Keywords: حمله; Attack; Internet of Things; Smart card; Remote user; Session key;
مقالات ISI حمله (ترجمه نشده)
مقالات زیر هنوز به فارسی ترجمه نشده اند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
Keywords: حمله; Attack; State estimation; Kalman filters; Structural results; Markov decision process; Multi-armed bandit;
Keywords: حمله; Twitter; Agenda setting; Donald Trump; Favorite; Retweet; Issue; Attack;
Keywords: حمله; Attack; Authentication; Key agreement; Remote user; Security;
Keywords: حمله; Social media; eWOM; Rival brands; Brand engagement; Attack; Defense; Across pages; Sentiment analysis; Time series analysis;
Keywords: حمله; Cellule d'urgence médico-psychologique; Attentat; Traumatisme; Medico-psychological emergency care; Attack; Traumatism;
Keywords: حمله; Attack; Authentication; Modification; Privacy; Session key;
Keywords: حمله; Attack; Healthcare; Protocol; Security; Threat; Wearable devices;
Keywords: حمله; Attack; Biometric; Remote user; Security; Session key; Smart card;
Keywords: حمله; Asthma; Attack; Control; Medical record; Observational; Risk factor; ICS; Inhaled corticosteroid; LABA; Long-acting β2 agonist; OCS; Oral corticosteroid; OPCRD; Optimum Patient Care Research Database;
Keywords: حمله; Special effort; General effort; Protection; Defense; Attack; Reliability; Vulnerability; Series system; Parallel system; Safety; Security; Terrorism;
Keywords: حمله; TMIS; Authentication; Biometric; Password; Smart Card; Security; Attack;
Keywords: حمله; Intergroup conflict; Parochial altruism; Intergroup aggression; Attack; Defense;
Keywords: حمله; Fast Fourier transform; Computational ghost imaging; Compressive sensing; Attack
Keywords: حمله; Attack; Cryptosystem; Correlated imaging
Keywords: حمله; Multiple sclerosis; Bruxism; Botulinum toxin; Treatment; Attack;
Keywords: حمله; Combat; Attack; Defense; Play fighting; Body targets; Tactics; Signals
Keywords: حمله; Complex dynamical network; Network optimization; Attack; Synchronization; Synchronizability
Keywords: حمله; Interdependent networks; Cascading failures; Attack; Catastrophic; Phase transition
Keywords: حمله; SCUBA diving; Questionnaire survey; Provisioning; Attack;
Keywords: حمله; Cascading failure; Interdependent network; Coupled strength; Robustness; Attack
Keywords: حمله; Protection; Warehouse; Game theory; Capacity; Attack; Damage; Defense;
Keywords: حمله; Aluminosilicate; Minerals; Refractories; Castables; Bricks; Slag; Attack;
Keywords: حمله; Optical encryption; Amplitude-phase retrieval; Phase truncation; Attack
Keywords: حمله; Cascading failure; Robustness; Attack; Internet;
Keywords: حمله; Overarching protection; Individual protection; Expected damage; Defense; Attack
Keywords: حمله; Power networks; Small-world property; Scale-free networks; Error; Attack; Cascaded failure;
Keywords: حمله; Capacity; Protection; Facility; Attack; Damage; Vulnerability; Game theory; Contest
Keywords: حمله; Joint fingerprinting and decryption (JFD); Vector quantization (VQ); Traitor tracing; Attack; Codebook partition
Keywords: حمله; Bark beetle; Ips typographus (L.); Hyperspectral remote sensing; Vitality; Attack; Spruce forest;
Keywords: حمله; Sharp force injury; Knife; Attack; Self-infliction; Mortality rate; Injury Severity Score
Keywords: حمله; Robustness; Cascading failure; Attack; Interconnected network; Fuzzy information
Keywords: حمله; Reliability; Vulnerability; Defense; Attack; False targets; Contest success function
Keywords: حمله; Online trust; Trust management; Online social communities; Attack
A survey of detection methods for XSS attacks
Keywords: حمله; XSS; Vulnerabilities; Attack; Detection; Prevention; Tools; Attack vectors; CSPs;
HSecGR: Highly Secure Geographic Routing
Keywords: حمله; Ad hoc network; Secure routing; Attack; Cryptography; Reputation; Malicious;
USB-based attacks
Keywords: حمله; USB; Device; Attack; Malicious; Malware;
A robust and blind 3D watermarking algorithm using multiresolution adaptive parameterization of surface
Keywords: حمله; 3D mesh model; Watermarking; Feature vertex; Attack; Robustness;
Tabu Search enhances network robustness under targeted attacks
Keywords: حمله; Network robustness; Attack; Combinatorial optimization; Tabu Search; Complex networks
Trust Based Certificate Revocation for Secure Routing in MANET
Keywords: حمله; MANET; attack; Trust based threshold revocation method; malicious nodes
A novel lottery protocol for mobile environments
Keywords: حمله; E-lottery; Fairness; Elliptic curve; Attack; Mutual authentication
Immune deficiencies, infection, and systemic immune disordersEndothelial cell activation during edematous attacks of hereditary angioedema types I and II
Keywords: حمله; Hereditary angioedema; C1-inhibitor deficiency; attack; endothelial cells; activation; von Willebrand factor; endothelin-1; soluble E-selectin; clinical study; BMI; Body mass index; C1-INH; C1-inhibitor; C4; Complement factor 4; CRP; C-reactive protein; E
Elevated relapse rates in pediatric compared to adult MS persist for at least 6 years
Keywords: حمله; Multiple sclerosis; Pediatric; Relapse; Demyelination; Attack; Disability;
(F,I)-security in graphs
Keywords: حمله; Security; Security number; Attack; Integer defense; Ultra-security;
A new color image cryptosystem via hyperchaos synchronization
Keywords: حمله; Color image cryptosystem; Six-dimensional hyperchaotic system; Synchronization; Substitution; Permutation; Security analysis; Attack
Analyzing mechanism-based attacks in privacy-preserving data publishing
Keywords: حمله; Privacy-preserving data publishing (PPDP); Anonymization; Attack; Algorithm
Evaluating the damage associated with intentional supply deprivation in multi-commodity network
Keywords: حمله; Network; Multi-commodity supply; Supply deprivation; Attack; Defense; Link failure; Damage
Defending majority voting systems against a strategic attacker
Keywords: حمله; Voting; Attack; Defense; Game; Protection; Vulnerability; Minmax
Cryptanalysis and improvement of a chaotic system based fragile watermarking scheme
Keywords: حمله; Fragile watermarking; Chaotic system; Attack; Improvement
Critical supply network protection against intentional attacks: A game-theoretical model
Keywords: حمله; Protection; Facility; Attack; Damage; Game theory; Vulnerability; Contest