Keywords: سیستم تشخیص نفوذ; Training attack; Intrusion detection system; Anomaly detection; Network security; Machine learning;
مقالات ISI سیستم تشخیص نفوذ (ترجمه نشده)
مقالات زیر هنوز به فارسی ترجمه نشده اند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
Keywords: سیستم تشخیص نفوذ; Cyber attacks; Advanced persistent threat; Malware; Intrusion detection system; Alert correlation; Machine learning;
Keywords: سیستم تشخیص نفوذ; Cyber-physical system; Cyber security; Intrusion detection; CPS testbed; Smart grid; ADS; Anomaly detection system; ADA; Advanced distribution automation; AMI; Advanced metering infrastructure; AMR; Automatic meter reading; ANSI; America National Standard
Keywords: سیستم تشخیص نفوذ; Intrusion detection system; Intelligent analysis; Accuracy analysis; Automatic alarm; Thermal infrared imagery;
Keywords: سیستم تشخیص نفوذ; Smart grid; Cyber-attacks; Vulnerabilities; Confidentiality; Availability; Integrity; Accountability; Intrusion detection system; Cryptography; Network security;
Keywords: سیستم تشخیص نفوذ; Edge device; Two-stage Markov model; Fog computing; Intrusion detection system; Virtual Honeypot Device; Internet of Things;
Keywords: سیستم تشخیص نفوذ; Wireless mesh network; Intrusion detection system; GA based feature selection; SVM classifier;
Keywords: سیستم تشخیص نفوذ; Anomaly detection; Intrusion detection system; Benign outlier; Visualization; Self-Organizing map;
Keywords: سیستم تشخیص نفوذ; Advanced persistent threat; Event correlation; Intrusion detection system; Multi-stage attack; Multi-step attack; Network security;
Keywords: سیستم تشخیص نفوذ; Intrusion Detection System; Hybrid Classifiers; Centroid-Based Classification; Representative Feature;
Keywords: سیستم تشخیص نفوذ; Intrusion detection system; Field installation; Optical fiber sensors; Fiber bragg grating; Intruder walking test; Railway;
Keywords: سیستم تشخیص نفوذ; Hypergraph; Genetic algorithm; Support vector machine; Feature subset; Kernel parameters; Intrusion detection system;
Keywords: سیستم تشخیص نفوذ; Cybersecurity; Indoor positioning; Robotics; Cyber-attack; Beacon; Statistical-testing; AOA; Angle of Arrival; CUSUM; Cumulative Sum; DoS; Denial of Service; GPS; Global Positioning System; ICS; Industrial Control System; IDS; Intrusion Detection System;
Keywords: سیستم تشخیص نفوذ; Alert correlation; Anomalies; Intrusion detection system; Malware; Network; Payload;
Keywords: سیستم تشخیص نفوذ; Intrusion detection system; Internet of Things; Cybersecurity;
Keywords: سیستم تشخیص نفوذ; 3G; Third generation; 3GPP; 3rd Generation Partnership Project; 5G; Fifth generation; AN; Artificial noise; BER; Bit error rate; BS; Base station; CoAP; Constrained Application Protocol; CR; Cognitive Radios; CSI; Channel state information; D2D; Device to
Keywords: سیستم تشخیص نفوذ; Intrusion Detection System; Machine Learning; anomaly detection; false alarm; ignored attack ;
Keywords: سیستم تشخیص نفوذ; Network security; Intrusion detection system; Classification; Very fast decision tree algorithm
Keywords: سیستم تشخیص نفوذ; Vehicular ad hoc networks; Intrusion detection system; Detection rate; False positive rate; Detection time; Overhead
Keywords: سیستم تشخیص نفوذ; Intrusion detection system; Feature selection technique; Network traffic dataset; Network traffic profiling; Online sequential extreme learning machine (OS-ELM);
Keywords: سیستم تشخیص نفوذ; Network security; Intrusion detection system; Intrusion protection system; Parallel processing; Switch configuration; Quality of Service
Keywords: سیستم تشخیص نفوذ; Intrusion detection system; Visualization; Feature generation
Keywords: سیستم تشخیص نفوذ; SG; Smart Grid; AMI; Advanced Metering Infrastructure; DSM; Demand Side Management; DER; Distributed Energy Resources; MDMS; Meter Data Management Systems; BPL; Broadband over Power Line; PLC; Power Line Carrier; AMR; Automatic Meter Reading; IHD; In-Home
Keywords: سیستم تشخیص نفوذ; Intrusion detection system; Intrusion response system; Intrusion risk assessment; Response time; Prediction; Response cost; Attack graph; Service dependency graph
Keywords: سیستم تشخیص نفوذ; Alert management; Alert verification; Vulnerability database; Alert correlation; Intrusion detection system;
DACDI (Define, Audit, Correlate, Disclose, and Improve) framework to address cyber-manufacturing attacks and intrusions
Keywords: سیستم تشخیص نفوذ; Cyber-Manufacturing System; Intrusion detection system; Simulation; Cyber security;
A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection
Keywords: سیستم تشخیص نفوذ; Intrusion detection system; ABC; AFS; Feature selection; NSL-KDD; UNSW-NB15;
Adaptive artificial immune networks for mitigating DoS flooding attacks
