iTrans.ir
سفارش ترجمه
خانه
راهنما
چگونه سفارش ترجمه دهیم
تماس با ما
ترجمه فوری
راهنمای استفاده از سایت
API
بیشتر...
پرسش و پاسخ
قیمت ترجمه
ثبت نام
ورود
021-66989400
021-66989500
0935-173-0404
نشانی و اطلاعات تماس
تگ anomaly
جزئیات خدمات ترجمه در ترجمه تخصصی
Discovery of Policy Anomalies
1
Related works There has been much research on hybrid intrusion
Computer Communications 33 (2010) 477–484
An efficient network intrusion detection
A Design and Implementation of Intrusion
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.4, July 2011
A Signal Analysis of Network Traffic Anomalies
Network Attacks Detection Using Fuzzy Logic
Recent advances in anomaly detection address event representation and globally
Available online at www.sciencedirect.com
IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART C: APPLICATIONS AND REVIEWS, VOL. 42, NO. 6, NOVEMBER 2012 1257
SURVEILLANCE TARGET The target of surveillance is the entity or
Egyptian Informatics Journal (2015) xxx, xxx–xxx
To appear in IEEE Conf. on Computer Vision and Pattern Recognition, San Francisco, 2010.
indication of abnormality is the difference between the
IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART C: APPLICATIONS AND REVIEWS, VOL. 42, NO. 6, NOVEMBER 2012 1257
indication of abnormality is the difference between the
Sliding Modes for Anomaly Observation in TCP
Going, going, gone? The demise of the accruals anomaly
The tremendous increase in the popularity of the SNS allows
Detecting Dynamic Topics in Social Network Using Citation based Anomaly
Varying Graph Data Abstract This work presents a novel modeling
Activity and Anomaly Detection in Smart
An Object-Oriented Knowledge Representation
An Object-Oriented Knowledge Representation