23 results on '"Jantan, Aman"'
Search Results
2. Towards Understanding the Challenges of Data Remanence in Cloud Computing: A Review
3. The Age of Ransomware
4. A Review on TLS Encryption Malware Detection: TLS Features, Machine Learning Usage, and Future Directions
5. Ransomware Evolution: Solving Ransomware Attack Challenges
6. The Age of Ransomware
7. Hybridizing Bat Algorithm with Modified Pitch Adjustment Operator for Numerical Optimization Problems
8. A Novel Hybrid Artificial Bee Colony with Monarch Butterfly Optimization for Global Optimization Problems
9. A Similarity Model to Estimate Attack Strategy Based on Intentions Analysis for Network Forensics
10. A Framework for Optimizing Malware Classification by Using Genetic Algorithm
11. A New Approach Based on Honeybee to Improve Intrusion Detection System Using Neural Network and Bees Algorithm
12. A Framework for Defining Malware Behavior Using Run Time Analysis and Resource Monitoring
13. A Secure Storage Model to Preserve Evidence in Network Forensics
14. Attack Intention Analysis Model for Network Forensics
15. F-IDS: A Technique for Simplifying Evidence Collection in Network Forensics
16. Privacy Risk Diagnosis: Mining l-Diversity
17. Clustering-Based Frequency l-Diversity Anonymization
18. Honeybee-Based Model to Detect Intrusion
19. An Approach for Anomaly Intrusion Detection Based on Causal Knowledge-Driven Diagnosis and Direction
20. Privacy Risk Diagnosis: Mining l-Diversity.
21. Honeybee-Based Model to Detect Intrusion.
22. Clustering-Based Frequency l-Diversity Anonymization.
23. An Approach for Anomaly Intrusion Detection Based on Causal Knowledge-Driven Diagnosis and Direction.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.