لطفا کمی صبر نمایید ...
ورود
Advanced Search
Thesis
مقالات فارسی
ISI
کنفرانسها
ژورنالها
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Login / Register
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Thesis
Dark Mode
استعلام پایان نامه
جستجوی مقالات داخلی
Catehory
Conference Papers
Journal Papers
Books
Plans
Research documents
Rports
Result Type:
Full Text
Has Word File
Search regardless of the position of the words
Limit article publication year to:
All years
Specific years:
Search
Show
All Information
Only Paper Title
Item Per Page
10
20
Sort By
Paper title
Year
Indexing
ABS
DESC
فیلتر نتایج
نتایج 1 تا 10 از مجموع 12
1
2
Conference Paper
A Deep Learning Approach Using Convolutional Neural Networks for Enhanced IoT Security and Governance
Authors:
Ali Zolfaghari Bengar
،
Mohammad Hosein Poornoori
،
Mohammad Sohrabi
Year 1403
Publish place:
The 25th National Conference on Computer Science and Engineering and Information Technology
Pages:
10
| Language: Persian
View And Download
Conference Paper
Enhancing Network Intrusion Detection Systems Using Unsupervised Deep Learning Approaches with Autoencoders for Anomaly Detection
Authors:
Homa Taherpour Gelsefid
،
Seyyed Abdorreza Hesam Mohseni
Year 1402
Publish place:
5th International Conference on Software Computing
Pages:
10
| Language: English
View And Download
Journal Paper
Dynamic Security Risk Management Considering Systems Structural and Probabilistic Attributes
Authors:
Masoud Khosravi-Farmad
،
Abbas Ghaemi Bafghi
Year 1402
Publish place:
Computer and Knowledge Engineering Issue 2، Vol 6
Pages:
16
| Language: English
View And Download
Conference Paper
Grid infrastructure monitoring system based on Nagios
Authors:
Ali Khodayaran
Year 1401
Publish place:
2nd International Conference on Electrical, Computer and Mechanical Engineering
Pages:
12
| Language: English
View And Download
Journal Paper
Designing the performance evaluation indicators of Hormozgan Social Security Organization's service supply chain by the Network Data Envelopment Analysis Model
Authors:
Taleb pargar
،
Morteza Shafiee
،
Mohamadali Afsharkazemi
Year 1401
Publish place:
International Journal of Finance and Managerial Accounting Issue 27، Vol 7
Pages:
10
| Language: English
View And Download
Journal Paper
A Taxonomy for Network Vulnerabilities
Authors:
Sara Hajian
،
Faramarz Hendessi
،
Mehdi Berenjkoub
Year 1388
Publish place:
International Journal of Information and Communication Technology Research (IJICT Issue 1، Vol 2
Pages:
16
| Language: English
View And Download
Journal Paper
Detecting Bot Networks Based On HTTP And TLS Traffic Analysis
Authors:
Zahra Nafarieh
Year 1399
Publish place:
Journal of Advances in Computer Engineering and Technology Issue 2، Vol 6
Pages:
10
| Language: English
View And Download
Journal Paper
A Risk Estimation Framework for Security Threats in Computer Networks
Authors:
Razieh Rezaee
،
Abbas Ghaemi Bafghi
Year 1399
Publish place:
Journal of Computing and Security Issue 1، Vol 7
Pages:
15
| Language: English
View And Download
Journal Paper
Detecting Active Bot Networks Based on DNS Traffic Analysis
Authors:
Zahra Nafarieh
،
Ebrahim Mahdipur
،
Haj Hamid Haj Seyed Javadi
Year 1398
Publish place:
Journal of Advances in Computer Engineering and Technology Issue 3، Vol 5
Pages:
14
| Language: English
View And Download
Conference Paper
Network Security Analysis Using Big Data Technology
Authors:
Fatemeh Kashirifard
،
Mohsen Mohammadi
Year 1396
Publish place:
Fifth International Conference on Electrical and Computer Engineering with Emphasis on Indigenous Knowledge
Pages:
6
| Language: English
View And Download
نتایج 1 تا 10 از مجموع 12
1
2