iTrans.ir
سفارش ترجمه
خانه
راهنما
چگونه سفارش ترجمه دهیم
تماس با ما
ترجمه فوری
راهنمای استفاده از سایت
API
بیشتر...
پرسش و پاسخ
قیمت ترجمه
ثبت نام
ورود
021-66989400
021-66989500
0935-173-0404
نشانی و اطلاعات تماس
تگ INTRUSION
جزئیات خدمات ترجمه در ترجمه تخصصی
nodes
[]
detection
detection
security
[]
[]
[]
[]
[]
intrusion
intrusion
intrusion
6 List of Table Table 1 classification of detection principal
6 List of Table Table 1 classification of detection principal
6 List of Table Table 1 classification of detection principal
Intrusion Detection
INTRUSION
INTRUSION
INTRUSION
NSSA technology is a research hot spot to enhance network
decision maker to analysis volumes of data from the devicesand
decision maker to analysis volumes of data from the devicesand
INTRUSION
INTRUSION
Hybrid Intelligent System
©2005 Society of Economic Geologists, Inc.
System Intrusion Detection
Computer Communications 42 (2014) 1–23
2014 Fourth International Conference on Communication Systems and Network Technologies 2014 Fourth International Conference on Communication Systems and Network Technologies
Computers and Electrical Engineering 38 (2012) 1062–1072
Computer Communications 33 (2010) 477–484
International Journal of Computer Science & Information Technology (IJCSIT) Vol 3, No 6, Dec 2011
A Design and Implementation of Intrusion
Automatic network intrusion detection: Current techniques
NETWORK INTRUSION DETECTION USING DATA
A Design and Implementation of Intrusion
1 Introduction In the previous chapter we presented the architecture
In three months it tookover about 9 million Microsoft Windows
In three months it tookover about 9 million Microsoft Windows
2 Collaborative Intrusion Detection Networks A collaborative intrusion detection network
4 Selected Intrusion Detection Networks In the previous section we
1 Introduction In the previous chapter we discussed the design
1 Introduction So far in this book we have focused
. (کامپیوتر-امنیت-شبکه)
A Survey on Deep Packet Inspection for Intrusion Detection Systems
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.4, July 2011
Computers and Electrical Engineering 38 (2012) 1062–1072
computers & security 28 (2009) 18–28
S e e d i s c u s s i o n s , s t a t s , a n d a u t h o r p r o f i l e s f o r t h i s p u b l i c a t i o n a t : h t t p : / / w w w . r e s e a r c h g a t e . n e t / p u b l i c a t i o n / 2 2 8 5 8 7 2 4 2
computers & security 27 (2008) 30–47
FutureGenerationComputerSystems ( ) –
netflow
FutureGenerationComputerSystems37(2014)127–140
FutureGenerationComputerSystems37(2014)127–140
FutureGenerationComputerSystems37(2014)127–140
FutureGenerationComputerSystems37(2014)127–140
FutureGenerationComputerSystems37(2014)127–140
FutureGenerationComputerSystems37(2014)127–140
2012 International Conference on Computer Communication and Informatics (ICCCI -2012), Jan. 10 – 12, 2012, Coimbatore, INDIA
Available online at www.sciencedirect.com
Pipeline Intrusion & Leak Detection Monitoring System
Computer Communications 42 (2014) 1–23
COMCOM 5065 No. of Pages 12, Model 5G
شورknn k [2]
Applied Soft Computing 18 (2014) 178–184
International Journal of
Artificial Neural Networks for Misuse Detection
FutureGenerationComputerSystems37(2014)127–140
FutureGenerationComputerSystems37(2014)127–140
Journal of Network and Computer Applications 36 (2013) 16–24
Downloaded from http://iranpaper.ir
Downloaded from https://iranpaper.ir
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, VOL. 22, NO. 7, JULY 2021 4519
Decision Analytics Journal 7 (2023) 100233