Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Siva S. Sivatha Sindhu,S. Geetha and S. Selvakumar. Network Intrusion Detection System using Machine Learning Techniques. – М.: LAP Lambert Academic Publishing, 2013. – 80 с. Дополнительные результаты Laszlo Gyorfi. Machine Learning for Financial Engineering (Advances in Computer Science and Engineering: Texts). – М.: , 2012. – 250 с. Richard A. McCormack. Lean Machines: Learning From the Leaders of the Next Industrial Revolution. – М.: , 0. – 0 с. William Horton. Using E-Learning. – М.: , 0. – 0 с. George M. Jacobs, Michael A. Power, Wan Inn Loh. Teacher's Sourcebook for Cooperative Learning: Practicle Techniques, Basic Principles, and Frequently Asked Questions. – М.: , 0. – 0 с. Dorothy E. Denning, Peter J. Denning. Internet Besieged. – М.: , 0. – 0 с. James C. Vatalaro, Robert E. Taylor. Implementing a Mixed Model Kanban System: The Lean Replenishment Technique for Pull Production. – М.: , 2005. – 125 с. Paul Piccard, Jeremy Faircloth. Combating Spyware in the Enterprise. – М.: , 2006. – 386 с. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с. Elizabeth Barkley, K. Patricia Cross, Claire Howell Major. Collaborative Learning Techniques: A Handbook for College Faculty. – М.: , 2004. – 288 с. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с. Data Analysis, Machine Learning and Applications: Proceedings of the 31st Annual Conference of the Gesellschaft fA?r Klassifikation e.V., Albert-Ludwigs-UniversitA¤t ... Data Analysis, and Knowledge Organization). – М.: , 2008. – 720 с. Ismael Arciniegas Rueda. Explaining Currency Crises: A Statistical Machine Learning Approach: Understanding why some currency crises are followed by strong recesions but others are not. – М.: , 2010. – 472 с. S.Y. Kung, M.W. Mak, S.H. Lin. Biometric Authentication: A Machine Learning Approach (Prentice Hall Information and System Sciences Series). – М.: , 2010. – 496 с. Muhammad Ali Mazidi, Sarmad Naimi, Sepehr Naimi. AVR Microcontroller and Embedded Systems: Using Assembly and C. – М.: , 2010. – 792 с. Advances in Machine Learning I: Dedicated to the Memory of Professor Ryszard S. Michalski (Studies in Computational Intelligence). – М.: , 2010. – 524 с. Advances in Machine Learning II: Dedicated to the memory of Professor Ryszard S. Michalski (Studies in Computational Intelligence). – М.: , 2010. – 532 с. Encyclopedia of Machine Learning. – М.: , 2010. – 1020 с. Rory Bray. OSSEC Host-Based Intrusion Detection Guide. – М.: , 2010. – 416 с. Balas K. Natarajan. Machine Learning. – М.: , 2010. – 217 с. Syngress. Snort Intrusion Detection 2.0. – М.: , 2010. – 550 с. Y. Anzai. Pattern Recognition & Machine Learning. – М.: , 2010. – 407 с. Katharina Morik. Knowledge Acquisition and Machine Learning. – М.: , 2010. – 305 с. Brian Caswell. Snort Intrusion Detection and Prevention Toolkit. – М.: , 2010. – 768 с. Meryl E. Wastney. Investigating Biological Systems Using Modeling. – М.: , 2010. – 382 с. Ryszard S. Michalski. Machine Learning. – М.: , 2010. – 572 с. Luis F. Chaparro. Signals and Systems Using MATLAB. – М.: Elsevier, 2011. – 768 с. Cornelius T. Leondes. Digital Control Systems Implementation and Computational Techniques,79. – М.: , 2010. – 393 с. Robert Barnard. Intrusion Detection Systems. – М.: , 2010. – 480 с. Ethem Alpaydin. Introduction to Machine Learning 2e (OISC). – М.: , 2010. – 584 с. Luis Castaner. Modelling Photovoltaic Systems Using PSpice®. – М.: , 2002. – 376 с. Etham Alpaydin. Introduction to Machine Learning (OIP). – М.: , 2004. – 400 с. Joseph J. Byrne. Network+ Certification Study System. – М.: , 1999. – 356 с. Brednan Jf Frey. Graphical Models for Machine Learning & Digital Communications. – М.: , 1998. – 220 с. Terry Escamilla. Intrusion Detection. – М.: , 1998. – 368 с. Norman Witkin. Enterprise Networking for Information Systems Professionals. – М.: , 1997. – 254 с. Haibo He. Self–Adaptive Systems for Machine Intelligence. – М.: , 2011. – 240 с. Joaquin Quinone Quinonero–cande. Dataset Shift in Machine Learning. – М.: , 2009. – 248 с. RS FORSYTH. Forsyth ?machine? Learning – Applications In Exper T Systems & Information Retrieval. – М.: , 1986. – 278 с. Greg Holden. Guide to Firewalls and Network Security: Intrusion Detection and VPNs. – М.: Course Technology, 2003. – 512 с. Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido Dubrawsky. Cisco Security Professional's Guide to Secure Intrusion Detection Systems. – М.: , . – с. Ian H. Witten, Eibe Frank. Data Mining: Practical Machine Learning Tools and Techniques, Second Edition (Morgan Kaufmann Series in Data Management Systems). – М.: , 2005. – 560 с. Jianbo Yang. Feature selection and model selection in supervised learning. – М.: LAP Lambert Academic Publishing, 2015. – 160 с. Anup Bhange and Manmeet Kaur Marhas. Anomaly Detection in Network Traffic; A Statistical Approach. – М.: LAP Lambert Academic Publishing, 2012. – 92 с. Gulshan Kumar. Effective Intrusion Detection using Genetic Algorithms. – М.: LAP Lambert Academic Publishing, 2014. – 100 с. Shadab Pattekari. Intelligent Heart Disease Prediction System Using Naive Bayes. – М.: LAP Lambert Academic Publishing, 2014. – 64 с. Maninder Jeet Kaur,Moin Uddin and Harsh Verma. Capacity Analysis of Cognitive Radio using Soft Computing Techniques. – М.: LAP Lambert Academic Publishing, 2012. – 172 с. Tanmoy Hazra. Application of PCA in IDS. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Shaek Rana Mohammad Baki Billah and Mohammad Hafizur Rahman. Design & Development of Network Security System using IP Tables. – М.: LAP Lambert Academic Publishing, 2013. – 164 с. Vulasala Ganesh. Optimization Methods of Electrical Distribution Systems using GA. – М.: LAP Lambert Academic Publishing, 2013. – 200 с. Tasnuva Ahmed,Rabiul Hossain and Dipesh Barua. Security System Using Ultrasound. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Asmatullah Chaudhry. Image Processing using Punctual Kriging and Machine Learning. – М.: LAP Lambert Academic Publishing, 2009. – 116 с. Bashar Mudhafar Ahmed and Raad Sami Fyath. Dual Polarization WDM Systems Using CO-OFDM Technique. – М.: Scholars' Press, 2014. – 112 с. Ahmad A. M. Abushariah and Teddy Surya Gunawan. Speech Recognition System using MATLAB. – М.: LAP Lambert Academic Publishing, 2011. – 112 с. Kuldeep Singh and Sunil Agrawal. Internet Traffic Classification. – М.: LAP Lambert Academic Publishing, 2011. – 100 с. Joydip Jana and Mahendra Lad. A Fast Feedback Control System using FPGA for RF signals. – М.: LAP Lambert Academic Publishing, 2013. – 96 с. Hua Ouyang. Networked Predictive Control Systems. – М.: LAP Lambert Academic Publishing, 2010. – 164 с. Sarang Patil,Sunil Pawar and Vivek Chaudhari. Implementation wireless A.M.R. system using ZigBee And TCP/IP. – М.: LAP Lambert Academic Publishing, 2013. – 96 с. Huang-Chun Roan. Network Intrusion Detection Based on Shift-OR Circuit. – М.: LAP Lambert Academic Publishing, 2011. – 60 с. M. Sadiq Ali Khan and S. M. Aqil Burney. Recent Trends in Intrusion Detection System & Network Monitoring. – М.: LAP Lambert Academic Publishing, 2012. – 120 с. Mohammad H. Alomari,Rami S. Qahwaji and Stanley S. Ipson. Applied Machine Learning for Solar Data Processing. – М.: LAP Lambert Academic Publishing, 2011. – 152 с. Cruceru Madalina. Radiation Detection Systems With Applications in High Energy Physics. – М.: LAP Lambert Academic Publishing, 2012. – 84 с. Tufan Colak and Rami Qahwaji. AUTOMATED PREDICTION OF SOLAR FLARES. – М.: LAP Lambert Academic Publishing, 2010. – 128 с. Neveen Metwally. Carnation Production Using Soilless Culture Technique. – М.: LAP Lambert Academic Publishing, 2011. – 140 с. Alireza Shahabfar. Construction of an Agricultural Drought Monitoring System Using Remote Sensing Techniques. – М.: LAP Lambert Academic Publishing, 2010. – 192 с. Yi Xin. Mid-IR-based Gas Detection System Analysis Model. – М.: LAP Lambert Academic Publishing, 2011. – 136 с. Vadim Rukavitsyn. Ecosystem Condition Modeling Using Machine Learning Tools. – М.: LAP Lambert Academic Publishing, 2015. – 132 с. Pragya Singh and David R. Goodlett. Characterizing Bacterial Secretion Systems Using Mass Spectrometry. – М.: LAP Lambert Academic Publishing, 2012. – 212 с. Guy Lebanon. Riemannian Geometry and Statistical Machine Learning. – М.: LAP Lambert Academic Publishing, 2015. – 140 с. Nataliia Semenenko. Diagnosis of Cross-Browser Compatibility Issues via Machine Learning. – М.: LAP Lambert Academic Publishing, 2014. – 68 с. Aneta Trajanov. Machine learning in agroecology. – М.: LAP Lambert Academic Publishing, 2011. – 140 с. Sharad Shandilya. Machine Learning and Non-Linear Dynamics to the Rescue. – М.: Scholars' Press, 2013. – 88 с. Mark Rossman. Automated Detection of Hematological Patterns Through Machine Learning. – М.: LAP Lambert Academic Publishing, 2014. – 128 с. Farhana Shahid and Ubaid Ur Rahman. Detection Of Heart Disease Using Decision Tree Technique. – М.: LAP Lambert Academic Publishing, 2014. – 64 с. Abhay Nath Singh. Honeypot Based Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 68 с. Shahnawaz Husain,S. C. Gupta and R. C. Joshi. Intrusion Detection Engine for Adhoc Environment. – М.: LAP Lambert Academic Publishing, 2013. – 120 с. Sumaya Saad Sulaiman and Sarab M. Hameed. A Fuzzy Based Clustering for Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 120 с. Shubha Puthran and Ketan Shah. Intrusion Detection System using datamining techniques. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Mohammad S. I. Mamun. Intrusion Detection System Architecture in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Heba Fathy Eid. Computational Intelligence in Network Intrusion Detection System. – М.: Scholars' Press, 2014. – 164 с. Janakiraman S. Distributed Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 164 с. Mohd Nazri Ismail,Mohd Afizi Shukran and Kamaruzaman Maskat. Smarthome Computing System Using Mobile Devices. – М.: LAP Lambert Academic Publishing, 2014. – 88 с. Yogesh Kumar,Krishan Kumar and Gulshan Kumar. Feature Selection For Intrusion Detection Systems. – М.: LAP Lambert Academic Publishing, 2014. – 100 с. Syed Zahidur Rashid. Computer Network Security Monitoring. – М.: Scholars' Press, 2015. – 284 с. Lanier Watkins. Resource Discovery: Using Network Traffic To Infer CPU And Memory Load. – М.: LAP Lambert Academic Publishing, 2014. – 96 с. Ulya Sabeel and Nidhi Chandra. ADLS: Attack Detection & Localization Scheme in WSN. – М.: LAP Lambert Academic Publishing, 2014. – 68 с. Gulshan Kumar. Effective Intrusion Detection using Feature Selection. – М.: LAP Lambert Academic Publishing, 2014. – 92 с. Mrutyunjaya Panda and Manas Ranjan Patra. A Data Mining Approach to Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2015. – 216 с. Glenn Wilkinson. Identification of Hostile TCP Traffic using Support Vector Machines. – М.: LAP Lambert Academic Publishing, 2010. – 80 с. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с. Mueen Uddin. Dynamic Multi Layer Signature based IDS System using Mobile Agents. – М.: LAP Lambert Academic Publishing, 2011. – 72 с. Ivano Malavolta. A tamper resistant Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2011. – 144 с. Shaffali Gupta and Sanmeet Kaur. A GUI Framework for detecting Intrusions using Bro IDS. – М.: LAP Lambert Academic Publishing, 2013. – 76 с. Mahmoud Jazzar. Computer Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 240 с. Siva S. Sivatha Sindhu,S. Geetha and S. Selvakumar. Network Intrusion Detection System using Machine Learning Techniques. – М.: LAP Lambert Academic Publishing, 2013. – 80 с. Gaurav Mishra and Gulshan Ahuja. Classification of data mining techniques in intrusion detection. – М.: LAP Lambert Academic Publishing, 2013. – 52 с. Nasim Beigi-Mohammadi. Smart Meter Networks: Intrusion Detection System by Design. – М.: LAP Lambert Academic Publishing, 2014. – 136 с. Christian Chetachi Umunna. Distributed Intrusion Detection System in Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 104 с. Iftikhar Ahmad. Feature Subset Selection in Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 220 с. Saima Munawar. Detection and Classification Of Normal and Anomaly IP Packet. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Jabarweer Singh,Krishan Kumar and Gulshan Kumar. Intrusion detection using artificial intelligence based ensembles. – М.: LAP Lambert Academic Publishing, 2014. – 116 с. Govind Sreekar Shenoy. Architecture Support for Intrusion Detection systems. – М.: LAP Lambert Academic Publishing, 2014. – 160 с. Soumyajit Dey and Anupam Basu. Embedded Architectures for Speech and Machine Learning. – М.: LAP Lambert Academic Publishing, 2010. – 128 с. Britto R. Kumar and Albert S. Rabara. An Architecture for Secure Mobile Payment System using PKI. – М.: LAP Lambert Academic Publishing, 2013. – 184 с. Tanzila Saba and Amjad Rehman. Machine Learning and Script Recognition. – М.: LAP Lambert Academic Publishing, 2012. – 168 с. Monis Akhlaq,Irfan Awan and Faeiz Alserhani. Improved Performance High Speed Network Intrusion Detection Systems. – М.: LAP Lambert Academic Publishing, 2011. – 132 с. Prakash Prasad. Intrusion Detection System: Findings. – М.: LAP Lambert Academic Publishing, 2011. – 104 с. Homam El-Taj and Omar Amer. Network Alert Management System For IDS False Positive Reduction. – М.: LAP Lambert Academic Publishing, 2013. – 156 с. Bibi Masoomeh Aslahi Shahri. Intrusion Detection System Using Hybrid Gsa-kmeans. – М.: LAP Lambert Academic Publishing, 2014. – 128 с. Noormadinah Allias,Megat Norulazmi Megat Mohamed Noor and Mohd. Nazri Ismail. Email Filtering Based On Swarm Intelligence via Machine Learning. – М.: LAP Lambert Academic Publishing, 2015. – 196 с. Mehmet ACI. DEVELOPMENT OF TWO HYBRID CLASSIFICATION METHODS FOR MACHINE LEARNING. – М.: LAP Lambert Academic Publishing, 2011. – 48 с. Vinayak Bharadi and Hemchandra Kekre. Signature Recognition Using Clustering Techniques. – М.: LAP Lambert Academic Publishing, 2012. – 180 с. Sahar Sabbeh. Adaptation Of Web Operating System Using Semantic Web Techniques. – М.: LAP Lambert Academic Publishing, 2012. – 148 с. Kunwar Babar Ali. Quality Prediction using Machine Learning Technique(MLT). – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Tigabu Dagne Akal. Constructing Predictive Model for Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 160 с. Kamrul Hasan. An Investigation into Botnet Detection System. – М.: LAP Lambert Academic Publishing, 2013. – 120 с. Rupali Pathak. Recent Advances In Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 72 с. Khamael Abbas Al-Dulaimi. Fingerprint Recognition System Using Image Processing Technique. – М.: LAP Lambert Academic Publishing, 2013. – 88 с. Lum Zhaveli. Gauging affectivity in social networks. – М.: LAP Lambert Academic Publishing, 2013. – 136 с. Fadel O. Shaban. Spyware Detection. – М.: LAP Lambert Academic Publishing, 2013. – 92 с. Thanh-Quang Chu. Agent-based models and machine learning in decision support systems. – М.: LAP Lambert Academic Publishing, 2015. – 208 с. Leonardo Rigutini. Automatic Text Processing: Machine Learning Techniques. – М.: LAP Lambert Academic Publishing, 2010. – 148 с. Rajnish Kumar,Anju Sharma and Pritish Kumar Varadwaj. Machine Learning and Biological Data. – М.: LAP Lambert Academic Publishing, 2011. – 64 с. Surafel Teklu. Automatic Categorization Of Amharic News Text. