Search

Your search keyword '"Ghorbani, Ali"' showing total 43 results

Search Constraints

Start Over You searched for: Author "Ghorbani, Ali" Remove constraint Author: "Ghorbani, Ali" Publication Type Magazines Remove constraint Publication Type: Magazines
43 results on '"Ghorbani, Ali"'

Search Results

1. CapsRule: Explainable Deep Learning for Classifying Network Attacks

2. Parent process termination: an adversarial technique for persistent malware

3. Evaluation Framework for Electric Vehicle Security Risk Assessment

4. Traitement chirurgical des tendinopathies corporéales du tendon calcanéen: étude comparative des approches endoscopique et à ciel ouvert*

5. Towards privacy-preserving split learning: Destabilizing adversarial inference and reconstruction attacks in the cloud

6. An incremental frequent structure mining framework for real-time alert correlation

7. SVision: A novel visual network-anomaly identification technique

8. CICIoMT2024: A benchmark dataset for multi-protocol security assessment in IoMT

10. Preventing proof-of-work mining attacks.

11. Memory forensics tools: a comparative analysis

12. Improved fault analysis on SIMECK ciphers

13. Data breach: analysis, countermeasures and challenges

14. An entity matching-based image topic verification framework for online fact-checking

15. A Deep Learning Approach to Network Intrusion Detection Using a Proposed Supervised Sparse Auto-encoder and SVM

16. CICIoV2024: Advancing realistic IDS approaches against DoS and spoofing attack in IoV CAN bus

17. Résultats cliniques et fonctionnels d’une série de 405 ruptures du tendon calcanéen revus au recul minimum d’un an

18. Application of Artificial Intelligence to State-of-Charge and State-of-Health Estimation of Calendar-Aged Lithium-Ion Pouch Cells

19. The relationship between serum zinc levels and rheumatoid arthritis activity

20. Prediction of UCS and CBR of microsilica-lime stabilized sulfate silty sand using ANN and EPR models; application to the deep soil mixing

21. IoT Zigbee device security: A comprehensive review

22. Security issues in Internet of Vehicles (IoV): A comprehensive survey

23. Internet of Things (IoT) security dataset evolution: Challenges and future directions

24. Morphological and Electrochemical Characterization of Nanostructured Li4Ti5O12 Electrodes Using Multiple Imaging Mode Synchrotron X-ray Computed Tomography

25. Percutaneous Ankle Reconstruction of Lateral Ligaments (Perc-Anti RoLL)

26. Application-layer denial of service attacks: taxonomy and survey

27. A mathematical exploitation of simulated uniform scanning botnet propagation dynamics for early stage detection and management

28. Monotonic triaxial experiments to evaluate steady-state and liquefaction susceptibility of Babolsar sand

29. Development of a constitutive model for rockfills and similar granular materials based on the disturbed state concept

31. Alert correlation using artificial immune recognition system

32. Research on New Botnet Detection Strategy Based on Information Materials

33. Desired State of Entrepreneurial IT Organizations: An Analysis Based on Iran’s SMEs

34. SWAMI: A Multiagent, Active Representation of a User's Browsing Interests

35. The state of the art in critical infrastructure protection: a framework for convergence

36. An agent-based service-oriented simulation suite for critical infrastructure behaviour analysis

37. The ACORN multi-agent system

40. A memory-based game-theoretic defensive approach for digital forensic investigators

41. Site response analysis in cross-anisotropic alluvial deposits subjected to inclined incident SH wave

42. Lack of Efficacy of Topical Calcineurin Inhibitor Pimecrolimus 1% on Pruritus of Severely Uremic Patients: A Randomized Double-Blind Study in 60 Patients.

Catalog

Books, media, physical & digital resources