際際滷shows by User: MMehdiAhmadian / http://www.slideshare.net/images/logo.gif 際際滷shows by User: MMehdiAhmadian / Wed, 24 Mar 2021 13:49:47 GMT 際際滷Share feed for 際際滷shows by User: MMehdiAhmadian 悋惠 愕愕惠 悋 愆惡擧 悋 擧惠惘 惶惺惠: 悋 愕悋慍 悋惠 愕愕惠 悋 愆惡擧 悋 擧惠惘 惶惺惠 悋愕擧悋惆悋 惆愕拆悋擯 惠 惠惘 ... 惡悋 忰惘惠 悋愆悋 拆惘惠擧 惶惺惠 /MMehdiAhmadian/ss-244996399 ahmadianicssecurityiec104securitychallenges1399final-210324134947
愕愕惠 悋 擧惠惘 惶惺惠 擧 惆惘 惶悋惺 慍惘愕悋悽惠悋 忰悋惠 惘惆 悋愕惠悋惆 惘悋惘 擯惘惆 悋慍 拆惘惠擧悋 悋惘惠惡悋愀 惠惺惆惆 悋愕惠悋惆 擧惆 悋愃惡 悋 拆惘惠擧悋 惡 惆悋 悽惠 惆悋惘悋 悋愆悋 悋惠 惠惺惆惆悋惆 擧 悋擧悋 悽惘悋惡擧悋惘 惠愕愀 悋悴悋 惘悋 惘悋 愕悋慍惆. 擧 悋慍 拆惘惠擧悋 擧 惆惘 愆惡擧悋 擧惠惘 惶惺惠 惡惘悋 悋惠悋 悋愀悋惺悋惠 擧惠惘 惠惠惘 惘惆 悋愕惠悋惆 惘悋惘 擯惘惆 IEC 60870-5-104 悋愕惠 擧 惆惘 悋 悋惘悋悧 悋慍 擯悋 悋惠 愕悋惡惘-慍擧 惘惆 惡惘惘愕 惘悋惘擯惘惠 悋愕惠 惆惘 悋 悋惘悋悧 惡悋 惆 惠愕 惘悛惆 愆悋悽惠 悴悋惡 悋惠 悽惠 拆惘惠擧 悋惡惘惆 惠悋愆 愆惆 悋愕惠 惠悋 惡悋 惠忰 惡惘惘愕 惺悋惠 拆惘惠擧 惆 惆惘 惡愕惠惘 悛慍悋愆擯悋 悋 悛愕惡拆悵惘悋 惘忰 愀惘悋忰 拆悋惆愕悋慍 惠惆惆悋 悋惠 悛 愆悋愕悋 愆惆 惡惘悽 惘悋擧悋惘悋 悋愕悋慍 惘忰 愀惘悋忰 拆惘惠擧 悋愆悋 惆惘擯惘 惆惘 悛 惡惘惘愕 愆惆.]]>

愕愕惠 悋 擧惠惘 惶惺惠 擧 惆惘 惶悋惺 慍惘愕悋悽惠悋 忰悋惠 惘惆 悋愕惠悋惆 惘悋惘 擯惘惆 悋慍 拆惘惠擧悋 悋惘惠惡悋愀 惠惺惆惆 悋愕惠悋惆 擧惆 悋愃惡 悋 拆惘惠擧悋 惡 惆悋 悽惠 惆悋惘悋 悋愆悋 悋惠 惠惺惆惆悋惆 擧 悋擧悋 悽惘悋惡擧悋惘 惠愕愀 悋悴悋 惘悋 惘悋 愕悋慍惆. 擧 悋慍 拆惘惠擧悋 擧 惆惘 愆惡擧悋 擧惠惘 惶惺惠 惡惘悋 悋惠悋 悋愀悋惺悋惠 擧惠惘 惠惠惘 惘惆 悋愕惠悋惆 惘悋惘 擯惘惆 IEC 60870-5-104 悋愕惠 擧 惆惘 悋 悋惘悋悧 悋慍 擯悋 悋惠 愕悋惡惘-慍擧 惘惆 惡惘惘愕 惘悋惘擯惘惠 悋愕惠 惆惘 悋 悋惘悋悧 惡悋 惆 惠愕 惘悛惆 愆悋悽惠 悴悋惡 悋惠 悽惠 拆惘惠擧 悋惡惘惆 惠悋愆 愆惆 悋愕惠 惠悋 惡悋 惠忰 惡惘惘愕 惺悋惠 拆惘惠擧 惆 惆惘 惡愕惠惘 悛慍悋愆擯悋 悋 悛愕惡拆悵惘悋 惘忰 愀惘悋忰 拆悋惆愕悋慍 惠惆惆悋 悋惠 悛 愆悋愕悋 愆惆 惡惘悽 惘悋擧悋惘悋 悋愕悋慍 惘忰 愀惘悋忰 拆惘惠擧 悋愆悋 惆惘擯惘 惆惘 悛 惡惘惘愕 愆惆.]]>
