Skip to content
VuFind
Advanced
  • Attack Intention Recognition:...
  • Cite this
  • Print
  • Export Record
    • Export to RefWorks
    • Export to EndNoteWeb
    • Export to EndNote
  • Permanent link
Attack Intention Recognition: A Review

Attack Intention Recognition: A Review

Sensitive information faces critical risks when it is transmitted through computer networks. Existing protection systems are still limited in their capacities to ensure network information has sufficient confidentiality, integrity, and availability. The rapid development in network technologies has...

Full description

Bibliographic Details
Main Authors: Ahmed, Abdulghani Ali, Noorul Ahlami, Kamarul Zaman
Format: Article
Language:English
English
Published: IJNS 2017
Subjects:
QA76 Computer software
Online Access:http://umpir.ump.edu.my/id/eprint/14396/
http://umpir.ump.edu.my/id/eprint/14396/
http://umpir.ump.edu.my/id/eprint/14396/
http://umpir.ump.edu.my/id/eprint/14396/1/Attack%20Intention%20Recognition-%20A%20Review.pdf
http://umpir.ump.edu.my/id/eprint/14396/7/Attack%20Intention%20Recognition-%20A%20Review.pdf
  • Holdings
  • Description
  • Similar Items
  • Staff View

Internet

http://umpir.ump.edu.my/id/eprint/14396/
http://umpir.ump.edu.my/id/eprint/14396/
http://umpir.ump.edu.my/id/eprint/14396/
http://umpir.ump.edu.my/id/eprint/14396/1/Attack%20Intention%20Recognition-%20A%20Review.pdf
http://umpir.ump.edu.my/id/eprint/14396/7/Attack%20Intention%20Recognition-%20A%20Review.pdf

Similar Items

  • AIRSE : an approach for attack intention recognition based on similarity of evidences
    by: Ahmed, Abdulghani Ali, et al.
    Published: (2017)
  • Investigation Model for Ddos Attack Detection in Real-Time
    by: Ahmed, Abdulghani Ali
    Published: (2015)
  • Filtration Model For DDoS Attack Detection in Real-Time
    by: Ahmed, Abdulghani Ali
    Published: (2015)
  • Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method
    by: Fahad, Ahmed Mohammed, et al.
    Published: (2019)
  • Review of access control mechanisms in cloud computing
    by: Muhammad Rizwan, Ghori, et al.
    Published: (2018)

Search Options

  • Advanced Search

Find More

  • Browse the Catalog

Need Help?

  • Search Tips
Cannot write session to /tmp/vufind_sessions/sess_bnndes0bku4tik6t6ai8u7qhpj