Results 11 to 20 of about 29 (29)

An Ethical Study of Teaching Malware Writing, Hacking Skills and System Infiltration [PDF]

open access: yes, 2018
Nowadays, the number of courses teaching hacking skills is increasing and has encountered a very warm reception. In some countries, teaching hacking and writing malware has been considered as part of course credits for students of the fields of computer ...
Alī Rezā Ᾱlebūyeh Ᾱlebūyeh   +1 more
core   +1 more source

A Hybrid Machine Learning Approach and Genetic Algorithm for Malware Detection [PDF]

open access: yes
Detecting and preventing malware infections in systems is become a critical necessity. This paper presents a hybrid method for malware detection, utilizing data mining algorithms such as simulated annealing (SA), support vector machine (SVM), genetic ...
Mahdieh Maazalahi, Soodeh Hosseini
core   +1 more source

طرائق تعليم النحو في مأسسة المعهد الاسلامي دار الأبرار

open access: yesTarling : Journal of Language Education, 2018
اللغة العربية لها فنون منها فنّ النحو و فنّ الصرف و فنّ المعاني و فنّ البيان ثمّ فنّ البديع و غير ذلك. و الفنون متعالقات بعضهم ببعض. علم النحو علم الواضح. النحو يكون بحثا أولا قبل أن نتعلم بحثا أخرا.
openaire   +3 more sources

حصانة الدولة ضد الإجراءات التنÙيذية: دراسة مقارنة

open access: yesMalaysian Journal of Syariah and Law, 2019
لا شك أنَّ تنÙيذ الأحكام الأجنبية الصادرة ضد الأشخاص الخاصة يختل٠عن تنÙيذ الأحكام الصادرة ضد دول من الدول، إذ ليس من السهل إجبار دولة على الخضوع لأحكام دولة أخرى أو حتى التنÙيذ جبراً عليها ÙÙŠ Ù…Ø ...
Salim Farhood Enad Al-Janabi   +2 more
openaire   +1 more source

بهبود کارایی شبکه عصبی کانولووشنال با استفاده از تابع ضرر وزن‌دار افزایشی برای مقابله با نامتوازنی دسته‌ای [PDF]

open access: yesپدافند الکترونیکی و سایبری
باتوجه ‌به اینکه بیشتر مسائل دنیای واقعی از ﻗﺒﯿﻞ تشخیص تقلب، شناسایی خطا،  ﺗﺸﺨﯿﺺ ﻧﺎﻫﻨﺠﺎری، ﺗﺸﺨﯿﺺ ﭘﺰشکی و تشخیص بدافزار نامتوازن هستند، دسته­بندی داده­ﻫﺎ در مسائل ﻧﺎمتوازن ﺑﻪ ﻋﻨﻮان یکی از ﭼﺎﻟﺶ­ﻫﺎی اصلی در حوزة داده­ﮐﺎوی، ﻣﻮرد ﺗﻮﺟﻪ ﺑﺴﻴﺎری از ﻣﺤﻘﻘﺎن و ...
نسیبه محمودی   +3 more
doaj  

Conceptualizing Security with the Approach of Sustainability and Resilience of the Organization [PDF]

open access: yes
Objective: This research adopts an approach that conceptualizes security and develops a comprehensive security model using knowledge representation technologies.
Hamidzadeh, Mehrdad   +3 more
core  

Detection of DDoS Attacks in SDN Switches with Deep Learning and Swarm Intelligence Approach [PDF]

open access: yes
This paper introduces an efficient intrusion detection system for the Internet of Things, addressing the challenge of malware-infected IoT nodes acting as botnet attackers, along with issues in existing intrusion detection systems such as feature ...
Mohammadreza Mollkhalili Maybodi   +1 more
core   +1 more source

تحليل نصوص كتاب العصري في تعليم اللغة العربية للصف الثاني عشر بمدرسة المحمدية العالية

open access: yesEL-FUSHA: Jurnal Bahasa Arab dan Pendidikan
The study of Arabic textbooks is very important because the content contained in them can affect the learning process and students understanding. In analyzing Arabic textbooks, it is necessary to pay attention to the context of their use, learning objectives, and the compatibility between the material and the applicable curriculum. In addition, aspects
openaire   +1 more source

A Distributed Denial-of-Service (DDoS) Attack Detection Approach in Fog Layer Based on Distributed Blockchain Database and Machine Learning [PDF]

open access: yes
DDoS attacks make network services unavailable to users by sending fake traffic by botnets. One of the methods to deal with DDoS attacks is to use machine learning, but these methods face challenges such as high volume of IoT traffic and data imbalance ...
Mohammadreza Mollahoseini Ardakani   +1 more
core   +1 more source

Home - About - Disclaimer - Privacy