Search Results/Filters    

Filters

Year

Banks




Expert Group











Full-Text


Issue Info: 
  • Year: 

    2022
  • Volume: 

    52
  • Issue: 

    3
  • Pages: 

    195-204
Measures: 
  • Citations: 

    0
  • Views: 

    248
  • Downloads: 

    83
Abstract: 

Distributed Denial of Service (DDoS) attacks are among the primary concerns in internet SECURITY today. Machine learning can be exploited to detect such attacks. In this paper, a multi-layer perceptron model is proposed and implemented using deep machine learning to distinguish between malicious and normal traffic based on their behavioral patterns. The proposed model is trained and tested using the CICDDoS2019 dataset. To remove irrelevant and redundant data from the dataset and increase learning accuracy, feature selection is used to select and extract the most effective features that allow us to detect these attacks. Moreover, we use the grid search algorithm to acquire optimum values of the model’s hyperparameters among the parameters’ space. In addition, the sensitivity of accuracy of the model to variations of an input parameter is analyzed. Finally, the effectiveness of the presented model is validated in comparison with some state-of-the-art works.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 248

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 83 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2023
  • Volume: 

    2
  • Issue: 

    3 (پیاپی 5)
  • Pages: 

    51-61
Measures: 
  • Citations: 

    0
  • Views: 

    185
  • Downloads: 

    26
Abstract: 

Purpose: Food SECURITY is a critical global challenge that is influenced by research and innovation in the field. Therefore, the objective of this study is to analyze the scientific output of developing countries in food SECURITY and examine its relationship with patents and Gross Domestic Product (GDP).Methodology: This applied research utilized the Scientometric approach. A total of 8,416 papers published between 1992-2023 in the field of food SECURITY by developing countries were included in the study using citation databases from Clarivate Analytics. Additionally, patent registrations from the WIPO database and GDP data from the World Bank were analyzed. Information was collected through note-taking, and the data was analyzed using Pearson's correlation coefficient.Findings: The findings reveal an upward trend in the publication and citation of scientific outputs related to food SECURITY in developing countries. China has higher numbers of papers, patents, GDP, and food production index compared to Iran, Japan, and South Korea. There is also a positive correlation observed between population and the number of papers, gross production and the number of papers, food production and the number of published papers, as well as the number of patents and papers citing scientific outputs of countries.Conclusion: These results highlight the significant relationship between increasing scientific output, GDP, the number of patents, and food SECURITY. Greater emphasis on food SECURITY contributes to enhanced scientific output, GDP, and innovation. Similarly, increasing scientific output, GDP, and innovation positively impact food SECURITY in countries.Value: This study emphasizes the importance of scientific outputs in driving technological advancements, innovations, and ultimately, ensuring food SECURITY in developing countries.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 185

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 26 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Writer: 

Issue Info: 
  • End Date: 

    اسفند 1387
Measures: 
  • Citations: 

    12
  • Views: 

    241
  • Downloads: 

    0
Keywords: 
Abstract: 

-قابلیت گسترش و تغییر (Change & Scaleability -کارایی (Performance) -برگشت پذیری و افزونگی (Resilience & Redundancy) -مدیریت پذیری شبکه (NETWORK & manageability) -امنیت و خروج از بحران (SECURITY & Disaster Recovery) -هزینه متناسب (Effective Cost) -قابلیت سازگاری (Adaptability)

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 241

Issue Info: 
  • Year: 

    2020
  • Volume: 

    14
  • Issue: 

    4 (56)
  • Pages: 

    53-78
Measures: 
  • Citations: 

    0
  • Views: 

    1503
  • Downloads: 

    0
Abstract: 

Background and aim: Virtual social NETWORKs, especially the telegram messenger NETWORK, have essential functions in the transition society and have been directly linked to SECURITY and ethical issues in societies. The purpose of this study is to determine the effect of telegram messenger NETWORK on ethical SECURITY in Tehran. Research methodology: This study is a survey research using a researcher-made questionnaire tool to collect data. The statistical population of the study consistes of all users of telegram messenger NETWORK in Tehran. Data analysis was done using SPSS software and statistical tests. Findings: Findings indicate that the provision or threat of moral SECURITY is the result of the components of social behavior changes such as privacy violations (abuse of private information) and the spreading of false rumors and produced content (textual, audio, visual) about individuals and social and ethical issues. Targeted use of the telegram and ease of access to this messenger NETWORK are other influential variables. Conclusion: The results of this study shows that policy making and strategic planning (proactive and opportunistic measures) for targeted use and content guidance as well as legal and formal oversight and control levers, including filtering of some of the offending channels by responsible organizations (counter and counter measures), seems essential in order to maintain and preserve moral SECURITY.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1503

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Writer: 

Issue Info: 
  • End Date: 

    1395
Measures: 
  • Citations: 

    1
  • Views: 

    236
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 236

Issue Info: 
  • Year: 

    2016
  • Volume: 

    6
Measures: 
  • Views: 

    136
  • Downloads: 

