Showing
1 - 15
results of
15
for search '
Shahid, Anwar
'
Skip to content
VuFind
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Find
Advanced
Author
Shahid, Anwar
Showing
1 - 15
results of
15
for search '
Shahid, Anwar
'
, query time: 0.02s
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
1
African Buffalo Optimization: A Swarm-Intelligence Technique
by
Odili, Julius Beneoluchi
,
M. N. M., Kahar
,
Shahid
,
Anwar
Published 2015
Get full text
Get full text
Get full text
2
Mobile Cloud Computing with SOAP and REST Web Services
by
Ali, Mushtaq
,
Mohamad Fadli, Zolkipli
,
Jasni, Mohamad Zain
,
Shahid
,
Anwar
Published 2018
Get full text
Get full text
Get full text
3
A Review Paper on Botnet and Botnet Detection Techniques in Cloud Computing
by
Shahid
,
Anwar
,
Jasni, Mohamad Zain
,
Mohamad Fadli, Zolkipli
,
Zakira, Inayat
Published 2014
Get full text
Get full text
Get full text
Get full text
4
Methods for Preventing DDoS Attacks in Cloud Computing
by
Jaber, Aws Naser
,
Mohamad Fadli, Zolkipli
,
Mazlina, Abdul Majid
,
Shahid
,
Anwar
Published 2017
Get full text
Get full text
Get full text
Get full text
Get full text
5
Trusting Cloud Computing for Personal Files
by
Mazlina, Abdul Majid
,
Jaber, Aws Naser
,
Mohamad Fadli, Zolkipli
,
Shahid
,
Anwar
Published 2014
Get full text
Get full text
Get full text
6
Cloud-Based Intrusion Detection and Response System: Open Research Issues, and Solutions
by
Zakira, Inayat
,
Abdullah, Gani
,
Nor Badrul, Anuar
,
Shahid
,
Anwar
,
Muhammad Khurram , Khan
Published 2017
Get full text
Get full text
Get full text
Get full text
Get full text
7
Present Status and Challenges in Cloud Monitoring Framework: A Survey
by
Jaber, Aws Naser
,
Mohamad Fadli, Zolkipli
,
Shahid
,
Anwar
,
Al-Hawawreh, Muna Sulieman
Published 2016
Get full text
Get full text
Get full text
8
Intrusion Response Systems: Foundations, Design, and Challenges
by
Zakira, Inayat
,
Abdullah, Gani
,
Nor Badrul, Anuar
,
Muhammad Khuram, Khan
,
Shahid
,
Anwar
Published 2016
Get full text
Get full text
Get full text
9
A Comparative Study of African Buffalo Optimization and Randomized Insertion Algorithm for Asymmetric Travelling Salesman's Problem
by
Odili, Julius Beneoluchi
,
M. N. M., Kahar
,
Shahid
,
Anwar
,
Azrag, M. A. K.
Published 2015
Get full text
Get full text
Get full text
Get full text
10
Android Botnets: A Serious Threat to Android Devices
by
Shahid
,
Anwar
,
Mohamad Fadli, Zolkipli
,
Zakira, Inayat
,
Odili, Julius Beneoluchi
,
Ali, Mushtaq
,
Jasni, Mohamad Zain
Published 2018
Get full text
Get full text
Get full text
11
A Static Approach towards Mobile Botnet Detection
by
Shahid
,
Anwar
,
Jasni, Mohamad Zain
,
Inayat, Zakira
,
Ul Haq, Riaz
,
Ahmad, Karim
,
Jaber, Aws Naser
Published 2016
Get full text
Get full text
Get full text
Get full text
12
Response Option for Attacks Detected by Intrusion Detection System
by
Shahid
,
Anwar
,
Mohamad Fadli, Zolkipli
,
Aws Naser, Jaber
,
Jasni, Mohamad Zain
,
Zakira, Inayat
,
Odili, Julius Beneoluchi
Published 2015
Get full text
Get full text
Get full text
Get full text
13
From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions
by
Shahid
,
Anwar
,
Jasni, Mohamad Zain
,
Mohamad Fadli, Zolkipli
,
Inayat, Zakira
,
Khan, Suleman
,
Anthony, Bokolo Jnr.
,
Chang, Victor
Published 2017
Get full text
Get full text
Get full text
Get full text
14
Adaboost-multilayer perceptron to predict the student’s performance in software engineering
by
Ahmad Firdaus, Zainal Abidin
,
Mohd Faaizie, Darmawan
,
Mohd Zamri, Osman
,
Shahid
,
Anwar
,
Shahreen, Kasim
,
Yunianta, Arda
,
Sutikno, Tole
Published 2019
Get full text
Get full text
Get full text
15
Cross-VM Cache-based Side Channel Attacks and Proposed Prevention Mechanisms: A Survey
by
Shahid
,
Anwar
,
Mohamad Fadli, Zolkipli
,
Zakira, Inayat
,
Jasni, Mohamad Zain
,
Abdullah, Gani
,
Nor Badrul, Anuar
,
Khan, Muhammad Khurram
,
Chang, Victor
Published 2017
Get full text
Get full text
Get full text
Get full text
Get full text
Search Tools:
RSS Feed
–
Email Search