لطفا کمی صبر نمایید ...
ورود
Advanced Search
Thesis
مقالات فارسی
ISI
کنفرانسها
ژورنالها
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Login / Register
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Thesis
Dark Mode
استعلام پایان نامه
جستجوی مقالات داخلی
Catehory
Conference Papers
Journal Papers
Books
Plans
Research documents
Rports
Result Type:
Full Text
Has Word File
Search regardless of the position of the words
Limit article publication year to:
All years
Specific years:
Search
Show
All Information
Only Paper Title
Item Per Page
10
20
Sort By
Paper title
Year
Indexing
ABS
DESC
فیلتر نتایج
Journal Paper
An Attack Graph Based Method for Predictive Risk Evaluation of Zero-Day Attacks
Authors:
Marjan Keramati
Year 1396
Publish place:
International Journal of Information and Communication Technology Research (IJICT Issue 3، Vol 9
Pages:
10
| Language: English
View And Download
Journal Paper
Dynamic Risk Assessment System for the Vulnerability Scoring
Authors:
Marjan Keramati
Year 1396
Publish place:
International Journal of Information and Communication Technology Research (IJICT Issue 4، Vol 9
Pages:
12
| Language: English
View And Download
Conference Paper
Security Model Based Method for Quantitative Risk Evaluation of Zero-Day Attacks
Authors:
Marjan Keramati
،
Fatemeh Sadat Halataei
Year 1397
Publish place:
Fourth National Conference on Applied Research in Electrical Engineering, Mechanics, Computer and Information Technology
Pages:
11
| Language: English
View And Download
Conference Paper
New Vulnerability Scoring System for Risk Assessment
Authors:
Marjan keramati
Year 1393
Publish place:
The Second National Conference on Applied Research in Computer Science and Information Technology
Pages:
9
| Language: English
View And Download
Conference Paper
Scalable Intrusion Prevention Framework based on Attack Graphs
Authors:
Marjan keramati
Year 1393
Publish place:
The Second National Conference on Applied Research in Computer Science and Information Technology
Pages:
9
| Language: English
View And Download