iTrans.ir
سفارش ترجمه
خانه
راهنما
چگونه سفارش ترجمه دهیم
تماس با ما
ترجمه فوری
راهنمای استفاده از سایت
API
بیشتر...
پرسش و پاسخ
قیمت ترجمه
ثبت نام
ورود
021-66989400
021-66989500
0935-173-0404
نشانی و اطلاعات تماس
تگ Attack
جزئیات خدمات ترجمه در ترجمه تخصصی
solutions
mortar
grid
[]
detection
VANET
detection
attack
[]
network
network
network
corrosion
[]
[]
intrusion
intrusion
intrusion
attack
network
sensor
1
and define the mission of the manual and summarizestwo successful
6 List of Table Table 1 classification of detection principal
6 List of Table Table 1 classification of detection principal
6 List of Table Table 1 classification of detection principal
Intrusion Detection
Cyber Attacks and Deterrence Theory The advent of nuclear weapons
www.ijecs.in
Remote Attack Surfaces The largest and most attractive attack surface
Remote Attack Surfaces The largest and most attractive attack surface
Remote Attack Surfaces The largest and most attractive attack surface
International Journal of Future Generation Communication and Networking
the administrators possess too much data to dissect effectivelyto determine
شبکه
viewpoints
viewpoints
Breaking Up Is Hard To Do: Modeling Security
INTRODUCTION Traditional network security devices such as Intrusion Detection Systems
INTRODUCTION Traditional network security devices such as Intrusion Detection Systems
INTRODUCTION Traditional network security devices such as Intrusion Detection Systems
em up released by Sega in 1991 for the Mega
part comic strip series based upon the games appeared in
1752 IEEE LATIN AMERICA TRANSACTIONS, VOL. 10, NO. 3, APRIL 2012
A Taxonomy for Social Engineering attacks
NSSA technology is a research hot spot to enhance network
decision maker to analysis volumes of data from the devicesand
decision maker to analysis volumes of data from the devicesand
security This chapter outlines two different technology domains that have
security This chapter outlines two different technology domains that have
Two Vulnerabilities in Android OS Kernel
Two Vulnerabilities in Android OS Kernel
Apple confirms celeb photo leak was the result of a
ISSN 2090-4304
IJCSNS International Journal of Computer Science and Network Security, VOL.12 No.5, May 2012 21
Association for Information Systems
Detecting Distributed Denial of
Cryptography in Theory and Practice: The Case
The large volume and sophistication of cyber attacks on enterprise
The large volume and sophistication of cyber attacks on enterprise
computers & security 46 (2014) 126e140
The attack is successful in finding a collision if it
The attack is successful in finding a collision if it
Chapter 6
Chapter 6
Chapter 6
Chapter 6
International Journal of P2P Network Trends and Technology- Volume1Issue1- 2011
by el fabricante de espheras was the attack against the
by el fabricante de espheras was the attack against the
by el fabricante de espheras was the attack against the
DNS rebinding
DNS rebinding
2012 Second International Conference on Instrumentation & Measurement, Computer, Communication and Control 2012 Second International Conference on Instrumentation & Measurement, Computer, Communication and Control
2011 Cross Strait Quad-Regional Radio Science and Wireless Technology Conference
1 A mission is a task or process that is
are the objects in the environment that are relevant to
1 A mission is a task or process that is
4CORRELATION COMPONENTS AND ANALYSIS RESULTS Alert correlation is a multicomponent
1 Data Analysis The alert fusion component is particularly relevant
8 Attack Session Reconstruction The goal of the attack session
1 A mission is a task or process that is
4 Alert Preprocessing Normalized alerts have a standardized name and
4 Alert Preprocessing Normalized alerts have a standardized name and
4 Alert Preprocessing Normalized alerts have a standardized name and
4.10 MultistepCorrelat ion
4 Alert Preprocessing Normalized alerts have a standardized name and
8 Attack Session Reconstruction The goal of the attack session
8 Attack Session Reconstruction The goal of the attack session
Pattern Recognition Letters 51 (2015) 1–7
Semester Thesis
Semester Thesis
New threats and new measures to counter such threats call
New threats and new measures to counter such threats call
High-PerformanceHardwareMonitorstoProtectNetwork
In three months it tookover about 9 million Microsoft Windows
1 Introduction Since the first computer virus Creeper appeared in
1 Introduction Since the first computer virus Creeper appeared in
into a numerical IP address that is used to route
is a type of cyber attack with the intention to
is a type of cyber attack with the intention to
The Communications Assistance for Law Enforcement Act applies in the
Verifiable election systems give voters the ability to check that
Verifiable election systems give voters the ability to check that
2014 IEEE 13th International Symposium on Network Computing and Applications 2014 IEEE 13th International Symposium on Network Computing and Applications
Computers 2014, 3, 1-35; doi:10.3390/computers3010001
International Conference on Communication and Signal Processing, April 3- 5, 2014, India
International Conference on Communication and Signal Processing, April 3- 5, 2014, India
International Conference on Communication and Signal Processing, April 3- 5, 2014, India
