Skip to main content
Sign in
Summit Research Repository
SIGN IN
SFU Mail
goSFU
Canvas
Library Catalogue
Search
Search
This site
SFU.ca
Submit your Research
Menu
Main navigation
Home
Collections
About
Contact
Search Summit
Search
Search
Sort by
Relevance
Title
Order
Asc
Desc
Search
Displaying 1 - 20 of 24
Community participation in protected areas in Iran, Afghanistan, and India
Author:
Jamshidian Ghaleh Sefidi, Soudeh
Date created:
2020-04-22
"Now we learn to live with it": Katzie cultural resilience and the Golden Ears Bridge.
Author:
Hoffmann, Tanja
Date created:
2017-08-23
Archaeological Data as Evidence in Aboriginal Rights and Title Litigation in Canada
Author:
Hogg, Erin
Date created:
2019-09-09
Evaluation of Support Vector Machine kernels for detecting network anomalies
Author:
Batta, Prerna
Date created:
2019-04-18
They ‘sprouted up from the earth’: Archaeology and management of Shubenacadie River Valley paleoshorelines, Nova Scotia
Author:
McKillop, Vanessa
Date created:
2019-11-26
Underwater cultural heritage law and policy in Ontario: History and prospects for reform
Author:
Pitul, Michael
Date created:
2019-11-13
Application of machine learning techniques for detecting anomalies in communication networks
Author:
Ding, Qingye
Date created:
2018-06-19
Algorithms and tools for anonymization of the internet traffic
Author:
Farah, Tanjila
Date created:
2013-02-26
Reauthorizing Kanaka Oiwi Heritage Discourse at Kaloko-Honokohau National Historical Park, Hawaii
Author:
Aloua, Ruth Rebeccalynne
Date created:
2014-07-24
Applications of Reinforcement Learning to Routing and Virtualization in Computer Networks
Author:
Haeri, Soroush
Date created:
2016-03-17
Revaluing “looted” archaeological materials at Fort Apache and Theodore Roosevelt School National Historic Landmark, Arizona
Author:
Lewis-Botica, Jennifer Maria
Date created:
2017-07-17
Comparison of machine learning models for classification of BGP anomalies
Author:
Al-Rousan, Nabil Mashhour
Date created:
2012-08-06
Distributed intelligent systems for control with distributed hash table
Author:
Zhang, Chi
Date created:
2011-12-01
Collection and characterization of BCNET BGP traffic
Author:
Lally, Sukhchandan
Date created:
2012-05-25
Finding middle ground: case studies in negotiated repatriation
Author:
Ewing, Robyn G.
Date created:
2010-10-22
Detection of denial of service attacks using echo state networks
Author:
Bekshentayeva, Kamila
Date created:
2021-07-23
Machine learning classification of internet worms and ransomware attacks and effect of BGP feature properties
Author:
Takhar, Hardeep Kaur
Date created:
2023-04-19
Machine learning for detecting ransomware attacks using BGP routing records
Author:
Gonzalez Rios, Ana
Date created:
2022-08-24
Machine learning for classifying anomalies and intrusions in communication networks
Author:
Li, Zhida
Date created:
2022-04-14
Effect of MRAI Timers on BGP Convergence Times
Author:
Gill, Rajvir Kaur
Date created:
2013-01-22
Pagination
1
2
››
Next page
Last »
Last page