Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Journal Issue Information

Archive

Year

Volume(Issue)

Issues

Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Journal: 

C4I JOURNAL

Issue Info: 
  • Year: 

    2021
  • Volume: 

    4
  • Issue: 

    4
  • Pages: 

    0-0
Measures: 
  • Citations: 

    0
  • Views: 

    76
  • Downloads: 

    0
Abstract: 

Despite all the efforts of security experts to detect SQL injection attacks, according to OWASP report’ s, SQL injection attack is still used as the most important cyber attack by attackers. In order to detect attacks, two methods are used: signature-based and behavior-based. Signature-based methods are used for known attacks, and behavior-based methods are suitable for detecting unknown attacks. Behavior-based intrusion detection systems are more useful because attacks are implemented in different ways. Behavior can be analyzed by methods such as classification, clustering, etc. One of the most important classification algorithms is the random forest algorithm which has high accuracy and on the other hand the implementation and interpretation of the results can be done easily using this algorithm. According to the studies, the accuracy of the random forest algorithm is highly dependent on its input parameters. These parameters include 9 items, including the number of trees, their depth, voting method, information gain, and so on. Optimal determination of these parameters is an optimization problem with large state space. In this research, a method based on genetic algorithm to determine the optimal values of these parameters is presented. Due to the optimal determination of the parameters, the obtained results show an improvement in the detection accuracy compared to the default state of the algorithm and other researches. The evaluation results indicate that the intrusion detection accuracy in the proposed method was %98, which is about %11 higher than the random forest algorithm with default parameters and %08 higher than previous studies.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 76

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    1399
  • Volume: 

    4
  • Issue: 

    4
  • Pages: 

    0-0
Measures: 
  • Citations: 

    0
  • Views: 

    142
  • Downloads: 

    0
Abstract: 

علی رغم تمام تلاش متخصصان امنیتی برای کشف حملات تزریق SQL، اما بر اساس گزارش OWASP، کماکان حمله تزریق SQL به عنوان مهم ترین و زیان بارترین حمله سایبری توسط مهاجمین مورد استفاده قرار می گیرد. به منظور تشخیص حملات از دو روش مبتنی بر امضاء و مبتنی بر رفتار استفاده می شود. روش های مبتنی بر امضاء برای حملات شناخته شده کاربرد دارند و روش های مبتنی بر رفتار برای تشخیص حملات ناشناخته مناسب هستند. از آنجایی که حملات به روش های مختلفی پیاده-سازی می شوند سیستم های تشخیص نفوذ مبتنی بر رفتار، کاربرد بیشتری دارند. رفتار را می توان با استفاده از روش هایی مانند طبقه بندی، خوشه بندی و غیره تحلیل کرد. یکی از مهم ترین الگوریتم های طبقه بندی، الگوریتم جنگل تصادفی است که دقت بالایی دارد و از طرفی پیاده سازی و تفسیر نتایج با استفاده از این الگوریتم به سادگی قابل انجام است. با توجه به بررسی های انجام شده دقت الگوریتم جنگل تصادفی به شدت وابسته به پارامترهای ورودی آن است. این پارامترها شامل 9 مورد ازجمله تعداد درخت ها، عمق آن ها، نحوه رأی گیری، بهره اطلاعاتی و غیره است. تعیین بهینه این پارامترها یک مسئله بهینه سازی با فضای حالت بزرگ است. در این پژوهش روشی بر اساس الگوریتم ژنتیک برای تعیین مقادیر بهینه این پارامترها ارائه شده است. در اثر تعیین بهینه پارامترها، نتایج به دست آمده در مقایسه با حالت پیش فرض الگوریتم و سایر تحقیقات، بهبود دقتِ تشخیص را نشان می دهد. نتایج ارزیابی حاکی از آن است که دقت تشخیص نفوذ در روش پیشنهادی، 98% بوده است که در مقایسه با الگوریتم جنگل تصادفی با پارامترهای پیش فرض حدوداً 11% و در مقایسه با پژوهش های قبلی 08% دقتِ تشخیص، افزایش یافته است.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 142

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

Taslimikar Behrooz

Journal: 

