نتایج جستجو برای: network security
تعداد نتایج: 818903 فیلتر نتایج به سال:
Abstract— In order to provide complete security in a computer system and to prevent intrusion, intrusion detection systems (IDS) are required to detect if an attacker crosses the firewall, antivirus, and other security devices. Data and options to deal with it. In this paper, we are trying to provide a model for combining types of attacks on public data using combined methods of genetic algorit...
In today's highly interconnected networks, security of the entities are often interdependent. This means security decisions of the agents are not only influenced by their own costs and constraints, but also are affected by their neighbors’ decisions. Game theory provides a rich set of tools to analyze such influence networks. In the game model, players try to maximize their utilities through se...
Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...
چکیده ندارد.
زردآلو بعنوان یکی از مهمترین میوه های مناطق معتدله ، هزاران سال است که در دامنه کوه ها در آسیا و حداقل دو هزار سال دراروپا کشت و پرورش می یابد. ایران بعنوان یکی از خاستگاههای زردآلوهای وحشی و زراعی مطرح است. آینده زردآلو به عنوان یک عنصر اصلی در صنعت میوه کاری ایران بستگی کامل به اصلاح زردآلو و دستیابی به ارقام جدید دارد.از آنجائی که دسترسی محققان به ژرم پلاسم غنی زردآلوی بومی ایران که بطور کام...
service availability is important for any organization. this has become more important with the increase of dos attacks. it is therefore essential to assess the threat on service availability. we have proposed a new model for threat assessment on service availability with a data fusion approach. we have selected three more important criteria for evaluating the threat on service availability and...
Objective. Network security systems are one of the key players in today's business life. Some networks private while others open to public. Whether your network is or public, it must be well secured and secure. In this article, we will discuss where begins, describe general measures taken secure it. Method. The study determined by need solve problem algorithmic mathematical support for assessin...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید