لطفا کمی صبر نمایید ...
ورود
Advanced Search
Thesis
مقالات فارسی
ISI
کنفرانسها
ژورنالها
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Login / Register
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Thesis
Dark Mode
استعلام پایان نامه
جستجوی مقالات داخلی
Catehory
Conference Papers
Journal Papers
Books
Plans
Research documents
Rports
Result Type:
Full Text
Has Word File
Search regardless of the position of the words
Limit article publication year to:
All years
Specific years:
Search
Show
All Information
Only Paper Title
Item Per Page
10
20
Sort By
Paper title
Year
Indexing
ABS
DESC
فیلتر نتایج
Mohammad Ali Nazeri
آرمان رحیمی
zahra tayyebi qasabeh
نتایج 11 تا 20 از مجموع 19
1
2
Conference Paper
The Role of Rootkit s Techniques in High Interaction Honeypots
Authors:
Jaber Karimpour
،
Maryam Mohammadzad
Year 1396
Publish place:
4th National Conference on Information Technology?Computer & Telecommunication
Pages:
8
| Language: English
View And Download
Conference Paper
راه کار رکوردهایHoneypot برای شناسایی و مقابله با پرسش های درست نما در حملات تزریق SQL
Authors:
آرمان رحیمی بروجردی
،
روح اله گودرزی
Year 1393
Publish place:
The Second National Conference on Applied Research in Computer Science and Information Technology
Pages:
10
| Language: Persian
View And Download
Conference Paper
تاکتیک های امنیتی در منابع ابری امن و تکنیک های تخصیص منابع در سرویس های ابری و بررسی چالش های پژوهشی برای اپلیکیشن ها
Authors:
زهرا طیبی قصبه
،
فرشته اخوان سیاسی پورفومنی
،
ژیلا تجربه کار
Year 1394
Publish place:
2nd National conference on Computer Engineering and IT Management
Pages:
10
| Language: Persian
View And Download
Journal Paper
Information precautions using intellectual honeypot instrument
Authors:
L.S Arul
،
k Lecturer
Year 1391
Publish place:
Scientific Journal of Pure and Applied Sciences Issue 3، Vol 1
Pages:
6
| Language: English
View And Download
Conference Paper
A Distributed Approach for Spam Collection and Detection Using Honeypots
Authors:
Moein Sarvi
،
Ali Yazdiane Varjani
،
Mohammad Ali Nazeri
Year 1393
Publish place:
First International Conference on Knowledge, Information and Software Engineering
Pages:
9
| Language: English
View And Download
Conference Paper
تاکتیک های امنیتی در منابع رایانش ابری امن
Authors:
زهرا طیبی قصبه
،
مریم هاشمی
،
اعظم بجاری
Year 1392
Publish place:
The first internal conference on electrical computer engineering and information technology
Pages:
5
| Language: Persian
View And Download
Conference Paper
تاکتیک های امىیتی در منابع رایانش ابری امن
Authors:
زهرا طیبی قصبه
،
زینب گودرزی
،
اعظم بجاری
،
مریم هاشمی جوکار
Year 1392
Publish place:
National Conference on Computer Engineering and Information Technology
Pages:
5
| Language: Persian
View And Download
Conference Paper
Honeypot و تاثیر آن در شبکه های کامپیوتری
Authors:
مهدی امیری
،
مریم ارکیا
،
محمدصادق عبدالهی
Year 1392
Publish place:
Conference on Computer Engineering and Sustainable Development with a focus on computer networking, modeling and systems security
Pages:
9
| Language: Persian
View And Download
Conference Paper
Automatic Generation of Attack Signatures for implementing anew Plugin to Honeyd
Authors:
Motahareh Dehghan
،
Babak Sadeghiyan
Year 1391
Publish place:
7th Sympozium on Advances in Sience & Technology
Pages:
7
| Language: English
View And Download
نتایج 11 تا 20 از مجموع 19
1
2