C4I JOURNAL

Issue Info: 
  • Year: 

    2021
  • Volume: 

    4
  • Issue: 

    4
  • Pages: 

    1-20
Measures: 
  • Citations: 

    0
  • Views: 

    402
  • Downloads: 

    0
Abstract: 

The importance of command and control systems as one of the requirements of military forces in achieving success and achieving goals is not at present understood. This importance is growing day by day with the rapid changes in the environment that have led us to face anarchic and non-linear environments along with a wealth of information, as well as the rapid growth of technology and technology. Plan to improve the performance of command and control systems in a timely manner over short periods of time. So that the largest armies and the most powerful nations are no exception. This is an applied-developmental case study and a descriptive case study with mixed (qualitative / quantitative) approach. At first, the characteristics of the future war environments (37 attributes) were extracted from the study of resources and after receiving expert approval, To determine the features that are effective in improving the command and control system, consider the sample size received (28 approved) and then re-submit the results to the expert community to obtain the specifications of the command and control systems. Was done. Finally, the annotated profile of the expert community was judged by the sample size and presented and prioritized in 44 attributes.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 402

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

Fazeli Mehran | Dousti Motlagh Seyed Nasibollah

Journal: 

C4I JOURNAL

Issue Info: 
  • Year: 

    2021
  • Volume: 

    4
  • Issue: 

    4
  • Pages: 

    21-43
Measures: 
  • Citations: 

    0
  • Views: 

    437
  • Downloads: 

    0
Abstract: 

Quantum computers evolution and the enormous effect of their computation speed is one of the main topics of every scientific gathering today. This massive computation power of theirs will enable them to solve some problems which are unfeasible to solve, even with the use of the strongest classic super computers available today. Cryptographies, which we use for military and non-military applications today, are based on computational hardness of some problems like factorization of a big number or computing discrete log. Post quantum cryptography will be the only solution left to protect our data in the era of converting to quantum world, as they are believed to be resistant to both classical and quantum attacks and also can be exploited without needing quantum infrastructures. By introducing and studying post quantum cryptographies in this work, we tried to propose necessary strategies to employ post quantum cryptographies in I. R. I including armed forces. For this purpose, after reviewing classical cryptographies, we would introduce post quantum cryptographies and we would present the reasons to exploit post quantum cryptographies. After that we would use SWOT method and elite experts of quantum technologies and information security’ s opinion through step-by-step questionnaires, to perform gap analysis and propose strategies to utilize post quantum cryptography in all sectors and forces of Islamic Republic of Iran. Outputs of this research show that I. R. I is on WT sector for post quantum cryptography deployment and proper strategies to encounter the related threats and covering weaknesses of this sector can briefly be stated as: 1) Establishing a national center to specify and approve standard and accepted post quantum cryptographies. 2) Motivating Iranian post quantum experts and elite for collaboration and participation. 3) Fundraising and attracting governmental and private organizations on importance of this field. 4) Providing educational and information sharing infrastructure.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 437

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Journal: 

C4I JOURNAL

Issue Info: 
  • Year: 

    2021
  • Volume: 

    4
  • Issue: 

    4
  • Pages: 

    44-60
Measures: 
  • Citations: 

    0
  • Views: 

    182
  • Downloads: 

    0
Abstract: 

This Attention to human resources and its empowerment, which is the most valuable organizational capital, confirms the fact that human beings are considered as a decisive and effective partner in organizations, and the development of human resources leads to comprehensive and balanced development of the organization. . In this approach, the human resources unit is doubly important as a strategic partner of any organization. Despite the many criteria associated with a HR partner, there is no comprehensive process model that can step-by-step determine the steps to achieving a HR partner since anything that cannot be measured It can not be controlled, it will not be possible to manage it, so the main issue in all organizational analysis is performance, and in itself it requires measurement, so no organization can be imagined without a performance appraisal system. Therefore, the main issue is to design a model to measure the performance of the strategic partner of human resources with which to measure the human resources of the strategic partner of the organization, so the purpose of this article is to show how to measure the performance of the strategic partner of human resources. In the university, a mixed method includes Delphi technique, interpretive structural modeling and research action, to measure the performance of the strategic partner of human resources. To answer the research question, various applied techniques were first identified. These techniques were then combined with a quantitative and mathematical technique called interpretive structural modeling. The result of the initial modeling was the input of the action research process and this model was applied in practice in the organization and the phases of action, observation and reflection were performed. Then, the performance and desirability of the model were summarized using the agreement group technique.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 182

