Keywords: خود داری از خدمات; Cyber-physical system; Cyber security; Intrusion detection; CPS testbed; Smart grid; ADS; Anomaly detection system; ADA; Advanced distribution automation; AMI; Advanced metering infrastructure; AMR; Automatic meter reading; ANSI; America National Standard
مقالات ISI خود داری از خدمات (ترجمه نشده)
مقالات زیر هنوز به فارسی ترجمه نشده اند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
Keywords: خود داری از خدمات; Nuclear Power Plant; Cyber-Physical System; Cyber threats; Safety margins; Advanced Lead-cooled Fast Reactor European Demonstrator (ALFRED); LFR; Lead-cooled Fast Reactor; ALFRED; Advanced Lead-cooled Fast Reactor European Demonstrator; CPS; Cyber-Physica
Keywords: خود داری از خدمات; 3GPP; 3rd Generation Partnership Project; ASK; Amplitude Shift Keying; BFSK; Binary Frequency Shift Keying; BPSK; Binary Phase Shift Keying; CDMA; Code Division Multiple Access; CIoT; Cellular IoT; CSMA/CA; Carrier Sense Multiple Access for Collision Avoi
Keywords: خود داری از خدمات; Cybersecurity; Indoor positioning; Robotics; Cyber-attack; Beacon; Statistical-testing; AOA; Angle of Arrival; CUSUM; Cumulative Sum; DoS; Denial of Service; GPS; Global Positioning System; ICS; Industrial Control System; IDS; Intrusion Detection System;
Keywords: خود داری از خدمات; 3G; Third generation; 3GPP; 3rd Generation Partnership Project; 5G; Fifth generation; AN; Artificial noise; BER; Bit error rate; BS; Base station; CoAP; Constrained Application Protocol; CR; Cognitive Radios; CSI; Channel state information; D2D; Device to
Keywords: خود داری از خدمات; Security; Denial of service; Puppet attack; Advanced metering infrastructure;
Keywords: خود داری از خدمات; Authentication; Protocol verification; Wireless communication; Mobile communication systems; Denial of service;
Adaptive artificial immune networks for mitigating DoS flooding attacks
Keywords: خود داری از خدمات; Anomalies; Artificial immune system; Denial of Service; Forecasting; Intrusion detection system; Network;
REATO: REActing TO Denial of Service attacks in the Internet of Things
Keywords: خود داری از خدمات; Internet of Things; Security; Denial of Service; Attacks; Middleware; Prototype;
Dealing with a non green behaviour in WSN
Keywords: خود داری از خدمات; Green network; Time Petri nets; Detection; Formal methods; Denial of Service; Energy efficiency; Zigbee;
User behavior analytics-based classification of application layer HTTP-GET flood attacks
Keywords: خود داری از خدمات; Denial of service; Application layer attack; GET flooding; Intrusion detection;
Slowcomm: Design, development and performance evaluation of a new slow DoS attack
Keywords: خود داری از خدمات; Denial of service; Lbr dos attack; Cyberwarfare; Slow dos attack; Protocol independence;
A Statistical and Cluster Analysis Exploratory Study of Snort Rules
Keywords: خود داری از خدمات; Voice Biometric; Internet of Things; Denial of Service;
Application layer HTTP-GET flood DDoS attacks: Research landscape and challenges
Keywords: خود داری از خدمات; Systematic survey; Application layer DDoS attacks; Denial of service; HTTP-GET flood; Sophisticated attacks;
Are mobile botnets a possible threat? The case of SlowBot Net
Keywords: خود داری از خدمات; Denial of service; Distributed attacks; Slow DoS attack; Offensive security; Smartphone; Android; LOIC;
Deceiving entropy based DoS detection
Keywords: خود داری از خدمات; Entropy; Detection deceiving; Denial of service; DDoS; Intrusion detection; Protocol spoofing
An efficient and easily deployable method for dealing with DoS in SIP services
Keywords: خود داری از خدمات; Session Initiation Protocol; Entropy; Abnormal traffic; Denial of Service; Anonymity
Mitigating congestion based DoS attacks with an enhanced AQM technique
Keywords: خود داری از خدمات; Congestion control; Active queue management; Denial of service; Flow protection
An advanced persistent threat in 3G networks: Attacking the home network from roaming networks
Keywords: خود داری از خدمات; Denial of service; APT; LTE; HLR/AuC; Flooding; UMTS
Jamming-resistant rate adaptation in Wi-Fi networks
Keywords: خود داری از خدمات; IEEE 802.11; Denial of service; Rate control
A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks
Keywords: خود داری از خدمات; Network programming protocols; Broadcast authentication; Code dissemination; Sensor network security; Power depletion attack; Denial of service;
Detection of malicious and non-malicious website visitors using unsupervised neural network learning
