Skip to main content
Sign in
Summit Research Repository
SIGN IN
SFU Mail
goSFU
Canvas
Library Catalogue
Search
Search
This site
SFU.ca
Submit your Research
Menu
Main navigation
Home
Collections
About
Contact
Search Summit
Search
Search
Sort by
Relevance
Title
Order
Asc
Desc
Search
Displaying 1 - 20 of 27
Evaluation of Support Vector Machine kernels for detecting network anomalies
Author:
Batta, Prerna
Date created:
2019-04-18
Application of machine learning techniques for detecting anomalies in communication networks
Author:
Ding, Qingye
Date created:
2018-06-19
Algorithms and tools for anonymization of the internet traffic
Author:
Farah, Tanjila
Date created:
2013-02-26
Victim', 'Deviant', or 'Worker' but Nothing in Between: Revisiting Prostitution Discourse in Bedford v. Canada
Author:
Chiang, Anita
Date created:
2015-11-10
Extending a relative methodological perspective to sentencing outcome analysis
Author:
Reid, Andrew Alexander
Date created:
2017-07-21
Applications of Reinforcement Learning to Routing and Virtualization in Computer Networks
Author:
Haeri, Soroush
Date created:
2016-03-17
Is Treatment the Cure? Exploring the Possible Role of Implementing Mandatory Treatment Programs in the YCJA for Serious and Violent Youth
Author:
Dawson, Krysta Lyndell
Date created:
2016-05-25
Comparison of machine learning models for classification of BGP anomalies
Author:
Al-Rousan, Nabil Mashhour
Date created:
2012-08-06
Distributed intelligent systems for control with distributed hash table
Author:
Zhang, Chi
Date created:
2011-12-01
Collection and characterization of BCNET BGP traffic
Author:
Lally, Sukhchandan
Date created:
2012-05-25
Canadian girls in custody
Author:
Brown, Susan Judith
Date created:
2011-08-19
Mandates in motion: exploring judicial decisions to incarcerate youth under the YCJA
Author:
Wittes, Maya Andrée
Date created:
2011-05-30
Is the Canadian legal profession at risk? An analysis of lawyer victimization across Canada.
Author:
Brown, Karen Nancy
Date created:
2011-04-21
Detection of denial of service attacks using echo state networks
Author:
Bekshentayeva, Kamila
Date created:
2021-07-23
Machine learning classification of internet worms and ransomware attacks and effect of BGP feature properties
Author:
Takhar, Hardeep Kaur
Date created:
2023-04-19
Machine learning for detecting ransomware attacks using BGP routing records
Author:
Gonzalez Rios, Ana
Date created:
2022-08-24
Machine learning for classifying anomalies and intrusions in communication networks
Author:
Li, Zhida
Date created:
2022-04-14
Mandatory minimum sentences of imprisonment as 'cruel and unusual punishment': Exploring constitutional infirmity post-Nur (2015)
Author:
Barkase, Kayla
Date created:
2020-07-30
"Obscenity has fallen to the wayside": The decline of the obscenity provisions amongst law enforcement professionals in Canada
Author:
Kusz, Jennifer
Date created:
2020-10-23
Effect of MRAI Timers on BGP Convergence Times
Author:
Gill, Rajvir Kaur
Date created:
2013-01-22
Pagination
1
2
››
Next page
Last »
Last page