Keywords: تشخیص نفوذ; Intrusion detection; Hybrid approach; Anomaly detection; k-nearest neighbors algorithm;
مقالات ISI تشخیص نفوذ (ترجمه نشده)
مقالات زیر هنوز به فارسی ترجمه نشده اند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
Keywords: تشخیص نفوذ; Botnet; Machine learning; Peer-to-peer; Intrusion detection; Security;
Keywords: تشخیص نفوذ; Cloud computing; Taxonomy; Security attacks; Intrusion detection;
Keywords: تشخیص نفوذ; Adversarial attacks; Identity theft; Information security; Intrusion detection; Masquerade attacks;
Keywords: تشخیص نفوذ; Intrusion detection; DARPA; NSL-KDD; Genetic algorithm; Interval rule-based;
Keywords: تشخیص نفوذ; Botnet detection; Intrusion detection; IRC
Keywords: تشخیص نفوذ; Intrusion detection; Anomaly detection; Negative selection algorithm; Multi-start methods; Genetic algorithms
Keywords: تشخیص نفوذ; Negative pattern; Exclusive matching; Pattern matching; Intrusion detection
Keywords: تشخیص نفوذ; Network security; Fake anti-virus software; Intrusion detection; Web document analysis; Statistical classification;
Keywords: تشخیص نفوذ; Intrusion detection; Optimum-path forest; Meta-heuristic; Clustering
Keywords: تشخیص نفوذ; User authentication; Network authentication; Graph analysis; Intrusion detection; Cyber security; Enterprise security
Keywords: تشخیص نفوذ; Advanced persistent threat; Anomaly detection; Log file analysis; Intrusion detection; Event correlation; Self-learning system model
Keywords: تشخیص نفوذ; Spread estimation; Traffic measurement; Software router; Graphics processing unit; Intrusion detection
Keywords: تشخیص نفوذ; Network security and performance; Intrusion detection; Non-critical alarm reduction; Contextual signature; Hash function
Keywords: تشخیص نفوذ; Compressed model; MapReduce; Parallelization; Classification; Intrusion detection
Keywords: تشخیص نفوذ; Anomaly based algorithm; Classification algorithms; Data communication; Denial of service attack; Intrusion detection
Keywords: تشخیص نفوذ; False alarms; Correlation; Intrusion detection
Keywords: تشخیص نفوذ; Intrusion detection; Address aliasing; Privacy protection; Statistical modelling
Keywords: تشخیص نفوذ; Classification; Intrusion detection; Security; Wireless networks
Keywords: تشخیص نفوذ; Wireless mesh network; Intrusion detection; Optimal monitoring; Traffic awareness; Resource constraints; Integer linear program
Keywords: تشخیص نفوذ; Video surveillance; Video; Intrusion detection; Global features; Machine learning; Event; Recognition;
Keywords: تشخیص نفوذ; Industrial control networks; Traffic periodicity; Traffic models; Intrusion detection; Device performance evaluation
Keywords: تشخیص نفوذ; Provenance; Intrusion detection; Forensic analysis; False alarm
Performance evaluation of intrusion detection based on machine learning using Apache Spark
Keywords: تشخیص نفوذ; Intrusion Detection; Machine Learning; Apache Spark;
Ransomware behavioural analysis on windows platforms
Keywords: تشخیص نفوذ; Cryptovirology; Cybersecurity; Intrusion detection; Malware; Ransomware; Win/32;
Unsupervised intrusion detection through skip-gram models of network behavior
Keywords: تشخیص نفوذ; Skip-gram modeling; Neural networks; Anomaly detection; Intrusion detection; Unsupervised learning; Word2vec; Unknown attacks;
SQL Injection Attack classification through the feature extraction of SQL query strings using a Gap-Weighted String Subsequence Kernel
Keywords: تشخیص نفوذ; Intrusion detection; SQL Injection Attacks; Data mining; String Subsequence Kernel; Support vector machine; Supervised learning;
Performance comparison of intrusion detection systems and application of machine learning to Snort system
Keywords: تشخیص نفوذ; Intrusion detection; Snort and Suricata; Performance comparison; Machine learning; Support Vector Machine; Fuzzy Logic;
FNF: Flow-net based fingerprinting and its applications
Keywords: تشخیص نفوذ; Flow-net; Logging; Fingerprint; Intrusion detection; Computer networks; Computer systems;
Intelligent agents defending for an IoT world: A review
Keywords: تشخیص نفوذ; Intrusion detection; Artificial intelligence; Machine learning; Internet of Things; Cyber security; Data driven cyber security;
