لطفا کمی صبر نمایید ...
ورود
Advanced Search
Thesis
مقالات فارسی
ISI
کنفرانسها
ژورنالها
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Login / Register
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Thesis
Dark Mode
استعلام پایان نامه
جستجوی مقالات داخلی
Catehory
Conference Papers
Journal Papers
Books
Plans
Research documents
Rports
Result Type:
Full Text
Has Word File
Search regardless of the position of the words
Limit article publication year to:
All years
Specific years:
Search
Show
All Information
Only Paper Title
Item Per Page
10
20
Sort By
Paper title
Year
Indexing
ABS
DESC
فیلتر نتایج
Hamid Hassanpour
Ali Movaghar
Ali Amiri
Behzad Akbari
Ghasem Mirjalily
sayed mohsen hashemi
نتایج 11 تا 20 از مجموع 27
1
2
3
Conference Paper
Wormhole Attack Detection Methods in Wireless Sensor Networks
Authors:
Mojgan Rayenizadeh
،
Marjan Kuchaki Rafsanjani
Year 1396
Publish place:
5th International Conference on Sciences, Engineering and Technology Innovations
Pages:
8
| Language: English
View And Download
Journal Paper
A Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks
Authors:
Maryam Fathi Ahmadsaraei
،
Abolfazl Toroghi Haghighat
Year 1394
Publish place:
Journal of Computer and Robotics Issue 2، Vol 8
Pages:
8
| Language: English
View And Download
Journal Paper
A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks
Authors:
Maryam Fathi Ahmadsaraei
،
Abolfazl Toroghi Haghighat
Year 1392
Publish place:
Journal of Computer and Robotics Issue 2، Vol 6
Pages:
8
| Language: English
View And Download
Conference Paper
Privacy-Preserving Sybil Attack Detection inVehicular Ad-Hoc Networks
Authors:
Mohsen Memarian
،
Hoda Madani
Year 1396
Publish place:
Third National Conference on New Approaches in computer in Electrical Engineering
Pages:
6
| Language: English
View And Download
Conference Paper
Modified CBDS for defending against collaborative attacks by malicious nodes in MANETs
Authors:
Ahmad Haghighi
،
Kiarash Mizanian
،
Ghasem Mirjalily
Year 1394
Publish place:
2nd Internatioanl Conference on Knowledge -Base Engineering and Innovation
Pages:
7
| Language: English
View And Download
Journal Paper
Proposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Authors:
Meisam Yadollahzadeh
،
Hamid Hassanpour
،
Ali Movaghar
Year 1390
Publish place:
Journal of Advances in Computer Research Issue 2، Vol 2
Pages:
12
| Language: English
View And Download
Conference Paper
An Effective Intrusion Detection System by Using Feature Selection Methods and Machine Learning Algorithms
Authors:
Sayed Hossein Hashemi
،
Sayed Mohsen Hashemi
،
Aref Sayahi
Year 1394
Publish place:
National Conference on Information Technology, Computer & Communication
Pages:
7
| Language: English
View And Download
Journal Paper
OMADM: Online Multi-step Attack Detection Method
Authors:
Ali Amiri
،
Alireza Nowroozi
Year 1394
Publish place:
International Journal of Computer & Information Technologies Issue 2، Vol 3
Pages:
13
| Language: English
View And Download
Conference Paper
A Hybrid Detection Approach of Hello Flood Attack in Wireless Sensor Networks
Authors:
Hasti Khosravi
،
Reza Azmi
،
Mehran Sharghi
Year 1394
Publish place:
International Conference on New Research Findings in Electrical Engineering and Computer Science
Pages:
10
| Language: English
View And Download
Conference Paper
Alert Correlation Approach Based on HMM
Authors:
Fatemeh Vafaei Nejad
،
Behzad Akbari
Year 1393
Publish place:
6th iranian conference on electrical and electronic engineering
Pages:
8
| Language: English
View And Download
نتایج 11 تا 20 از مجموع 27
1
2
3