Vol. 8 No. 3 (2015)
Published:
2015-07-07
Articles
-
AIS Algorithm for Smart Antenna Application in WLAN
DOI : https://doi.org/10.5614/itbj.ict.res.appl.2015.8.3.1
-
Handwritten Javanese Character Recognition Using Several Artificial Neural Network Methods
DOI : https://doi.org/10.5614/itbj.ict.res.appl.2015.8.3.2
-
DIDS Using Cooperative Agents Based on Ant Colony Clustering
DOI : https://doi.org/10.5614/itbj.ict.res.appl.2015.8.3.3
-
Improving Intrusion Detection System Based on Snort Rules for Network Probe Attacks Detection with Association Rules Technique of Data Mining
DOI : https://doi.org/10.5614/itbj.ict.res.appl.2015.8.3.4
-
Comprehensiveness of Response to Internal Cyber-Threat and Selection of Methods to Identify the Insider
DOI : https://doi.org/10.5614/itbj.ict.res.appl.2015.8.3.5
-
Ownerâs Support, IT Sophistication and IT Adoption in Indonesian Manufacturing SMEs
DOI : https://doi.org/10.5614/itbj.ict.res.appl.2015.8.3.6
Editorial Section
-
Cover JICTRA Vol. 8 No. 3, 2015
-
Front Matter
-
Back Matter