Search results for: Nur Izura Udzir
Lecture Notes in Computer Science > Computational Intelligence in Security for Information Systems > Chapter 5: Applications of Intelligent Methods for Security > 272-284
Journal of Intelligent Information Systems > 2017 > 48 > 2 > 399-420
Studies in Computational Intelligence > Opportunities and Challenges for Next-Generation Applied Intelligence > Mining Interesting Knowledge > 329-334
Communications in Computer and Information Science > Networked Digital Technologies > Information Security > 37-46
Communications in Computer and Information Science > Digital Enterprise and Information Systems > XML-Based Languages > 466-477
Communications in Computer and Information Science > Digital Enterprise and Information Systems > Data Mining > 569-579
Communications in Computer and Information Science > Software Engineering and Computer Systems > Information and Data Management > 177-189
Communications in Computer and Information Science > Networked Digital Technologies > Information Security > 24-36
Communications in Computer and Information Science > Informatics Engineering and Information Science > Information Security > 409-420
Arabian Journal for Science and Engineering > 2016 > 41 > 8 > 2927-2943
Computer Fraud & Security > 2015 > 2015 > 8 > 9-13
Procedia Computer Science > 2015 > 56 > Complete > 370-375