تخطي إلى المحتوى
VuFind
  • شاركنا بملاحظاتك!
  • سلة الكتب: 0 مادة (ممتلئ)
  • تسجيل الدخول
    • العربية
    • الإنجليزية

اكتشف مناهل المعرفة!

استكشف مجموعتنا الشاملة من الكتب والمقالات والوسائط الرقمية وغيرها

بحث متقدم
  • الكل
  • فهرس المكتبة
  • المستودع الرقمي
  • القنوات
  • Remote Access Trojan Detection Method Based on Bidirectional Encoder Representations from Transformers /
البحث عن المزيد من القنوات:

مواد مشابهة: Remote Access Trojan Detection Method Based on Bidirectional Encoder Representations from Transformers /

Enhancing User Reputation Evaluation in Blockchain-Based Access Control for IoT using Fuzzy Logic and Decay Algorithms /

IoT-Based Remote HealthCare Monitoring System for the Pilgrims /

Ensemble-based Deep Learning Intrusion Detection System for Spoofing Attack on UAV /

Racism Detection in Twitter Using Deep Learning and Text Mining Techniques for the Arabic language /

A Hybrid Intelligent System for Prediction of Medical Diseases /

Multivariate Time-Series Anomaly Detection for Industrial Control Systems /

The tiger and the Trojan horse /

An Investigation of the Role of Image Properties in Influencing The Accuracy of Remote Sensing Change Detection Analysis /

Applying Machine Learning techniques to detect Money Laundering in Kingdom of Saudi Arabia /

Role-based access control /

Encoded Archival Description on the Internet /

Hybrid Deep Neural Network Based Recommendation Through ImplicitInteractions /

Seam Carving Based Two Levels Segmentation In Arabic Handwritten Documents /

Artificial intelligence Methods in Software Testing /

Introduction to remote sensing /

Knowledge-based systems in artificial intelligence /

The world as will and representation /

The world as will and representation.

Knowledge representation /

Sentiment Analysis of Twitter to Detect Signs of Depression using a Hybrid Model /

موضوع: Artificial intelligence

Intelligent systems design and applications /

The Investigation of the Effect of Ensemble Learning for Assisting the Employment Process /

Principles of data mining /

Arabic Sentiment Analysis Using Machine Learning Algorithms of Twitter Data Based on Spatial and Temporal Analysis - Case Study /

Branch and bound and A* search using fuzzy underestimates \

Artificial intelligence : a modern approach /

Application of agents and intelligent information technologies /

7th International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2009) /

Convolutional Neural Network and Long-short Term Memory Techniques for Human Identification Based on Heart Biometrics /

Seam Carving Based Two Levels Segmentation In Arabic Handwritten Documents /

Almost human : making robots think /

Knowledge-based systems in artificial intelligence /

Advances in applied artificial intelligence /

Branch and Bound and A Search Using Fuzzy Underestimates /

Encyclopedia of artificial intelligence /

Intelligent information technologies : concepts, methodologies, tools, and applications.

Intelligent computer graphics 2010 /

Metamagical themas : questing for the essence of mind and pattern /

Forecasting the Evolving Role of OpenAIand GPT-3 in the Future of ArtificialIntelligence : Implications for Society /

Applications of information systems to homeland security and defense /

موضوع: Electronic data processing

  • موضوع: Software engineering
  • موضوع: Management

Dictionnaire de l'informatique : francais, anglais, arabe : avec abreviations francaises, abreviations anglaises, lexique anglais-francais et glossaire arabe /

Discrete mathematics in computer science /

International Computing Symposium, 1977 : proceedings of the International Computing Symposium, 1977, Liege, Belgium, 4-7 April 1977 /

Introduction to probability and statistics : principles and applications for engineering and the computing sciences /

Data processing, an introduction with BASIC /

An Introduction to high-performance scientific computing /

Basic English for computing: Teacher's book/

A dictionary of computers/

The information age /

Computers and microprocessors made simple /

Electronic data processing/

Structured systems analysis : tools and techniques /

Minicomputers in libraries, 1979-80 /

Writing handbook for computer professionals /

Computing : a dictionary of terms, concepts and ideas /

Introduction to IBM data processing systems: student text

Introduction to computer data processing /

Computers and crisis : how computers are shaping our future /

Distributed systems : concepts and design /

Introduction to computers /

المؤلف: Al-Kathiry, Monirah Zaid

Remote Access Trojan Detection Method Based on Bidirectional Encoder Representations from Transformers /

المؤلف: BinSaeedan, Wojdan

Remote Access Trojan Detection Method Based on Bidirectional Encoder Representations from Transformers /

اكتشف المعرفة مع بوابة الاكتشاف الرقمي لجامعة الإمام محمد بن سعود الإسلامية

اطلع على آلاف الموارد الأكاديمية، والمواد البحثية، والمنشورات العلمية

ابدأ الاستكشاف الآن
Imam University Team
Imam University Logo

جامعة الإمام محمد بن سعود الإسلامية

الرياض، المملكة العربية السعودية
+966 11 259 5000
info@imamu.edu.sa

الموارد

  • استعراض الفهرس
  • استعرض أبجدياً
  • اكتشف القنوات
  • الحجز الأكاديمي
  • مواد جديدة
  • موارد تعليمية
  • ImamU API

البحث والمساعدة

  • بحث بسيط
  • بحث متقدم
  • سجل البحث
  • شاركنا بملاحظاتك!
  • إرشادات حول معاملات البحث
  • إسأل أخصائي مكتبات
  • مساعدة
  • الأسئلة الشائعة
  • اتفاقية مستوى الخدمة
  • اتفاقية المستخدم

تواصل معنا

© 2026 جامعة الإمام محمد بن سعود الإسلامية. جميع الحقوق محفوظة.

VuFind