Search Results for - Narrowed by: Fazeldehkordi, Elahe, author. - Computer networks -- Security measures.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dAUTHOR$002509Author$002509Fazeldehkordi$00252C$002bElahe$00252C$002bauthor.$002509Fazeldehkordi$00252C$002bElahe$00252C$002bauthor.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026ps$003d300$0026isd$003dtrue?
2024-09-24T03:18:28Z
A study of black hole attack solutions : on AODV routing protocol in MANET
ent://SD_ILS/0/SD_ILS:2309038
2024-09-24T03:18:28Z
2024-09-24T03:18:28Z
by Fazeldehkordi, Elahe, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128053799/?ar">https://go.oreilly.com/library-access/library/view/-/9780128053799/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128053799/?ar">https://learning.oreilly.com/library/view/~/9780128053799/?ar</a><br/>Format: Electronic Resources<br/>
A machine learning approach to phishing detection and defense
ent://SD_ILS/0/SD_ILS:2306002
2024-09-24T03:18:28Z
2024-09-24T03:18:28Z
by Akanbi, Oluwatobi Ayodeji, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128029275/?ar">https://learning.oreilly.com/library/view/~/9780128029275/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128029275/?ar">https://go.oreilly.com/library-access/library/view/-/9780128029275/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128029275">https://learning.oreilly.com/library/view/~/9780128029275</a><br/>Format: Electronic Resources<br/>