Keywords: امنیت اینترنت; Internet connectivity; Emergency response team; Incident response plan; Internet security; Connection vulnerability;
مقالات ISI امنیت اینترنت (ترجمه نشده)
مقالات زیر هنوز به فارسی ترجمه نشده اند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
Keywords: امنیت اینترنت; Phishing; Internet security; Easy-to-hard effect; Human-computer interaction; Discrimination learning; Visual discrimination;
Keywords: امنیت اینترنت; Cloud services; Internet security; User behavior; SSO; Device security failure;
Keywords: امنیت اینترنت; E-business; Maturity model design; Social software; E-visibility; Interactivity; Global market; Sociability; Internet security; Internet presence
Keywords: امنیت اینترنت; Classification; Data mining; Forged websites; Phishing; Internet security
A distributed filtering mechanism against DDoS attacks: ScoreForCore
Keywords: امنیت اینترنت; DDoS; DoS; Filter; Internet security; Intrusion detection and prevention systems; Traffic filtering;
FPGA acceleration of a pseudorandom number generator based on chaotic iterations
Keywords: امنیت اینترنت; Internet security; Pseudorandom number generator; Discrete chaotic iterations; Cryptographical security; FPGA
The influence of user affect in online information disclosure
Keywords: امنیت اینترنت; Intention model; Positive affect; Enjoyment; Information disclosure; Consumer data; PLS; Website trust; Website privacy; Internet security; Privacy paradox; Strategic information systems; Dynamic capabilities; Cognitive consistency theory
At the boundaries of peer production: The organization of Internet security production in the cases of Estonia 2007 and Conficker
Keywords: امنیت اینترنت; Internet security governance; Internet security; Peer production/open source production; Estonia 2007 cyberattacks; Conficker botnet
DNA-inspired information concealing: A survey
Keywords: امنیت اینترنت; Information concealing; Internet security; Web statistics; Repeats in DNA
Regime formation and consequence: The case of internet security in the East-Asia ‘Four Tigers’
Keywords: امنیت اینترنت; Information privacy; Internet security; Encryption; Asian Pacific Economic Cooperation; East Asia developmental model
Preventing IP Source Address Spoofing: A Two-Level, State Machine-Based Method
Keywords: امنیت اینترنت; source address spoofing; spoofing prevention; internet security;
Dividing or uniting Europe? Internet usage in the EU
Keywords: امنیت اینترنت; L81; L86; G21; Country differences; Internet security; e-Commerce;
DNS-based email sender authentication mechanisms: A critical review
Keywords: امنیت اینترنت; Email; Spam; Phishing; SPF; DKIM; Sender-ID; SIDF; SMTP; Internet security
RIP – A robust IP access architecture
Keywords: امنیت اینترنت; Secure architectures; Attack detection; Internet security; Anomalous traffic
An economic mechanism for better Internet security
Keywords: امنیت اینترنت; Information Security; Internet security; Mechanism design; Certificates; Interdependent security
Peer-to-peer system-based active worm attacks: Modeling, analysis and defense
Keywords: امنیت اینترنت; P2P systems; Active worm attacks; Internet security
An anti-spam scheme using pre-challenges
Keywords: امنیت اینترنت; Electronic mail; Anti-spam; Internet security
An empirical study of the factors affecting Internet security for the financial industry in Taiwan
Keywords: امنیت اینترنت; Internet; Internet privacy; Internet security
A distributed systems approach to secure Internet mail
Keywords: امنیت اینترنت; Internet security; Privacy; Email; Distributed systems; Distributed file system;
A threshold signature scheme based on the elliptic curve cryptosystem
Keywords: امنیت اینترنت; Elliptic curve cryptosystem; Threshold signature; Internet security; Identity authentication;
Focusing on what might happen and how it could feel: can the anticipation of regret change students' computing-related choices?
Keywords: امنیت اینترنت; Regret; Choice; Decision-making; Computing; Backing-up; Internet security;