Keywords: تشخیص نفوذ; Neural and exploratory projection techniques; Connectionist unsupervised models; Computer network security; Intrusion detection; Network traffic visualization
مقالات ISI ترجمه شده تشخیص نفوذ
مقالات ISI تشخیص نفوذ (ترجمه نشده)
مقالات زیر هنوز به فارسی ترجمه نشده اند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
Keywords: تشخیص نفوذ; Intrusion detection; KDD-CUP 99; k-nearest neighbors (kNN); Density peaks clustering (DPC); Density peaks nearest neighbor (DPNN);
Keywords: تشخیص نفوذ; Nuclear facilities; Intrusion detection; Virtual fence; Deep learning; Action recognition;
Keywords: تشخیص نفوذ; Threat intelligence; Privacy preserving; Private information retrieval; Intrusion detection;
Keywords: تشخیص نفوذ; Cyber-physical system; Cyber security; Intrusion detection; CPS testbed; Smart grid; ADS; Anomaly detection system; ADA; Advanced distribution automation; AMI; Advanced metering infrastructure; AMR; Automatic meter reading; ANSI; America National Standard
Keywords: تشخیص نفوذ; Bloom filter; Crossbar switch; Intrusion detection; Packet classification; Payload matching; Universal HASH functions;
Keywords: تشخیص نفوذ; Start/stop attack; Vulnerability analysis; Traffic analysis; Industrial control systems; PLC security; Intrusion detection; Pattern;
Keywords: تشخیص نفوذ; Intrusion detection; Attack detection; Network data collection; Network management; Network security; Packet capture;
Keywords: تشخیص نفوذ; Data reduction; Intrusion detection; Anomaly detection; Computer security;
Keywords: تشخیص نفوذ; Intrusion detection; Phase sensitivity; Interferometric sensors; Phase generated carrier; Hollow-core fiber; Strain sensor;
Keywords: تشخیص نفوذ; Android security; Malware detection; Intrusion detection; Classification; Ensemble learning; Static analysis;
Keywords: تشخیص نفوذ; Smart grid; Malicious meter inspection; Theft of electricity; Grouping; Intrusion detection; Security;
Keywords: تشخیص نفوذ; Collaborate network; Privacy preserving; Intrusion detection; Cloud environment; Fog computing;
Keywords: تشخیص نفوذ; Data mining; Data reduction; Intrusion detection; Scan; Backscatter;
Keywords: تشخیص نفوذ; Feature reduction; Intrusion detection; Correlation analysis; Association impact scale;
Keywords: تشخیص نفوذ; Wireless sensor network; Machine learning; Intrusion detection; Clustering; Support vector machine;
Keywords: تشخیص نفوذ; Malware; Machine learning; Self organising maps; Intrusion detection; Data science; Security operation centre;
Keywords: تشخیص نفوذ; Malware detection; Intrusion detection; Recurrent neural networks; Machine learning; Deep learning;
Keywords: تشخیص نفوذ; In-vehicle network; Anomaly detection; Intrusion detection; Survival analysis;
Keywords: تشخیص نفوذ; Intrusion detection; Security visualization; Security analytics; Alert mining; Alert correlation;
Keywords: تشخیص نفوذ; Feature selection; Intrusion detection; Bigram technique; Recursive feature addition; ISCX 2012;
Keywords: تشخیص نفوذ; MANETs; Security measurement; Intrusion detection; Data collection;
Keywords: تشخیص نفوذ; Anomalies; Malware; Mobile devices; Intrusion detection; Pattern recognition; Sequence alignment;
Keywords: تشخیص نفوذ; Information Security; Social Engineering; Cyber Crime; Semantic Attacks; Intrusion detection;
Keywords: تشخیص نفوذ; Restore; Windows; Server; Disaster recovery; Intrusion detection; Threats; Virus;
Keywords: تشخیص نفوذ; Optical networks; Control plane; Intrusion detection; Machine learning;
Keywords: تشخیص نفوذ; Transfer learning; Image classification; Deep learning; Video surveillance; Intrusion detection;
Keywords: تشخیص نفوذ; Intrusion Detection; Artificial Immune Systems; Intrusion Classification; Machine Learning;
Keywords: تشخیص نفوذ; Memory analysis; Reverse engineering; Windows internals; Operating system; Forensic analysis; Malware detection; Intrusion detection;
Keywords: تشخیص نفوذ; Emerging architecture; Emerging smartphone networks; Intrusion detection; Bayesian inference; Insider attacks;
Keywords: تشخیص نفوذ; Wireless sensor networks; Intrusion detection; Multi-agent; Node trust value;
Keywords: تشخیص نفوذ; Computation offloading; Intrusion detection; Energy efficiency; Detection latency; Cyber-physical systems; Vehicular security;
Keywords: تشخیص نفوذ; Privacy preservation; Trust management; Unwanted traffic control; Intrusion detection;
Keywords: تشخیص نفوذ; Fuzziness; Divide-and-conquer strategy; Semi-supervised learning; Intrusion detection; Random weight neural network;
Keywords: تشخیص نفوذ; Replication attacks; Cloning attacks; Intrusion detection; Sensor network security; Wireless sensor network;
Keywords: تشخیص نفوذ; HetVNet; Game model; Intrusion detection; Intrusion prediction; Accuracy prediction;
Keywords: تشخیص نفوذ; Software defined networks; Information security; Intrusion detection; Graph mining, Denial of service attacks; Security architecture;
Keywords: تشخیص نفوذ; Intrusion detection; Cloud security; Virtual machine introspection; Hypervisor introspection; Cloud attacks;
Keywords: تشخیص نفوذ; Intrusion detection; Multi-Task learning; Web logs; Gaussian Mixture Model (GMM);
Keywords: تشخیص نفوذ; Intrusion detection; SAP HANA; In-memory; Security; Machine learning; Anomaly detection; Outlier detection;
Keywords: تشخیص نفوذ; Ensemble classifiers; Hybrid classifiers; Intrusion detection; KDD 99; Multiclass classifiers; NSL-KDD;
Keywords: تشخیص نفوذ; Big data; Soft Computing; Neuro-Fuzzy; Intrusion detection; Self-organizing feature maps; Computational forensics;
Keywords: تشخیص نفوذ; network security; intrusion detection; intrusion prevention; anomaly detection;
Keywords: تشخیص نفوذ; Classification Algorithms; Intrusion Detection; Machine Learning; Network Security; Supervised Learning.;
Keywords: تشخیص نفوذ; Intrusion detection; Cloud technology; Software-defined network; Traffic sampling;
Keywords: تشخیص نفوذ; Intrusion detection; Computer security; Anomaly detection; Classification; Clustering; Information theory
Keywords: تشخیص نفوذ; Intrusion detection; Intrusion prevention; Distributed processing; Load balancing; Security68M14; 68W05
Keywords: تشخیص نفوذ; Multipath security; Information assurance; Anomaly detection; Intrusion detection; Data encryption;
Keywords: تشخیص نفوذ; Forensic; Investigation; Cybercrimes; Digital evidence; Intrusion detection
Keywords: تشخیص نفوذ; Intrusion detection; Intrusion response; Semantic coherence; Response design parameter