Found: 14 resources
Design and Implementation of a Proposal Network Firewall
Al-Khwarizmi Engineering Journal, 2006, Volume 2, Issue 1, Pages 52-69
Enhancement of Intrusion Detection Using Back Propagation Algorithm
Journal Of AL-Turath University College, 2010, Volume , Issue 9, Pages 159-171
AN IMPROVED DATA CONFIDENTIALITY PROTOCOL BASED ON TIMESTAMP
IRAQI JOURNAL OF COMPUTERS, COMMUNICATION, CONTROL & SYSTEMS ENGINEERING, 2012, Volume 12, Issue 1, Pages 53-59
Securing Wireless Sensor Network (WSN) Using Embedded Intrusion Detection Systems
Iraqi Journal for Electrical And Electronic Engineering, 2012, Volume 8, Issue 1 & 2, Pages 54-64
An Ontological Approach to Secure Address Resolution Protocol
AL-MANSOUR JOURNAL, 2014, Volume , Issue 21, Pages 59-75
An Adaptive Intrusion Detection System by using Decision Tree
Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 2, Pages 88-96 Comp
Miner Alerts Module to Generate Itemsets Based on FP-Growth Algorithm Improvement
Al-Mustansiriyah Journal of Science, 2018, Volume 29, Issue 1, Pages 114-117
A Study of Graph Theory Applications in IT Security
Iraqi Journal of Science, 2020, Volume 61, Issue 10, Pages 2705-2714
Security Issues of Solar Energy Harvesting Road Side Unit (RSU)
Iraqi Journal for Electrical And Electronic Engineering, 2015, Volume 11, Issue 1, Pages 18-31
Storage Architecture for Network Security in Cloud Computing
Diyala Journal For Pure Science, 2018, Volume 14, Issue 1 - Part 1, Pages 1-17