Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request
Academic Journal

The detection method of identification terms for intrusion detection system.

Subjects: CYBERTERRORISM; FUZZY systems; INTRUSION detection systems (Computer security)

  • Source: Ukrainian Scientific Journal of Information Security; 2014, Vol. 20 Issue 3, p217-223, 7p

Record details

×
Academic Journal

Modern methods of computer steganography systematization.

Subjects: CRYPTOGRAPHY; INFORMATION technology security; LIE detectors & detection

  • Source: Ukrainian Scientific Journal of Information Security; 2013, Vol. 19 Issue 3, p209-217, 9p

Record details

×
  • 1-5 of  5 results for ""COMPUTER security research""