Keywords: خود داری از خدمات; Web crawler detection; Neural networks; Web server access logs; Machine learning; Clustering; Denial of service
TCP Ack storm DoS attacks
Keywords: خود داری از خدمات; Denial of service; TCP; Secure network protocols; Amplification attacks; Wi-fi attacks; Man in the middle;
Side effects of identity management in SIP VoIP environment
Keywords: خود داری از خدمات; SIP; VoIP; NGN; Authentication; Denial of service; Timing attack
Practical real-time intrusion detection using machine learning approaches
Keywords: خود داری از خدمات; Network intrusion detection; Machine learning; Denial of Service; Probe
DoS attacks exploiting signaling in UMTS and IMS
Keywords: خود داری از خدمات; UMTS; Denial of service; IMS; Security; EAP-AKA
Extensions to the source path isolation engine for precise and efficient log-based IP traceback
Keywords: خود داری از خدمات; Denial of service; Packet tracing; Traceback; Attack Response; Traffic logging
Using honeynodes for defense against jamming attacks in wireless infrastructure-based networks
Keywords: خود داری از خدمات; Jamming; Security attacks; Channel surfing; Defence; Denial of Service; NS-2
Defense techniques for low-rate DoS attacks against application servers
Keywords: خود داری از خدمات; Denial of service; Low-rate; Defense; Network security
Utilizing bloom filters for detecting flooding attacks against SIP based services
Keywords: خود داری از خدمات; Session Initiation Protocol (SIP); Voice over IP (VoIP); Flooding attacks; Denial of Service; Bloom filter; Security
Probabilistic model checking for the quantification of DoS security threats
Keywords: خود داری از خدمات; Denial of service; Secure authentication; Probabilistic model checking; Resource exhaustion; Attacker model
Two layer Denial of Service prevention on SIP VoIP infrastructures
Keywords: خود داری از خدمات; VoIP; SIP; Denial of Service; Flooding protection; Security; Malformed messages; DNS cache
Evaluation of a low-rate DoS attack against application servers
Keywords: خود داری از خدمات; Denial of service; Low-rate attack; Network security; Application servers; Intrusion event
Analysis of area-congestion-based DDoS attacks in ad hoc networks
Keywords: خود داری از خدمات; Ad hoc network; Security; Congestion; Distributed denial of service; Denial of service
Protecting bursty applications against traffic aggressiveness
Keywords: خود داری از خدمات; Security; Quality of Service; Denial of Service; Queuing
Anticipatory distributed packet filter configurations for carrier-grade IP networks
Keywords: خود داری از خدمات; Network security; Denial of service; IP spoofing; Packet filters; Critical infrastructure protection
A self-aware approach to denial of service defence
Keywords: خود داری از خدمات; Denial of service; Self-aware; Cognitive packet network; Internet
Evaluation of a low-rate DoS attack against iterative servers
Keywords: خود داری از خدمات; Denial of service; Low-rate attack; Network security; Iterative servers; Intrusion event
A discussion on ‘Detection of intrusions in information systems by sequential change-point methods’ by Tartakovsky, Rozovskii, Blažek, and Kim
Keywords: خود داری از خدمات; Change-point detection; CUSUM procedures; Sequential tests; Intrusion detection; Denial of service
Flooding attack and defence in Ad hoc networks1
Keywords: خود داری از خدمات; computer networks; security; mobile Ad hoc networks; routing protocol; denial of service; Ad hoc flooding attack;
Application of anomaly detection algorithms for detecting SYN flooding attacks
Keywords: خود داری از خدمات; Denial of service; Change point detection; Network security
A survivable DoS-resistant overlay network
Keywords: خود داری از خدمات; Overlay; Routing; Denial of Service; Probing
Using equivalence-checking to verify robustness to denial of service
Keywords: خود داری از خدمات; Equivalence-checking; Denial of service; Protocols; Process algebra; Admissible interference; Bisimulation
Detection of intrusions in information systems by sequential change-point methods
Keywords: خود داری از خدمات; Change-point detection; Sequential tests; Multichannel information systems; Rapid detection; Page’s test; Cumulative sum; Intrusion detection; Denial of service
WebSOS: an overlay-based system for protecting web servers from denial of service attacks
Keywords: خود داری از خدمات; Security and protection; Denial of service; Network topology; Overlay networks; Security; Reliability; Graphic Turing Tests; Web proxies; Java;