Keywords: سیستم تشخیص نفوذ; Anomalies; Artificial immune system; Denial of Service; Forecasting; Intrusion detection system; Network;
Towards the transversal detection of DDoS network attacks in 5G multi-tenant overlay networks
Keywords: سیستم تشخیص نفوذ; DDoS attack; Multi-tenant; 5G network; Security; Intrusion detection system;
Trust aware support vector machine intrusion detection and prevention system in vehicular ad hoc networks
Keywords: سیستم تشخیص نفوذ; Vehicular Ad Hoc Networks; Intrusion Detection System; Support Vector Machine; Machine learning; Trust aware;
Securing a Local Area Network by IDPS Open Source
Keywords: سیستم تشخیص نفوذ; Natural immune system; security systems; intrusion prevention system; intrusion detection system; artificial immune system; specifications;
System Integration and Security of Information Systems
Keywords: سیستم تشخیص نفوذ; Information system; Intrusion detection system; Behavioral method; Signature method; Security of information systems;
RFAODE: A Novel Ensemble Intrusion Detection System
Keywords: سیستم تشخیص نفوذ; Intrusion Detection System; Ensemble Learning; Random Forest; AODE;
Information attacks and security in wireless sensor networks of industrial SCADA systems
Keywords: سیستم تشخیص نفوذ; Information security; SCADA system; Wireless sensor network; Network attacks; Attacks detection; Intrusion detection system; Key management; Data encryption; Routing protocol;
Anomaly detection of network-initiated LTE signaling traffic in wireless sensor and actuator networks based on a Hidden semi-Markov Model
Keywords: سیستم تشخیص نفوذ; Wireless sensor and actuator network; LTE signaling attack; Hidden semi-Markov Model; Anomaly detection; Intrusion detection system;
Implementation of Intrusion Detection System using Adaptive Neuro-Fuzzy Inference System for 5G wireless communication network
Keywords: سیستم تشخیص نفوذ; 5G; Adaptive Neuro-Fuzzy Inference System; Intrusion Detection System; Relay;
Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system
Keywords: سیستم تشخیص نفوذ; Intrusion detection system; Support vector machine; Extreme learning machine; K-means; Multi-level; KDD Cup 1999;
ReviewThe rise of “malware”: Bibliometric analysis of malware study
Keywords: سیستم تشخیص نفوذ; Malware; Bibliometric analysis; Malware analysis; Intrusion detection system; Mobile malware;
MAIS-IDS: A distributed intrusion detection system using multi-agent AIS approach
Keywords: سیستم تشخیص نفوذ; Multi-agent; Intrusion detection system; Artificial immune system; Distributed system
Algorithms for a distributed IDS in MANETs
Keywords: سیستم تشخیص نفوذ; Intrusion detection system; Mobile ad hoc networks; Distributed systems; Fault tolerance; Network security
An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems
Keywords: سیستم تشخیص نفوذ; Unsupervised detection; Cyber-warfare; SCADA systems; Intrusion Detection System; Consistent/Inconsistent SCADA Patterns
Minimal complexity attack classification intrusion detection system
Keywords: سیستم تشخیص نفوذ; Intrusion detection system; Classification and association rules; False alarm
Designing of on line intrusion detection system using rough set theory and Q-learning algorithm
Keywords: سیستم تشخیص نفوذ; Q-learning algorithm; Rough set theory; Discretization; Intrusion detection system
Toward a more practical unsupervised anomaly detection system
Keywords: سیستم تشخیص نفوذ; Intrusion Detection System; Clustering; One-class SVM; Anomaly detection
A survey of intrusion detection techniques in Cloud
Keywords: سیستم تشخیص نفوذ; Cloud computing; Firewalls; Intrusion detection system; Intrusion prevention system
In-execution dynamic malware analysis and detection by mining information in process control blocks of Linux OS
Keywords: سیستم تشخیص نفوذ; Intrusion detection system; Kernel task structure; Malware forensic; Operating system security; Malicious process detection
The configuration and detection strategies for information security systems
Keywords: سیستم تشخیص نفوذ; Intrusion detection system; Base rate fallacy; Configuration policy
SHADuDT: Secure hypervisor-based anomaly detection using danger theory
Keywords: سیستم تشخیص نفوذ; Intrusion detection system; Anomaly detection; Artificial immune system; Danger theory; Hypervisor technology; System call interception
Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues
Keywords: سیستم تشخیص نفوذ; Intrusion detection system; Adversarial environment; Computer security
An Optimum-Path Forest framework for intrusion detection in computer networks
Keywords: سیستم تشخیص نفوذ; Intrusion detection system; Optimum-Path Forest; Computer security; Machine learning