Keywords: امنیت رایانه; Computer security; Network security; Intrusion Detection System (IDS); Naïve Bayes classifier
مقالات ISI ترجمه شده امنیت رایانه
مقالات ISI امنیت رایانه (ترجمه نشده)
مقالات زیر هنوز به فارسی ترجمه نشده اند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
Keywords: امنیت رایانه; Machine learning; Intrusion detection systems; Computer security; Artificial Intelligence;
Keywords: امنیت رایانه; Applied cryptography; Embedded systems security; Computer security; Automated countermeasure application; Reactive countermeasures;
Keywords: امنیت رایانه; Classification; Computer security; Phishing; Machine learning; Web security; Security awareness;
Keywords: امنیت رایانه; Data reduction; Intrusion detection; Anomaly detection; Computer security;
Keywords: امنیت رایانه; Computer security; Formal methods; Process algebra; Security policy; Policy enforcement; Ambient calculus; Modal logic;
Keywords: امنیت رایانه; Workflow; Computer security; Hospital information systems; Medical records systems, computerized; Attitude of health personnel;
Keywords: امنیت رایانه; Intrusion detection; Computer security; Anomaly detection; Classification; Clustering; Information theory
Keywords: امنیت رایانه; Online safety; Computer security; Protection motivation theory; Response cost; Habit strength
Keywords: امنیت رایانه; Computer security; Nuclear facility; Implementation; Germany
Keywords: امنیت رایانه; computer security; Intrusion analysis; Use case maps
Keywords: امنیت رایانه; Biometrics; Keystroke dynamics; Soft biometrics; Pattern recognition; Data fusion; Computer security
Keywords: امنیت رایانه; Computer security; Behavioral biometrics; Multi-modal fusion; Insider threat; Active authentication
Keywords: امنیت رایانه; Computer security; Malware; Malware detection; API call graph; API call graph construction algorithm; API call graph matching algorithm
Keywords: امنیت رایانه; Malware; Packer; Anomaly detection; Machine-learning; Computer security
Keywords: امنیت رایانه; Delivery of health care; Medical informatics; Computer security; Health information technology; Framework; Evaluation; Organisational framework; Model; Technology framework; Environment; Outcomes
Keywords: امنیت رایانه; Spam filtering; Anomaly detection; Secure e-commerce; Computer security;
Keywords: امنیت رایانه; Computer security; Covering arrays; Design of experiments; Measurement; Metrology; Orthogonal arrays; Software engineering; Software testing;
Keywords: امنیت رایانه; Cyber security; Computer security; Cyber security plan; Cyber security implementation; Software verification and validation
Reactive redundancy for data destruction protection (R2D2)
Keywords: امنیت رایانه; Computer security; Virtual Machine Introspection; Operating systems security; Data integrity; Data availability; Data resiliency; Malware;
A novel kill-chain framework for remote security log analysis with SIEM software
Keywords: امنیت رایانه; Kill-chains; Cyber ontology; Cyber forensics; Computer security; Remote logging; SIEM; Intrusion detection alerts; Operating system audit logs;
Optimization of rootkit revealing system resources – A game theoretic approach
Keywords: امنیت رایانه; Computer security; Non-cooperative game theory; Rootkit; Resource optimization; Windows OS
The Windows-Users and -Intruder simulations Logs dataset (WUIL): An experimental framework for masquerade detection mechanisms
Keywords: امنیت رایانه; Masquerade dataset; Masquerade detection; Computer security
From information security to cyber security
Keywords: امنیت رایانه; Information security; Cyber security; Cybersecurity; Cyber-Security; Computer security; Risk; Threat; Vulnerability
Active cyber defense with denial and deception: A cyber-wargame experiment
Keywords: امنیت رایانه; Computer security; Authentication; Denial; Deception; Counterdeception; Wargame
Anti-forensic resilient memory acquisition
Keywords: امنیت رایانه; Memory forensics; Memory acquisition; Anti forensics; Live forensics; Malware; Computer security; Information security; Incident response
Opcode sequences as representation of executables for data-mining-based unknown malware detection
Keywords: امنیت رایانه; Malware detection; Computer security; Data mining; Machine learning; Supervised learning
Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues
