List of Articles intrusion Open Access Article Abstract Page Full-Text 1 - EIDA: An Energy-Intrusion aware Data Aggregation Technique for Wireless Sensor Networks Nafiseh Daneshgar M. Habibi Najafi Mohsen Jahanshahi Ehsan Ahvar Open Access Article Abstract Page Full-Text 2 - A New Method for Intrusion Detection Using Genetic Algorithm and Neural network mohammadreza hosseinzadehmoghadam seyed javad mirabedini toraj banirostam Open Access Article Abstract Page Full-Text 3 - Detecting Bot Networks Based On HTTP And TLS Traffic Analysis Zahra Nafarieh Open Access Article Abstract Page Full-Text 4 - Detecting Active Bot Networks Based on DNS Traffic Analysis Zahra Nafarieh Ebrahim Mahdipur Haj Hamid Haj Seyed Javadi Open Access Article Abstract Page Full-Text 5 - Evaluating the effect of supplying drinking water and agriculture water of Sari-Neka aquifer on the salinity movement with the utilization of Gelvard dam mina nasiri mehdi hamidi Hamid Kardan moghaddam Open Access Article Abstract Page Full-Text 6 - Evaluation of sharp-interface simulation of saltwater intrusion into the multi-layered coastal aquifers exposed to pumping S. Sadjad Mehdizadeh Freydoon Vafaie 10.22034/jest.2019.13700 Open Access Article Abstract Page Full-Text 7 - Design of Anomaly Based Intrusion Detection System Using Support Vector Machine and Grasshopper Optimization Algorithm in IoT Sepehr Sharifi Soulmaz Gheisari 10.30495/jce.2022.695339 Open Access Article Abstract Page Full-Text 8 - A Distributed Denial-of-Service (DDoS) Attack Detection Approach in Fog Layer Based on Distributed Blockchain Database and Machine Learning Mohsen Eghbali Mohammadreza Mollahoseini Ardakani 10.30495/jce.2023.1992146.1215 Open Access Article Abstract Page Full-Text 9 - Distributed Denial of Service Attacks Detection in Internet of Things Using the Majority Voting Approach Habibollah Mazarei Marziye Dadvar MohammadHadi Atabakzadeh 10.30495/jce.2023.1984927.1201 Open Access Article Abstract Page Full-Text 10 - improving intrusion detection systems by feature reducing based on genetics algorithm and data mining techniques Mehdi Keshavarzi hossein Momenzadeh Open Access Article Abstract Page Full-Text 11 - Introducing a Two-step Strategy based on Deep Learning Enhance the Accuracy of Intrusion Detection Systems in the Network Ali Bahmani Amirhassan Monajemi Open Access Article Abstract Page Full-Text 12 - A Honeypot-assisted Industrial Control System to Detect Replication Attacks on Wireless Sensor Networks Abbasgholi Pashaei Mohammad Esmaeil Akbari Mina Zolfy Lighvan Asghar Charmin 10.30486/mjtd.2022.695925 Open Access Article Abstract Page Full-Text 13 - Honeypot Intrusion Detection System using an Adversarial Reinforcement Learning for Industrial Control Networks Abbasgholi Pashaei Mohammad Esmaeil Akbari Mina Zolfy Lighvan Asghar Charmin 10.30486/mjtd.2023.1977229.1011 Open Access Article Abstract Page Full-Text 14 - Presenting A Hybrid Method of Deep Neural Networks to Prevent Intrusion in Computer Networks Mohsen Roknaldini Erfaneh Noroozi Open Access Article Abstract Page Full-Text 15 - Providing a Solution Based on Fuzzy Logic to Reduce False Positive Alarms in The Intrusion Detection System Mohammad Akhlaghpour Open Access Article Abstract Page Full-Text 16 - An Effective and Lightweight Intrusion Detection for IoT based on Fog and Cloud using KNN Classification ali kaffash Seyed Reza Kamel Tabbakh Farizani Maryam Kheirabadi Open Access Article Abstract Page Full-Text 17 - A new Approach to Detecting Intrusion and Malicious Behaviors in Big Data Homa Movahednejad Mohsen Porshaban Ehsan Yazdani Chamzini Elahe Hemati Ashani Mahdi Sharifi 10.30486/TEEGES.2024.904864 Open Access Article Abstract Page Full-Text 18 - Geochemical Exploration of the Tareek Darreh Gold Deposit, North of Torbat-e Jaam, East Iran K. Shabani N. Nezafati M. Momenzadeh I. Rassa Open Access Article Abstract Page Full-Text 19 - Study of geochemistry, tectonomagmatic environment and petrography of the Astaneh granitoid body (South-West of Arak) Abbas Asgari Open Access Article Abstract Page Full-Text 20 - Designing an Intelligent Intrusion Detection System in the Electronic Banking Industry Using Fuzzy Logic Adel Jahanbani Open Access Article Abstract Page Full-Text 21 - A Combinatory Feature Selection Method using Gray Wolf Optimization and Crow Search Algorithms for Intrusion Detection Systems Kayvan Asghari Open Access Article Abstract Page Full-Text 22 - Detection Anomaly of Network Datasets with Honeypots at Industrial Control System Abbasgholi pashaei Mohammad