Keywords: امنیت شبکه ; Cybersecurity; Information security; Network security; Profiling; Phishing email; Clustering
مقالات ISI امنیت شبکه (ترجمه نشده)
مقالات زیر هنوز به فارسی ترجمه نشده اند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
Keywords: امنیت شبکه ; Cyber-physical power system; Interdependent network; Infrastructure vulnerability; Cyberattack; Network security; Failure propagation;
Exploiting IP telephony with silence suppression for hidden data transfers
Keywords: امنیت شبکه ; Information hiding; Network covert channel; VoIP; IP telephony; Network steganography; Network security;
A novel honeypot based security approach for real-time intrusion detection and prevention systems
Keywords: امنیت شبکه ; Intrusion detection and prevention systems (IDS/IPS); Honeypots; Network security; System security; Network traffic visualization;
Software-defined networking-based crypto ransomware detection using HTTP traffic characteristics
Keywords: امنیت شبکه ; Ransomware; Malware; Software-defined networking; Network security;
IoT security: Review, blockchain solutions, and open challenges
Keywords: امنیت شبکه ; IoT security; Blockchain; IoT protocols; Network security; Data security;
Methodology for the identification of potential security issues of different IPv6 transition technologies: Threat analysis of DNS64 and stateful NAT64
Keywords: امنیت شبکه ; DNS64; Internet; IPv6 transition technologies; Network security; Stateful NAT64; STRIDE;
UGR'16: A new dataset for the evaluation of cyclostationarity-based network IDSs
Keywords: امنیت شبکه ; Network security; Dataset; IDS; Network traffic; Netflow;
D-FACE: An anomaly based distributed approach for early detection of DDoS attacks and flash events
Keywords: امنیت شبکه ; Network security; DDoS attacks; Flash events; Entropy; Information distance;
An efficient intrusion detection in resource-constrained mobile ad-hoc networks
Keywords: امنیت شبکه ; MANETs; IDS; Network security; Bayesian game; Perfect Bayesian equilibrium; Belief management;
Ransomware early detection by the analysis of file sharing traffic
Keywords: امنیت شبکه ; Ransomware; Malware detection; Traffic analysis; Network security;
Key management issue in SCADA networks: A review
Keywords: امنیت شبکه ; Critical infrastructure security; Key management scheme; Network security; Power system security; SCADA network;
An effective intrusion detection framework based on SVM with feature augmentation
Keywords: امنیت شبکه ; Intrusion detection; Marginal density ratios transformation; Network security; Support vector machine;
ReviewDetection of DDoS attacks and flash events using information theory metrics-An empirical investigation
Keywords: امنیت شبکه ; Network security; DDoS attacks; Flash events; Entropy; Information distance;
Characterizing DDoS attacks and flash events: Review, research gaps and future directions
Keywords: امنیت شبکه ; DDoS; Detection; Flash events; Network security; Review;
DBod: Clustering and detecting DGA-based botnets using DNS traffic analysis
Keywords: امنیت شبکه ; Domain generation algorithm; Botnet detection mechanism; Name error response; Traffic analysis; Network security;
Detection of DDoS attacks and flash events using novel information theory metrics
Keywords: امنیت شبکه ; DDoS attacks; Network security; Entropy; Information divergence;
The Z-Wave routing protocol and its security implications
Keywords: امنیت شبکه ; Z-Wave; Network security; Home automation security; Routing protocol analysis; Reverse engineering; Embedded systems security;
Detecting HTTP-based application layer DoS attacks on web servers in the presence of sampling
Keywords: امنیت شبکه ; Denial-of-service attacks; Application layer; Sampling techniques; Intrusion detection; DDoS; Network security;
Trends in Validation of DDoS Research
Keywords: امنیت شبکه ; DDoS; Intrusion; Flash Events; Datasets; Network Security
A hybridised variable neighbourhood tabu search heuristic to increase security in a utility network
Keywords: امنیت شبکه ; Network security; Metaheuristics; GRASP; ILS; Tabu search; VND
MVPSys: Toward practical multi-view based false alarm reduction system in network intrusion detection
Keywords: امنیت شبکه ; Network security; Intrusion detection; False alarms; Alarm filter; Multi-view; Semi-supervised learning; Practical applications
Controlled access to cloud resources for mitigating Economic Denial of Sustainability (EDoS) attacks
Keywords: امنیت شبکه ; Economic Denial of Sustainability attacks (EDoS); Cloud computing; Network security; Rate control;
PCA-based multivariate statistical network monitoring for anomaly detection
Keywords: امنیت شبکه ; Multivariate statistical process control; Network monitoring; Network security; Principal component analysis; Anomaly detection
PsyBoG: A scalable botnet detection method for large-scale DNS traffic
