لطفا کمی صبر نمایید ...
ورود
Advanced Search
Thesis
مقالات فارسی
ISI
کنفرانسها
ژورنالها
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Login / Register
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Thesis
Dark Mode
استعلام پایان نامه
جستجوی مقالات داخلی
Catehory
Conference Papers
Journal Papers
Books
Plans
Research documents
Rports
Result Type:
Full Text
Has Word File
Search regardless of the position of the words
Limit article publication year to:
All years
Specific years:
Search
Show
All Information
Only Paper Title
Item Per Page
10
20
Sort By
Paper title
Year
Indexing
ABS
DESC
فیلتر نتایج
GholamReza Ahmadi
Hossein gharaee
نتایج 21 تا 30 از مجموع 52
1
2
3
4
5
6
Journal Paper
Detecting Flood-based Attacks against SIP Proxy Servers and Clients using Engineered Feature Sets
Authors:
Hassan Asgharian
،
Ahmad Akbari
،
Bijan Raahemi
Year 1394
Publish place:
International Journal of Information and Communication Technology Research (IJICT Issue 1، Vol 8
Pages:
9
| Language: English
View And Download
Journal Paper
Intrusion Detection System Using SVM as Classifier and GA for Optimizing Feature Vectors
Authors:
Hossein Gharaee
،
Maryam Fekri
،
Hamid Hosseinvand
Year 1396
Publish place:
International Journal of Information and Communication Technology Research (IJICT Issue 1، Vol 10
Pages:
10
| Language: English
View And Download
Journal Paper
ارائه یک سیستم تشخیص نفوذ جدید مبتنی بر ماشین بردار پشتیبان و بهینه سازی کلونی زنبور مصنوعی بهبودیافته
Authors:
T. Feizi
،
M. H. Moattar
Year 1398
Publish place:
Tabriz Journal of Electrical Engineering Issue 2، Vol 49
Pages:
16
| Language: English
View And Download
Conference Paper
A Model to Improve the Performance of Intrusion Detection System Based on the Genetic Algorithm
Authors:
Mohammad Hossein Gheisizadeh
،
Habib Rostami
،
GholamReza Ahmadi
Year 1398
Publish place:
National Congress of Basic Research in Computer Engineering and Information Technology
Pages:
10
| Language: English
View And Download
Conference Paper
A Model to Improve the Performance of Intrusion Detection System Based on the Genetic Algorithm
Authors:
Mohammad Hossein Gheisizadeh
،
Habib Rostami
،
Gholamreza Ahmadi
Year 1398
Publish place:
International Conference on Recent Developments in Information Science, Engineering and Technology
Pages:
15
| Language: English
View And Download
Journal Paper
Intrusion Detection based on a Novel Hybrid Learning Approach
Authors:
L. khalvati
،
M. Keshtgary
،
N. Rikhtegar
Year 1397
Publish place:
Journal of Artificial Intelligence & Data Mining Issue 1، Vol 6
Pages:
6
| Language: English
View And Download
Journal Paper
Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing
Authors:
M. Rezvani
Year 1397
Publish place:
Journal of Artificial Intelligence & Data Mining Issue 2، Vol 6
Pages:
11
| Language: English
View And Download
Journal Paper
A New Method for Intrusion Detection Using Genetic Algorithm and Neural network
Authors:
mohammadreza hosseinzadehmoghadam
،
seyed javad mirabedini
،
toraj banirostam
Year 1396
Publish place:
Journal of Advances in Computer Engineering and Technology Issue 4، Vol 3
Pages:
10
| Language: English
View And Download
Conference Paper
An Intelligent Intrusion Detection System for Cloud Networks Based on Heterogeneous Intelligent Detection Method
Authors:
Mohammad Effan Shamsi
،
Manouchehr Kazemi
،
Alireza Amo Abedini
Year 1396
Publish place:
5th International Conference on Sciences, Engineering and Technology Innovations
Pages:
10
| Language: English
View And Download
Conference Paper
مطالعه و ارزیابی روش های سیستم تشخیص نفوذ
Authors:
سید محسن هاشمی
Year 1396
Publish place:
Pages:
16
| Language: Persian
View And Download
نتایج 21 تا 30 از مجموع 52
1
2
3
4
5
6