تخطي إلى المحتوى
VuFind
  • شاركنا بملاحظاتك!
  • سلة الكتب: 0 مادة (ممتلئ)
  • تسجيل الدخول
    • العربية
    • الإنجليزية

اكتشف مناهل المعرفة!

استكشف مجموعتنا الشاملة من الكتب والمقالات والوسائط الرقمية وغيرها

بحث متقدم
  • الكل
  • فهرس المكتبة
  • المستودع الرقمي
  • القنوات
  • Salp Swarm-Based Feature Selection Algorithms for Anomaly Detection in Network Security /
البحث عن المزيد من القنوات:

مواد مشابهة: Salp Swarm-Based Feature Selection Algorithms for Anomaly Detection in Network Security /

Network security : how to plan for it and achieve it /

Network security essentials : applications and standards /

Network security essentials : applications and standards /

Network security : private communication in a public world /

Cryptography and network security : principles and practice /

Virus detection using artificial immune system with genetic algorithm \

Wireless network security : a beginner's guide /

Resource Allocation Based on Swarm Intelligence for Securing Cloud Environment Against Multi-Tenancy Attack /

Enhancing IoT Device Security : A Comparative Analysis of Machine Learning Algorithms for Attack Detection /

Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \

New leader election algorithms in hypercube networks \

New leader election algorithms in hypercube networks \

Secure roaming in 802.11 networks /

Features Selection for Image Steganalysis Using Swarm Intelligence /

Computer security : principles and practice /

Principles of information security /

Principles of information security /

Proposed method of factorization analysis to break the RSA algorithm \

Investigative data mining for security and criminal detection /

Information security : principles and practices /

موضوع: Algorithms

Interactive computer graphics : data structures, algorithms, languages /

A Metaheuristic to Solve the Capacitated Clustering Problem /

Quality of service routing for multimedia multicast over Ad Hoc networks \

Algorithmic game theory /

Algorithmic methods in non-commutative algebra : applications to quantum groups /

Diagnosis and mastery treatment in mathematics a strategy for renadial teaching in the upper forms of Egyptian primary schools /

Enhanced Method for RSA cryptoststem algorithm \

Programming.architecture/

Planning algorithms /

Multi-Robot Path Planning Problem : a Complete Polynomial Method /

Calculation of medication dosages : practical strategies to ensure safety and accuracy /

Digital image processing algorithms and applications /

Salp Swarm-Based Feature Selection Algorithms for Anomaly Detection in Network Security /

Genetic Algorithm for the Generalized Travelling Salesman Problem /

An Energy Efficient Routing Algorithm Using Chaotic Grey Wolf with Mobile Sink-Based Path Optimization for Wireless Sensor Networks /

Predicting the Severity of COVID-19 in the Kingdom of Saudi Arabia using Machine Learning Algorithms /

موضوع: Computer networks

  • موضوع: Computer security
  • موضوع: Security measures

Library and information networks in the United Kingdom /

Principles of information security /

Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \

Development and performance analysis of hybrid IPSec SSL VPN technology \

Building the knowledge society on the Internet : sharing and exchanging knowledge in networked environments /

Enhancement of IEEE 802.11 layer handoff process and protocol \

E-business /

E-Commerce systems architecture and applications

Electronic finance : a new approach to financial sector development? /

Enhancing IoT Device Security : A Comparative Analysis of Machine Learning Algorithms for Attack Detection /

The effects of time triggered Ethernet on the network \

AN INTRODUCTION TO OSI / INCHOLAS HEAP

Introduction to E-business : Management and strategy /

Design and analysis of computer communication networks /

Convolutional Neural Network and Long-short Term Memory Techniques for Human Identification Based on Heart Biometrics /

Networking in easy steps /

Computer networks : principles, technologies, and protocols for network design /

Cumputer Networks Lab /

Making search work : implementing Web, intranet, and enterprise search /

Introduction to information systems /

المؤلف: Alsaleh, Alanoud Khaled

Salp Swarm-Based Feature Selection Algorithms for Anomaly Detection in Network Security /

المؤلف: Binsaeedan, Wojdan M.

Salp Swarm-Based Feature Selection Algorithms for Anomaly Detection in Network Security /

Resource Allocation Based on Swarm Intelligence for Securing Cloud Environment Against Multi-Tenancy Attack /

اكتشف المعرفة مع بوابة الاكتشاف الرقمي لجامعة الإمام محمد بن سعود الإسلامية

اطلع على آلاف الموارد الأكاديمية، والمواد البحثية، والمنشورات العلمية

ابدأ الاستكشاف الآن
Imam University Team
Imam University Logo

جامعة الإمام محمد بن سعود الإسلامية

الرياض، المملكة العربية السعودية
+966 11 259 5000
info@imamu.edu.sa

الموارد

  • استعراض الفهرس
  • استعرض أبجدياً
  • اكتشف القنوات
  • الحجز الأكاديمي
  • مواد جديدة
  • موارد تعليمية
  • ImamU API

البحث والمساعدة

  • بحث بسيط
  • بحث متقدم
  • سجل البحث
  • شاركنا بملاحظاتك!
  • إرشادات حول معاملات البحث
  • إسأل أخصائي مكتبات
  • مساعدة
  • الأسئلة الشائعة
  • اتفاقية مستوى الخدمة
  • اتفاقية المستخدم

تواصل معنا

© 2026 جامعة الإمام محمد بن سعود الإسلامية. جميع الحقوق محفوظة.

VuFind