• About Us
  • Services
    • List of Authors
    • For Authors
    • Editor-in-Chief
    • For Editor-in-Chief
    • reviewer
    • For Reviewers
  • List of Journals
  • Order
  • Contact Us
  • Home
  • About Us
  • Contact Us
  • Register
  • Log in
  • Order
Advanced
  • Home
  • Intrusion
    • List of Articles Intrusion

      • Open Access Article
        • Abstract Page
        • Full-Text

        1 - An efficient energy-aware trust-based RPL protocol for Internet of Things
        Farzaneh Kaviani Mohammadreza Soltanaghaei Farsad Zamani Boroujeni
        https://doi.org/10.82553/josc.2024.14020803783415
      • Open Access Article
        • Abstract Page
        • Full-Text

        2 - EIDA: An Energy-Intrusion aware Data Aggregation Technique for Wireless Sensor Networks
        Nafiseh Daneshgar M. Habibi Najafi Mohsen Jahanshahi Ehsan Ahvar
      • Open Access Article
        • Abstract Page
        • Full-Text

        3 - A New Method for Intrusion Detection Using Genetic Algorithm and Neural network
        mohammadreza hosseinzadehmoghadam seyed javad mirabedini toraj banirostam
      • Open Access Article
        • Abstract Page
        • Full-Text

        4 - Detecting Bot Networks Based On HTTP And TLS Traffic Analysis
        Zahra Nafarieh
      • Open Access Article
        • Abstract Page
        • Full-Text

        5 - Detecting Active Bot Networks Based on DNS Traffic Analysis
        Zahra Nafarieh Ebrahim Mahdipur Haj Hamid Haj Seyed Javadi
      • Open Access Article
        • Abstract Page
        • Full-Text

        6 - Evaluating the effect of supplying drinking water and agriculture water of Sari-Neka aquifer on the salinity movement with the utilization of Gelvard dam
        mina nasiri mehdi hamidi Hamid Kardan moghaddam
      • Open Access Article
        • Abstract Page
        • Full-Text

        7 - Evaluation of sharp-interface simulation of saltwater intrusion into the multi-layered coastal aquifers exposed to pumping
        S. Sadjad Mehdizadeh Freydoon Vafaie
        10.22034/jest.2019.13700
      • Open Access Article
        • Abstract Page
        • Full-Text

        8 - Detection of DDoS Attacks in SDN Switches with Deep Learning and Swarm Intelligence Approach
        Mohsen Eghbali Mohammadreza Mollkhalili Maybodi
        10.30495/jce.2023.1998267.1233
      • Open Access Article
        • Abstract Page
        • Full-Text

        9 - Design of Anomaly Based Intrusion Detection System Using Support Vector Machine and Grasshopper Optimization Algorithm in IoT
        Sepehr Sharifi Soulmaz Gheisari
        10.30495/jce.2022.695339
      • Open Access Article
        • Abstract Page
        • Full-Text

        10 - A Distributed Denial-of-Service (DDoS) Attack Detection Approach in Fog Layer Based on Distributed Blockchain Database and Machine Learning
        Mohsen Eghbali Mohammadreza Mollahoseini Ardakani
        10.30495/jce.2023.1992146.1215
      • Open Access Article
        • Abstract Page
        • Full-Text

        11 - Distributed Denial of Service Attacks Detection in Internet of Things Using the Majority Voting Approach
        Habibollah Mazarei Marziye Dadvar MohammadHadi Atabakzadeh
        10.30495/jce.2023.1984927.1201
      • Open Access Article
        • Abstract Page
        • Full-Text

        12 - improving intrusion detection systems by feature reducing based on genetics algorithm and data mining techniques
        Mehdi Keshavarzi hossein Momenzadeh
      • Open Access Article
        • Abstract Page
        • Full-Text

        13 - Introducing a Two-step Strategy based on Deep Learning Enhance the Accuracy of Intrusion Detection Systems in the Network
        Ali Bahmani Amirhassan Monajemi
      • Open Access Article
        • Abstract Page
        • Full-Text

