1. Emerging technologies in data mining and Information security :
Author: Ajith Abraham, Paramartha Dutta, Jyotsna Kumar Mandal, Abhishek Bhattacharya, Soumi Dutta, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Data mining, Congresses.,Artificial Intelligence.,Computational Intelligence.,Systems and Data Security.,Artificial intelligence.,Computer security.,Computer security.,COMPUTERS / General.,Data mining.
Classification :
QA76
.
9
.
D343


2. Emerging technologies in data mining and information security :
Author: Ajith Abraham, Paramartha Dutta, Jyotsna Kumar Mandal, Abhishek Bhattacharya, Soumi Dutta, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Data mining, Congresses.,Computer security.,Data mining.
Classification :
QA76
.
9
.
D343
I58
2018


3. Emerging technologies in data mining and information security :
Author: Ajith Abraham, Paramartha Dutta, Jyotsna Kumar Mandal, Abhishek Bhattacharya, Soumi Dutta, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Data mining, Congresses.,Computer security.,Data mining.
Classification :
QA76
.
9
.
D343
I58
2018


4. Intelligence and security informatics : IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, Ga, USA, May 19-20, 2005 : proceedings
Author: Paul Kantor... ]et al.[ )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Expert systems )Computer science(,Congresses ، Data mining,Congresses ، Computer security,Congresses ، National security
Classification :
QA
76
.
L28
Vol
.
3495


5. International Conference on Intelligent Computing and Applications :
Author: M. Arun Bhaskar, Subhransu Sekhar Dash, Swagatam Das, Bijaya Ketan Panigrahi, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Artificial intelligence, Congresses.,Computer security, Congresses.,Computational Intelligence.,Data Mining and Knowledge Discovery.,Signal, Image and Speech Processing.,Artificial intelligence.,Artificial intelligence.,Computer security.,COMPUTERS / General.,Data mining.,Imaging systems & technology.
Classification :
Q334


6. Privacy and security issues in data mining and machine learning
Author: Christos Dimitrakakis [and four others] (Eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Data mining-- Security measures, Congresses.,Machine learning-- Security measures, Congresses.

7. Transactions on large-scale data- and knowledge-centered systems XXXVII /
Author: edited by Abdelkader Hameurlain, Roland Wagner.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data mining, Congresses.,Database management, Congresses.,Artificial intelligence.,Artificial intelligence.,Computer networks.,Computer science.,Computer security.,Computer security.,Computers-- Database Management-- Data Mining.,Computers-- Hardware-- Network Hardware.,Computers-- Intelligence (AI) & Semantics.,Computers-- Operating Systems-- General.,Computers-- Security-- General.,Computers-- Software Development & Engineering-- General.,Data mining.,Data mining.,Network hardware.,Operating systems (Computers),Operating systems.,Software engineering.,Software Engineering.
Classification :
QA76
.
9
.
A25


8. Transactions on large-scale data- and knowledge-centered systems XXXVIII :
Author: Abdelkader Hameurlain, Roland Wagner, Sven Hartmann, Hui Ma (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data mining, Congresses.,Database management, Congresses.,Computer networks-- Security measures.,Computer security.,Data mining.,Database management.
Classification :
QA76
.
9
.
A25


9. VizSEC/DMSEC'04 : proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, Washington, DC, USA, October 29, 2004, co-located with CCS 2004
Author: sponsored by ACM SIGSAC
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Data mining
Classification :
QA
76
.
9
.
A25A384
2004

