Keywords: سیستم های تشخیص نفوذ; Detection software; Intrusion detection systems; Game-theory; Decision errors
مقالات ISI ترجمه شده سیستم های تشخیص نفوذ
Keywords: سیستم های تشخیص نفوذ; Computer networks; Computer network security; Intrusion detection systems; Hybrid intrusion detection system
مقالات ISI سیستم های تشخیص نفوذ (ترجمه نشده)
مقالات زیر هنوز به فارسی ترجمه نشده اند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
Keywords: سیستم های تشخیص نفوذ; Machine learning; Intrusion detection systems; Computer security; Artificial Intelligence;
Keywords: سیستم های تشخیص نفوذ; Intrusion detection systems; Misuse detection; Decision Trees; Genetic Algorithms; Machine learning; Information systems security;
Keywords: سیستم های تشخیص نفوذ; Anomaly detection systems; Intrusion detection systems; Heterogeneous and reliable systems; Decision-level combination;
Keywords: سیستم های تشخیص نفوذ; Intrusion detection systems; IDS; Privacy; Privacy preserving intrusion detection system; IDS privacy issues;
Keywords: سیستم های تشخیص نفوذ; Data fusion; Intrusion detection systems; Measurements and networking; Network security; Virtual jamming attacks; Wireless network measurements;
Keywords: سیستم های تشخیص نفوذ; Multiclass classifiers; Support vector machines; Intrusion detection systems; NSL-KDD; Model selection; Differential evolution;
Keywords: سیستم های تشخیص نفوذ; Learning agents; Hybrid agents; Case-based reasoning; Ontologies; Information security; Intrusion detection systems;
Keywords: سیستم های تشخیص نفوذ; Cloud security; Cloud computing; Denial-of-service; Security threats; Intrusion detection systems
Keywords: سیستم های تشخیص نفوذ; Feature selection; Cuttlefish algorithm; Intrusion detection systems; Decision trees; ID3 algorithm
Keywords: سیستم های تشخیص نفوذ; Intrusion Detection Systems; Genetic Fuzzy Systems; Pairwise learning; One-vs-One; Misuse detection
Keywords: سیستم های تشخیص نفوذ; Intrusion detection systems; Information security; Machine learning; Data mining; File system; Anomaly detection;
Distributed Intrusion Detection System for Cloud Environments based on Data Mining techniques
Keywords: سیستم های تشخیص نفوذ; Intrusion Detection Systems; Cloud Computing; Machine Leaning; Hadoop; MapReduce;
Network Intrusion Detection Systems Analysis using Frequent Item Set Mining Algorithm FP-Max and Apriori
Keywords: سیستم های تشخیص نفوذ; Internet Attack; Frequent Item Set Mining; FP-MAX; Apriori; SNORT; Intrusion Detection Systems;
A GA-LR wrapper approach for feature selection in network intrusion detection
Keywords: سیستم های تشخیص نفوذ; Intrusion detection systems; Anomaly detection; Feature selection; Wrapper approach; Genetic algorithm; Logistic regression; Classification; Decision tree; KDD99; UNSW-NB15;
Automatic generation of HTTP intrusion signatures by selective identification of anomalies
Keywords: سیستم های تشخیص نفوذ; Anomaly detection; Intrusion detection systems; Attack signature; Network security; Web application firewalls
An efficient parallel-network packet pattern-matching approach using GPUs
Keywords: سیستم های تشخیص نفوذ; Graphics processing units; Parallel processing; Pattern matching; Intrusion detection systems
Randomized Anagram revisited
Keywords: سیستم های تشخیص نفوذ; Intrusion detection systems; Anomaly detection; Evasion attacks; Adversarial classification
Enhancing IDS performance through comprehensive alert post-processing
Keywords: سیستم های تشخیص نفوذ; Intrusion detection systems; Aggregation; Correlation; Prediction; Visualization
A model-based survey of alert correlation techniques
Keywords: سیستم های تشخیص نفوذ; Alert correlation; Network management systems; Fault localization; Intrusion detection systems; SCADA systems
An autonomous labeling approach to support vector machines algorithms for network traffic anomaly detection
Keywords: سیستم های تشخیص نفوذ; Anomaly detection; Intrusion detection systems; SVM; Labeling
A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier
Keywords: سیستم های تشخیص نفوذ; Intrusion detection systems; Data mining; Multiclass classification; Hidden Naïve Bayes (HNB); Denial-of-services (DoS)
Improving the performance of passive network monitoring applications with memory locality enhancements
Keywords: سیستم های تشخیص نفوذ; Passive network monitoring; Intrusion detection systems; Locality buffering; Packet capturing
A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering
Keywords: سیستم های تشخیص نفوذ; Intrusion detection systems; Artificial Neural Networks; Fuzzy clustering
Reducing false positives in intrusion detection systems
Keywords: سیستم های تشخیص نفوذ; Intrusion detection systems; False alarms; Filter; Snort; Alarms’ distribution
Conversion methods for symbolic features: A comparison applied to an intrusion detection problem
Keywords: سیستم های تشخیص نفوذ; Symbolic features; Intrusion detection systems; Machine learning; Anomaly detection
MOVIH-IDS: A mobile-visualization hybrid intrusion detection system
Keywords: سیستم های تشخیص نفوذ; Hybrid artificial intelligent systems; Multiagent systems; Artificial neural networks; Unsupervised projection methods; Intrusion detection systems
Critical study of neural networks in detecting intrusions
Keywords: سیستم های تشخیص نفوذ; Intrusion detection systems; Neural networks; Misuse intrusion detection; KDD features; Attack categories
Vulnerability analysis of immunity-based intrusion detection systems using genetic and evolutionary hackers
Keywords: سیستم های تشخیص نفوذ; Artificial immune systems; Intrusion detection systems; GENERTIA
Hybrid multi-agent framework for detection of stealthy probes
Keywords: سیستم های تشخیص نفوذ; Intrusion detection systems; Stealthy probes; Controller;
A hierarchical SOM-based intrusion detection system
Keywords: سیستم های تشخیص نفوذ; Intrusion detection systems; Self-organizing map; Unsupervised learning; Benchmarking; Hierarchical neural network
Using the danger model of immune systems for distributed defense in modern data networks
Keywords: سیستم های تشخیص نفوذ; Malware; Worm; Virus; Security; Pervasive computing; Artificial immune systems; Intrusion detection systems
Security issues in SCADA networks
Keywords: سیستم های تشخیص نفوذ; SCADA network security; Critical infrastructure security; SCADA protocol analysis; Firewalls; Intrusion detection systems; SCADA cryptography
RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks
Keywords: سیستم های تشخیص نفوذ; Network security; Intrusion detection systems; Misuse detection; Anomaly detection; Unsupervised neural network; Self-organizing map; Adaptive resonance theory