        14 - A Honeypot-assisted Industrial Control System to Detect Replication Attacks on Wireless Sensor Networks
        Abbasgholi Pashaei Mohammad Esmaeil Akbari Mina Zolfy Lighvan Asghar Charmin
        10.30486/mjtd.2022.695925
      • Open Access Article
        • Abstract Page
        • Full-Text

        15 - Honeypot Intrusion Detection System using an Adversarial Reinforcement Learning for Industrial Control Networks
        Abbasgholi Pashaei Mohammad Esmaeil Akbari Mina Zolfy Lighvan Asghar Charmin
        10.30486/mjtd.2023.1977229.1011
      • Open Access Article
        • Abstract Page
        • Full-Text

        16 - Presenting A Hybrid Method of Deep Neural Networks to Prevent Intrusion in Computer Networks
        Mohsen Roknaldini Erfaneh Noroozi
        10.71856/impcs.2024.903465
      • Open Access Article
        • Abstract Page
        • Full-Text

        17 - Providing a Solution Based on Fuzzy Logic to Reduce False Positive Alarms in The Intrusion Detection System
        Mohammad Akhlaghpour
      • Open Access Article
        • Abstract Page
        • Full-Text

        18 - An Effective and Lightweight Intrusion Detection for IoT based on Fog and Cloud using KNN Classification
        ali kaffash Seyed Reza Kamel Tabbakh Farizani Maryam Kheirabadi
        10.71856/impcs.2024.903638
      • Open Access Article
        • Abstract Page
        • Full-Text

        19 - Improving the Accuracy of the Intrusion Detection System in the IoT by Machine Learning and Clustering Algorithms
        Javad Pashaei Barbin Mahdi Jalali
        10.71856/impcs.2024.903654
      • Open Access Article
        • Abstract Page
        • Full-Text

        20 - A new Approach to Detecting Intrusion and Malicious Behaviors in Big Data
        Homa Movahednejad Mohsen Porshaban Ehsan Yazdani Chamzini Elahe Hemati Ashani Mahdi Sharifi
        10.30486/TEEGES.2024.904864
      • Open Access Article
        • Abstract Page
        • Full-Text

        21 - Geochemical Exploration of the Tareek Darreh Gold Deposit, North of Torbat-e Jaam, East Iran
        K. Shabani N. Nezafati M. Momenzadeh I. Rassa
      • Open Access Article
        • Abstract Page
        • Full-Text

        22 - Study of geochemistry, tectonomagmatic environment and petrography of the Astaneh granitoid body (South-West of Arak)
        Abbas Asgari
      • Open Access Article
        • Abstract Page
        • Full-Text

        23 - Designing an Intelligent Intrusion Detection System in the Electronic Banking Industry Using Fuzzy Logic
        Adel Jahanbani
      • Open Access Article
        • Abstract Page
        • Full-Text

        24 - A Combinatory Feature Selection Method using Gray Wolf Optimization and Crow Search Algorithms for Intrusion Detection Systems
        Kayvan Asghari
      • Open Access Article
        • Abstract Page
        • Full-Text

        25 - Detection Anomaly of Network Datasets with Honeypots at Industrial Control System
        Abbasgholi pashaei Mohammad Esmaeil akbari mina zolfy Asghar charmin
      • Open Access Article
        • Abstract Page
        • Full-Text

        26 - Machine Learning-based Industrial LAN Networks Using Honeypots
        Pashaei Abbasgholi mina zolfy
      • Open Access Article
        • Abstract Page
        • Full-Text

        27 - The Effect of Organizational Influence Skills on Decision Making Strategies in Mazandaran Province Educational Organization in order to provide a model
        ali Dehghan Chachkami farshid zameni mohamad salehi
      • Open Access Article
        • Abstract Page
        • Full-Text

        28 - MHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security
        Soheila Mirzagholi Karim Faez
      • Open Access Article
        • Abstract Page
        • Full-Text

        29 - A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks
        Maryam Fathi Ahmadsaraei Abolfazl Toroghi Haghighat
      • Open Access Article
        • Abstract Page
        • Full-Text

        30 - A Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks
        Maryam Fathi Ahmadsaraei Abolfazl Toroghi Haghighat
      • Open Access Article
        • Abstract Page
        • Full-Text

        31 - Improved Intrusion Detection System Based On Distributed Self-Adaptive Genetic Algorithm to Solve Support Vector Machine in Form of Multi Kernel Learning with Auto Encoder
        Elaheh Faghihnia Seyed Reza Kamel Tabakh Farizni Maryam Kheirabadi
      • Open Access Article
        • Abstract Page
        • Full-Text

        32 - Combined Intrusion Detection System to deal with Cyber- Attacks in Industrial Control Systems with a Dedicated Network
        Mohammad Safari Elham Parvinnia Alireza Keshavarz Haddad
      • Open Access Article
        • Abstract Page
        • Full-Text

        33 - Presenting a New Approach for Detecting Attacks on Voice over Internet Protocol Based on Ensemble Clustering
        Farid Bavifard Mohammad Kheyrandish Mohammad Mosleh
        10.71666/jipet.2024.998705
      • Open Access Article
        • Abstract Page
        • Full-Text

        34 - A Parallel Genetic Algorithm Based Method for Feature Subset Selection in Intrusion Detection Systems
        Iran Shokripoor Bahman Bigloo
      • Open Access Article
        • Abstract Page
        • Full-Text

        35 - Improving Accuracy in Intrusion Detection Systems Using Classifier Ensemble and Clustering
        Ensieh Nejati Hassan Shakeri Hassan Raei
      • Open Access Article
        • Abstract Page
        • Full-Text

        36 - Intrusion Response System for SIP based Applications with Engineered Feature Set
        Hassan Asgharian Ahmad Akbari Bijan Raahemi
      • Open Access Article
        • Abstract Page
        • Full-Text

        37 - Intrusion Detection System in Computer Network Using Hybrid Algorithms (SVM and ABC)
        Bahareh Gholipour Goodarzi Hamid Jazayeri Soheil Fateri
      • Open Access Article
        • Abstract Page
        • Full-Text

        38 - RISE Feedback Control Design for RLED Robot Manipulator Using Bees Algorithm
        Behnaz Hadi Alireza Khosravi Abolfazl Ranjbar N. Pouria Sarhadi
      • Open Access Article
        • Abstract Page
        • Full-Text

        39 - RSSAT: A Wireless Intrusion Detection System Based on Received Signal Strength Acceptance Test
        S.Mobarakeh Moosavirad Peyman Kabiri Hamidreza Mahini
      • Open Access Article
        • Abstract Page
        • Full-Text

        40 - Intrusion Detection System in Computer Networks Using Decision Tree and SVM Algorithms
        Zeinab Kermansaravi Hamid Jazayeriy Soheil Fateri
      • Open Access Article
        • Abstract Page
        • Full-Text

        41 - Study of Change in Water Quality at Different Distances form Sea in Mahi Estuarian Area
        M. B. Patel R. A. S. Patel
      • Open Access Article
        • Abstract Page
        • Full-Text

        42 - Intrusion Detection in Wireless Sensor Networks using Genetic Algorithm
        Elham Yazdankhah Fardad Farokhi Reza Sabbaghi-Nadooshan
      • Open Access Article
        • Abstract Page
        • Full-Text

        43 - Management of Seawater Intrusion in Coastal Aquifers of Caspian Sea
        Mehdi Nezhadnaderi
        10.22034/ap.2018.538412
      • Open Access Article
        • Abstract Page
        • Full-Text

        44 - A New Method for Intrusion Detection Using Genetic Algorithm and Neural Network
        M.R. Hosseinzadeh Moghaddam S. Javad Mirabedini T. banirostam
      • Open Access Article
        • Abstract Page
        • Full-Text

        45 - Improving intrusion detection system in the internet of things using a combination of convolutional neural network and cuckoo algorithm
        Ali  Shahriari Mohammad Davarpour Mohammad ahmadinia
      • Open Access Article
        • Abstract Page
        • Full-Text

