iTrans.ir
سفارش ترجمه
خانه
راهنما
چگونه سفارش ترجمه دهیم
تماس با ما
ترجمه فوری
راهنمای استفاده از سایت
API
بیشتر...
پرسش و پاسخ
قیمت ترجمه
ثبت نام
ورود
021-66989400
021-66989500
0935-173-0404
نشانی و اطلاعات تماس
تگ Attacks
جزئیات خدمات ترجمه در ترجمه تخصصی
solutions
[]
detection
detection
[]
network
network
network
[]
[]
attack
network
sensor
Cyber Attacks and Deterrence Theory The advent of nuclear weapons
www.ijecs.in
A SURVEY ON SQL INJECTION: VULNERABILITIES, ATTACKS, AND
Seema Mehla et. al. / (IJCSE) International Journal on Computer Science and Engineering
Remote Attack Surfaces The largest and most attractive attack surface
Remote Attack Surfaces The largest and most attractive attack surface
Remote Attack Surfaces The largest and most attractive attack surface
International Journal of Future Generation Communication and Networking
the administrators possess too much data to dissect effectivelyto determine
شبکه
viewpoints
viewpoints
Breaking Up Is Hard To Do: Modeling Security
Description Download the all new Teenage Mutant Ninja Turtles Official
Description Download the all new Teenage Mutant Ninja Turtles Official
1752 IEEE LATIN AMERICA TRANSACTIONS, VOL. 10, NO. 3, APRIL 2012
A Taxonomy for Social Engineering attacks
NSSA technology is a research hot spot to enhance network
decision maker to analysis volumes of data from the devicesand
decision maker to analysis volumes of data from the devicesand
Content s in De ta il
A Look at Targeted Attacks Through the Lense
16 CHAPTER 1 / INTRODUCTION
1.8 / OUTLINE OF THIS BOOK 21
16 CHAPTER 1 / INTRODUCTION
1.8 / OUTLINE OF THIS BOOK 21
Association for Information Systems
International Journal of Computer Applications (0975 – 8887)
IEEE-20180
Detecting Distributed Denial of
A Homeland Security Model for Assessing US Domestic Threats
A Homeland Security Model for Assessing US Domestic Threats
Cryptography in Theory and Practice: The Case
The large volume and sophistication of cyber attacks on enterprise
The large volume and sophistication of cyber attacks on enterprise
computers & security 46 (2014) 126e140
old the right to drive a car or vote in
2012 Ninth International Conference on Information Technology - New Generations 2012 Ninth International Conference on Information Technology- New Generations
I. J. Computer Network and Information Security, 2013, 10, 44-50
Peer-to-Peer Netw. Appl. (2010) 3:265–276
I. J. Computer Network and Information Security, 2013, 10, 44-50
DNS rebinding
DNS rebinding
INTRODUCTION Network coding is a promising paradigm that hasbeen shown
4CORRELATION COMPONENTS AND ANALYSIS RESULTS Alert correlation is a multicomponent
1 Data Analysis The alert fusion component is particularly relevant
8 Attack Session Reconstruction The goal of the attack session
Related works There has been much research on hybrid intrusion
4 Alert Preprocessing Normalized alerts have a standardized name and
4 Alert Preprocessing Normalized alerts have a standardized name and
4 Alert Preprocessing Normalized alerts have a standardized name and
4.10 MultistepCorrelat ion
4 Alert Preprocessing Normalized alerts have a standardized name and
8 Attack Session Reconstruction The goal of the attack session
8 Attack Session Reconstruction The goal of the attack session
Pattern Recognition Letters 51 (2015) 1–7
An efficient network intrusion detection
A Design and Implementation of Intrusion
In three months it tookover about 9 million Microsoft Windows
1 Introduction Since the first computer virus Creeper appeared in
1 Introduction Since the first computer virus Creeper appeared in
into a numerical IP address that is used to route
1 Introduction Since the first computer virus Creeper appeared in
is a type of cyber attack with the intention to
1 Introduction Since the first computer virus Creeper appeared in
is a type of cyber attack with the intention to
International Journal of Engineering Research and General Science Volume 2, Issue 6, October-November, 2014
International Journal of Engineering Research and General Science Volume 2, Issue 6, October-November, 2014
International Journal of Engineering Research and General Science Volume 2, Issue 6, October-November, 2014
collaborative intrusion detection networkscan improve the intrusion detection accuracy of
1 Introduction So far in this book we have focused
2014 IEEE 13th International Symposium on Network Computing and Applications 2014 IEEE 13th International Symposium on Network Computing and Applications
ISSN (Online) : 2278-1021
Computers 2014, 3, 1-35; doi:10.3390/computers3010001
centric warfare capabilities has led to a greater need to
CSA is diffi cult due to the dynamic nature of
E-C ommer c e S ecurit y and F r aud
10.5 The Information Assurance Model and Defense Strategy 487
