Skip to content
VuFind
  • Feedback
  • Book Bag: 0 items (Full)
  • Login
    • العربية
    • الإنجليزية

Discover Knowledge Resources!

Explore our comprehensive collection of books, articles, digital media, and more

Advanced
  • OneSearch
  • Library Catalog
  • Digital Repository
  • Channels
  • Anonymization of Host-Based Logs for Preserving Data Privacy and Security Monitoring Utility /
Search for more channels:

Similar Items: Anonymization of Host-Based Logs for Preserving Data Privacy and Security Monitoring Utility /

Data Warehousing and Data Mining Techniques for Cyber Security /

Principles of data security /

Pervasive information security and privacy developments : trends and advancements /

Developing a host intrusion prevention system by using data mining \

Secure E-Voting system using Secure Multiparty Computation (SMC) for user data privacy /

Investigative data mining for security and criminal detection /

Managing information systems security and privacy /

Information security fundamentals /

Digital preservation /

Security in computing /

Security in computing /

Data and knowledge protection in data mining \

Improving Privacy in Decentralized Identity Management Systems with Distributed Ledger Technology (blockchain) as Infrastructure /

Privacy and access to government data for research : an international bibliography /

IoT Based Solution for Tracking, Locating and Monitoring the Pilgrim's Health During Hajj /

Information security : principles and practices /

Data mining : concepts and techniques /

Data mining : concepts and techniques /

Introduction to Data Mining /

Knowledge-based business intelligence depends on data mining technique \

Topic: Computer security

Principles of information security /

Integrating security and software engineering : advances and future visions /

Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \

Information security : principles and practice /

Encyclopedia of information ethics and security /

Information hiding technique in digital image using transform domain \

Foundations of computer science : from data manipulation to theory of computation /

Network security : private communication in a public world /

Bi-directional transition mechanism between IPv4 and IPv6 \

The art of software security assessment : identifying and preventing software vulnerabilities /

Risk Assessment in Cyber-Physical System /

Foundations of computer security /

Information security fundamentals /

A method for improving the Bluetooth key exchange security /

A hybrid fingerprint identification & verification algorithm \

Computer security : principles and practice /

Information security : a strategic approach /

Information security applications : 6th international workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005 : revised selected papers /

Information security : principles and practices /

Security in computing /

Topic: Data Mining

  • Topic: Data protection

The Investigation of the Effect of Ensemble Learning for Assisting the Employment Process /

Automatic Qurʼān Tutor to Assist Qurʼānic Recitation with Neural Network /

Supervised Learning Approach for Knowledge Extraction & Decision-Making Process usinggenome sequence in Bioinformatics /

Forecasting the Evolving Role of OpenAIand GPT-3 in the Future of ArtificialIntelligence : Implications for Society /

Voice Command and Gesture Recognition using Multimodal Deep Learning /

Solving the Multiple Traveling Salesman Problem by Hybrid Genetic Algorithm /

Detecting Violence In Videos Using Movies Transcripts (Arabic Movie Or Dubbed Animations) By Using Text Mining Techniques /

Artificial Intelligence Governance in Public Sector /

Improve the Usability of Government Applications for Elderlies in the Kingdom of Saudi Arabia /

Identifying Fake Twitter Trends with Deep Learning /

Enhancing Pre-trained Arabic Language Models with Structured Knowledge /

Anonymization of Host-Based Logs for Preserving Data Privacy and Security Monitoring Utility /

Knowledge discovery and data mining : challenges and realities /

Author: Alabdi, Sadeem

Anonymization of Host-Based Logs for Preserving Data Privacy and Security Monitoring Utility /

Author: Aljumaah, Feras

Anonymization of Host-Based Logs for Preserving Data Privacy and Security Monitoring Utility /

Discover Knowledge with Imam University's Digital Discovery Portal

Access thousands of academic resources, research materials, and scholarly publications

Start Exploring Now
Imam University Team
Imam University Logo

Imam Muhammad Ibn Saud Islamic University

Riyadh, Kingdom of Saudi Arabia
+966 11 259 5000
info@imamu.edu.sa

Resources

  • Browse the Catalog
  • Browse Alphabetically
  • Explore Channels
  • Course Reserves
  • New Items
  • Educational resources
  • ImamU API

Search & Help

  • Basic search
  • Advanced search
  • Search history
  • Feedback
  • Search Tips
  • Ask a Librarian
  • Help
  • FAQs
  • Service level agreement
  • End User Agreement

Connect With Us

© 2026 Imam Muhammad Ibn Saud Islamic University. All rights reserved.

VuFind