Found: 21 resources
Design and Implementation of a Proposal Network Firewall
Al-Khwarizmi Engineering Journal, 2006, Volume 2, Issue 1, Pages 52-69
Enhancement of Intrusion Detection Using Back Propagation Algorithm
Journal Of AL-Turath University College, 2010, Volume , Issue 9, Pages 159-171
AN IMPROVED DATA CONFIDENTIALITY PROTOCOL BASED ON TIMESTAMP
IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2012, Volume 12, Issue 1, Pages 53-59
Securing Wireless Sensor Network (WSN) Using Embedded Intrusion Detection Systems
Iraqi Journal for Electrical And Electronic Engineering, 2012, Volume 8, Issue 1 & 2, Pages 54-64
An Ontological Approach to Secure Address Resolution Protocol
AL-MANSOUR JOURNAL, 2014, Volume , Issue 21, Pages 59-75
An Adaptive Intrusion Detection System by using Decision Tree
Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 2, Pages 88-96 Comp
Miner Alerts Module to Generate Itemsets Based on FP-Growth Algorithm Improvement
Al-Mustansiriyah Journal of Science, 2018, Volume 29, Issue 1, Pages 114-117
A Study of Graph Theory Applications in IT Security
Iraqi Journal of Science, 2020, Volume 61, Issue 10, Pages 2705-2714
Analysis and Implementation of Kerberos Protocol in Hybrid Cloud Computing Environments
Engineering and Technology Journal, 2021, Volume 39, Issue 1part (B) Science, Pages