Keywords: تشخیص سوء استفاده; Intrusion detection systems; Misuse detection; Decision Trees; Genetic Algorithms; Machine learning; Information systems security;
مقالات ISI تشخیص سوء استفاده (ترجمه نشده)
مقالات زیر هنوز به فارسی ترجمه نشده اند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
Keywords: تشخیص سوء استفاده; Intrusion Detection Systems; Genetic Fuzzy Systems; Pairwise learning; One-vs-One; Misuse detection
CPU Load Analysis & Minimization for TCP SYN Flood Detection
Keywords: تشخیص سوء استفاده; Denial of Service (DoS) Attack; CPU Load; Threshold; Misuse Detection; Feature Extraction
Decision tree based light weight intrusion detection using a wrapper approach
Keywords: تشخیص سوء استفاده; Intrusion Detection System; Misuse detection; Genetic algorithm; Neural network; Decision tree; Neurotree
An Integrated Intrusion Detection System for Cluster-based Wireless Sensor Networks
Keywords: تشخیص سوء استفاده; WSN; Intrusion Detection System; Misuse detection; Anomaly detection
DSS for computer security incident response applying CBR and collaborative response
Keywords: تشخیص سوء استفاده; Log analysis; System security; Misuse detection; Anomaly detection; Decision support system; Expert system; RFM analysis methodology; CBR (case based reasoning)
Modelling intrusion detection as an allocation problem
Keywords: تشخیص سوء استفاده; Allocation problem; Attacks database; Modelling attack classes; Misuse detection; Simulation tool
Efficient deterministic method for detecting new U2R attacks
Keywords: تشخیص سوء استفاده; Linear programming system; Behavior classes; Misuse detection; Simulation tool; Knowledge discovery; Data mining (KDD) dataset
A research using hybrid RBF/Elman neural networks for intrusion detection system secure model
Keywords: تشخیص سوء استفاده; 05.45.+bIntrusion detection; Hybrid RBF/Elman neural network; Memory of events; Anomaly detection; Misuse detection
Building intrusion pattern miner for Snort network intrusion detection system
Keywords: تشخیص سوء استفاده; Network-based Intrusion Detection; Data Mining; Misuse Detection; Intrusion Pattern; Snort NIDS
RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks
Keywords: تشخیص سوء استفاده; Network security; Intrusion detection systems; Misuse detection; Anomaly detection; Unsupervised neural network; Self-organizing map; Adaptive resonance theory
An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks
Keywords: تشخیص سوء استفاده; Intrusion detection; Anomaly detection; Misuse detection; SOM; Decision trees; J.48; KDD Cup 99; Hybrid intrusion detection;