Keywords: امنیت رایانه; Intrusion detection system; Adversarial environment; Computer security
Task-based behavior detection of illegal codes
Keywords: امنیت رایانه; Illegal codes; Malicious codes; Task-based behavior detection; Computer security
Enhanced Topic-based Vector Space Model for semantics-aware spam filtering
Keywords: امنیت رایانه; Spam detection; Information Retrieval; Semantics; Computer security; Machine-learning
An Optimum-Path Forest framework for intrusion detection in computer networks
Keywords: امنیت رایانه; Intrusion detection system; Optimum-Path Forest; Computer security; Machine learning
Word sense disambiguation for spam filtering
Keywords: امنیت رایانه; Spam filtering; Word sense disambiguation; Secure e-commerce; Computer security
Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques
Keywords: امنیت رایانه; Computer security; Cloud computing; Digital forensics; Cloud forensics; EnCase; FTK; Amazon EC2
FT-FW: A cluster-based fault-tolerant architecture for stateful firewalls
Keywords: امنیت رایانه; Stateful firewall; Fault-tolerance; Computer security; Computer networks; Access control
Which security policies are enforceable by runtime monitors? A survey
Keywords: امنیت رایانه; Computer security; Runtime monitoring; Dynamic analysis; Security policies
Securing distributed systems using patterns: A survey
Keywords: امنیت رایانه; Computer security; Patterns; Distributed systems; Software engineering; Methodologies
An efficient dynamic authenticated key exchange protocol with selectable identities
Keywords: امنیت رایانه; Identity-based key exchange; Computer security; Cryptography
Modeling behavioral considerations related to information security
Keywords: امنیت رایانه; Computer security; Learning; Threat detection; Judgment and decision-making; System dynamics; Modeling; Computer simulation; Information security; Theory integration; Experimental data
Extending the enforcement power of truncation monitors using static analysis
Keywords: امنیت رایانه; Computer security; Dynamic analysis; Monitoring; Software safety
A methodology for the pseudonymization of medical data
Keywords: امنیت رایانه; Computer security; Information management; Electronic medical record; Privacy; Pseudonymization
Can a good offense be a good defense? Vulnerability testing of anomaly detectors through an artificial arms race
Keywords: امنیت رایانه; Computer security; Intrusion detection; Evasion attacks; Genetic Programming; Arms race
Configuration of the virtual laboratory for fusion researches in Japan
Keywords: امنیت رایانه; SNET; Nationwide collaboration; Computer security; Data transfer; ITER
Sequential anomaly detection based on temporal-difference learning: Principles, models and case studies
Keywords: امنیت رایانه; Anomaly detection; Temporal-difference; Markov reward processes; Learning prediction; Computer security; Reinforcement learning
Recognition of electro-magnetic leakage information from computer radiation with SVM
Keywords: امنیت رایانه; EM radiation; Information leakage; Computer security; Support vector machine; SVMs network
Information fusion for computer security: State of the art and open issues
Keywords: امنیت رایانه; Computer security; Information fusion
Studying users' computer security behavior: A health belief perspective
Keywords: امنیت رایانه; Computer security; Security awareness; Health belief model; Email attachment; Virus
Human and organizational factors in computer and information security: Pathways to vulnerabilities
Keywords: امنیت رایانه; Computer security; Red teams; Human and organizational factors; Design; Pathways; Vulnerabilities; Causal Network Analysis
Emergent vulnerabilities in Integrated Operations: A proactive simulation study of economic risk
Keywords: امنیت رایانه; Computer security; Oil and gas operations; Simulation
Fast intrusion detection based on a non-negative matrix factorization model
Keywords: امنیت رایانه; Computer security; Intrusion detection system; Anomaly detection; Non-negative matrix factorization
PENET: A practical method and tool for integrated modeling of security attacks and countermeasures
Keywords: امنیت رایانه; Cyber security; Attack Modeling; Computer security; Software development; Petri nets; Attack trees; Survivability