centric warfare capabilities has led to a greater need to
Journal of Network and Computer Applications∎ (∎∎∎∎)∎∎∎–∎∎∎
CSA is diffi cult due to the dynamic nature of
1 Capturing Threats and Attacks with Graphical Models In order
1 Capturing Threats and Attacks with Graphical Models In order
Although the ultimate goal of research in Cyber Situational Awareness
Available online at www.sciencedirect.com
CHAPTER 14 Misuse Patterns That some good can be derived
Available online at www.sciencedirect.com
. (کامپیوتر-امنیت-شبکه)
Wireless Sensor Network Security model using
Experimentation
In order to be able to change the design of
Computer Networks 44 (2004) 643–666
CHAPTER
Iowa State University
Gargash condemns attack Minister of State for Foreign Affairs says
2012 Network Technologies
Journal of Network and Computer Applications 35 (2012) 763–769
The attackers exactly use the radio jamming and battery exhaustion methods to
233
Journal of Network and Computer Applications 40 (2014) 307–324
Sources of information The alerts generated by monitoring systems are
we have found some research efforts suggesting alternative methods like
we have found some research efforts suggesting alternative methods like
Alert association and tracking Associating IDS alerts that are hypothesized
High level information fusion assisted cyber defense Identifying the needs
Sources of information The alerts generated by monitoring systems are
Taxonomy of alert correlation techniques After a thorough review of
ACriticalAnalysisontheSecurityConcernsof
2009 International Conference of Soft Computing and Pattern Recognition 2009 International Conference of Soft Computing and Pattern Recognition
XSS-Dec: A Hybrid Solution to Mitigate Cross-Site
Journal of Network and Computer Applications 33 (2010) 661–671
1. Introduction
sensor data fusion has been recommended as a methodology to
sensor data fusion has been recommended as a methodology to
Sensors Sensors are devices that provide observation data for use
has opened up an opportunity for it to become a
1. Introduction
1. Introduction
Out of many
Vehicular Communications 1 (2014) 53–66
IJIRST –International Journal for Innovative Research in Science & Technology| Volume 1 | Issue 7 | December 2014
Cyber Attack Simulator This section presents a model for simulating
Cyber Attack Simulator This section presents a model for simulating
9 This section presents a model for simulating the behavior
IJIRST –International Journal for Innovative Research in Science & Technology| Volume 1 | Issue 7 | December 2014
Vehicular Communications 1 (2014) 53–66
Vehicular Communications 1 (2014) 53–66
2011 International Joint Conference of IEEE TrustCom-11/IEEE ICESS-11/FCST-11
Research associated with each of these individual problems deserves entire
The simulator allows for both cyber attacks that are initiated
the focus is on the impact a specific attack has
A set of seven common attacks were carefully selected for
Quantico
and need to move at wire speed in a wide
and need to move at wire speed in a wide
and need to move at wire speed in a wide
and need to move at wire speed in a wide
Engineering Applications of Artificial Intelligence 32 (2014) 228–241
Advances in Information Security
Alexandria Engineering Journal (2015) xxx, xxx–xxx
Alexandria Engineering Journal (2015) xxx, xxx–xxx
Alexandria Engineering Journal (2015) xxx, xxx–xxx
Alexandria Engineering Journal (2015) xxx, xxx–xxx
is an emergingtechnology and day by day it is attracting
is an emergingtechnology and day by day it is attracting
INTRODUCTION
SECURITY PROBLEMS
SECURITY PROBLEMS
SECURITY PROBLEMS
Journal of Network and Computer Applications∎ (∎∎∎∎)∎∎∎–∎∎∎
WIND ENERGY
WIND ENERGY
WIND ENERGY
Network Attacks Detection Using Fuzzy Logic
WIRELESS SENSOR NETWORK SECURITY THREATS
2013 International Conference on Intelligent Systems and Signal Processing (ISSP)
Evaluation of Moving Target IPv6 Defense and Distributed Denial
Contents
The FBI is investigating the fatal shooting of 14 people
WIRELESS SENSOR NETWORK SECURITY THREATS
2013 International Conference on Intelligent Systems and Signal Processing (ISSP)
computers & security 43 (2014) 205e218
WIND ENERGY
1
Nicolas Sklavos/Wireless Security and Cryptography 8771_C007 Final Proof page 213 27.1.2007 2:40pm
A Trend Micro Research Paper
TCP/IP Header Classification for Detecting Spoofed
Distributed Denial of Service attack on Cloud:
Journal of Network and Computer Applications 59 (2016) 198–207
2009 International Conference on Computational Intelligence and Security
Improved Impossible Di�erential Attacks against
Impossible differential cryptanalysis of LBlock
Impossible differential cryptanalysis of LBlock
Computer Communications xxx (2014) xxx–xxx
Security in cloudcannot be simulated even though as different simulation
2014 International Conference on Electronics and Communication System (lCECS -2014)
245
Online Social Network
Understanding Cryptography Christof Paar · Jan Pelzl
Understanding Cryptography Christof Paar · Jan Pelzl
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI Downloaded form http://iranpaper.ir
Result Analysis
random masking, TPA becomes unable to access the data content while it is
Computer Networks 81 (2015) 308–319
2015 12th International Conference on Information Technology - New Generations
55803
2015 18th International Conference on Intelligence in Next Generation Networks
International Journal of Future Generation Communication and Networking
Umbrella Corps Reviews
1
A survey of Attacks on VoIP networks and Countermeasures
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
A malicious node can perform packetdropping by itself or by
International Journal of Computer Applications (0975 – 8887)
ND
FutureGenerationComputerSystems28(2012)833–851
The Myth of Cyberwar
Neural Comput & Applic
Neural Comput & Applic
Neural Comput & Applic
Neural Comput & Applic
Why States Won’t Give Nuclear Weapons to Terrorists
Neural Comput & Applic
Neural Comput & Applic
NETWORK TRAFFIC ANOMALY DETECTION FOR IAAS
yet they present a serious threat due to rogue malicious
yet they present a serious threat due to rogue malicious
Pers Ubiquit Comput (2014) 18:163–175
Pers Ubiquit Comput (2014) 18:163–175
The runtime modification of hypervisors is an appealing problem for
A live wireless local area network had been setup for
A live wireless local area network had been setup for
ا
2015 International Conference on Computing Communication Control and Automation
Most traffic in sensor networks canbe classified into one of
Journal of Network and Computer Applications 79 (2017) 88–115
FM 3-05.222
FM 3-05.222
FM 3-05.222
DetectionofknownandunknownDDoSattacksusingArtificial NeuralNetworks
Dictionary Attack on Wordpress: Security and
8.0 OUTSOURCING MANAGEMENT
s Revolutionary Guards blame Saudis for Tehran attacks By ShirzadBozorgmehr
International Journal of Advanced Computer Technology (IJACT)
A Review of Various Techniques for Detection and Prevention
A Review of Various Techniques for Detection and Prevention
FortiWeb Unprotected web applications are the easiest point of entry
A Framework for Automating Security Analysis of the
A Framework for Automating Security Analysis of the
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2017.2685596, IEEE Internet of
Performance Investigation of an Aircraft Wing at Various Cant Angles of Winglets using CFD Simulation Dinesh Myilsamy Post-Graduate Student Pukyong National University, Dayeon Campus, Namgu, Busan, Korea (South) 608-737 dineshaero555@gmail.com
Volleyball
Applied Computing and Informatics xxx (2017) xxx–xxx
NMap is a free and open source utility that mainly performs IP scans, port
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
Each such output block is an independent combination of the
2524 IEEE COMMUNICATIONS LETTERS, VOL. 21, NO. 11, NOVEMBER 2017
Ocean Engineering 142 (2017) 115–124
Ocean Engineering 142 (2017) 115–124
UNSW-NB15: A Comprehensive Data set for Network
Jill Slay School of Engineering and Information Technology University of
rich blood to a section of heart muscle suddenly becomes
Kaspersky Enterprise Cybersecurity
Hate: This is when the attacker causes physical, psychological, or financial
HindawiPublishingCorporation
M . A b u r ro u s e t a l . / E x p e r t S y s t em s w i t h A pplica t io n s 3 7 ( 2010) 7 91 3 – 79 2 1 7 9 17
A Comparison of Machine Learning
5004-1
DHS Science and Technology Directorate
insident management
What is a Heart Attack?
ETHERNET SWITCH VULNERABILITY MAC flooding is an attack that manipulates
ETHERNET SWITCH VULNERABILITY MAC flooding is an attack that manipulates
PORT SECURITY MAC flooding is an attack that manipulates the
with the consent of those in charge of the network
with the consent of those in charge of the network
has been made available to the sniffing host using the
JDMS
Phishing attacks What is a phishing attack Phishing is a
is a common attack vector that uses malicious SQL code
attack What is MITM attack A man in the middle
What is clickjacking Clickjacking is an attack that tricks a
Audittools are used by MNOs to monitor the activity of
Thisthreatrelatestocellularpagingprotocolsthatcanbeexploitedbya malicious actor in the vicinity of a victim to
1
BSI Security Testing video
wireless sensor networks are developing rapidly with the support of
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/342501765
� Spoofing/Relay Attack Spoofing/Relay attacks occur
Attack Name Attack Type
6 issues to solve before it strikes Being struck by
but the right knowledge and tactics can drastically improve your
As one of the unfortunate benefactors from the changing business
The rise of phishing attacks poses a significant threat to
Amplification attacks generate a high volume of packets that are
The number of vulnerabilities available to cyber criminals continues to
Amplification attacks generate a high volume of packets that are
The number of vulnerabilities available to cyber criminals continues to
How the Attack works and How to Prevent the SYN
CK Framework to Fight Ransomware Attacks Chinese military general Sun
Looking for exampels of BEC attacks or information about how
Looking for exampels of BEC attacks or information about how
Possible synergies for cyber attack in combination with HPEM attack
J Cryptol (2021) 34:22
This section is dedicated to introducing in detail the proposed
This section is dedicated to introducing in detail the proposed
The attack can be modeled via a vector starting from