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Journal: 

C4I JOURNAL

Issue Info: 
  • Year: 

    2021
  • Volume: 

    4
  • Issue: 

    4
  • Pages: 

    61-82
Measures: 
  • Citations: 

    0
  • Views: 

    619
  • Downloads: 

    0
Abstract: 

The command and control warfare between hostile countries is a common type of battles. This warfare occurs during the real war surely. Its goal is to destruct the focus of the opposite sidechr(chr('39')39chr('39'))s commander. This issue possesses a high importance at the beginning of the war as it affects the analysis of the opposite side whether to start a war, or avoid it. One of the main questions of research is whether you can predict these feedbacks and decisions. The main goal of the article is to create a set of possible suggestions based on mutual decisions. It is obviously important to predict the behavior and to estimate the choices of the rival. In this article, we study modeling and analysis of the scenarios for hostile countries (blue and red) in the Command and control war, by non-cooperative game theory method – a very useful tool for qualitative and quantitative analysis of the partnerchr(chr('39')39chr('39'))s decisions-to predict the most likely outcomes. Recognizing the possible actions of the countries and their preferences over the feasible states make the results and equilibrium more accurate. The results of this study show that low cost actions, such as jamming the network of special link of command and control and disorder in the systems of navigation can reduce power of the competitorchr(chr('39')39chr('39'))s combat, and pave the way for the next tough actions.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 619

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Journal: 

C4I JOURNAL

Issue Info: 
  • Year: 

    2021
  • Volume: 

    4
  • Issue: 

    4
  • Pages: 

    83-102
Measures: 
  • Citations: 

    0
  • Views: 

    222
  • Downloads: 

    0
Abstract: 

Todays, Developments of Information Technology in techno-social domains is on the basis of pervasive cloud computing approach. Despite of uncountable benefits of this approach, challenges and complexities are added so that IT governance changed in some aspects. Therefore, cloud governance is a research trends in the world to develop the concepts of IG governance in cloud computing environment. in this research, with qualitative strategy, open-questionnaire and semi-constructed interview, changes and reconstructing topics for cloud governance framework planning are identified. Eighteen identified topics are classified in nine domain including: Direction, evaluation, monitoring, strategies, culture, structure, skills, process and technology. Finding of this research demonstrate that organizational culture domain with 4 topics, continuous monitoring and organizational structure, each one with one topic, respectively should experience most and least changes in cloud governance vs traditional IT governance.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 222

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Journal: 

C4I JOURNAL

Issue Info: 
  • Year: 

    2021
  • Volume: 

    4
  • Issue: 

    4
  • Pages: 

    104-115
Measures: 
  • Citations: 

    0
  • Views: 

    360
  • Downloads: 

    0
Abstract: 

Undoubtedly, one of the dimensions of the expansion and promotion of military ana defense organizations in the coming decades is the use of newcommunicatin technologies such as IOT technology. The main purpose of this study is to investigate the effect of the role of IOT technology in improving the readiness and support capabilities of s defense organization. in terms of the purpose of an applied research, the present study is a descriptive research in terms of nature and a cross-sectional research in terms of time. The statistical population of the study includes all commanders ana training officials of one the defense organizations based in tehran with an approximate number of 70 people. A questionnaire according to the six principles of military logistics was used to collect information. The validity of the questionnaires was confirmed based on the opinions of experts and their reliability was confirmed using Cronbach's alpha coefficient. Non-parametric tests (Binomial and Friedman) were used in data analysis due to abnormal data distribution. The results of the research hypotheses test show that despite the impact of IOT technology on the capabilities of readiness. efficiency, economy and responsiveness. in the field of IOT integration capabilities and initiative, it does not have a significant impact. in the end. in addition to presenting executive suggestions, some suggestions have also been presented to future researchers.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 360

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button