تصفح محتويات المستودع باستخدام اسماء الناشرين

انت تشاهد مقالات الاستاذ  اسماء شاكر عاشور الزبيدي
عدد المقالات والبحوث 11 هذا الاستاذ ينشر تحت فئة كلية التربية الاساسية

moodle  722 Views
التعليم الالكتروني
invitetion  737 Views
invitetion
Network Intrusion Detection System Using Multi-Agents  936 Views
In this work, we propose a novel Network Intrusion Detection Systems (NIDSs) architecture utilizing the misuse detection approach.
Difference between Intrusion Detection System (IDS) & Intrusion Prevention System (IPS)  859 Views
This paper discusses difference between Intrusion Detection system and intrusion Prevention System (IDS/IPS) technology in computer networks
التعليم الالكتروني  941 Views
من اجل نجاح هذا النوع من التعليم هناك عدة شروط منها تحديد الاهداف التعلييمة
Misuse Detection System based- Snortrules- JESS Using Multiagents  845 Views
In this work, we propose a novel Network Intrusion Detection Systems (NIDSs) architecture utilizing the misuse detection approach.
Anomaly Detection Algorithm Using Multi-agents  702 Views
A Network intrusion detection system (NIDS) is gaining ever increasing importance in security of the information from network attacks.
Importance of Intrusion Detection System (IDS)  1052 Views
The researchers proposed a number of techniques such as (firewall, encryption) to prevent such penetration and protect the infrastructure of computers,
Computer Viruses in UNIX Environment: Case Study  1177 Views
All of people who don’t know how to use a computer have heard a bout viruses through programs such as hackers and some means like that
Difference between Intrusion Detection System (IDS) & Intrusion Prevention System (IPS)  1279 Views
This paper discusses difference between Intrusion Detection system and intrusion Prevention System (IDS/IPS) technology in computer networks
The Difference Between Hackers and Intruders: Case Study   2745 Views
This paper presents the difference between hackers and intruders with their main motives and intentions with their way of thinking, planning and performing attacks for their personal gain and as well as others gain.

This Page was dynamically generated on 4/27/2024 12:48 AM

البحث في الموقع

Authors, Titles, Abstracts

Full Text




خيارات العرض والخدمات


ادارة المستودع الاكاديمي


مجلة المحقق الحلي
مجلة العلوم الانسانية
مجلة العلوم التطبيقية والصرفة
احصائيات وارقام في المستودع
الدخول لحساب في الشبكة


link in the repository ادارة مستودع بيانات الجامعة

     uobabylon@gmail.com
     uob.it.operations@gmail.com
     uob.it.operations@uobabylon.edu.iq