لطفا کمی صبر نمایید ...
ورود
Advanced Search
Thesis
مقالات فارسی
ISI
کنفرانسها
ژورنالها
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Login / Register
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Thesis
Dark Mode
استعلام پایان نامه
جستجوی مقالات داخلی
Catehory
Conference Papers
Journal Papers
Books
Plans
Research documents
Rports
Result Type:
Full Text
Has Word File
Search regardless of the position of the words
Limit article publication year to:
All years
Specific years:
Search
Show
All Information
Only Paper Title
Item Per Page
10
20
Sort By
Paper title
Year
Indexing
ABS
DESC
فیلتر نتایج
Nasser Modiri
Saeed Araban
نتایج 1 تا 10 از مجموع 12
1
2
Journal Paper
ارائه مدلی برای بهبود روند امتیازدهی به آسیب پذیری در CVSS
Authors:
مرجان کرامتی
Year 1401
Publish place:
Journal of Iranian Association of Electrical and Electronics Engineers Issue 1، Vol 19
Pages:
7
| Language: Persian
View And Download
Journal Paper
روشی مبتنی بر مدل امنیتی برای ارزیابی پویا از خطر حملات چندمرحله ای شبکه های کامپیوتری DOR:۲۰.۱۰۰۱.۱.۲۳۲۲۴۳۴۷.۱۴۰۰.۹.۱.۱۳.۰
Authors:
مرجان کرامتی
Year 1400
Publish place:
Electronic and cyber defense Issue 1، Vol 9
Pages:
18
| Language: Persian
View And Download
Journal Paper
An Attack Graph Based Method for Predictive Risk Evaluation of Zero-Day Attacks
Authors:
Marjan Keramati
Year 1396
Publish place:
International Journal of Information and Communication Technology Research (IJICT Issue 3، Vol 9
Pages:
10
| Language: English
View And Download
Journal Paper
Dynamic Risk Assessment System for the Vulnerability Scoring
Authors:
Marjan Keramati
Year 1396
Publish place:
International Journal of Information and Communication Technology Research (IJICT Issue 4، Vol 9
Pages:
12
| Language: English
View And Download
Conference Paper
ارائه رویکرد جهت توسعه معیارهای امنیت سایبری و برآورد ارزش بردارهای مربوطه
Authors:
الهام دارابی
،
ناصر مدیری
Year 1399
Publish place:
4th National Conference on Applied Research in Electrical and Computer Science and Medical Engineering
Pages:
19
| Language: Persian
View And Download
Conference Paper
اجرای امنیت مبتنی بر ریسک در شبکه تعریف شده توسط نرم افزار
Authors:
هادی ویشکی نژاد
،
محمدحسین موذن رضامحله
Year 1398
Publish place:
Fourth National Conference on New Ideas in Engineering and Engineering
Pages:
8
| Language: Persian
View And Download
Conference Paper
نقدی بر سیستم امتیازدهی به آسیب پذیری CVSS
Authors:
مرجان کرامتی
،
فاطمه سادات هل اتایی
Year 1397
Publish place:
Fourth National Conference on Applied Research in Electrical Engineering, Mechanics, Computer and Information Technology
Pages:
14
| Language: Persian
View And Download
Conference Paper
بهبود ارزیابی ریسک امنیتی شبکه های کامپیوتری با استفاده از گراف حمله بیزی
Authors:
الهام اصغری
،
سعید عربان
،
احد هراتی
Year 1395
Publish place:
Pages:
18
| Language: Persian
View And Download
Conference Paper
New Vulnerability Scoring System for Risk Assessment
Authors:
Marjan keramati
Year 1393
Publish place:
The Second National Conference on Applied Research in Computer Science and Information Technology
Pages:
9
| Language: English
View And Download
Conference Paper
Scalable Intrusion Prevention Framework based on Attack Graphs
Authors:
Marjan keramati
Year 1393
Publish place:
The Second National Conference on Applied Research in Computer Science and Information Technology
Pages:
9
| Language: English
View And Download
نتایج 1 تا 10 از مجموع 12
1
2