نتایج جستجو برای: network security

تعداد نتایج: 818903  

Abstract— In order to provide complete security in a computer system and to prevent intrusion, intrusion detection systems (IDS) are required to detect if an attacker crosses the firewall, antivirus, and other security devices. Data and options to deal with it. In this paper, we are trying to provide a model for combining types of attacks on public data using combined methods of genetic algorit...

In today's highly interconnected networks, security of the entities are often interdependent. This means security decisions of the agents are not only influenced by their own costs and constraints, but also are affected by their neighbors’ decisions. Game theory provides a rich set of tools to analyze such influence networks. In the game model, players try to maximize their utilities through se...

Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس 1381

زردآلو بعنوان یکی از مهمترین میوه های مناطق معتدله ، هزاران سال است که در دامنه کوه ها در آسیا و حداقل دو هزار سال دراروپا کشت و پرورش می یابد. ایران بعنوان یکی از خاستگاههای زردآلوهای وحشی و زراعی مطرح است. آینده زردآلو به عنوان یک عنصر اصلی در صنعت میوه کاری ایران بستگی کامل به اصلاح زردآلو و دستیابی به ارقام جدید دارد.از آنجائی که دسترسی محققان به ژرم پلاسم غنی زردآلوی بومی ایران که بطور کام...

Journal: :journal of advances in computer research 2014
amin sardeh moghadam behzad moshiri

service availability is important for any organization. this has become more important with the increase of dos attacks. it is therefore essential to assess the threat on service availability. we have proposed a new model for threat assessment on service availability with a data fusion approach. we have selected three more important criteria for evaluating the threat on service availability and...

Journal: :Information & Security: An International Journal 2000

Journal: : 2022

Objective. Network security systems are one of the key players in today's business life. Some networks private while others open to public. Whether your network is or public, it must be well secured and secure. In this article, we will discuss where begins, describe general measures taken secure it. Method. The study determined by need solve problem algorithmic mathematical support for assessin...

Journal: :Modern Applied Science 2010

Journal: :EURASIP Journal on Wireless Communications and Networking 2007

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید