لطفا کمی صبر نمایید ...
ورود
Advanced Search
Thesis
مقالات فارسی
ISI
کنفرانسها
ژورنالها
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Login / Register
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Thesis
Dark Mode
استعلام پایان نامه
جستجوی مقالات داخلی
Catehory
Conference Papers
Journal Papers
Books
Plans
Research documents
Rports
Result Type:
Full Text
Has Word File
Search regardless of the position of the words
Limit article publication year to:
All years
Specific years:
Search
Show
All Information
Only Paper Title
Item Per Page
10
20
Sort By
Paper title
Year
Indexing
ABS
DESC
فیلتر نتایج
نتایج 1 تا 10 از مجموع 24
1
2
3
Conference Paper
Securing the Control Plane: A Comprehensive Review of IDS Approaches in SDN Environments
Authors:
Saba Alizadeh
،
Arezoo Jahani
Year 1404
Publish place:
5th International Conference on Computer, Electrical Engineering and Technology
Pages:
19
| Language: English
View And Download
Journal Paper
ویژگی های دولت پهلوی دوم و آسیب پذیری آن درمقابل بسیج انقلابی
Authors:
عباس کشاورز شکری
،
الهه عابدینی
Year 1393
Publish place:
Journal of Historical Sociology Issue 2، Vol 6
Pages:
32
| Language: Persian
View And Download
Conference Paper
Navigating the Security Landscape of Smart Systems: Threats, Vulnerabilities, and Mitigation Strategies
Authors:
Mahdieh Zakizadeh
Year 1404
Publish place:
The 9th International Conference on Science and Technology of Electrical, Computer and Mechanical Engineering of Iran
Pages:
17
| Language: English
View And Download
Journal Paper
Cybersecurityin Autonomous Systems: Threats, Vulnerabilities, and Defense Mechanisms
Authors:
Seyed Milad Kashefi Pour Dezfuli
Year 1404
Publish place:
Journal of Engineering in Industrial Research Issue 2، Vol 6
Pages:
16
| Language: English
View And Download
Conference Paper
Enhancing Network Security in Software-Defined Networking (SDN): Challenges, Threats, and Solutions
Authors:
Muhammad AZIZI
،
Aref Eskandari
،
Ehsan Ghazinezhad
Year 1403
Publish place:
4 th international conference of computer engineering, electricity and technology
Pages:
17
| Language: English
View And Download
Journal Paper
Enhancing High-Performance Computing (HPC) Security: A Compre- hensive Review of Detection and Protection Strategies
Authors:
سارا کلینی
،
پروانه پهلوان زاده
Year 1402
Publish place:
Journal of Distributed Computing Systems Issue 2، Vol 6
Pages:
13
| Language: Persian
View And Download
Conference Paper
Exploiting Fine-Tuning Vulnerabilities in Large Language Models
Authors:
Fatemeh Zahra Arshia
،
Saeedeh Sadat Sadidpour
Year 1403
Publish place:
International Conference on Artificial Intelligence and Future Civilization
Pages:
9
| Language: English
View And Download
Conference Paper
Identification and vulnerabilities analysis of SS۷ protocol and its detection solutions by machine learning methods
Authors:
Seyed Morteza Pournaghi
،
Rouhollah Fazli Shahri
Year 1403
Publish place:
International Conference on Artificial Intelligence and Future Civilization
Pages:
23
| Language: English
View And Download
Conference Paper
Dissecting the Vulnerabilities in Self-Driving Cars Integrated with Artificial Intelligence: A Comprehensive Analysis
Authors:
Amirhossein Rahimian
Year 1403
Publish place:
9th.International Conference on Researches in Science & Engineering & 6th.International Congress on Civil, Architecture and Urbanism in Asia
Pages:
5
| Language: English
View And Download
Journal Paper
Linking Environmental Crimes and Extreme Weather Conditions: A Systematic Review on the Climate Change Issues of Bangladesh
Authors:
Mostak Bari Fahim
Year 1404
Publish place:
Sustainable Earth Review Issue 3، Vol 5
Pages:
11
| Language: English
View And Download
نتایج 1 تا 10 از مجموع 24
1
2
3