Skip to content
VuFind
  • Feedback
  • Book Bag: 0 items (Full)
  • Login
    • العربية
    • الإنجليزية

Discover Knowledge Resources!

Explore our comprehensive collection of books, articles, digital media, and more

Advanced
  • OneSearch
  • Library Catalog
  • Digital Repository
  • Channels
  • Development of a network-based intrusion prevention system using data mining approach \
Search for more channels:

Similar Items: Development of a network-based intrusion prevention system using data mining approach \

Developing a host intrusion prevention system by using data mining \

Salp Swarm-Based Feature Selection Algorithms for Anomaly Detection in Network Security /

Network security : how to plan for it and achieve it /

Data communications and networking /

Network security essentials : applications and standards /

Computer networking : a top-down approach /

Computer networking : a top-down approach /

Computer networking : A TOP- DOWN APPROACH /

Network security essentials : applications and standards /

Data mining : practical machine learning tools and techniques /

Data Warehousing and Data Mining Techniques for Cyber Security /

Principles of data mining /

Principles of data mining /

Business data networks and telecommunications /

A Technique For Face Recognition Using Approach Based On Artificial Neural Network And Principal Component Analysis \

Business data communications and networking /

Network security : private communication in a public world /

Fundamental networking in Java /

Computer networking and the Internet /

Data and knowledge protection in data mining \

Topic: Computer networks

Library and information networks in the United Kingdom /

Principles of information security /

Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \

Development and performance analysis of hybrid IPSec SSL VPN technology \

Building the knowledge society on the Internet : sharing and exchanging knowledge in networked environments /

Enhancement of IEEE 802.11 layer handoff process and protocol \

E-business /

E-Commerce systems architecture and applications

Electronic finance : a new approach to financial sector development? /

Enhancing IoT Device Security : A Comparative Analysis of Machine Learning Algorithms for Attack Detection /

The effects of time triggered Ethernet on the network \

AN INTRODUCTION TO OSI / INCHOLAS HEAP

Introduction to E-business : Management and strategy /

Design and analysis of computer communication networks /

Convolutional Neural Network and Long-short Term Memory Techniques for Human Identification Based on Heart Biometrics /

Networking in easy steps /

Computer networks : principles, technologies, and protocols for network design /

Cumputer Networks Lab /

Making search work : implementing Web, intranet, and enterprise search /

Introduction to information systems /

Topic: Computer programs

  • Topic: Computer security
  • Topic: Internet (Computer network)
  • Topic: Security measures

Dummies 101.

Information technology project management /

Quick Books pro 2006 : a complete course : with updates for 2007 /

Understanding 1-2-3, Release 2.3/

Supercritical wing sections III /

Web development & design foundations with XHTML /

Microsoft Access 2013 : a case approach /

New perspectives on Microsoft Office 2013 : first course /

How to build a digital library /

Information technology project management : providing measurable organizational value /

Teach yourself Microsoft Office 2000 /

Intelligent E-commerce system development using an intelligent agent and natural language understanding /

Digital copyright /

IT and office software /

Software for indexing /

Microsoft PowerPoint 2013 : Advanced /

FastSOA : The way to use native XML Technology to achieve Service Oriented Architecture governance, scalability, and performance /

Microsoft Office 2013 : introductory /

Some common Pascal programs : based on the book Some common BASIC programs

GO! with Microsoft PowerPoint 2010 : introductory /

Author: Al-Sammerai, Nagham Farouk

Development of a network-based intrusion prevention system using data mining approach \

Author: Al-Hamami, Alaa Hussein

Improving the delay in voice over internet protocol (VOIP) wireless Lan \

Development of a network-based intrusion prevention system using data mining approach \

A steganography-based SMS and MMS services for secure messages exchange on mobile networks \

A technique for concealing confidential information inside an image over an unsecure network \

Data and knowledge protection in data mining \

The role of coordination between research and development (R&D) and marketing in a chieving competitive advantage in the pharmaceutical industry \

Discover Knowledge with Imam University's Digital Discovery Portal

Access thousands of academic resources, research materials, and scholarly publications

Start Exploring Now
Imam University Team
Imam University Logo

Imam Muhammad Ibn Saud Islamic University

Riyadh, Kingdom of Saudi Arabia
+966 11 259 5000
info@imamu.edu.sa

Resources

  • Browse the Catalog
  • Browse Alphabetically
  • Explore Channels
  • Course Reserves
  • New Items
  • Educational resources
  • ImamU API

Search & Help

  • Basic search
  • Advanced search
  • Search history
  • Feedback
  • Search Tips
  • Ask a Librarian
  • Help
  • FAQs
  • Service level agreement
  • End User Agreement

Connect With Us

© 2026 Imam Muhammad Ibn Saud Islamic University. All rights reserved.

VuFind