لطفا کمی صبر نمایید ...
ورود
Advanced Search
Thesis
مقالات فارسی
ISI
کنفرانسها
ژورنالها
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Login / Register
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Thesis
Dark Mode
استعلام پایان نامه
جستجوی مقالات داخلی
Catehory
Conference Papers
Journal Papers
Books
Plans
Research documents
Rports
Result Type:
Full Text
Has Word File
Search regardless of the position of the words
Limit article publication year to:
All years
Specific years:
Search
Show
All Information
Only Paper Title
Item Per Page
10
20
Sort By
Paper title
Year
Indexing
ABS
DESC
فیلتر نتایج
فرشاد ادبجو
نتایج 21 تا 30 از مجموع 112
1
2
3
4
5
6
...
Last
Conference Paper
روش های یادگیری ماشین برای تشخیص نفوذ امنیت سایبری: مجموعه داده ها و مطالعه تطبیقی
Authors:
مهسا عظیم نسب
،
فاطمه فیروزنژاد
،
آزاده احمدی
Year 1400
Publish place:
Sixth International Conference on Electrical Engineering, Computer Science and Information Technology
Pages:
20
| Language: Persian
View And Download
Journal Paper
Implementation of Intrusion Detection Systems in order to Detect Phishing in the Banking Industry
Authors:
Mohsen gerami
،
Abdullah Sahifa
Year 1399
Publish place:
International Journal of Information and Communication Technology Research (IJICT Issue 2، Vol 12
Pages:
13
| Language: English
View And Download
Conference Paper
سیستم های تشخیص نفوذ در شبکه های حسگر بی سیم
Authors:
رسول کرکه آبادی
،
سحر سیف علیان
،
رزیتا جمیلی اسکویی
Year 1400
Publish place:
Specialized conference on defense engineering entitled "Cyber-electronic threats"
Pages:
8
| Language: Persian
View And Download
Conference Paper
تشخیص حمله سیبیل دراینترنت اشیاء مبتنی بریادگیری عمیق
Authors:
فرشاد ادب جو
،
مهدی صادق زاده
،
طالب خفایی
Year 1399
Publish place:
7th National Congress of New Findings of Iranian Electrical Engineering
Pages:
35
| Language: Persian
View And Download
Journal Paper
توسعه یک سیستم تشخیص نفوذ مبتنی بر خوشه بندی فازی و الگوریتم بهینه سازی نهنگ
Authors:
رضا نظری
،
مصطفی فخراحمد
Year 1400
Publish place:
Scientific Journal of Advanced Defense Science and Technology Issue 2، Vol 12
Pages:
16
| Language: Persian
View And Download
Journal Paper
Detecting Flood-based Attacks against SIP Proxy Servers and Clients using Engineered Feature Sets
Authors:
Hassan Asgharian
،
Ahmad Akbari
،
Bijan Raahemi
Year 1394
Publish place:
International Journal of Information and Communication Technology Research (IJICT Issue 1، Vol 8
Pages:
9
| Language: English
View And Download
Conference Paper
امنیت در رایانش ابری: چالش ها، حملات و راه کارها
Authors:
مهزاد مهدوی شریف
Year 1399
Publish place:
3rd International Conference on Electrical, Computer and Mechanical Engineering
Pages:
20
| Language: Persian
View And Download
Conference Paper
مروری بر روش های تشخیص نفوذ با استفاده از نظریه بازی ها در شبکه های موردی
Authors:
عذرا بی باک
،
محمد خیراندیش
Year 1399
Publish place:
National Conference on New Research in Electrical Engineering
Pages:
6
| Language: Persian
View And Download
Conference Paper
سیستم تشخیص نفوذ در شبکه های کامپیوتری
Authors:
محبوبه میرصادق
،
جواد آتشی
Year 1399
Publish place:
4th National Conference on Electrical and Computer Engineering of Iran
Pages:
10
| Language: Persian
View And Download
Conference Paper
Investigating the effect of the use of managerial credit IDs in the education management model on improving the motivation of entrepreneurship and managerial credit
Authors:
Seyedeh Khadijeh Mirjamali
،
Mohammad Reza Behrangi
،
Maryam Mollabagher
Year 1399
Publish place:
1st International Conference on Challenges and New Solutions in Industrial Engineering and Management and Accounting
Pages:
15
| Language: English
View And Download
نتایج 21 تا 30 از مجموع 112
1
2
3
4
5
6
...
Last