• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
تعداد ۹ پاسخ غیر تکراری از ۹ پاسخ تکراری در مدت زمان ۱,۱۹ ثانیه یافت شد.

1. Emerging technologies in data mining and Information security :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Ajith Abraham, Paramartha Dutta, Jyotsna Kumar Mandal, Abhishek Bhattacharya, Soumi Dutta, editors.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security, Congresses.,Data mining, Congresses.,Artificial Intelligence.,Computational Intelligence.,Systems and Data Security.,Artificial intelligence.,Computer security.,Computer security.,COMPUTERS / General.,Data mining.

Classification :
QA76
.
9
.
D343

2. Emerging technologies in data mining and information security :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Ajith Abraham, Paramartha Dutta, Jyotsna Kumar Mandal, Abhishek Bhattacharya, Soumi Dutta, editors.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security, Congresses.,Data mining, Congresses.,Computer security.,Data mining.

Classification :
QA76
.
9
.
D343
I58
2018

3. Emerging technologies in data mining and information security :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Ajith Abraham, Paramartha Dutta, Jyotsna Kumar Mandal, Abhishek Bhattacharya, Soumi Dutta, editors.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security, Congresses.,Data mining, Congresses.,Computer security.,Data mining.

Classification :
QA76
.
9
.
D343
I58
2018

4. Intelligence and security informatics : IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, Ga, USA, May 19-20, 2005 : proceedings

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Paul Kantor... ]et al.[ )eds.(

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: Congresses ، Expert systems )Computer science(,Congresses ، Data mining,Congresses ، Computer security,Congresses ، National security

Classification :
QA
76
.
L28
Vol
.
3495

5. International Conference on Intelligent Computing and Applications :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: M. Arun Bhaskar, Subhransu Sekhar Dash, Swagatam Das, Bijaya Ketan Panigrahi, editors.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Artificial intelligence, Congresses.,Computer security, Congresses.,Computational Intelligence.,Data Mining and Knowledge Discovery.,Signal, Image and Speech Processing.,Artificial intelligence.,Artificial intelligence.,Computer security.,COMPUTERS / General.,Data mining.,Imaging systems & technology.

Classification :
Q334

6. Privacy and security issues in data mining and machine learning

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Christos Dimitrakakis [and four others] (Eds.).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security, Congresses.,Data mining-- Security measures, Congresses.,Machine learning-- Security measures, Congresses.

Classification :

7. Transactions on large-scale data- and knowledge-centered systems XXXVII /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: edited by Abdelkader Hameurlain, Roland Wagner.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data mining, Congresses.,Database management, Congresses.,Artificial intelligence.,Artificial intelligence.,Computer networks.,Computer science.,Computer security.,Computer security.,Computers-- Database Management-- Data Mining.,Computers-- Hardware-- Network Hardware.,Computers-- Intelligence (AI) & Semantics.,Computers-- Operating Systems-- General.,Computers-- Security-- General.,Computers-- Software Development & Engineering-- General.,Data mining.,Data mining.,Network hardware.,Operating systems (Computers),Operating systems.,Software engineering.,Software Engineering.

Classification :
QA76
.
9
.
A25

8. Transactions on large-scale data- and knowledge-centered systems XXXVIII :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Abdelkader Hameurlain, Roland Wagner, Sven Hartmann, Hui Ma (eds.).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data mining, Congresses.,Database management, Congresses.,Computer networks-- Security measures.,Computer security.,Data mining.,Database management.

Classification :
QA76
.
9
.
A25

9. VizSEC/DMSEC'04 : proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, Washington, DC, USA, October 29, 2004, co-located with CCS 2004

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: sponsored by ACM SIGSAC

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: Congresses ، Computer security,Congresses ، Data mining

Classification :
QA
76
.
9
.
A25A384
2004
  • »
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival