Period of time: 2013年2期
Publisher: Inderscience Publishers
Founded in: 2005
Total resources: 28
ISSN: 1743-8187
Subject: TP Automation Technology , Computer Technology
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
International Journal of Business Intelligence and Data Mining,volume 5,issue 2
Menu
Defining and transforming security rules in an MDA approach for DWs
By Blanco Carlos,Guzman Ignacio Garcia-Rodriguez de,Fernandez-Medina Eduardo,Trujillo Juan,Piattini Mario in (2010)
International Journal of Business Intelligence and Data Mining,volume 5,issue 2 , Vol. 5, Iss. 2, 2010-01 , pp.Practical algorithms for subgroup detection in covert networks
By Memon Nasrullah,Wiil Uffe Kock,Qureshi Pir Abdul Rasool in (2010)
International Journal of Business Intelligence and Data Mining,volume 5,issue 2 , Vol. 5, Iss. 2, 2010-01 , pp.Experimenting with an Intrusion Detection System for Encrypted Networks
By Goh Vik Tor,Zimmermann Jacob,Looi Mark in (2010)
International Journal of Business Intelligence and Data Mining,volume 5,issue 2 , Vol. 5, Iss. 2, 2010-01 , pp.By Apu Russel A.,Gavrilova Marina L. in (2010)
International Journal of Business Intelligence and Data Mining,volume 5,issue 2 , Vol. 5, Iss. 2, 2010-01 , pp.