لطفا کمی صبر نمایید ...
ورود
Advanced Search
Thesis
مقالات فارسی
ISI
کنفرانسها
ژورنالها
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Login / Register
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Thesis
Dark Mode
استعلام پایان نامه
جستجوی مقالات داخلی
Catehory
Conference Papers
Journal Papers
Books
Plans
Research documents
Rports
Result Type:
Full Text
Has Word File
Search regardless of the position of the words
Limit article publication year to:
All years
Specific years:
Search
Show
All Information
Only Paper Title
Item Per Page
10
20
Sort By
Paper title
Year
Indexing
ABS
DESC
فیلتر نتایج
GholamReza Ahmadi
نتایج 1 تا 10 از مجموع 27
1
2
3
Conference Paper
Scada Security Threats: For Machinelearning Engineers
Authors:
Ali Taghavirashidizadeh
Year 1402
Publish place:
the seventh International Conference on Information Technology Engineering , Computer Sciences and Telecommunication of Iran
Pages:
117
| Language: English
View And Download
Journal Paper
Detection of Attacks and Anomalies in the Internet of Things System using Neural Networks Based on Training with PSO Algorithms, Fuzzy PSO, Comparative PSO and Mutative PSO
Authors:
Mohammad Nazarpour
،
navid nezafati
،
Sajjad Shokouhyar
Year 1400
Publish place:
The Journal of Information Systems and Telecommunication (JIST) Issue 40، Vol 10
Pages:
9
| Language: English
View And Download
Journal Paper
Detection of E-commerce Attacks and Anomalies using Adaptive Neuro-Fuzzy Inference System and Firefly Optimization Algorithm
Authors:
Fereidoon Rezaei
،
Mohammad Ali Afshar Kazemi
،
Mohammad Ali Keramati
Year 1399
Publish place:
International Journal of Information and Communication Technology Research (IJICT Issue 1، Vol 13
Pages:
8
| Language: English
View And Download
Journal Paper
Combining Particle Swarm Optimization and Entropy to Detect DDoS Attacks in the Cloud Computing
Authors:
Amin Rezaeipanah
،
Sayed Ebrahim Mousavipoor
،
Mehdi Asayeshjoo
،
Mehdi Sadeghzadeh
Year 1400
Publish place:
Journal of Business Data Science Research Issue 1، Vol 1
Pages:
11
| Language: English
View And Download
Journal Paper
Ontological Modeling of Radio Frequency Identification(RFID)Attacks
Authors:
Ahmad Salahi
،
Mahshid Delavar
Year 1391
Publish place:
International Journal of Information and Communication Technology Research (IJICT Issue 2، Vol 4
Pages:
10
| Language: English
View And Download
Journal Paper
بهینه سازی تشخیص حملات تزریق SQL با استفاده ترکیبی از الگوریتم های جنگل تصادفی و ژنتیک
Authors:
جواد مرادی
،
مجید غیوری ثالث
Year 1400
Publish place:
Journal Of Command & Control Issue 1، Vol 5
Pages:
12
| Language: Persian
View And Download
Journal Paper
Detection of Attacks and Anomalies in The Internet of Things System Using Neural Networks Based on Training with PSO and TLBO Algorithms
Authors:
Mohammad Nazarpour
،
Navid Nezafati
،
Sajjad Shokuhyar
Year 1399
Publish place:
Signal Processing and Renewable Energy Issue 4، Vol 4
Pages:
14
| Language: English
View And Download
Journal Paper
Detecting Flood-based Attacks against SIP Proxy Servers and Clients using Engineered Feature Sets
Authors:
Hassan Asgharian
،
Ahmad Akbari
،
Bijan Raahemi
Year 1394
Publish place:
International Journal of Information and Communication Technology Research (IJICT Issue 1، Vol 8
Pages:
9
| Language: English
View And Download
Conference Paper
A Model to Improve the Performance of Intrusion Detection System Based on the Genetic Algorithm
Authors:
Mohammad Hossein Gheisizadeh
،
Habib Rostami
،
GholamReza Ahmadi
Year 1398
Publish place:
National Congress of Basic Research in Computer Engineering and Information Technology
Pages:
10
| Language: English
View And Download
Conference Paper
A Model to Improve the Performance of Intrusion Detection System Based on the Genetic Algorithm
Authors:
Mohammad Hossein Gheisizadeh
،
Habib Rostami
،
Gholamreza Ahmadi
Year 1398
Publish place:
International Conference on Recent Developments in Information Science, Engineering and Technology
Pages:
15
| Language: English
View And Download
نتایج 1 تا 10 از مجموع 27
1
2
3