Search Results for Computer security - Narrowed by: Dahliyusmanto DahlanSirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qu$003dComputer$002bsecurity$0026qf$003dAUTHOR$002509Author$002509Dahliyusmanto$002bDahlan$002509Dahliyusmanto$002bDahlan$0026ps$003d300?dt=list2024-06-09T21:56:41ZA data analysis for intrusion detection using principal componentent://SD_ILS/0/SD_ILS:3780882024-06-09T21:56:41Z2024-06-09T21:56:41Zby Abdul Hanan Abdullah<br/>Author Abdul Hanan Abdullah, Dahliyusmanto Dahlan, Conference on Telematics System, Service and Applications (1st : 2004 : Bandung, Indonesia)<br/>Format: Books<br/>Call Number QA76.9.A25 A234 2004<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2004<br/>Detecting outlier on intrusion detection system using data set of system callsent://SD_ILS/0/SD_ILS:3965472024-06-09T21:56:41Z2024-06-09T21:56:41Zby Dahliyusmanto Dahlan<br/>Author Dahliyusmanto Dahlan, Abdul Hanan Abdullah, International Conference on Information and Computer Science (2004 : Dhahran, Saudi Arabia)<br/>Format: Books<br/>Call Number QA76.9.A25 D335 2004<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2004<br/>Counting the number of system calls to detect intrusion using discriminant analysisent://SD_ILS/0/SD_ILS:3866162024-06-09T21:56:41Z2024-06-09T21:56:41Zby Dahliyusmanto Dahlan<br/>Author Dahliyusmanto Dahlan, Abdul Hanan Abdullah, Seminar Quality in Research (2003 : Indonesia)<br/>Format: Books<br/>Call Number QA76.9.A25 D334 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>A methodology to detect intrusion using system call base on discriminant analysisent://SD_ILS/0/SD_ILS:3534312024-06-09T21:56:41Z2024-06-09T21:56:41Zby Dahliyusmanto Dahlan<br/>Author Dahliyusmanto Dahlan, Abdul Hanan Abdullah, International Symposium on Information Technology (2003 : Kuala Lumpur)<br/>Format: Books<br/>Call Number QA76.9.A25 D33 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>