Search Results for - Narrowed by: Abdul Hanan Abdullah - Computers -- Access control - Closed Access Book SirsiDynix Enterprise http://portal.utm.my/client/en_AU/main/main/qf$003dAUTHOR$002509Author$002509Abdul$002bHanan$002bAbdullah$002509Abdul$002bHanan$002bAbdullah$0026qf$003dSUBJECT$002509Subject$002509Computers$002b--$002bAccess$002bcontrol$002509Computers$002b--$002bAccess$002bcontrol$0026qf$003dITYPE$002509Material$002bType$0025091$00253ACLS_BK$002509Closed$002bAccess$002bBook$0026ps$003d300?dt=list 2024-05-03T12:03:55Z Detecting outlier on intrusion detection system using data set of system calls ent://SD_ILS/0/SD_ILS:396547 2024-05-03T12:03:55Z 2024-05-03T12:03:55Z by&#160;Dahliyusmanto Dahlan<br/>Author&#160;Dahliyusmanto Dahlan,&#160;Abdul Hanan Abdullah,&#160;International Conference on Information and Computer Science (2004 : Dhahran, Saudi Arabia)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 D335 2004<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2004<br/> Counting the number of system calls to detect intrusion using discriminant analysis ent://SD_ILS/0/SD_ILS:386616 2024-05-03T12:03:55Z 2024-05-03T12:03:55Z by&#160;Dahliyusmanto Dahlan<br/>Author&#160;Dahliyusmanto Dahlan,&#160;Abdul Hanan Abdullah,&#160;Seminar Quality in Research (2003 : Indonesia)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 D334 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/> A methodology to detect intrusion using system call base on discriminant analysis ent://SD_ILS/0/SD_ILS:353431 2024-05-03T12:03:55Z 2024-05-03T12:03:55Z by&#160;Dahliyusmanto Dahlan<br/>Author&#160;Dahliyusmanto Dahlan,&#160;Abdul Hanan Abdullah,&#160;International Symposium on Information Technology (2003 : Kuala Lumpur)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 D33 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/>