نتایج جستجو برای: botnet life cycle

تعداد نتایج: 976603  

Journal: :Future Generation Computer Systems 2021

Botnets are causing severe damages to users, companies, and governments through information theft, abuse of online services, DDoS attacks, etc. Although significant research is being made detect them mitigate their effect, they exponentially increasing due new zero-day a variation behavior, obfuscation techniques. High Interaction Honeypots (HIH) the only honeypots able capture attacks log all ...

Krishnamoorthi,

  A product life cycle is the life span of a product in which the period begins with the initial product specification and ends with the withdrawal from the market of both the product and its support. A product life cycle can be divided into several stages characterized by the revenue generated by the product. This study investigates inventory control policies in a manufacturing system for a si...

Journal: :Mathematical statistics and learning 2021

We formalize the problem of detecting presence a botnet in network as hypothesis testing where we observe single instance graph. The null hypothesis, corresponding to absence botnet, is modeled random geometric graph every vertex assigned location on $d$-dimensional torus and two vertices are connected when their distance smaller than certain threshold. alternative similar, except that there sm...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تهران 1380

در این پایان نامه خصوصیات کلی شبیه سازی cycle-based معرفی شده و نحوه انجام شبیه سازی cycle-based در سطح گیت و سطح انتقال ثبات مورد بررسی موشکافانه قرار گرفته است . در این پایان نامه همچنین محدودیتهای شبیه سازی cycle-based معرفی شده و راه حلهایی برای این مشکلات ارائه شده است . به موازات این پایان نامه و برای اثبات صحت نظریه های مطرح شده و راه حلهای ارائه شده در آن، یک شبیه ساز cycle-based برای ز...

Journal: :Academic Medicine 1971

Journal: :Expert Systems With Applications 2023

This paper introduces a novel bio-inspired meta-heuristic optimization algorithm, named termite life cycle optimizer (TLCO), which is based both on the of colony and modulation movement strategies used by many animal species in nature. Termite colonies are comprised three distinct castes: workers, soldiers reproductive termites. Each caste undertakes set specific tasks that ensure growth surviv...

Journal: :Applied sciences 2023

The digitization trend that prevails nowadays has led to increased vulnerabilities of tools and technologies everyday life. One the many different types software attacks is botnets. Botnets enable attackers gain remote control infected machines, often leading disastrous consequences. Cybersecurity experts engage machine learning (ML) deep (DL) for designing developing smart proactive cybersecur...

Since difererent aspects of corporate governance could result in considerable impacts on corporate performance, leaving remarkable changes behind, along the corporate life cycle, this article embarks on a research to analyze the impact of ownership stracture on financial performance, taking the life cycle of the corporations in mind. Accordingly, four factors, namely "ownership concentrati...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید