iTrans.ir
سفارش ترجمه
خانه
راهنما
چگونه سفارش ترجمه دهیم
تماس با ما
ترجمه فوری
راهنمای استفاده از سایت
API
بیشتر...
پرسش و پاسخ
قیمت ترجمه
ثبت نام
ورود
021-66989400
021-66989500
0935-173-0404
نشانی و اطلاعات تماس
تگ malicious
جزئیات خدمات ترجمه در ترجمه تخصصی
security
Anyone who is responsible for a private network that is
Two Vulnerabilities in Android OS Kernel
Two Vulnerabilities in Android OS Kernel
A Look at Targeted Attacks Through the Lense
Identifying Suspicious URLs: An Application of Large-Scale Online Learning
2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
IJCSNS International Journal of Computer Science and Network Security, VOL.12 No.5, May 2012 21
Toward Comprehensive Traffic Generation
DNS rebinding
DNS rebinding
Semester Thesis
Semester Thesis
1 Introduction In the previous chapter we presented the architecture
4 Sequential Consultation In this experiment we study the number
a b s t r a c t Kernel queue
a b s t r a c t Kernel queue
The requirement for advanced security equipment to scan data streams for
Computer Communications 56 (2015) 60–73
computers & security 49 (2015) 132e146
Computer Networks 72 (2014) 45–61
Journal of Network and Computer Applications 33 (2010) 661–671
Computer Networks 72 (2014) 45–61
ICAST 2008
ICAST 2008
Applied Soft Computing 38 (2016) 469–476
AnalyzingInter-ApplicationCommunicationinAndroid
AnalyzingInter-ApplicationCommunicationinAndroid
AnalyzingInter-ApplicationCommunicationinAndroid
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
A malicious node can perform packetdropping by itself or by
Available online at www.sciencedirect.com
Imprint logo
virtualization has gained a huge slice in the server deployment
hypervisor escapes are possibly the most frightening security issues related
We propose to monitor malicious activity on OSNs through the
2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications;
Detecting redirection spam using multilayer perceptron neuralnetworkAbstract Quality
this ransomware targets the Pokemon Go application for Windows and
is a common attack vector that uses malicious SQL code
These threats relate to elements of the Core Network thatincludes
Audittools are used by MNOs to monitor the activity of
Thisthreatrelatestocellularpagingprotocolsthatcanbeexploitedbya malicious actor in the vicinity of a victim to
the attacker sends a decryption key to restore access to
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TNSM.2020.3046906, IEEE
The rise of phishing attacks poses a significant threat to
AcceptedManuscript