        46 - An Intrusion Detection System for Network Cyber Security Using Hybrid Feature Selection Algorithms
        Zahraa Oday Kamil Golnaz Aghaee Ghazvini
        https://doi.org/10.82553/josc.2024.140212101104068
      • Open Access Article
        • Abstract Page
        • Full-Text

        47 - An optimal approach to detect anomalies in intrusion detection systems
        Afsaneh Banitalebi Dehkordi
        https://doi.org/10.82553/josc.2024.140212131104279
      • Open Access Article
        • Abstract Page
        • Full-Text

        48 - Improved hybrid algorithm for detection of intrusion into computer networks
        Safanaz Heidari Firozeh Razavi
        10.82195/ntds.2025.1123245
      • Open Access Article
        • Abstract Page
        • Full-Text

        49 - Metaheuristic Algorithms for Feature Selection in Intrusion Detection Systems: A Systematic Review
        yashar Pourardebil khah Mirsaeid Hosseini Shirvani Homayun Motameni
        10.71856/impcs.2023.1123897
      • Open Access Article
        • Abstract Page
        • Full-Text

        50 - Prevention and detection of denial of service attacks using random forest and decision tree algorithms
        seyedebrahim dashti hadis farajpor
      • Open Access Article
        • Abstract Page
        • Full-Text

        51 - Hybrid Intrusion Detection System: Leveraging XGBoost, Genetic Algorithms, and k-Means Clustering
        Ladan Riazi
      • Open Access Article
        • Abstract Page
        • Full-Text

        52 - Investigation of Saline Water Intrusion in the Borazjan Freshwater Aquifer from the Dalaki and Helleh Rivers
        J. Mozafarizadeh Z. Sajadi
      • Open Access Article
        • Abstract Page
        • Full-Text

        53 - A Variable Structure Learning Automata Approach for the Feature Reduction Problem of Intrusion Detection Systems
        Kayvan Asghari Majid Samadzamini Solmaz Abdollahizad
      • Open Access Article
        • Abstract Page
        • Full-Text

        54 - A Hybrid Model for Intrusion Detection Using Big Data Analytics and Deep Learning Techniques in Distributed Networks
        Shahin SamieAdel
      • Open Access Article
        • Abstract Page
        • Full-Text

        55 - Challenges and solutions to identify and prevent SYN attacks in the Internet of Things
        Vesal ّFiroozi Hassan Shakeri Hassan Raei Sani
        10.82195/ntds.2025.1190576
      • Open Access Article
        • Abstract Page
        • Full-Text

        56 - Intrusion Detection Using Deep Learning in Wireless Body Area Networks
        Elham Hajian Navid Asadi
        10.71856/impcs.2024.1195000
      • Open Access Article
        • Abstract Page
        • Full-Text

        57 - Intrusion detection in the Internet of Things based on a multilayer combination of misuse and anomaly detection systems
        Hossein Khosrovifar Mohammad Ali Jabraeil Jamali Kambiz Majidzadeh Mohammad Masdari
      • Open Access Article
        • Abstract Page
        • Full-Text

        58 - An Optimized Intrusion Detection System Framework for Internet of Things Networks: Integrating Arctic Puffin Optimization and RNN
        Mohammad Arefi Parisa Rahmani Zoleikha  Jahanbakhsh Naghadeh Mahdieh Rahmani
        10.71856/IMPCS.2025.1209464

Sanad


Sanad is a platform for managing Azad University publications

Links


  • Islamic Azad University
  • Relevant Journals of the Ministry of Science, Research and Technology
  • Iranian Journals IndexedIn ISI

Related Centers


  • Office of the Supreme Leader
  • Presidential Institution
  • Ministry of Science, Research and Technology
  • Ministry of Health and Medical Education
  • Community Communication Center (SAMS)

Technical Support


  • Phone : +98 21 22222222
  • Email : journals@iau.ac.ir

Official pages



  • Home Page
  • Site Map
  • Islamic Azad University
  • Contact Us
  • Home
  • Site Map
  • Islamic Azad University
  • Contact Us

The rights to this website are owned by the Raimag Press Management System.
Copyright © 2021-2025

Home| Login| About Us| Contact Us|
[فارسی] [العربية] [fa] [ar]
  • IAU
  • Login