لطفا کمی صبر نمایید ...
ورود
Advanced Search
Thesis
مقالات فارسی
ISI
کنفرانسها
ژورنالها
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Login / Register
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Thesis
Dark Mode
استعلام پایان نامه
جستجوی مقالات داخلی
Catehory
Conference Papers
Journal Papers
Books
Plans
Research documents
Rports
Result Type:
Full Text
Has Word File
Search regardless of the position of the words
Limit article publication year to:
All years
Specific years:
Search
Show
All Information
Only Paper Title
Item Per Page
10
20
Sort By
Paper title
Year
Indexing
ABS
DESC
فیلتر نتایج
Mohammad Kazem Beshkani
Benyamin Mohammadian Khazineh
نتایج 31 تا 40 از مجموع 123
1
2
3
4
5
6
7
...
Last
Journal Paper
Evaluation of an Intrusion Detection System for Routing Attacks in Wireless Self-organised Networks
Authors:
O. Adaobi
،
M. Ghassemian
Year 1390
Publish place:
The International Journal of Communications and Information Technology Issue 1، Vol 1
Pages:
5
| Language: English
View And Download
Journal Paper
Entropy Based Fuzzy Rule Weighting for Hierarchical Intrusion Detection
Authors:
Mohammad Reza Moosavi
،
Mahsa Fazaeli Javan
،
Mohammad Hadi Sadreddini
،
Mansoor Zolghadri Jahromi
Year 1393
Publish place:
Iranian Journal of Fuzzy Systems Issue 3، Vol 11
Pages:
18
| Language: English
View And Download
Conference Paper
Intrusion Detection and Classification Using Machine Learning
Authors:
Babak Eamaeilpour Ghouchani
،
Benyamin Mohammadian Khazineh
،
Seyed Mohammad Esmaeil kazemi
،
Mohammad Kazem Beshkani
Year 1401
Publish place:
International Conference on Recent Advances in Engineering, Innovation and Technology
Pages:
11
| Language: English
View And Download
Journal Paper
A Novel Anomaly-based Intrusion Detection System using Whale Optimization Algorithm WOA-Based Intrusion Detection System
Authors:
Aliakbar Tajari Siahmarzkooh
،
Mohammad Alimardani
Year 1400
Publish place:
International Journal of Web Research Issue 2، Vol 4
Pages:
8
| Language: English
View And Download
Conference Paper
Types of intrusion detection systems and technologies for cloud computing networks
Authors:
Nooshin Rezaian Rad
Year 1400
Publish place:
14th International Conference on Information Technology, Computers and Telecommunications
Pages:
12
| Language: English
View And Download
Journal Paper
Masquerade Detection Using GUI Events in Windows Systems
Authors:
Parisa Kaghazgaran
،
Babak Sadeghyan
Year 1390
Publish place:
International Journal of Information and Communication Technology Research (IJICT Issue 2، Vol 3
Pages:
5
| Language: English
View And Download
Journal Paper
Ontological Modeling of Radio Frequency Identification(RFID)Attacks
Authors:
Ahmad Salahi
،
Mahshid Delavar
Year 1391
Publish place:
International Journal of Information and Communication Technology Research (IJICT Issue 2، Vol 4
Pages:
10
| Language: English
View And Download
Journal Paper
مدلی برای تشخیص نفوذ در اینترنت اشیاء با استفاده از بازی شراکت
Authors:
علی سلیمی
،
مجید غیوری ثالث
Year 1400
Publish place:
Journal Of Command & Control Issue 2، Vol 5
Pages:
18
| Language: Persian
View And Download
Journal Paper
بهره گیری از طبقه بندی کننده ی عصبی– فازی برای سیستم های تشخیص نفوذ
Authors:
محمد حسن نتاج صلحدار
Year 1400
Publish place:
Journal Of Command & Control Issue 2، Vol 5
Pages:
16
| Language: Persian
View And Download
Journal Paper
بهینه سازی تشخیص حملات تزریق SQL با استفاده ترکیبی از الگوریتم های جنگل تصادفی و ژنتیک
Authors:
جواد مرادی
،
مجید غیوری ثالث
Year 1400
Publish place:
Journal Of Command & Control Issue 1، Vol 5
Pages:
12
| Language: Persian
View And Download
نتایج 31 تا 40 از مجموع 123
1
2
3
4
5
6
7
...
Last