An Ethical Study of Teaching Malware Writing, Hacking Skills and System Infiltration [PDF]
Nowadays, the number of courses teaching hacking skills is increasing and has encountered a very warm reception. In some countries, teaching hacking and writing malware has been considered as part of course credits for students of the fields of computer ...
Alī Rezā Ᾱlebūyeh Ᾱlebūyeh +1 more
core +1 more source
A Hybrid Machine Learning Approach and Genetic Algorithm for Malware Detection [PDF]
Detecting and preventing malware infections in systems is become a critical necessity. This paper presents a hybrid method for malware detection, utilizing data mining algorithms such as simulated annealing (SA), support vector machine (SVM), genetic ...
Mahdieh Maazalahi, Soodeh Hosseini
core +1 more source
طرائق تعليم النØÙˆ ÙÙŠ مأسسة المعهد الاسلامي دار الأبرار
اللغة العربية لها Ùنون منها Ùنّ النØÙˆ Ùˆ Ùنّ الصر٠و Ùنّ المعاني Ùˆ Ùنّ البيان ثمّ Ùنّ البديع Ùˆ غير ذلك. Ùˆ الÙنون متعالقات بعضهم ببعض. علم النØÙˆ علم الواضØ. النØÙˆ يكون Ø¨ØØ«Ø§ أولا قبل أن نتعلم Ø¨ØØ«Ø§ أخرا.
openaire +3 more sources
ØØµØ§Ù†Ø© الدولة ضد الإجراءات التنÙيذية: دراسة مقارنة
لا شك أنَّ تنÙيذ الأØÙƒØ§Ù… الأجنبية الصادرة ضد الأشخاص الخاصة يختل٠عن تنÙيذ الأØÙƒØ§Ù… الصادرة ضد دول من الدول، إذ ليس من السهل إجبار دولة على الخضوع لأØÙƒØ§Ù… دولة أخرى أو ØØªÙ‰ التنÙيذ جبراً عليها ÙÙŠ Ù…Ø ...
Salim Farhood Enad Al-Janabi +2 more
openaire +1 more source
بهبود کارایی شبکه عصبی کانولووشنال با استفاده از تابع ضرر وزندار افزایشی برای مقابله با نامتوازنی دستهای [PDF]
باتوجه به اینکه بیشتر مسائل دنیای واقعی از ﻗﺒﯿﻞ تشخیص تقلب، شناسایی خطا، ﺗﺸﺨﯿﺺ ﻧﺎﻫﻨﺠﺎری، ﺗﺸﺨﯿﺺ ﭘﺰشکی و تشخیص بدافزار نامتوازن هستند، دستهبندی دادهﻫﺎ در مسائل ﻧﺎمتوازن ﺑﻪ ﻋﻨﻮان یکی از ﭼﺎﻟﺶﻫﺎی اصلی در حوزة دادهﮐﺎوی، ﻣﻮرد ﺗﻮﺟﻪ ﺑﺴﻴﺎری از ﻣﺤﻘﻘﺎن و ...
نسیبه محمودی +3 more
doaj
Conceptualizing Security with the Approach of Sustainability and Resilience of the Organization [PDF]
Objective: This research adopts an approach that conceptualizes security and develops a comprehensive security model using knowledge representation technologies.
Hamidzadeh, Mehrdad +3 more
core
Detection of DDoS Attacks in SDN Switches with Deep Learning and Swarm Intelligence Approach [PDF]
This paper introduces an efficient intrusion detection system for the Internet of Things, addressing the challenge of malware-infected IoT nodes acting as botnet attackers, along with issues in existing intrusion detection systems such as feature ...
Mohammadreza Mollkhalili Maybodi +1 more
core +1 more source
The study of Arabic textbooks is very important because the content contained in them can affect the learning process and students understanding. In analyzing Arabic textbooks, it is necessary to pay attention to the context of their use, learning objectives, and the compatibility between the material and the applicable curriculum. In addition, aspects
openaire +1 more source
A Distributed Denial-of-Service (DDoS) Attack Detection Approach in Fog Layer Based on Distributed Blockchain Database and Machine Learning [PDF]
DDoS attacks make network services unavailable to users by sending fake traffic by botnets. One of the methods to deal with DDoS attacks is to use machine learning, but these methods face challenges such as high volume of IoT traffic and data imbalance ...
Mohammadreza Mollahoseini Ardakani +1 more
core +1 more source
بناها وآبدات تاریخی شمال Ø§ÙØºØ§Ù†Ø³ØªØ§Ù† / نویسنده Ø¹Ø¨Ø¯Ø§Ù„ØºÙØ§Ø± ØµÙØ§ Ø› مهتمم وکمپوزر Ù…ØÙ…د ظاهر بابری [PDF]
openaire +1 more source

