Skip to content
VuFind
  • Feedback
  • Book Bag: 0 items (Full)
  • Login
    • العربية
    • الإنجليزية

Discover Knowledge Resources!

Explore our comprehensive collection of books, articles, digital media, and more

Advanced
  • OneSearch
  • Library Catalog
  • Digital Repository
  • Channels
  • Virus detection using artificial immune system with genetic algorithm \
Search for more channels:

Similar Items: Virus detection using artificial immune system with genetic algorithm \

Adaptive genetic algorithm for production system \

A hybrid fingerprint identification & verification algorithm \

Salp Swarm-Based Feature Selection Algorithms for Anomaly Detection in Network Security /

Proposed method of factorization analysis to break the RSA algorithm \

Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \

Controlling software projects using genetic algorithm /

Infection, immunity, and genetics /

Classification and learning using genetic algorithms : applications in bioinformatics and web intelligence /

Genetic algorithms in search, optimization, and machine learning /

Arabic Handwritten Character Segmentation Using Graph Theory Algorithm /

Improving the performance of naïve nayes algorithm for Arabic text categorization \

Detecting Threats from Live videos Using Deep Learning Algorithms /

Optimal seat suspension desing for a quarter car with human-body model using genetic algorithms \

Genetic Algorithm for the Generalized Travelling Salesman Problem /

Study the Effectiveness of Genetic Algorithms for Solving the DNA Fragments Assembly Optimization Problem /

How the immune system works /

Algorithms /

Nanoparticles and the immune system : safety and effects /

Infection and immunity /

Introduction to algorithms /

Topic: Computer networks

Library and information networks in the United Kingdom /

Principles of information security /

Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \

Development and performance analysis of hybrid IPSec SSL VPN technology \

Building the knowledge society on the Internet : sharing and exchanging knowledge in networked environments /

Enhancement of IEEE 802.11 layer handoff process and protocol \

E-business /

E-Commerce systems architecture and applications

Electronic finance : a new approach to financial sector development? /

Enhancing IoT Device Security : A Comparative Analysis of Machine Learning Algorithms for Attack Detection /

The effects of time triggered Ethernet on the network \

AN INTRODUCTION TO OSI / INCHOLAS HEAP

Introduction to E-business : Management and strategy /

Design and analysis of computer communication networks /

Convolutional Neural Network and Long-short Term Memory Techniques for Human Identification Based on Heart Biometrics /

Networking in easy steps /

Computer networks : principles, technologies, and protocols for network design /

Cumputer Networks Lab /

Making search work : implementing Web, intranet, and enterprise search /

Introduction to information systems /

Topic: Computer security

  • Topic: Genetic algorithms
  • Topic: Software engineering
  • Topic: Immune System
  • Topic: Security measures

Principles of information security /

Integrating security and software engineering : advances and future visions /

Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \

Information security : principles and practice /

Encyclopedia of information ethics and security /

Information hiding technique in digital image using transform domain \

Foundations of computer science : from data manipulation to theory of computation /

Network security : private communication in a public world /

Bi-directional transition mechanism between IPv4 and IPv6 \

The art of software security assessment : identifying and preventing software vulnerabilities /

Risk Assessment in Cyber-Physical System /

Foundations of computer security /

Information security fundamentals /

A method for improving the Bluetooth key exchange security /

A hybrid fingerprint identification & verification algorithm \

Computer security : principles and practice /

Information security : a strategic approach /

Information security applications : 6th international workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005 : revised selected papers /

Information security : principles and practices /

Security in computing /

Author: Afaneh, Suha M. A.

Virus detection using artificial immune system with genetic algorithm \

Author: Abu Zitar, Raed

  • Author: Al-Hamamim, Alaa

Virus detection using artificial immune system with genetic algorithm \

Discover Knowledge with Imam University's Digital Discovery Portal

Access thousands of academic resources, research materials, and scholarly publications

Start Exploring Now
Imam University Team
Imam University Logo

Imam Muhammad Ibn Saud Islamic University

Riyadh, Kingdom of Saudi Arabia
+966 11 259 5000
info@imamu.edu.sa

Resources

  • Browse the Catalog
  • Browse Alphabetically
  • Explore Channels
  • Course Reserves
  • New Items
  • Educational resources
  • ImamU API

Search & Help

  • Basic search
  • Advanced search
  • Search history
  • Feedback
  • Search Tips
  • Ask a Librarian
  • Help
  • FAQs
  • Service level agreement
  • End User Agreement

Connect With Us

© 2026 Imam Muhammad Ibn Saud Islamic University. All rights reserved.

VuFind