Anda belum login :: 22 Oct 2025 13:55 WIB
Home
|
Logon
Search
ยป
Advanced Search
Advanced Search
Title:
Author:
Topik:
Mata Kuliah:
Penerbit:
Tahun terbit:
Jenis:
Format:
Lokasi:
All
--
Ben & Nafsiah Mboi Collection
BI Corner
Frans Seda Collection
Kees Bertens Collection
Lab-Kom-FK
Perpustakaan FK
Perpustakaan PKBB
Perpustakaan PKPM
Perpustakaan Pusat (BSD)
Perpustakaan Pusat (Semanggi)
Perpustakaan RSAJ
Pusat Penelitian HIV AIDS
Fulltext:
All
Hanya yang memiliki fulltext
Hanya yang belum ada fulltext
Search
Hasil
1
-
20
dari
56
(
0.125
detik)
Select all
Kirim
Download
A Document Clustering Algorithm using a Fuzzy Approach
Author:
Mahanta, A. K.
;
Thaoroijam, K.
Artikel dari
Networks, security and soft computing: trends and future directions
, page 198-202
A Faster Clustering Technique for Intrinsic Cluster Detection Over Spatial Datasets
Author:
Sarmah, S.
;
Das, R.
;
Bhattacharyya, D. K.
Artikel dari
Networks, security and soft computing: trends and future directions
, page 147-154
A Fresh Proposal for Design of a High Performance Query Answering Search Engine
Author:
Kumar, S.
;
Prasad, J. S.
;
Srivastava, R.
Artikel dari
Networks, security and soft computing: trends and future directions
, page 190-197
A Low Latency and Energy Efficient MAC for Wireless Sensor Networks
Author:
Singarapu, R.
;
Nandi, S.
Artikel dari
Networks, security and soft computing: trends and future directions
, page 1-7
A New Sorting Algorithm
Author:
Mohanty, S. P.
;
Ray, B. N. B.
;
Patro, S. N.
;
Rath, B. K.
Artikel dari
Networks, security and soft computing: trends and future directions
, page 234-235
A Secure Scheme for Detecting TCP SYN Attacks
Author:
Mal, S.
;
Bhattacharyya, D. K.
Artikel dari
Networks, security and soft computing: trends and future directions
, page 74-81
A Survey of Techniques and Trends in Clustering for Data Mining
Author:
Ghosh, S.
Artikel dari
Networks, security and soft computing: trends and future directions
, page 125-132
Abusing the internet of things: blackouts, freakouts, and stakeouts
Author:
Dhanjani, Nitesh
Edisi:
1st ed.
Penerbit:
Beijing:
O'Reilly
Tahun terbit:
2015
Jenis:
Books - Textbook
An Alternate Failure Tolerant Model for Multipath Routing of Sensor Network
Author:
Acharjee, D.
;
Sarma, N.
Artikel dari
Networks, security and soft computing: trends and future directions
, page 236-238
Attribute Based Hierarchical Clustering Algorithm
Author:
Singh, G. K.
;
Minz, S.
Artikel dari
Networks, security and soft computing: trends and future directions
, page 177-183
CAMAN : A CA Based Authentication Scheme for MANET
Author:
Choudhury, J. S.
;
Das, Y.
;
Das, R. K.
;
Bhattacharyya, D. K.
Artikel dari
Networks, security and soft computing: trends and future directions
, page 63-73
Computer security : principles and practice
Author:
Stallings, William
;
Brown, Lawrie
Edisi:
3rd ed.
Penerbit:
Boston:
Pearson Education
Tahun terbit:
2015
Jenis:
Books - E-Book
Computer security : art and science
Author:
Bishop, Matt
Edisi:
2nd ed.
Penerbit:
New York:
Pearson Education
Tahun terbit:
2019
Jenis:
Books - E-Book
Consolidating AffIX Evidence for Classification of Words
Author:
Sharma, U.
;
Das, R. K.
;
Kalita, J.
Artikel dari
Networks, security and soft computing: trends and future directions
, page 208-215
Cryptography and network security: principles and practice
Author:
Stallings, William
Edisi:
7th ed.
Penerbit:
Harlow, England:
Pearson Education
Tahun terbit:
2017
Jenis:
Books - E-Book
Cryptography and network security: principles and practice
Author:
Stallings, William
Edisi:
6th ed.
Penerbit:
Boston:
Pearson Education
Tahun terbit:
2014
Jenis:
Books - Textbook
Data Clustering: An Overview from Soft Computing Perspective
Author:
Begum, S. A.
;
Purkayastha, B. S.
;
Som, T.
Artikel dari
Networks, security and soft computing: trends and future directions
, page 169-176
Defense Against DDoS by using IP Spoof Detection and Push Forward Mechanism
Author:
Pathare, S.
;
Sawant, P.
;
Nandi, S.
Artikel dari
Networks, security and soft computing: trends and future directions
, page 91-95
Detection of Cold Lesions in SPECT Images of Cardiac
Author:
Devi, S.
;
Dutta, M.
Artikel dari
Networks, security and soft computing: trends and future directions
, page 216-219
Dimensionality Reduction using Multi-Objective Genetic Algorithm
Author:
Nath, B.
;
Bhattacharyya, D. K.
;
Ghosh, A.
Artikel dari
Networks, security and soft computing: trends and future directions
, page 155-161
Awal Sebelumnya
Berikutnya
Akhir
Halaman
dari 3
Lompat
Process time: 0.140625 second(s)