Keywords: امنیت سیستم; External kernel integrity monitor; Address translation redirection attack; Memory mapping integrity; Kernel security; Hardware-based kernel monitor; System security; Rootkit;
مقالات ISI امنیت سیستم (ترجمه نشده)
مقالات زیر هنوز به فارسی ترجمه نشده اند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
Keywords: امنیت سیستم; Data streams; Data flow analysis; Network analyzers; Network identification; Data compression; Data Transmission; System security; Human-machine interfac;
Keywords: امنیت سیستم; Total supply capability (TSC); Distribution system; N â 1 contingencies; Load balance; System security;
Keywords: امنیت سیستم; Distribution-interline power flow controller; Microgrid; Multi-objective nonlinear optimization; System security; Smart power grids resiliency;
Keywords: امنیت سیستم; Cyber-physical systems; System security; Attack space; Secure control systems;
Keywords: امنیت سیستم; Internet of Things; Mechatronics; Design; Education; System security; Participatory systems
Keywords: امنیت سیستم; Private browsing; Web security; User privacy; System security;
Keywords: امنیت سیستم; Buffer overflow; Return-oriented programming; Code-reuse attack; System security; Exploit mitigation; Dynamic binary instrumentation
A novel honeypot based security approach for real-time intrusion detection and prevention systems
Keywords: امنیت سیستم; Intrusion detection and prevention systems (IDS/IPS); Honeypots; Network security; System security; Network traffic visualization;
Gemini: Guest-transparent honey files via hypervisor-level access redirection
Keywords: امنیت سیستم; Data security; System security; Virtualization; Access control; Moving target defense;
TinyVisor: An extensible secure framework on android platforms
Keywords: امنیت سیستم; Android; Virtualization; ARM; Hypervisor; System Security;
R-Locker: Thwarting ransomware action through a honeyfile-based approach
Keywords: امنیت سیستم; Ransomware; Detection; Countermeasure; Honeyfile; System security;
Available transfer capability evaluation and enhancement using various FACTS controllers: Special focus on system security
Keywords: امنیت سیستم; ATC; Current based modeling; SSSC; STATCOM; UPFC; System security
Security of interdependent and identical networked control systems
Keywords: امنیت سیستم; Interdependent security; Nash games; Network reliability; Networked control systems; System security
Wind generation output during cold weather-driven electricity demand peaks in Ireland
Keywords: امنیت سیستم; Wind variability; Meteorological extremes; Heating degree-days; System security; Electric vehicles
ACSP: A novel security protocol against counting attack for UHF RFID systems
Keywords: امنیت سیستم; UHF RFID; System security; Counting attack
Distributed estimation via iterative projections with application to power network monitoring
Keywords: امنیت سیستم; Power systems; State estimation; Monitoring; Algebraic approaches; Distributed detection; System security
Probabilistic reactive power procurement in hybrid electricity markets with uncertain loads
Keywords: امنیت سیستم; Hybrid electricity markets; Local reactive power reserve; Monte Carlo Simulation; Multiobjective programming; Probabilistic reactive power market; System security
Coverage analysis of mobile agent trajectory via state-based opacity formulations
Keywords: امنیت سیستم; Discrete event systems; System security; Information flow; State estimation; Sensors
Research challenges towards the Future Internet
Keywords: امنیت سیستم; Internet architecture and protocols; Future internet; Optical networks; Wireless networks; Cognitive networks; Green networking; Data and communication security; System security
DSS for computer security incident response applying CBR and collaborative response
Keywords: امنیت سیستم; Log analysis; System security; Misuse detection; Anomaly detection; Decision support system; Expert system; RFM analysis methodology; CBR (case based reasoning)
On security of bluetooth wireless system
Keywords: امنیت سیستم; System security; Wireless; PAN; Authentication; Encryption;