EMU I-REP >
Browsing by Subject Computer security
Showing results 1 to 5 of 5
Preview | Issue Date | Title | Author(s) | | Aug-2015 | Analysis of Three (k, n) Secret Sharing Methods and Development of a (4, n) Method with Valid Participant Authentication, Error Detection, and 100% Repairing of Multiple Damages | Chefranov, Alexander; Narimani, Amir; Eastern Mediterranean University, Faculty of Engineering, Department of Computer Engineering |
| Feb-2022 | A Multistage Support Vector Machine Based Intrusion Detection System in MANET | Rizaner, Ahmet (Supervisor); Pourghassem, Arvin; Eastern Mediterranean University, School of Computing and Technology |
| Feb-2015 | Network Monitoring System | Mazaheri, Shirin |
| Jun-2013 | Secure true random number generator in a distributed system via wireless LAN (Distributed-RNG protocol) | Alavizadeh, Hooman |
| Jan-2022 | Using Rough Set Theory to Find Minimal Log with Rule Generation | Tut, Mehmet Ali (Supervisor); Alawneh, Tahani Nawaf E`layan; Eastern Mediterranean University, Faculty of Arts and Sciences, Dept. of Mathematics |
Showing results 1 to 5 of 5
|