List of Articles تشخیص نفوذ Open Access Article Abstract Page Full-Text 1 - A Distributed Denial-of-Service (DDoS) Attack Detection Approach in Fog Layer Based on Distributed Blockchain Database and Machine Learning Mohsen Eghbali Mohammadreza Mollahoseini Ardakani 10.30495/jce.2023.1992146.1215 Open Access Article Abstract Page Full-Text 2 - Distributed Denial of Service Attacks Detection in Internet of Things Using the Majority Voting Approach Habibollah Mazarei Marziye Dadvar MohammadHadi Atabakzadeh 10.30495/jce.2023.1984927.1201 Open Access Article Abstract Page Full-Text 3 - improving intrusion detection systems by feature reducing based on genetics algorithm and data mining techniques Mehdi Keshavarzi hossein Momenzadeh Open Access Article Abstract Page Full-Text 4 - Presenting A Hybrid Method of Deep Neural Networks to Prevent Intrusion in Computer Networks Mohsen Roknaldini Erfaneh Noroozi 10.71856/impcs.2024.903465 Open Access Article Abstract Page Full-Text 5 - Providing a Solution Based on Fuzzy Logic to Reduce False Positive Alarms in The Intrusion Detection System Mohammad Akhlaghpour Open Access Article Abstract Page Full-Text 6 - An Effective and Lightweight Intrusion Detection for IoT based on Fog and Cloud using KNN Classification ali kaffash Seyed Reza Kamel Tabbakh Farizani Maryam Kheirabadi 10.71856/impcs.2024.903638 Open Access Article Abstract Page Full-Text 7 - مروری بر سیستمهای تشخیص نفوذ از دیدگاه ساختار و روشهای بهبود کارایی در آنها شهرزاد رحیمی مسعود نیازی سیدعابد حسینی Open Access Article Abstract Page Full-Text 8 - Improved Intrusion Detection System Based On Distributed Self-Adaptive Genetic Algorithm to Solve Support Vector Machine in Form of Multi Kernel Learning with Auto Encoder Elaheh Faghihnia Seyed Reza Kamel Tabakh Farizni Maryam Kheirabadi Open Access Article Abstract Page Full-Text 9 - Combined Intrusion Detection System to deal with Cyber- Attacks in Industrial Control Systems with a Dedicated Network Mohammad Safari Elham Parvinnia Alireza Keshavarz Haddad Open Access Article Abstract Page Full-Text 10 - Presenting a New Approach for Detecting Attacks on Voice over Internet Protocol Based on Ensemble Clustering Farid Bavifard Mohammad Kheyrandish Mohammad Mosleh 10.71666/jipet.2024.998705 Open Access Article Abstract Page Full-Text 11 - An optimal approach to detect anomalies in intrusion detection systems افسانه بنی طالبی Open Access Article Abstract Page Full-Text 12 - Metaheuristic Algorithms for Feature Selection in Intrusion Detection Systems: A Systematic Review yashar Pourardebil khah Mirsaeid Hosseini Shirvani Homayun Motameni 10.71856/impcs.2023.1123897 Open Access Article Abstract Page Full-Text 13 - A Novel Approach for Intrusion Detection System in IoT Using Correlation-Based Hybrid Feature Selection and Harris Hawk Optimization Algorithm yashar salami yaser ebazadeh Mehdi Hamrang Nooshin Allahbakhshi Open Access Article Abstract Page Full-Text 14 - Intrusion Detection Using Deep Learning in Wireless Body Area Networks Elham Hajian Navid Asadi 10.71856/impcs.2024.1195000