Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Ali Ordi"'
Publikováno v:
Mathematical Problems in Engineering, Vol 2015 (2015)
Despite the popularity of 802.11 based networks, they suffer several types of DoS attack, launched by an attacker whose aim is to make an access point (AP) unavailable to legitimate users. One of the most common DoS attacks on 802.11 based networks i
Autor:
Mohammad Reza Najaf Torkaman, Ali Ordi, Mohammad Reza Abbasy, Hamid Mousavi, Bharanidharan Shanmugam
Publikováno v:
Communications in Computer and Information Science ISBN: 9783642219832
DICTAP (1)
DICTAP (1)
One of the most common types of denial of service attack on 802.11 based networks is resource depletion at AP side. APs meet such a problem through receiving flood probe or authentication requests which are forwarded by attackers whose aim are to mak
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ec55c5f24a497675c5e68d2de8f8b004
https://doi.org/10.1007/978-3-642-21984-9_43
https://doi.org/10.1007/978-3-642-21984-9_43
Autor:
Farid Habibi Tanha, Nader Ale Ebrahim, Mahmoud Danaee, Mohamed Amin Embi, Hossein Gholizadeh, Hadi Salehi, Noor Azuan Abu Osman, Ali Ordi
Publikováno v:
BASE-Bielefeld Academic Search Engine
Measuring the number of papers which are published each year, publication productivity is the factor which shows the reputation of universities and countries. However, the effect of growing economy and using internet on the publication productivity i
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ded6a011b0f669863a94b4b257fdaa2c
https://doaj.org/article/d964d6531c134a35a845ed8dc92148fd
https://doaj.org/article/d964d6531c134a35a845ed8dc92148fd
Autor:
Seyed Mohammad Motahar, Hadi Salehi, Mohamed Amin Embi, Ali Ordi, Nader Ale Ebrahim, Farid Habibi Tanha, Hossein Gholizadeh
Publikováno v:
BASE-Bielefeld Academic Search Engine
Due to the effect of citation impact on The Higher Education (THE) world university ranking system, most of the researchers are looking for some helpful techniques to increase their citation record. This paper by reviewing the relevant articles extra
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ee386cedf92a5ad3ffb0783878850f33
https://doaj.org/article/c32536a291624c44b29c83a8ba5b6a2e
https://doaj.org/article/c32536a291624c44b29c83a8ba5b6a2e
Autor:
Fagan, Jody Condit1 faganjc@jmu.edu, Willey, Malia2
Publikováno v:
College & Undergraduate Libraries. Apr2018, Vol. 25 Issue 2, p164-186. 23p. 5 Charts.
Autor:
Menaka. K., Sundaravalli. V.
Publikováno v:
International Journal of Advanced Research in Computer Science; Nov/Dec2017, Vol. 8 Issue 9, p482-485, 4p
Autor:
Das, Prasenjit, Kar, Nirmalya
Publikováno v:
2014 International Conference on Green Computing Communication & Electrical Engineering (ICGCCEE); 2014, p1-5, 5p
Publikováno v:
Revista ANACEM. 2016, Vol. 10 Issue 2, p1-2. 2p.
Autor:
Wilkinson, John
Publikováno v:
Money Management. 12/8/2005, Vol. 19 Issue 46, p14-18. 2p.
Cyber security has become a topic of concern over the past decade as private industry, public administration, commerce, and communication have gained a greater online presence. As many individual and organizational activities continue to evolve in th