Keywords: حملات; Security; Cyber; Attacks; Threat; Incidents; Accidents; Chemical and process industry;
مقالات ISI حملات (ترجمه نشده)
مقالات زیر هنوز به فارسی ترجمه نشده اند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
Keywords: حملات; Wireless Body Area Network (WBAN); Security; Privacy; Threats; Attacks; Healthcare systems;
Keywords: حملات; Wireless body area networks; Authentication; Anonymous; Attacks;
Keywords: حملات; Nonlinear state estimation; Attacks; Power systems; Security;
Keywords: حملات; Industrial Control Systems; Configuration Protocols; Attacks; Mitigation,;
Keywords: حملات; Electric power network protection; System resilience; Transmission switching; Attacks; Trilevel optimization;
Keywords: حملات; Sensor; Security; Ontology; SWRL; attacks
Keywords: حملات; Attacks; Intrusion; Mobile ad hoc networks; Security; Vulnerability; Wireless networks
Keywords: حملات; Lifting wavelet transform; Support vector machine; Coefficient difference; Feature reduction; Watermarking; Attacks; PCA; Digital image watermarking
Keywords: حملات; Image watermarking; Attacks; Robustness; Tamper detection
Keywords: حملات; Burma; Myanmar; Health worker; Conflict; Violence; Security; Attacks; Ethnic groups;
Keywords: حملات; watermarking; robust; attacks; security
Keywords: حملات; Optical packet switching networks; Dimensioning; Reinforcement learning; Self-healing; Attacks; Monte Carlo simulation
Keywords: حملات; Web security; Empirical study; Malicious web sessions; Vulnerability scans; Attacks; Statistical inference; Classification
Keywords: حملات; Advanced Metering Infrastructure; Smart Meters; Data Collectors; Attack Vectors; Targets; Functionality; Attacks; Impacts;
Keywords: حملات; Image encryption; Chaos theory; Key schedule; Attacks; Key space
Mobile Network Security and Privacy in WSN
Keywords: حملات; Wireless Sensor Network; security; threats; attacks; vulnerabilities; Trusted Computing;
Détermination de l'incapacité totale de travail psychologique : analyse rétrospective de 232 consultations de victimes à l'unité médico-judiciaire du CHU de Montpellier
Keywords: حملات; I.T.T. psychologique; Violences volontaires; Attentats; Psychological total incapacity for work; Voluntary violence; Attacks;
REATO: REActing TO Denial of Service attacks in the Internet of Things
Keywords: حملات; Internet of Things; Security; Denial of Service; Attacks; Middleware; Prototype;
A privacy-enhanced computationally-efficient and comprehensive LTE-AKA
Keywords: حملات; LTE; AKA; Privacy; Attacks; Passive attacks; Active attacks; Replay attacks;
Cryptanalytic attacks on cyber-physical systems
Keywords: حملات; Cryptography; Cryptanalysis; Attacks; Cyber-physical systems; GSM; Car immobilizers; Door opening systems; Public transport tickets; Differential power analysis;
P2P routing table poisoning: A quorum-based sanitizing approach
Keywords: حملات; P2P; Sanitizing; Attacks; Detection; Security;
NFD: Non-technical loss fraud detection in Smart Grid
Keywords: حملات; Non-Technical Loss fraud; Smart Grid security; Smart meter; Malicious meter; Attacks;
A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV
Keywords: حملات; Attacks; Intrusion detection; Misbehavior detection; IoV; VANET; Security;
Analysis of vulnerabilities, attacks, countermeasures and overall risk of the Automatic Dependent Surveillance-Broadcast (ADS-B) system
Keywords: حملات; Air traffic control; Automatic Dependent Surveillance-Broadcast (ADS-B); Vulnerabilities; Attacks; Countermeasures; Risk analysis;
Kademlia with Consistency Checks as a Foundation of Borderless Collaboration in Open Science Services
Keywords: حملات; Kademlia; P2P; DHT; distributed data systems; attacks; poisoning; OpenScience;
PEE based RW using fuzzy conditional entropy for image partitioning
Keywords: حملات; Prediction error expansion; Reversible watermarking; Conditional entropy; Attacks
Stealing bandwidth from BitTorrent seeders
Keywords: حملات; Peer-to-peer; BitTorrent; Attacks; Countermeasures; Seeding algorithms
