Showing
1 - 20
results of
49
for search '
Abdullah @ Selimun, Mohd Taufik
'
Skip to content
Toggle navigation
Home
Feedback
我的帐户
Back
我的帐户
最爱
被借出的项目
持有和召回
罚款
档案
您保存的搜索
退出
登录
语言
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Search:
全文检索
题名
作者
主题
索引号
ISBN/ISSN
标签
检索
高级检索
作者
Abdullah @ Selimun, Mohd Taufik
Showing
1 - 20
results of
49
for search '
Abdullah @ Selimun, Mohd Taufik
'
, 查询时间: 0.02s
Refine Results
排序
相关性排序
日期递增
日期递增
索书号排序
作者排序
标题
选择页 | 与选定的:
电子邮件
导出
打印
保存
Select result number 1
1
A systematic literature review for topic detection in chat conversation for cyber-crime investigation
由
Husin, Norzihan
,
Abdullah
@
Selimun
,
Mohd
Taufik
,
Mahmod, Ramlan
出版 2014
获取全文
Article
加到收藏夹
Saved in:
Select result number 2
2
VoIP evidence model: a new forensic method for investigating VoIP malicious attacks
由
Ibrahim, Mohammed
,
Abdullah
@
Selimun
,
Mohd
Taufik
,
Dehghantanha, Ali
出版 2012
获取全文
Conference or Workshop Item
加到收藏夹
Saved in:
Select result number 3
3
Survey on economics of information security
由
Aminnezhad, Asou
,
Mahmod, Ramlan
,
Abdullah
@
Selimun
,
Mohd
Taufik
出版 2016
获取全文
Article
加到收藏夹
Saved in:
Select result number 4
4
Image orientation based watermarking technique in copyright protection
由
Jasim, Hend Muslim
,
Muda, Zaiton
,
Abdullah
@
Selimun
,
Mohd
Taufik
出版 2017
获取全文
Article
加到收藏夹
Saved in:
Select result number 5
5
An investigation of the secure data communication in medical mobile applications
由
Aminnezhad, Asou
,
Abdullah
@
Selimun
,
Mohd
Taufik
,
Hezave, Pooya Khanmohamadi
出版 2015
获取全文
Article
加到收藏夹
Saved in:
Select result number 6
6
Cloud forensics issues and oppurtunities
由
Aminnezhad, Asou
,
Dehghantanha, Ali
,
Abdullah
@
Selimun
,
Mohd
Taufik
,
Damshenas, Mohsen
出版 2013
Article
加到收藏夹
Saved in:
Select result number 7
7
Overview of cross site request forgery and client-side protection
由
Yaakob, Razali
,
Joozdani, Mohsen
,
Abdullah
@
Selimun
,
Mohd
Taufik
,
Abdullah, Azizol
出版 2013
获取全文
Article
加到收藏夹
Saved in:
Select result number 8
8
Effective dimensionality reduction of payload-based anomaly detection in TMAD model for HTTP payload
由
Kakavand, Mohsen
,
Mustapha, Norwati
,
Mustapha, Aida
,
Abdullah
@
Selimun
,
Mohd
Taufik
出版 2016
获取全文
Article
加到收藏夹
Saved in:
Select result number 9
9
An epidemic based model for the predictions of OOFI in an IoT platform
由
Ibrahim, Mohammed
,
Abdullah
@
Selimun
,
Mohd
Taufik
,
Abdullah, Azizol
,
Perumal, Thinagaran
出版 2020
获取全文
Article
加到收藏夹
Saved in:
Select result number 10
10
Performance measurement for mobile forensic data acquisition in Firefox OS
由
Yusoof, Mohd Najwadi
,
Mahmod, Ramlan
,
Abdullah
@
Selimun
,
Mohd
Taufik
,
Dehghantanha, Ali
出版 2014
获取全文
Article
加到收藏夹
Saved in:
Select result number 11
11
A review on mobile device's digital forensic process models
由
Farjamfar, Anahita
,
Abdullah
@
Selimun
,
Mohd
Taufik
,
Mahmod, Ramlan
,
Udzir, Nur Izura
出版 2014
获取全文
Article
加到收藏夹
Saved in:
Select result number 12
12
Advances of mobile forensic procedures in Firefox OS
由
Yusoff, Mohd Najwadi
,
Mahmod, Ramlan
,
Dehghantanha, Ali
,
Abdullah
@
Selimun
,
Mohd
Taufik
出版 2014
获取全文
Article
加到收藏夹
Saved in:
Select result number 13
13
Mobile forensic data acquisition in Firefox OS
由
Yusoff, Mohd Najwadi
,
Mahmod, Ramlan
,
Abdullah
@
Selimun
,
Mohd
Taufik
,
Dehghantanha, Ali
出版 2014
获取全文
Conference or Workshop Item
加到收藏夹
Saved in:
Select result number 14
14
Critical phases in network forensics - a review
由
Nik Abdull Malik, Nik Mariza
,
Yahya, Saadiah
,
Abdullah
@
Selimun
,
Mohd
Taufik
出版 2014
获取全文
Conference or Workshop Item
加到收藏夹
Saved in:
Select result number 15
15
Multimedia files signature analysis in Blackberry Z10
由
Abdullah
@
Selimun
,
Mohd
.
Taufik
,
Udzir, Nur Izura
,
Mahmod, Ramlan
,
Farjamfar, Anahita
出版 2015
获取全文
Article
加到收藏夹
Saved in:
Select result number 16
16
The implementation of agent based complaint management system
由
Md Sultan, Abu Bakar
,
Zainal Abidin, Khairunnisa
,
Abdullah
@
Selimun
,
Mohd
Taufik
出版 2008
获取全文
Article
加到收藏夹
Saved in:
Select result number 17
17
Enhanced Bring your Own Device (BYOD) environment security based on blockchain technology
由
Jamal, Fara
,
Abdullah
@
Selimun
,
Mohd
.
Taufik
,
Abdullah, Azizol
,
Mohd Hanapi, Zurina
出版 2018
获取全文
Article
加到收藏夹
Saved in:
Select result number 18
18
A systematic review of Bring Your Own Device (BYOD) authentication technique
由
Jamal, Fara
,
Abdullah
@
Selimun
,
Mohd
.
Taufik
,
Abdullah, Azizol
,
Mohd. Hanapi, Zurina
出版 2020
获取全文
Article
加到收藏夹
Saved in:
Select result number 19
19
A Review on feature selection and ensemble techniques for intrusion detection system
由
Torabi, Majid
,
Udzir, Nur Izura
,
Abdullah
@
Selimun
,
Mohd
Taufik
,
Yaakob, Razali
出版 2021
Article
加到收藏夹
Saved in:
Select result number 20
20
An approach for forensic investigation in Firefox OS
由
Yusoff, Mohd Najwadi
,
Mahmod, Ramlan
,
Dehghantanha, Ali
,
Abdullah
@
Selimun
,
Mohd
Taufik
出版 2014
获取全文
Conference or Workshop Item
加到收藏夹
Saved in:
选择页 | 与选定的:
电子邮件
导出
打印
保存
1
2
3
下一个 »
[3]
检索工具:
得到RSS订阅
—
推荐此搜索
—
×
载入...