Search Results for Computer -- Access control - Narrowed by: Closed Access Book - Dahliyusmanto Dahlan SirsiDynix Enterprise http://portal.utm.my/client/en_AU/main/main/qu$003dComputer$002b--$002bAccess$002bcontrol$0026qf$003dITYPE$002509Material$002bType$0025091$00253ACLS_BK$002509Closed$002bAccess$002bBook$0026qf$003dAUTHOR$002509Author$002509Dahliyusmanto$002bDahlan$002509Dahliyusmanto$002bDahlan$0026ps$003d300$0026isd$003dtrue?dt=list 2024-06-01T15:02:15Z Detecting outlier on intrusion detection system using data set of system calls ent://SD_ILS/0/SD_ILS:396547 2024-06-01T15:02:15Z 2024-06-01T15:02:15Z by&#160;Dahliyusmanto Dahlan<br/>Author&#160;Dahliyusmanto Dahlan,&#160;Abdul Hanan Abdullah,&#160;International Conference on Information and Computer Science (2004 : Dhahran, Saudi Arabia)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 D335 2004<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2004<br/> Counting the number of system calls to detect intrusion using discriminant analysis ent://SD_ILS/0/SD_ILS:386616 2024-06-01T15:02:15Z 2024-06-01T15:02:15Z by&#160;Dahliyusmanto Dahlan<br/>Author&#160;Dahliyusmanto Dahlan,&#160;Abdul Hanan Abdullah,&#160;Seminar Quality in Research (2003 : Indonesia)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 D334 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/> A methodology to detect intrusion using system call base on discriminant analysis ent://SD_ILS/0/SD_ILS:353431 2024-06-01T15:02:15Z 2024-06-01T15:02:15Z by&#160;Dahliyusmanto Dahlan<br/>Author&#160;Dahliyusmanto Dahlan,&#160;Abdul Hanan Abdullah,&#160;International Symposium on Information Technology (2003 : Kuala Lumpur)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 D33 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/>