iTrans.ir
سفارش ترجمه
خانه
راهنما
چگونه سفارش ترجمه دهیم
تماس با ما
ترجمه فوری
راهنمای استفاده از سایت
API
بیشتر...
پرسش و پاسخ
قیمت ترجمه
ثبت نام
ورود
021-66989400
021-66989500
0935-173-0404
نشانی و اطلاعات تماس
تگ attacker
جزئیات خدمات ترجمه در ترجمه تخصصی
A Taxonomy for Social Engineering attacks
FEATURE
Association for Information Systems
International Journal of Computer Applications (0975 – 8887)
The large volume and sophistication of cyber attacks on enterprise
WhydoNigerianScammersSayTheyarefromNigeria?
2014 Conference on Information Assurance and Cyber Security (CIACS)
2014 Conference on Information Assurance and Cyber Security (CIACS)
INTRODUCTION Network coding is a promising paradigm that hasbeen shown
Semester Thesis
Semester Thesis
Dynamic Hooks: Hiding Control Flow Changes
2014 IEEE 13th International Symposium on Network Computing and Applications 2014 IEEE 13th International Symposium on Network Computing and Applications
CSA is diffi cult due to the dynamic nature of
CHAPTER 14 Misuse Patterns That some good can be derived
Fighting a bank spoofing attack: an out of page
1. Introduction
1. Introduction
IJIRST –International Journal for Innovative Research in Science & Technology| Volume 1 | Issue 7 | December 2014
IJIRST –International Journal for Innovative Research in Science & Technology| Volume 1 | Issue 7 | December 2014
Engineering Applications of Artificial Intelligence 32 (2014) 228–241
and recover from the security attacks and also provides apseudo
and recover from the security attacks and also provides a
and recover from the security attacks and also provides a
Low Level Security Mechanisms
1152 IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART C: APPLICATIONS AND REVIEWS, VOL. 37, NO. 6, NOVEMBER 2007
White Paper
A survey of Attacks on VoIP networks and Countermeasures
Pers Ubiquit Comput (2014) 18:163–175
Pers Ubiquit Comput (2014) 18:163–175
FM 3-05.222
FM 3-05.222
Privacy-PreservingDataPublishing:ASurveyof
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2017.2685596, IEEE Internet of
NMap is a free and open source utility that mainly performs IP scans, port
Hate: This is when the attacker causes physical, psychological, or financial
JDMS
Phishing attacks What is a phishing attack Phishing is a
attack What is MITM attack A man in the middle
Looking for exampels of BEC attacks or information about how
Looking for exampels of BEC attacks or information about how