Command Execution
Information & Management 52 (2015) 123–134
CHAPTER 14 Misuse Patterns That some good can be derived
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
. (کامپیوتر-امنیت-شبکه)
Experimentation
Computer Networks 44 (2004) 643–666
CHAPTER
Master’s Thesis
2012 Network Technologies
journal of information security and applications 18 (2013) 130e137
Linux Kernel Vulnerabilities: State-of-the-Art Defenses
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.4, July 2011
1. Introduction
1. Introduction
The attackers exactly use the radio jamming and battery exhaustion methods to
233
Journal of Network and Computer Applications 40 (2014) 307–324
Alert association and tracking Associating IDS alerts that are hypothesized
High level information fusion assisted cyber defense Identifying the needs
IEE E EM BEDD ED SYST EM S LETT ERS, VOL . 7, NO. 1, M A RCH 2 015 11
2009 International Conference of Soft Computing and Pattern Recognition 2009 International Conference of Soft Computing and Pattern Recognition
XSS-Dec: A Hybrid Solution to Mitigate Cross-Site
Prevention of Cross-Site Scripting Attacks
XSS-GUARD: Precise Dynamic Prevention of
1. Introduction
1. Introduction
1. Introduction
Out of many
Vehicular Communications 1 (2014) 53–66
Pereiraetal. EURASIPJournalonImageandVideoProcessing2014,2014:2
Cyber Attack Simulator This section presents a model for simulating
Cyber Attack Simulator This section presents a model for simulating
9 This section presents a model for simulating the behavior
Vehicular Communications 1 (2014) 53–66
Vehicular Communications 1 (2014) 53–66
IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 13, NO. 2, SECOND QUARTER 2011 245
Research associated with each of these individual problems deserves entire
the focus is on the impact a specific attack has
A set of seven common attacks were carefully selected for
and need to move at wire speed in a wide
and need to move at wire speed in a wide
Engineering Applications of Artificial Intelligence 32 (2014) 228–241
COMPUTER MODELLING & NEW TECHNOLOGIES 2014 18(11) 477-481 Wu Fan, Li Jingbing
COMPUTER MODELLING & NEW TECHNOLOGIES 2014 18(11) 477-481 Wu Fan, Li Jingbing
COMPUTER MODELLING & NEW TECHNOLOGIES 2014 18(11) 477-481 Wu Fan, Li Jingbing
Alexandria Engineering Journal (2015) xxx, xxx–xxx
Alexandria Engineering Journal (2015) xxx, xxx–xxx
Alexandria Engineering Journal (2015) xxx, xxx–xxx
Alexandria Engineering Journal (2015) xxx, xxx–xxx
netflow
Preface
Preface
Watermarking Techniques used in Medical
ICAST 2008
WIRELESS SENSOR NETWORK SECURITY THREATS
2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing
2013 International Conference on Intelligent Systems and Signal Processing (ISSP)
Security Analysis of Reliable Transport Layer Protocols for
Evaluation of Moving Target IPv6 Defense and Distributed Denial
ICAST 2008
WIRELESS SENSOR NETWORK SECURITY THREATS
2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing
2013 International Conference on Intelligent Systems and Signal Processing (ISSP)
Security Analysis of Reliable Transport Layer Protocols for
Content delivery network specifications
1
Overview Since people have been succeeded in making connections among
CHAPTER 16 Multiple Sclerosis 723
Nicolas Sklavos/Wireless Security and Cryptography 8771_C007 Final Proof page 213 27.1.2007 2:40pm
245
ِDNS
T-DNS:Connection-OrientedDNS
Connection-Oriented DNS
Connection-Oriented DNS
T-DNS:Connection-OrientedDNS
for use with other asthma medicines for the maintenance treatment
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.5, Sep 2011
Darkhotel's attacks in 2015 - Securelist https://securelist.com/blog/research/71713/darkhotels-attacks-in-2015/
Online Social Network
International Journal of Computer Applications (0975 – 8887)
PROCEEDINGS OF THE IEEE 1
Chapter 1
attackers will hide their presence and move laterally within your
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI Downloaded form http://iranpaper.ir
This schemecan reduce the authenticating process as short as possible
This schemecan reduce the authenticating process as short as possible
is a powerful technology helping in protecting the precious data
1
ARTICLE IN PRESS
These services are subscribed by clients willing to reduce the
White Paper
2015 12th International Conference on Information Technology - New Generations
International Journal of Future Generation Communication and Networking
1
Crystal-Induced
Crystal-Induced
Crystal-Induced
A survey of Attacks on VoIP networks and Countermeasures
Downloaded from http://iranpaper.ir
Downloaded from http://iranpaper.ir
ND
Attacking the Leader, Missing the Mark
Neural Comput & Applic
Neural Comput & Applic
Neural Comput & Applic
Neural Comput & Applic
Neural Comput & Applic
Neural Comput & Applic