Keywords: امنیت شبکه ; Network security; Botnet detection; DNS analysis; Power spectral density; Group activity;
BotFlex: A community-driven tool for botnet detection
Keywords: امنیت شبکه ; Botnet; Network security; Correlation
When Mice devour the Elephants: A DDoS attack against size-based scheduling schemes in the internet
Keywords: امنیت شبکه ; Denial of service (DoS) attacks; Simulation; Scheduling; Network security; ns2
JellyFish attack: Analysis, detection and countermeasure in TCP-based MANET
Keywords: امنیت شبکه ; JellyFish attack; TCP; Routing protocol; Malicious node; Wireless networks; Network security
OCP: A protocol for secure communication in federated content networks
Keywords: امنیت شبکه ; Federated Content Delivery Networks; Network security; Overlay networks; Interdomain
Decentralized detection of network attacks through P2P data clustering of SNMP data
Keywords: امنیت شبکه ; Network security; NIDS; SNMP; Data mining; Data clustering; Peer-to-peer
Cross-domain collaboration for improved IDS rule set selection
Keywords: امنیت شبکه ; Network security; Intrusion detection; Security collaboration; IDS; Rule set
Automatic generation of HTTP intrusion signatures by selective identification of anomalies
Keywords: امنیت شبکه ; Anomaly detection; Intrusion detection systems; Attack signature; Network security; Web application firewalls
Enabling security functions with SDN: A feasibility study
Keywords: امنیت شبکه ; Network security; Software-defined networking security; SDN security
Security of Software Defined Networks: A survey
Keywords: امنیت شبکه ; Software defined networking; Security; Software Defined Security; Networking; Network security
RTECA: Real time episode correlation algorithm for multi-step attack scenarios detection
Keywords: امنیت شبکه ; Network security; Early warning system; Alert correlation; Stream mining; Multi-step attacks;
DoS detection in IEEE 802.11 with the presence of hidden nodes
Keywords: امنیت شبکه ; Network security; Wireless networks; IEEE 802.11; Markov Chain; Network mapping
A wireless multi-step attack pattern recognition method for WLAN
Keywords: امنیت شبکه ; Multi-stage attack; Pattern recognition; WLAN; Correlation analysis; Network security
Uniform DoS traceback
Keywords: امنیت شبکه ; DoS; Traceback; Network security; Autonomous system; Packet marking
Autonomic intrusion detection: Adaptively detecting anomalies over unlabeled audit data streams in computer networks
Keywords: امنیت شبکه ; Anomaly detection; Intrusion detection; Adaptive system; Network security; Web security; Autonomic computing; Clustering
On the performance of secure user-centric VoIP communication
Keywords: امنیت شبکه ; Wireless networking; VoIP; Virtual private networks; Network security; User-centric networking;
EFM: Enhancing the performance of signature-based network intrusion detection systems using enhanced filter mechanism
Keywords: امنیت شبکه ; Network security; Intrusion detection; False alarm reduction; Exclusive signature matching; Blacklist generation; Packet filter; Enhanced filter mechanism
Algorithms for a distributed IDS in MANETs
Keywords: امنیت شبکه ; Intrusion detection system; Mobile ad hoc networks; Distributed systems; Fault tolerance; Network security
Using network motifs to investigate the influence of network topology on PPM-based IP traceback schemes
Keywords: امنیت شبکه ; Network security; Distributed Denial of Service (DDoS); IP traceback; Probabilistic Packet Marking (PPM); Network motifs; Network superfamilies
Improving cloud network security using the Tree-Rule firewall
Keywords: امنیت شبکه ; Firewall; Tree-Rule firewall; Network security; Cloud security; Cloud computing;
Unsupervised traffic classification using flow statistical properties and IP packet payload
Keywords: امنیت شبکه ; Traffic classification; Network security; Unsupervised learning; Cluster aggregation;
Data-driven software defined network attack detection : State-of-the-art and perspectives
Keywords: امنیت شبکه ; Network attack detection; Data-driven; Tensor; Network security; Software defined network (SDN);
An in-depth analysis on traffic flooding attacks detection and system using data mining techniques
Keywords: امنیت شبکه ; Network security; Data mining; DDoS; Vehicular network; Web of Things; Association rule mining
BotMosaic: Collaborative network watermark for the detection of IRC-based botnets
Keywords: امنیت شبکه ; Botnet detection; Botmaster traceback; Traffic analysis; Network flow watermarking; Network security
A secure and efficient batch binding update scheme for route optimization of nested NEtwork MObility (NEMO) in VANETs
Keywords: امنیت شبکه ; Mobile IPv6; Network security; Route optimization; Binding update
Towards secure and communication-efficient broadcast encryption systems
Keywords: امنیت شبکه ; Group communication; Network security; Broadcast encryption; Efficiency; Tradeoff