全部文献期刊学位论文会议报纸专利标准年鉴图书|学者科研项目
中外文文献  中文文献  外文文献
作者:Abdullah Kaid Al-Swidi , Munadil K. Faaeq
来源:[J].Electronic Government, an Int. J., 2019, Vol.15 (1), pp.37-66Inderscience 出版公司
摘要:This study aimed to examine the robustness of the unified theory of acceptance and use of technology (UTAUT) theory in explaining the usage of electronic government services in an unstable security context. In addition, it attempts to investigate the extent to which usage behavio...
作者:... Norita Md Norwawi , Osman Ghazali , Munadil K. Faaeq
来源:[J].Int. J. of Information and Computer Security, 2019, Vol.11 (1), pp.17-32Inderscience 出版公司
摘要:The main purpose of intrusion detection system (IDS) is to find out intrusions among normal audit data and this can be considered as a classification problem. This problem is brought about by the user datagram protocol (UDP) which is a connectionless protocol that means it does n...
作者:Munadil K. Faaeq , Noor Azizi Ismail ...
来源:[J].Electronic Government, an Int. J., 2013, Vol.10 (3/4), pp.343-360Inderscience 出版公司
摘要:In the last decade, several studies have employed unified theory of acceptance and use of technology (UTAUT) in different countries. Additionally, a quantitative meta-analysis was conducted of prior studies on the UTAUT in an attempt to make well-grounded statements of previous r...
作者:Mohammad M. Rasheed , Munadil K. Faaeq
来源:[B].Springer International Publishing2018Springer
摘要:Abstract Conficker worm spread in November 2008, it was targeting Microsoft Windows operating system that has once infected 15 million hosts. The worm system defense must be automatically detection. Before we defend against worm, we must get the worm strategy by analysis of ...

我们正在为您处理中,这可能需要一些时间,请稍等。

资源合作:cnki.scholar@cnki.net, +86-10-82896619   意见反馈:scholar@cnki.net

×