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Stefan Schliebs. Optimisation and Modelling of Spiking Neural Networks. – М.: LAP Lambert Academic Publishing, 2010. – 296 с. Ravindar Reddy Ravula. Classification of Malware. – М.: LAP Lambert Academic Publishing, 2011. – 108 с. Dakshina Ranjan Kisku,Phalguni Gupta and Massimo Tistarelli. Multibiometrics Systems: Modern Perspectives to Identity Verification. – М.: LAP Lambert Academic Publishing, 2012. – 176 с. Sheetal Dabra and Sunil Agrawal. Identification of Handwritten Characters using Machine Learning. – М.: LAP Lambert Academic Publishing, 2013. – 84 с. Alpay Doruk. Security Review Program Requirements for Intrusion Management Systems. – М.: LAP Lambert Academic Publishing, 2010. – 88 с. Sathish Kumar. Intrusion Detection and Response Techniques for Mobile Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 200 с. Babak Loni. Enhanced Question Classification with Optimal Combination of Features. – М.: LAP Lambert Academic Publishing, 2012. – 88 с. Richard Rimiru. Exploring Immune System's Concepts for the Design of Novel AIS Models. – М.: LAP Lambert Academic Publishing, 2012. – 164 с. Sokyna Al-Qatawneh. 3D Facial Feature Extraction and Recognition. – М.: LAP Lambert Academic Publishing, 2012. – 196 с. Sharmin Rashid Linta,Ridgewan Khan and Faysal Ahmed. Towards E-Learning Management System using Semantic Web Technologies. – М.: LAP Lambert Academic Publishing, 2011. – 80 с. Goh Kwang Leng,Ashutosh Kumar Singh and Lim King Hann. Web Spam Detection Application using Neural Network. – М.: Scholars' Press, 2013. – 60 с. Ismael Arciniegas Rueda. Explaining Currency Crises: A Statistical Machine Learning Approach. – М.: LAP Lambert Academic Publishing, 2010. – 472 с. Suganya Ramamoorthy and Rajaram Sivasubramanian. Classification of US liver images using machine learning techniques. – М.: LAP Lambert Academic Publishing, 2014. – 164 с. Victor Boyarshinov. Machine Learning In Computational Finance. – М.: LAP Lambert Academic Publishing, 2012. – 88 с. Saul Kornik. Machine Learning for Corporate Failure Prediction. – М.: LAP Lambert Academic Publishing, 2012. – 364 с. Kevin P. Murphy. Machine Learning: A Probabilistic Perspective. – М.: The MIT Press, 2012. – 1104 с. Jason Bell. Machine Learning: Hands??“On for Developers and Technical Professionals. – М.: , 2014. – с. Лучшие результаты Ничего не найдено Дополнительные результаты Банковское отделение будущего. интервью с Камероном МакКворри. Cameron MacQuarrie, менеджером по развитию бизнеса компании Cisco Systems в области корпоративных финансов в регионе EMEA. Европа, Ближний Восток, Африка. Н.Ф. Колюшенко, "Расчеты и операционная работа в коммерческом банке", № 2, февраль 2006. Необходимые и достаточные условия e-learning. М. Удовиченко, "Финансовая газета. Региональный выпуск", № 45, ноябрь 2004. Ловушка для пирата. интервью с И. Слабых, руководителем отдела противодействия интеллектуальному пиратству в России и СНГ Adobe Systems. И. Голова, "Расчет", N 9, сентябрь 2012 г. Основной арсенал "охотника" - его network: кого он знает на рынке и качество этих отношений. С. Плетнева, "Управление персоналом", № 12, июнь 2009. Я воспринимаю персонального помощника как напарника червяк должен нравиться рыбке, а не рыбаку. интервью с П.А. Черкашиным, руководителем российского представительства компании Adobe Systems. "Управление персоналом", № 20, октябрь 2008. E-learning - противоядие от рутины. О. Сизова, "Расчет", № 10, октябрь 2008. Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Марина Марина, большое спасибо, диплом после вашего сопровождения защитила на \"отлично\". Без Вас ничего бы не получилось. Еще раз спасибо!