Esmaeil akbari mina zolfy Asghar charmin Open Access Article Abstract Page Full-Text 23 - Machine Learning-based Industrial LAN Networks Using Honeypots Pashaei Abbasgholi mina zolfy Open Access Article Abstract Page Full-Text 24 - The Effect of Organizational Influence Skills on Decision Making Strategies in Mazandaran Province Educational Organization in order to provide a model ali Dehghan Chachkami farshid zameni mohamad salehi Open Access Article Abstract Page Full-Text 25 - MHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security Soheila Mirzagholi Karim Faez Open Access Article Abstract Page Full-Text 26 - A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks Maryam Fathi Ahmadsaraei Abolfazl Toroghi Haghighat Open Access Article Abstract Page Full-Text 27 - A Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks Maryam Fathi Ahmadsaraei Abolfazl Toroghi Haghighat Open Access Article Abstract Page Full-Text 28 - Improved Intrusion Detection System Based On Distributed Self-Adaptive Genetic Algorithm to Solve Support Vector Machine in Form of Multi Kernel Learning with Auto Encoder Elaheh Faghihnia Seyed Reza Kamel Tabakh Farizni Maryam Kheirabadi Open Access Article Abstract Page Full-Text 29 - Combined Intrusion Detection System to deal with Cyber- Attacks in Industrial Control Systems with a Dedicated Network Mohammad Safari Elham Parvinnia Alireza Keshavarz Haddad Open Access Article Abstract Page Full-Text 30 - Presenting a New Approach for Detecting Attacks on Voice over Internet Protocol Based on Ensemble Clustering Farid Bavifard Mohammad Kheyrandish Mohammad Mosleh Open Access Article Abstract Page Full-Text 31 - A Parallel Genetic Algorithm Based Method for Feature Subset Selection in Intrusion Detection Systems Iran Shokripoor Bahman Bigloo Open Access Article Abstract Page Full-Text 32 - Improving Accuracy in Intrusion Detection Systems Using Classifier Ensemble and Clustering Ensieh Nejati Hassan Shakeri Hassan Raei Open Access Article Abstract Page Full-Text 33 - Intrusion Response System for SIP based Applications with Engineered Feature Set Hassan Asgharian Ahmad Akbari Bijan Raahemi Open Access Article Abstract Page Full-Text 34 - Intrusion Detection System in Computer Network Using Hybrid Algorithms (SVM and ABC) Bahareh Gholipour Goodarzi Hamid Jazayeri Soheil Fateri Open Access Article Abstract Page Full-Text 35 - RISE Feedback Control Design for RLED Robot Manipulator Using Bees Algorithm Behnaz Hadi Alireza Khosravi Abolfazl Ranjbar N. Pouria Sarhadi Open Access Article Abstract Page Full-Text 36 - RSSAT: A Wireless Intrusion Detection System Based on Received Signal Strength Acceptance Test S.Mobarakeh Moosavirad Peyman Kabiri Hamidreza Mahini Open Access Article Abstract Page Full-Text 37 - Intrusion Detection System in Computer Networks Using Decision Tree and SVM Algorithms Zeinab Kermansaravi Hamid Jazayeriy Soheil Fateri Open Access Article Abstract Page Full-Text 38 - Study of Change in Water Quality at Different Distances form Sea in Mahi Estuarian Area M. B. Patel R. A. S. Patel Open Access Article Abstract Page Full-Text 39 - Intrusion Detection in Wireless Sensor Networks using Genetic Algorithm Elham Yazdankhah Fardad Farokhi Reza Sabbaghi-Nadooshan Open Access Article Abstract Page Full-Text 40 - Management of Seawater Intrusion in Coastal Aquifers of Caspian Sea Mehdi Nezhadnaderi 10.22034/ap.2018.538412 Open Access Article Abstract Page Full-Text 41 - A New Method for Intrusion Detection Using Genetic Algorithm and Neural Network M.R. Hosseinzadeh Moghaddam S. Javad Mirabedini T. banirostam Open Access Article Abstract Page Full-Text 42 - Improving intrusion detection system in the internet of things using a combination of convolutional neural network and cuckoo algorithm Ali Shahriari Mohammad Davarpour Mohammad ahmadinia Open Access Article Abstract Page Full-Text 43 - An Intrusion Detection System for Network Cyber Security Using Hybrid Feature Selection Algorithms Golnaz Aghaee Ghazvini zahra Oday Kamil Open Access Article Abstract Page Full-Text 44 - An optimal approach to detect anomalies in intrusion detection systems افسانه بنی طالبی Open Access Article Abstract Page Full-Text 45 - Metaheuristic Algorithms for Feature Selection in Intrusion Detection Systems: A Systematic Review yashar Pourardebil khah Mirsaeid Hosseini Shirvani Homayun Motameni Open Access Article Abstract Page Full-Text 46 - Investigation of Saline Water Intrusion in the Borazjan Freshwater Aquifer from the Dalaki and Helleh Rivers J. Mozafarizadeh Z. Sajadi