Found: 5
Select item for more details and to access through your institution.
Intrusion Detection System for Misbehaving WLAN Users.
- Published in:
- Journal of King Abdulaziz University: Computing & Information Technology Sciences, 2012, v. 1, n. 1, p. 55, doi. 10.4197/comp.1-1.3
- By:
- Publication type:
- Article
Challenges and Requirements of Digital Forensics Investigation in Wireless Ad-hoc Networks.
- Published in:
- International Journal of Advanced Research in Computer Science, 2012, v. 3, n. 1, p. 26
- By:
- Publication type:
- Article
Developing a Holistic Model for Assessing the ICT Impact on Organizations: A Managerial Perspective.
- Published in:
- Intelligent Automation & Soft Computing, 2019, v. 25, n. 2, p. 259, doi. 10.31209/2018.100000002
- By:
- Publication type:
- Article
Developing a framework and algorithm for scalability to evaluate the performance and throughput of CRM systems.
- Published in:
- Intelligent Automation & Soft Computing, 2017, v. 23, n. 1, p. 149, doi. 10.1080/10798587.2016.1184830
- By:
- Publication type:
- Article
Evaluation and comparison of open source software suites for data mining and knowledge discovery.
- Published in:
- WIREs: Data Mining & Knowledge Discovery, 2017, v. 7, n. 3, p. n/a, doi. 10.1002/widm.1204
- By:
- Publication type:
- Article