Found: 5
Select item for more details and to access through your institution.
Web Attack Intrusion Detection System Using Machine Learning Techniques.
- Published in:
- International Journal of Online & Biomedical Engineering, 2024, v. 20, n. 3, p. 24, doi. 10.3991/ijoe.v20i03.45249
- By:
- Publication type:
- Article
Measuring Software Quality in Use: State-of-the-Art and Research Challenges.
- Published in:
- Software Quality Professional, 2015, v. 17, n. 2, p. 4
- By:
- Publication type:
- Article
REQUIREMENTS ELICITATION APPROACH FOR CYBER SECURITY SYSTEMS.
- Published in:
- i-Manager's Journal on Software Engineering, 2016, v. 10, n. 3, p. 1, doi. 10.26634/jse.10.3.4898
- By:
- Publication type:
- Article
An Implementation Framework (IF) for the National Information Assurance and Cyber Security Strategy (NIACSS) of Jordan.
- Published in:
- International Arab Journal of Information Technology (IAJIT), 2013, v. 10, n. 4, p. 342
- By:
- Publication type:
- Article
A Spiral Software Engineering Model to Inspire Innovation and Creativity of University Students.
- Published in:
- International Journal of Engineering Pedagogy, 2019, v. 9, n. 5, p. 7, doi. 10.3991/ijep.v9i5.10993
- By:
- Publication type:
- Article