Search Results - Udzir, Nur
- Showing 1 - 20 results of 188
- Go to Next Page
-
1
C++: pengenalan kepada pengaturcaraan by Udzir, Nur Izura, Yaakob, Razali, Zakaria, Mohamed Nordin
Published 2001Get full text
Book -
2
Extract of facial feature point. by Bagherian, Elham, O. K. Rahmat, Rahmita Wirza, Udzir, Nur Izura
Published 2009Get full text
Get full text
Article -
3
IP spoofing defense: an introduction by Lee, Soon, Othman, Mohamed, Udzir, Nur Izura
Published 2009Get full text
Get full text
Conference or Workshop Item -
4
-
5
IP spoofing defense: An introduction by Lee, Soon, Othman, Mohamed, Udzir, Nur Izura
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
6
-
7
Effect of nonlinear resource allocation on AIRS classifier accuracy by Hormozi, Shahram Golzari, C. Doraisamy, Shyamala, Sulaiman, Md. Nasir, Udzir, Nur Izura
Published 2008Get full text
Get full text
Conference or Workshop Item -
8
Analytical studies and experimental examines for flooding-based search algorithms by Barjini, Hassan, Othman, Mohamed, Ibrahim, Hamidah, Udzir, Nur Izura
Published 2012Get full text
Book Section -
9
Access control in open distributed systems by Udzir, Nur Izura, Wood, Alan, Muda, Zaiton, Dehghantanha, Ali, Abdullah @ Selimun, Mohd Taufik, Abdullah, Azizol
Published 2012Get full text
Get full text
Conference or Workshop Item -
10
Towards data centric mobile security by Dehghantanha, Ali, Udzir, Nur Izura, Mahmod, Ramlan
Published 2011Get full text
Get full text
Conference or Workshop Item -
11
Effect of nonlinear resource allocation on AIRS classifier accuracy by Golzari, Shahram, Doraisamy, Shyamala, Sulaiman, Md Nasir, Udzir, Nur Izura
Published 2008Get full text
Get full text
Get full text
Conference or Workshop Item -
12
-
13
-
14
An alert fusion model inspired by artificial immune system. by Mahboubian, Mohammad, Udzir, Nur Izura, Subramaniam, Shamala, Abdul Hamid, Nor Asila Wati
Published 2012Get full text
Get full text
Conference or Workshop Item -
15
-
16
The affects of caching in browser stage on the performance of web items delivery by Yasin, Waheed, Ibrahim, Hamidah, Abdul Hamid, Nor Asilah Wati, Udzir, Nur Izura
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Investigation of bypassing malware defences and malware detections by Daryabar, Farid, Dehghantanha, Ali, Udzir, Nur Izura
Published 2011Get full text
Get full text
Conference or Workshop Item -
18
-
19
Towards secure model for SCADA systems by Daryabar, Farid, Dehghantanha, Ali, Udzir, Nur Izura, Mohd Sani, Nor Fazlida, Shamsuddin, Solahuddin
Published 2012Get full text
Get full text
Conference or Workshop Item -
20
