Limit search to available items
Nearby Titles are:
Result Page   Prev Next
Add Marked to Bag Add All On Page Add Marked to My Lists
Mark   Year Entries
The introvert's edge : how the quiet and shy can outsell anyone   2018 1
An Introvert's Guide to Succeeding in the Workplace   2024 1
Introverts in the Church   2017 1
Intrsoduction --   2013 1
Intruder /   11
Intruder alarms   3
Intruder Data Classification Using GM-SOM / / Petr GajdoĊĦ and Pavel Moravec --  2012 1
Intruder Detection by Using Faster R-CNN in Power Substation --   2020 1
Intruder in the Dust --   3
Intruder in the dust and the southern community / / Mark Royden Winchell --  2007 1
Intruder in the realm -- / ch. 5.  1998 1
Intruder or Welcome Friend: Inferring Group Membership in Online Social Networks / / Ofrit Lesser [and others] --  2013 1
Intruder Types --   2000 1
Intruders --   2
Intruders and Invaders: The Dark Ages of the Ancient Near East -- / 5.  2002 1
Intruders and Viruses. / Ch. 10.  2000 1
An intruder's guide to East Arnhem Land   2
Intruders in Mandalay Palace / / Grattan Geary --16.  1997 1
Intruders in the bush : the Australian quest for identity   2
Intruders in the Mind : Interdisciplinary Perspectives on Thought Insertion   2024 1
Intruders on Native Ground: Troubling Silences and Memories of the Land-Taking in Norwegian Immigrant Letters --   2009 1
Intruders, Viruses, and Worms -- / Ch. 7.  1995 1
Intruse   2018 1
Intrusion Alert Correlation Framework: An Innovative Approach / / Huwaida Tagelsir Elshoush --  2013 1
Intrusion Damage Assessment for Multi-stage Attacks for Clouds / / Junaid Arshad, Imran Ali Jokhio and Mahmood Shah --  2012 1
Intrusion Detection --   6
Intrusion detection : a data mining approach   2020 1
Intrusion detection : a machine learning approach   3
Intrusion detection and correlation : challenges and solutions   2
Intrusion Detection and Defense -- / 5.  2008 1
Intrusion Detection & Information Security Audits / / Terry T. Kidd /Robert K. Hiltbrand --  2008 1
Intrusion Detection and Intrusion Forensics -- / 7.  2003 1
Intrusion Detection and Prevention --   3
Intrusion detection and prevention for mobile ecosystems   2017 1
Intrusion detection and prevention systems   2004 1
Intrusion Detection and QoS Security Architecture for Service Grid Computing Environment / / Raghavendra Prabhu, Basappa B. Kodada and K.M. Shivakumar --  2012 1
Intrusion Detection and Recovery.   2013 1
Intrusion detection and vulnerability analysis of mobile commerce platform / / Changhua Zhu, Changxing Pei --  2005 1
Intrusion Detection Based on BP Neural Network and Genetic Algorithm / / Zhao Jian-hua and Li Wei-hua --  2012 1
Intrusion Detection Based on Immune Principles and Fuzzy Association Rules / / Zhang Lei, Meng Lingrui and Hou Chunjie --  2013 1
Intrusion Detection Based on Rough-Set Attribute Reduction / / Shuyue Ma, Huifen Liao, Yuan Yuan --  2013 1
Intrusion Detection Dataset: Binary Representation   2013 1
Intrusion Detection Engine Design Based on Immune / / Zong Jiang Wang --  2013 1
Intrusion Detection for Computer Security / / Sung-Bae Cho, Sang-Jun Han --  2005 1
Intrusion detection for IP-based multimedia communications over wireless networks   2013 1
Intrusion detection for job trailers -- / Ch. 7  2006 1
Intrusion detection in cellular mobile networks / / Bo Sun, Yang Xiao, and Kui Wu --  2007 1
Intrusion Detection in Open Peer-to-Peer Multi-Agent Systems / / David Robertson  2011 1
Intrusion detection in wireless ad-hoc networks   2014 1
Intrusion Detection in Wireless Sensor Networks: Issues, Challenges and Approaches / / Amrita Ghosal, Subir Halder --  2013 1
Add Marked to Bag Add All On Page Add Marked to My Lists
Result Page   Prev Next