Skip to search formSkip to main contentSkip to account menu

Telnet

National Institutes of Health

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
As intrusion detection techniques based on malicious traffic signature are unable to detect unknown attacks, the methods derived… 
2012
2012
Most of the Organizations such as public and private sectors have started deploying computers to their employees to perform their… 
2010
2010
There are a number of methods that can be used to efficiently build dimensional models for business intelligence systems using… 
2008
2008
Current paper attempts to answer an “exotic” question of usability of OPACs'. The possibilities of implementation of a web… 
2004
2004
Building and updating an effective intrusion detection system is complex engineering knowledge. A method of learning the… 
Review
2001
Review
2001
Introduction Digital library services: an overview of the hybrid approach Staffing the special library Organising access to… 
2000
2000
This paper briefly explains how the U.S. military currently implements secure networks internally and with multi-national… 
2000
2000
It is generally acknowledged that separation of concerns is a key requirement for effective software engineering: it helps in… 
1998
1998
Abstract Since August 1995, near-infrared images of Neptune have regularly been obtained with the University-of-Hawaii telescope… 
1994
1994
In presenting this thesis in partial fullllment of the requirements for a Postgraduate degree from the University of Saskatchewan…