استكشف مجموعتنا الشاملة من الكتب والمقالات والوسائط الرقمية وغيرها
Ensemble-based Deep Learning Intrusion Detection System for Spoofing Attack on UAV /
Detecting the risk of violence from the language used in a threat \
Virus detection using artificial immune system with genetic algorithm \
Racism Detection in Twitter Using Deep Learning and Text Mining Techniques for the Arabic language /
Deep learning /
Using Deep Learning Algorithms to Diagnose Coronavirus Disease (COVID-19) /
Salp Swarm-Based Feature Selection Algorithms for Anomaly Detection in Network Security /
Prediction of Volatility in Stock Commodities using Deep Learning /
Detecting Sensitive Information For Data Loss Prevention Using Layers Selection In Deep Learning/
Living and learning /
Arabic Image Caption Generator Using Deep Learning Techniques /
Learning to live; flags on the battlements.
Accuracy Analysis of Machine Learning Algorithms in Detecting Fals Alarms For IOT Networks /
Classification and learning using genetic algorithms : applications in bioinformatics and web intelligence /
Voice Command and Gesture Recognition using Multimodal Deep Learning /
Enhancing Saudi High School Students Intrinsic Motivation when learning \
Learning to live with others : a high school psychology /
Algorithms /
Identifying Fake Twitter Trends with Deep Learning /
The origin of cells from living substance /
Principles of information security /
Integrating security and software engineering : advances and future visions /
Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \
Information security : principles and practice /
Encyclopedia of information ethics and security /
Information hiding technique in digital image using transform domain \
Foundations of computer science : from data manipulation to theory of computation /
Network security : private communication in a public world /
Bi-directional transition mechanism between IPv4 and IPv6 \
The art of software security assessment : identifying and preventing software vulnerabilities /
Risk Assessment in Cyber-Physical System /
Foundations of computer security /
Information security fundamentals /
A method for improving the Bluetooth key exchange security /
A hybrid fingerprint identification & verification algorithm \
Computer security : principles and practice /
Information security : a strategic approach /
Information security applications : 6th international workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005 : revised selected papers /
Information security : principles and practices /
Security in computing /
A Unified Framework for Automating Software Security Analysis in DevSecOps /
Detecting Threats from Live videos Using Deep Learning Algorithms /
Trust in E-services : technologies, practices and challenges /
Computer Network System for University Hospitals in Saudi Arabia /
Architecture of computing systems--ARCS 2007 : 20th international conference, Zurich, Switzerland, March 12-15, 2007 /
Customer Churn Prediction in the Telecom Industry Using Machine Learning Techniques /
The Effectiveness of Introducing Programming Through Gamification Approach in Primary Schools to Enhance Creative Thinking Skills /
Visualization of Arabic Entities in Online Social Media using Machine Learning /
Adoption of Learning Relationship Management (LRM) Platform for Enhancing Student Learning and Satisfaction in Saudi Universities /
Applying Machine Learning techniques to detect Money Laundering in Kingdom of Saudi Arabia /
Severity Prediction in COVID-19 Patients Using Machine Learning Algorithms /