Analysis of Secure LEACH-Based Clustering Protocols in Wireless Sensor Networks
Keywords: حملات; Trust; Reputation; Security; Attacks; Cluster head; Cryptography; Confidentiality; Malicious nodes
Using network-based text analysis to analyze trends in Microsoft's security innovations
Keywords: حملات; Security; Trustworthy computing; Identity and access management; Patents; Innovation; Vulnerabilities; Attacks
A taxonomy and survey of attacks on digital signatures
Keywords: حملات; Security; Taxonomy; Digital signature; Attacks; Non-repudiation; Public key infrastructure
Vulnerability of the security enhanced double random phase-amplitude encryption scheme to point spread function attack
Keywords: حملات; Double random phase encryption; Attacks; Point spread function
Anti-aggressive activity of methyl jasmonate and the probable mechanism of its action in mice
Keywords: حملات; Methyl jasmonate; Antiaggressive; 5-Hydroxytryptamine; Attacks; Pursuit; Aggressive postures;
Cognitive radio network security: A survey
Keywords: حملات; Radio; Security; Trust; Attacks; Secondary users; Primary users
Denial-of-service attacks and countermeasures on BitTorrent
Keywords: حملات; Peer-to-peer; BitTorrent; Denial-of-service; Attacks; Countermeasures;
Error and attack tolerance of small-worldness in complex networks
Keywords: حملات; Complex networks; Random/systematic failure; Errors; Attacks; Robustness; Small-worldness
Synchronization of complex dynamical networks under recoverable attacks
Keywords: حملات; Complex dynamical networks; Synchronization; Attacks; Switched system
Therapy of multiple sclerosis in children and adolescents
Keywords: حملات; Multiple sclerosis; Paediatric; Childhood; Adolescence; Demyelination; Relapses; Attacks; Immunomodulation; Interferons; Glatiramer acetate; Immunossuppresive drugs; Adverse events; First-line drugs; Second-line drugs; Safety; Tolerability
Private key agreement and secure communication for heterogeneous sensor networks
Keywords: حملات; Key agreement; Heterogeneous sensor network; Pairing based cryptography; Attacks
An experimental investigation of malware attacks on SCADA systems
Keywords: حملات; Critical Infrastructures; SCADA Systems; Malware; Attacks
Human Fatalities Resulting From Dog Attacks in the United States, 1979–2005
Keywords: حملات; dog bite; fatality; attacks; prevention
Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard
Keywords: حملات; RFID; Security; Attacks; EPC-C1G2 standard
Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
Keywords: حملات; Password-authenticated key exchange; Cryptanalysis; Attacks; Provable security; Three-party; Unknown key-share; Undetectable online dictionary
Attack taxonomies for the Modbus protocols
Keywords: حملات; Modbus serial; Modbus TCP; Attacks; Attack taxonomies
Improving the security of ‘a flexible biometrics remote user authentication scheme’
Keywords: حملات; Authentication; Security; Cryptanalysis; Smart card; Attacks
Two methods for privacy preserving data mining with malicious participants
Keywords: حملات; Data mining; Privacy; Malicious model; Attacks; Protocols
Disaster management in power-law networks: Recovery from and protection against intentional attacks
Keywords: حملات; Growing networks; Power law; Attacks; Peer-to-peer (P2P); Scale-free; Preferential deletion; Compensation; Ad hoc networks
2004 Presidential campaign messages: A functional analysis of press releases from President Bush and Senator Kerry
Keywords: حملات; 2004 presidential election; News releases; Functional theory; Acclaims; Attacks; Defenses; Policy; Character
Paroxysmal Nonepileptic Events of Childhood
Keywords: حملات; syncope; seizure; movement disorders; attacks; breath-holding; spells
Primary presidential election campaign messages in 2004: A functional analysis of candidates' news releases
Keywords: حملات; 2004 Democratic primary; News releases; Functional Theory; Acclaims; Attacks; Defenses; Policy; Character;