Explore our comprehensive collection of books, articles, digital media, and more
Development of a network-based intrusion prevention system using data mining approach \
Data Warehousing and Data Mining Techniques for Cyber Security /
Data mining : concepts and techniques /
Intelligent data mining : techniques and applications /
Introduction to Data Mining /
Data and knowledge protection in data mining \
Anonymization of Host-Based Logs for Preserving Data Privacy and Security Monitoring Utility /
Data mining : practical machine learning tools and techniques /
Encyclopedia of data warehousing and mining /
Investigative data mining for security and criminal detection /
Data mining introductory and advanced topics /
Knowledge discovery and data mining : challenges and realities /
Web data mining : exploring hyperlinks, contents, and usage data /
University student information system development using data warehouse \
Quality measures in data mining /
Principles of data mining /
Developing a data dictionary system /
Fundamentals of data mining in genomics and proteomics /
Library and information networks in the United Kingdom /
Principles of information security /
Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \
Development and performance analysis of hybrid IPSec SSL VPN technology \
Building the knowledge society on the Internet : sharing and exchanging knowledge in networked environments /
Enhancement of IEEE 802.11 layer handoff process and protocol \
E-business /
E-Commerce systems architecture and applications
Electronic finance : a new approach to financial sector development? /
Enhancing IoT Device Security : A Comparative Analysis of Machine Learning Algorithms for Attack Detection /
The effects of time triggered Ethernet on the network \
AN INTRODUCTION TO OSI / INCHOLAS HEAP
Introduction to E-business : Management and strategy /
Design and analysis of computer communication networks /
Convolutional Neural Network and Long-short Term Memory Techniques for Human Identification Based on Heart Biometrics /
Networking in easy steps /
Computer networks : principles, technologies, and protocols for network design /
Cumputer Networks Lab /
Making search work : implementing Web, intranet, and enterprise search /
Introduction to information systems /
Visualizing discovered knowledge in databases mining \
Seam Carving Based Two Levels Segmentation In Arabic Handwritten Documents /
Fundamentals of database systems /
Research and trends in data mining technologies and applications /
Evaluating the Performance of Multiple Sequence Alignment Algorithms with Application to Genotyping SARS-CoV-2 for Saudis Population /
Mining the social web /
Visualization of Arabic Entities in Online Social Media using Machine Learning /
Handbook of research on fuzzy information processing in databases /
Cyberbullying Detection Using Text Mining Techniques and Semantic Resources in the Arabic Language / By Alanood Hamad Abdulaziz supervised by Muhammad Badruddin Khan
Automatic Temporal Classification of Arabic Texts /
Advanced data mining and applications : second international conference, ADMA 2006, Xi'an, China, August 14-16, 2006 : proceedings /
Features Selection for Image Steganalysis Using Swarm Intelligence /
Intelligent information processing and web mining : proceedings of the international IIS: IIPWM'06 conference held in Ustron, Poland, June 19-22, 2006 /
A Unified Framework for Automating Software Security Analysis in DevSecOps /
Developing a host intrusion prevention system by using data mining \
A proposal for treatments of habitual and fuzzy SQL commands \
Improving security performance on the banking system distributed database \
ARMA model orders and parameters estimation using evolutionary algorithm= تقدير درجة ومعاملات متسلسلات المتوسط المتحرك التدريجي الذاتي باستخدام الخوارزميات المتطورة /
Design and implementation of parameter tuning on Oracle DBMS \