Search Results - Budiarto
- Showing 1 - 20 results of 44
- Go to Next Page
-
1
Future Internet With IPv6. by Budiarto, Rahmat
Published 2009Get full text
Get full text
Conference or Workshop Item -
2
Intelligent Network-Based Stepping Stone Detection Approach. by Omar, Mohd Nizam, Budiarto, Rahmat
Get full text
Get full text
Conference or Workshop Item -
3
Simple Knit Design System; Using Pattern Matching. by Budiarto, Rahmat, Samsudin, Azman, Masashi, Yamada
Published 2002Get full text
Get full text
Conference or Workshop Item -
4
Color-based Image Retrieval Using Wavelet. by Sumari, Putra, Haili, Hailiza Kamarul, Budiarto, Rahmat
Published 2004Get full text
Get full text
Conference or Workshop Item -
5
Honeypots: Why We Need A Dynamics Honeypots? by Budiarto, Rahmat, Samsudin, Azman, Chuah, Wee Heong, Noori, Salah
Published 2004Get full text
Get full text
Conference or Workshop Item -
6
Development Of Penetration Testing Model For Increasing Network Security. by Budiarto, Rahmat, Ramadass, Sureswaran, Samsudin, Azman, Noori, Salah
Published 2004Get full text
Get full text
Conference or Workshop Item -
7
Selecting A Cyclic Redundancy Check (CRC) Generator Polynomial for CEH (CRC Extension Header). by Supriyanto, Supriyanto, M. Taib, Abidah, Budiarto, Rahmat
Published 2009Get full text
Get full text
Conference or Workshop Item -
8
A New Image-Database Encryption Based on A Hybrid Approach of Data-at-Rest and Data-in-Motion Encryption Protocol. by Ooi, Bee Sien, Samsuddin, Azman, Budiarto, Rahmat
Published 2004Get full text
Get full text
Conference or Workshop Item -
9
A Framework For Detecting Bluetooth Mobile Worms. by Sarwar, Usman, Ramadass, Sureswaran, Budiarto, Rahmat
Published 2007Get full text
Get full text
Conference or Workshop Item -
10
QoS Mechanism With Probability For IPv6-Based IPTV Network. by H.S, Primantara, C.C, Annanda, Budiarto, Rahmat
Published 2009Get full text
Get full text
Conference or Workshop Item -
11
-
12
POSFinger: A New Fingerprint For Passive Remote Operating System Identification. by Manasrah, Ahmad, Pasha, Muhammad Fermi, Budiarto, Rahmat, Ramadass, Sureswaran
Published 2007Get full text
Get full text
Conference or Workshop Item -
13
Security Mechanisms For The Ipv4 To Ipv6 Transition. by Hj Mat Taib, Abidah, Budiarto, Rahmat
Published 2007Get full text
Get full text
Conference or Workshop Item -
14
-
15
An Intelligent Method. For Processing String In 3-D Based On Its Minimum Energy. by Budiarto, Rahmat, Hj. Taib, Abdullah Zawawi, Yusoff, Zaharin, Yamada, Masashi
Published 2002Get full text
Get full text
Conference or Workshop Item -
16
Dawn Of The Mobile Malware: Reviewing Mobile Worms . by Sarwar, Usman, Ramadass, Sureswaran, Budiarto, Rahmat
Published 2007Get full text
Get full text
Conference or Workshop Item -
17
Hybrid Hierarchical Approach For Addressing Service Discovery Issues In MANETS. by Seno, Seyed Amin Hosseini, Wan, Tat-Chee, Budiarto, Rahmat
Published 2007Get full text
Get full text
Conference or Workshop Item -
18
lPv6 Transition: Why A New Security Mechanisms Model Is Necessary. by Hj Mat Taib, Abidah, Budiarto, Rahmat, Samsudin, Azman
Published 2007Get full text
Get full text
Conference or Workshop Item -
19
-
20
A Cluster-Based Distributed Hierarchical IDS for MANETs by B., Pahlevanzadesh, S.A., Hosseini Seno, T.C., Wan, R., Budiarto, M. Kadhum, Mohammed
Published 2008Get full text
Get full text
Conference or Workshop Item