    65
Abstract: 

COMPUTER NETWORKS CONSIST OF SEVERAL ASSETS SUCH AS HARDWARE, SOFTWARE, AND DATA SOURCES. THESE ASSETS HAVE OFTEN SOME VULNERABILITIES WHICH CAN BE EXPLOITED BY ATTACKERS THAT VIOLATE SECURITY POLICIES IN THE NETWORK. CONSIDERING THE LIMITED BUDGET, THE NETWORK ADMINISTRATOR SHOULD ANALYZE AND PRIORITIZE THESE VULNERABILITIES TO BE ABLE TO EFFICIENTLY PROTECT A NETWORK BY MITIGATING THE MOST RISKY ONES. SO FAR, SEVERAL SECURITY PARAMETERS ARE OFFERED TO ANALYZE SECURITY RISKS FROM THE NETWORK SECURITY ADMINISTRATOR’S PERSPECTIVE. THE MAJOR DRAWBACK OF THESE METHODS IS THAT THEY DO NOT CONSIDER ATTACKER’S MOTIVATION.DEPENDING ON THE MOTIVATION OF POTENTIAL ATTACKERS, DIFFERENT ATTACK PATH MAY BE SELECTED FOR NETWORK SECURITY COMPROMISE. SO, ATTACKER’S MOTIVATION IS A KEY FACTOR IN PREDICTING THE ATTACKER’S BEHAVIOR. IN THIS PAPER, THE ATTACKER’S MOTIVATION IS CONSIDERED IN THE PROCESS OF SECURITY RISK ANALYSIS, SO NETWORK ADMINISTRATORS ARE ABLE TO ANALYZE SECURITY RISKS MORE ACCURATELY. THE PROPOSED METHOD IS APPLIED ON A NETWORK AND THE RESULTS ARE COMPARED WITH NOVEL WORKS IN THIS AREA. THE EXPERIMENTAL RESULTS SHOW THAT NETWORK ADMINISTRATOR WILL BE ABLE TO PRECISELY PREDICT THE BEHAVIOR OF ATTACKERS AND APPLY COUNTERMEASURES MORE EFFICIENTLY.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 136

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 65
Author(s): 

YI N. | QI LUN Z. | HONG P.

Issue Info: 
  • Year: 

    2006
  • Volume: 

    -
  • Issue: 

    7
  • Pages: 

    0-0
Measures: 
  • Citations: 

    1
  • Views: 

    146
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 146

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

JADID SH. | KHAZAEI MOHAMMAD

Issue Info: 
  • Year: 

    2004
  • Volume: 

    15
  • Issue: 

    3
  • Pages: 

    253-265
Measures: 
  • Citations: 

    0
  • Views: 

    778
  • Downloads: 

    0
Keywords: 
Abstract: 

This paper presents a novel method to combine neural NETWORK and Ward equivalent external NETWORK modeling to achieve advantages of both methods for on-line voltage SECURITY assessment. The demonstrated method includes simplicity of Ward equivalent model and due to application of neural NETWORK techniques it is very fast and accurate. In this method ANN is used to obtain boundary buses power injections. The developed method in applied to IEEE 30 bus test system and results highlighted the anticipated speed and accuracy.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 778

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2022
  • Volume: 

    8
  • Issue: 

    3
  • Pages: 

    111-135
Measures: 
  • Citations: 

    0
  • Views: 

    72
  • Downloads: 

    21
Abstract: 

The proposed models to assess the SECURITY risks of bridges are generally designed based on the product of three-factor: probability (O), vulnerability (V), and importance (I). In this paper, the importance of bridge (I) and its changes due to the uncertainty of NETWORK topology during future NETWORK development programs were discussed. To measure and compare the relative importance of bridges, two groups of unique importance and the NETWORK-based importance of bridges were considered. Given that the NETWORK-based characteristics of bridges change during NETWORK development, a numerical example was presented to compare different decision-making approaches in selecting bridges (with and without considering the changes in the importance of bridge NETWORKs due to NETWORK changes). In this example, the Ahwaz inter-city transportation NETWORK was examined. The results showed that some bridges, such as B3, which were not important in the initial, became important during the development process. In contrast, in some bridges, such as B5, the relative importance was high at first, but during the development process, their relative importance decreased. It was also observed that a number of bridges such as B1, B6, and B7 are always important. In contrast, bridges such as B4 are always considered insignificant and NETWORK changes do not place them among the important bridges in any period.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 72

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 21 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2024
  • Volume: 

    12
  • Issue: 

    1
  • Pages: 

    37-55
Measures: 
  • Citations: 

    0
  • Views: 

    20
  • Downloads: 

    4
Abstract: 

IoT devices has witnessed a substantial increase due to the growing demand for smart devices. Intrusion Detection Systems (IDS) are critical components for safeguarding IoT NETWORKs against cyber threats. This study presents an advanced approach to IoT NETWORK intrusion detection, leveraging deep learning techniques and pristine data. We utilize the publicly available CICIDS2017 dataset, which enables comprehensive training and testing of intrusion detection models across various attack scenarios, such as Distributed Denial of Service (DDoS) attacks, port scans, botnet activity, and more. Our goal is to provide a more effective method than the previous methods. Our proposed deep learning model incorporates dense transition layers and LSTM architecture, designed to capture both spatial and temporal dependencies within the data. We employed rigorous evaluation metrics, including sparse categorical cross-entropy loss and accuracy, to assess model performance. The results of our approach show outstanding accuracy, reaching a peak of 0.997 on the test data. Our model demonstrates stability in loss and accuracy metrics, ensuring reliable intrusion detection capabilities. Comparative analysis with other machine learning models confirms the effectiveness of our approach. Moreover, our study assesses the model's resilience to Gaussian noise, revealing its capacity to maintain accuracy in challenging conditions. We provide detailed performance metrics for various attack types, offering insights into the model's effectiveness across diverse threat scenarios.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 20

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 4 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
litScript
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button