User behavior analytics-based classification of application layer HTTP-GET flood attacks
Keywords: تشخیص نفوذ; Denial of service; Application layer attack; GET flooding; Intrusion detection;
Applying domain-specific knowledge to construct features for detecting distributed denial-of-service attacks on the GOOSE and MMS protocols
Keywords: تشخیص نفوذ; SCADA Systems; GOOSE Protocol; MMS Protocol; Denial-of-Service Attacks; Intrusion Detection; Feature Construction; Machine Learning;
An effective intrusion detection framework based on SVM with feature augmentation
Keywords: تشخیص نفوذ; Intrusion detection; Marginal density ratios transformation; Network security; Support vector machine;
Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model
Keywords: تشخیص نفوذ; Intrusion detection; Collaborative network; Intrusion sensitivity; Machine learning; Trust management model; Insider attacks;
A stochastic approach for packet dropping attacks detection in mobile Ad hoc networks
Keywords: تشخیص نفوذ; Packet dropping attacks; Intrusion detection; Bayesian classification; Fuzzy logic; Markov chain;
MP-MID: Multi-Protocol Oriented Middleware-level Intrusion Detection method for wireless sensor networks
Keywords: تشخیص نفوذ; Wireless sensor networks; Intrusion detection; AWN; AODV;
Ramp loss K-Support Vector Classification-Regression; a robust and sparse multi-class approach to the intrusion detection problem
Keywords: تشخیص نفوذ; Multi-Class classification; Intrusion detection; K-Support Vector Classification-Regression; Ramp loss function; Alternating Direction Method of Multipliers (ADMM); Concave-Convex Procedure (CCCP);
Detecting HTTP-based application layer DoS attacks on web servers in the presence of sampling
Keywords: تشخیص نفوذ; Denial-of-service attacks; Application layer; Sampling techniques; Intrusion detection; DDoS; Network security;
A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV
Keywords: تشخیص نفوذ; Attacks; Intrusion detection; Misbehavior detection; IoV; VANET; Security;
Random Forest Modeling for Network Intrusion Detection System
Keywords: تشخیص نفوذ; Intrusion Detection; Data Mining; Random Forest; Feature Subsrt Selection; NSL-KDD Data Set.;
A Rule Status Monitoring Algorithm for Rule-Based Intrusion Detection and Prevention Systems
Keywords: تشخیص نفوذ; intrusion detection; intrusion prevention; signature based;
Toward an Efficient Ontology-Based Event Correlation in SIEM
Keywords: تشخیص نفوذ; Intrusion detection; Alert correlation; Description logics; Ontology; OWL
OCPAD: One class Naive Bayes classifier for payload based anomaly detection
Keywords: تشخیص نفوذ; Anomaly detection; Payload analysis; Intrusion detection;
Intrusion detection model using fusion of chi-square feature selection and multi class SVM
Keywords: تشخیص نفوذ; Chi square feature selection; Cross validation; Intrusion detection; Radial basis kernel; Support vector machine; Variance;
Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems
Keywords: تشخیص نفوذ; OCSVM; Intrusion detection; SCADA systems; Social analysis;
An effective intrusion detection framework based on MCLP/SVM optimized by time-varying chaos particle swarm optimization
Keywords: تشخیص نفوذ; Intrusion detection; Support vector machine; Parameter setting; Feature selection
FCAAIS: Anomaly based network intrusion detection through feature correlation analysis and association impact scale
Keywords: تشخیص نفوذ; Intrusion detection; Feature reduction; Correlation analysis; Association impact scale;
CEAP: SVM-based intelligent detection model for clustered vehicular ad hoc networks
Keywords: تشخیص نفوذ; Vehicular ad hoc network; Intrusion detection; High mobility; Support vector machine (SVM); Malicious node; Training set size reduction
MVPSys: Toward practical multi-view based false alarm reduction system in network intrusion detection
Keywords: تشخیص نفوذ; Network security; Intrusion detection; False alarms; Alarm filter; Multi-view; Semi-supervised learning; Practical applications
Tree-based string pattern matching on FPGAs
Keywords: تشخیص نفوذ; String matching; Intrusion detection; FPGA; Binary tree; NIDS