暂无分享,去创建一个
[1] Hamed Vahdat-Nejad,et al. A New Approach to Quantify Network Security by Ranking of Security Metrics and Considering Their Relationships , 2018, Int. J. Netw. Secur..
[2] Lokman Akbay. TRANSITION TO MULTIDIMENSIONAL AND COGNITIVE DIAGNOSIS ADAPTIVE TESTING : AN OVERVIEW OF CAT , 2017 .
[3] Boukari Souley,et al. A Captcha - Based Intrusion Detection Model , 2018 .
[4] Rozilawati Razali,et al. An Empirical Study of Information Security Management Success Factors , 2016 .
[5] Tianli Li. Design and Implementation of Computer Network Vulnerability Assessment System , 2017, 2017 International Conference on Computer Systems, Electronics and Control (ICCSEC).
[6] Mudassir Khan,et al. COMPUTER SECURITY IN THE HUMAN LIFE , 2017 .
[7] Al-Furat Al-Awsat. Performance Analysis of Big Data Intrusion Detection System over Random Forest Algorithm , 2018 .
[8] Punam Shriram Wankhede. Security Attacks and Challenges of Wireless Sensor Network , 2019 .
[9] Shikun Zhou,et al. Evaluation the Performance of DMZ , 2018 .
[10] Dahlan Abdullah,et al. Lecturers’ Understanding on Indexing Databases of SINTA, DOAJ, Google Scholar, SCOPUS, and Web of Science: A Study of Indonesians , 2018 .
[11] R. Umarani,et al. The Design and Implementation of On-Line Examination Using Firewall security , 2014 .
[12] Jingsha He,et al. Multi-objective Optimization for Computer Security and Privacy , 2017, Int. J. Netw. Secur..
[13] Mansyur,et al. Detecting Differential Item Functioning and Differential Test Functioning on Math School Final-exam , 2016 .
[14] Sourabh Shrimali. DeMilitarized Zone: Network Architecture for Information Security , 2017 .
[15] nbspAastha Puri,et al. A NOVEL TECHNIQUE FOR INTRUSION DETECTION SYSTEM FOR NETWORK SECURITY USING HYBRID SVM-CART , 2017 .
[16] Akbar Iskandar. The Effect of Open Book Test Model in Improving Students' Learning Motivation , 2017 .