watermarking
14th Intl Conf on Pervasive Intelligence 2016 IEEE 14th Intl
yet they present a serious threat due to rogue malicious
yet they present a serious threat due to rogue malicious
a considerably wide spectrum of attacks on hardware virtualization has
the adversary could detect and identify the virtual system he
the adversary could detect and identify the virtual system he
the adversary could detect and identify the virtual system he
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TCC.2016.2570752, IEEE
14th Intl Conf on Pervasive Intelligence 2016 IEEE 14th Intl
14th Intl Conf on Pervasive Intelligence 2016 IEEE 14th Intl
14th Intl Conf on Pervasive Intelligence 2016 IEEE 14th Intl
Databases are the repositories of the most important and expensive
SECURITY
Databases are the repositories of the most important and expensive
Journal of Network and Computer Applications 66 (2016) 198–213
virtualization has gained a huge slice in the server deployment
hypervisor escapes are possibly the most frightening security issues related
hypervisor escapes are possibly the most frightening security issues related
hypervisor escapes are possibly the most frightening security issues related
Journal of Network and Computer Applications 77 (2017) 18–47
2015 International Conference on Computing Communication Control and Automation
Fortiweb and FortiAnalyzer Devices
Most traffic in sensor networks canbe classified into one of
Applied Computing and Informatics (2016) xxx, xxx–xxx
Applied Computing and Informatics (2016) xxx, xxx–xxx
Efficient Distributed Detection of Node Replication Attacks in Sensor Networks
Journal of Network and Computer Applications 36 (2013) 16–24
DetectionofknownandunknownDDoSattacksusingArtificial NeuralNetworks
Computer Networks 57 (2013) 1344–1371
INT J COMPUT COMMUN, ISSN 1841-9836
GUIZANI_LAYOUT.qxp_Author Layout 2/17/15 4:16 PM Page 138
1
s Revolutionary Guards blame Saudis for Tehran attacks By ShirzadBozorgmehr
International Journal of Advanced Computer Technology (IJACT)
A Review of Various Techniques for Detection and Prevention
A Review of Various Techniques for Detection and Prevention
A Review of Various Techniques for Detection and Prevention
FutureGenerationComputerSystems70(2017)17–25
FutureGenerationComputerSystems70(2017)17–25
FutureGenerationComputerSystems70(2017)17–25
SmartLocks: LessonsforSecuring
A Framework for Automating Security Analysis of the
A Framework for Automating Security Analysis of the
Applied Computing and Informatics xxx (2017) xxx–xxx
NMap is a free and open source utility that mainly performs IP scans, port
10.2 IoT SECURITY OVERVIEW 189
(IJACSA) International Journal of Advanced Computer Science and Applications,
IOT SECURITY 1
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
IOT SECURITY 1
Downloaded from http://iranpaper.ir
Downloaded from http://iranpaper.ir
Downloaded from http://iranpaper.ir
Journal of Network and Computer Applications 88 (2017) 10–28
Kaspersky for Business
IoTSecurity: Review,BlockchainSolutions,andOpenChallenges
Hate: This is when the attacker causes physical, psychological, or financial
The effect of ambient air pollution on panic disorder in
HindawiPublishingCorporation
n
A Comparison of Machine Learning
5004-1
Signal Processing 90 (2010) 3256–3264
DHS Science and Technology Directorate
Appl. Sci. 2017, 7, 1069 5of22
applied
Appl. Sci. 2017, 7, 1069 5of22
attack that could take down your data center Scour the
This threat arises when an attacker scans the physical memory
1
A Review on Trust Models of Social
� Spoofing/Relay Attack Spoofing/Relay attacks occur
TEMPEST Attacks and Cybersecurity
TEMPEST is the set of standards that determine the The purpose of this study is to present a review of
Attack Name Attack Type
electromagnetic waves emitted by this method. In this way,
5
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TNSM.2020.3046906, IEEE
but the right knowledge and tactics can drastically improve your
As one of the unfortunate benefactors from the changing business
The rise of phishing attacks poses a significant threat to
IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO. 10, MAY 15, 2021 8387
IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO. 10, MAY 15, 2021 8387
Amplification attacks generate a high volume of packets that are
The number of vulnerabilities available to cyber criminals continues to
Amplification attacks generate a high volume of packets that are
The number of vulnerabilities available to cyber criminals continues to
How the Attack works and How to Prevent the SYN
Looking for exampels of BEC attacks or information about how
Looking for exampels of BEC attacks or information about how
dozens of stakeholders will send thousands of emails containing personnel