لطفا کمی صبر نمایید ...
ورود
Advanced Search
Thesis
مقالات فارسی
ISI
کنفرانسها
ژورنالها
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Login / Register
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Thesis
Dark Mode
استعلام پایان نامه
جستجوی مقالات داخلی
Catehory
Conference Papers
Journal Papers
Books
Plans
Research documents
Rports
Result Type:
Full Text
Has Word File
Search regardless of the position of the words
Limit article publication year to:
All years
Specific years:
Search
Show
All Information
Only Paper Title
Item Per Page
10
20
Sort By
Paper title
Year
Indexing
ABS
DESC
فیلتر نتایج
نتایج 11 تا 20 از مجموع 52
1
2
3
4
5
Journal Paper
Implementation of Intrusion detection and prevention with Deep Learning in Cloud Computing
Authors:
Srilatha
،
Thillaiarasu
Year 1402
Publish place:
Journal of Information Technology Management Issue 5، Vol 15
Pages:
18
| Language: English
View And Download
Journal Paper
Entropy Based Fuzzy Rule Weighting for Hierarchical Intrusion Detection
Authors:
Mohammad Reza Moosavi
،
Mahsa Fazaeli Javan
،
Mohammad Hadi Sadreddini
،
Mansoor Zolghadri Jahromi
Year 1393
Publish place:
Iranian Journal of Fuzzy Systems Issue 3، Vol 11
Pages:
18
| Language: English
View And Download
Journal Paper
Ontological Modeling of Radio Frequency Identification(RFID)Attacks
Authors:
Ahmad Salahi
،
Mahshid Delavar
Year 1391
Publish place:
International Journal of Information and Communication Technology Research (IJICT Issue 2، Vol 4
Pages:
10
| Language: English
View And Download
Journal Paper
بهره گیری از طبقه بندی کننده ی عصبی– فازی برای سیستم های تشخیص نفوذ
Authors:
محمد حسن نتاج صلحدار
Year 1400
Publish place:
Journal Of Command & Control Issue 2، Vol 5
Pages:
16
| Language: Persian
View And Download
Journal Paper
بهینه سازی تشخیص حملات تزریق SQL با استفاده ترکیبی از الگوریتم های جنگل تصادفی و ژنتیک
Authors:
جواد مرادی
،
مجید غیوری ثالث
Year 1400
Publish place:
Journal Of Command & Control Issue 1، Vol 5
Pages:
12
| Language: Persian
View And Download
Journal Paper
Machine Learning Algorithms Performance Evaluation for Intrusion Detection
Authors:
.
،
Kumar
،
Bhatnagar
Year 1400
Publish place:
Journal of Information Technology Management Issue 1، Vol 13
Pages:
20
| Language: Persian
View And Download
Journal Paper
An Intrusion Detection System in Computer Networks using the Firefly Algorithm and the Fast Learning Network
Authors:
Samira Rajabi
،
Shahram Jamali
،
Javad Javidan
Year 1399
Publish place:
International Journal of Web Research Issue 1، Vol 3
Pages:
7
| Language: English
View And Download
Journal Paper
Detecting Sinkhole Attack in RPL-based Internet of Things Routing Protocol
Authors:
M. Yadollahzadeh Tabari
،
Z. Mataji
Year 1400
Publish place:
Journal of Artificial Intelligence & Data Mining Issue 1، Vol 9
Pages:
14
| Language: English
View And Download
Journal Paper
Improving Accuracy in Intrusion Detection Systems Using Classifier Ensemble and Clustering
Authors:
Ensieh Nejati
،
Hassan Shakeri
،
Hassan Raei
Year 1399
Publish place:
Journal of Advances in Computer Research Issue 4، Vol 11
Pages:
18
| Language: English
View And Download
Conference Paper
Anomaly-based Intrusion Detection Using Generelized Variational Auto-Encoder
Authors:
Ali Ghorbani
،
Seyed Mostafa Fakhrahmad
Year 1399
Publish place:
Fifth National Conference on Electrical and Computer Engineering
Pages:
5
| Language: English
View And Download
نتایج 11 تا 20 از مجموع 52
1
2
3
4
5