Wed, 24 Mar 2021 13:49:47 GMT /MMehdiAhmadian/ss-244996399 MMehdiAhmadian@slideshare.net(MMehdiAhmadian) 悋惠 愕愕惠 悋 愆惡擧 悋 擧惠惘 惶惺惠: 悋 愕悋慍 悋惠 愕愕惠 悋 愆惡擧 悋 擧惠惘 惶惺惠 悋愕擧悋惆悋 惆愕拆悋擯 惠 惠惘 ... 惡悋 忰惘惠 悋愆悋 拆惘惠擧 惶惺惠 MMehdiAhmadian 愕愕惠 悋 擧惠惘 惶惺惠 擧 惆惘 惶悋惺 慍惘愕悋悽惠悋 忰悋惠 惘惆 悋愕惠悋惆 惘悋惘 擯惘惆 悋慍 拆惘惠擧悋 悋惘惠惡悋愀 惠惺惆惆 悋愕惠悋惆 擧惆 悋愃惡 悋 拆惘惠擧悋 惡 惆悋 悽惠 惆悋惘悋 悋愆悋 悋惠 惠惺惆惆悋惆 擧 悋擧悋 悽惘悋惡擧悋惘 惠愕愀 悋悴悋 惘悋 惘悋 愕悋慍惆. 擧 悋慍 拆惘惠擧悋 擧 惆惘 愆惡擧悋 擧惠惘 惶惺惠 惡惘悋 悋惠悋 悋愀悋惺悋惠 擧惠惘 惠惠惘 惘惆 悋愕惠悋惆 惘悋惘 擯惘惆 IEC 60870-5-104 悋愕惠 擧 惆惘 悋 悋惘悋悧 悋慍 擯悋 悋惠 愕悋惡惘-慍擧 惘惆 惡惘惘愕 惘悋惘擯惘惠 悋愕惠 惆惘 悋 悋惘悋悧 惡悋 惆 惠愕 惘悛惆 愆悋悽惠 悴悋惡 悋惠 悽惠 拆惘惠擧 悋惡惘惆 惠悋愆 愆惆 悋愕惠 惠悋 惡悋 惠忰 惡惘惘愕 惺悋惠 拆惘惠擧 惆 惆惘 惡愕惠惘 悛慍悋愆擯悋 悋 悛愕惡拆悵惘悋 惘忰 愀惘悋忰 拆悋惆愕悋慍 惠惆惆悋 悋惠 悛 愆悋愕悋 愆惆 惡惘悽 惘悋擧悋惘悋 悋愕悋慍 惘忰 愀惘悋忰 拆惘惠擧 悋愆悋 惆惘擯惘 惆惘 悛 惡惘惘愕 愆惆. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ahmadianicssecurityiec104securitychallenges1399final-210324134947-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> 愕愕惠 悋 擧惠惘 惶惺惠 擧 惆惘 惶悋惺 慍惘愕悋悽惠悋 忰悋惠 惘惆 悋愕惠悋惆 惘悋惘 擯惘惆 悋慍 拆惘惠擧悋 悋惘惠惡悋愀 惠惺惆惆 悋愕惠悋惆 擧惆 悋愃惡 悋 拆惘惠擧悋 惡 惆悋 悽惠 惆悋惘悋 悋愆悋 悋惠 惠惺惆惆悋惆 擧 悋擧悋 悽惘悋惡擧悋惘 惠愕愀 悋悴悋 惘悋 惘悋 愕悋慍惆. 擧 悋慍 拆惘惠擧悋 擧 惆惘 愆惡擧悋 擧惠惘 惶惺惠 惡惘悋 悋惠悋 悋愀悋惺悋惠 擧惠惘 惠惠惘 惘惆 悋愕惠悋惆 惘悋惘 擯惘惆 IEC 60870-5-104 悋愕惠 擧 惆惘 悋 悋惘悋悧 悋慍 擯悋 悋惠 愕悋惡惘-慍擧 惘惆 惡惘惘愕 惘悋惘擯惘惠 悋愕惠 惆惘 悋 悋惘悋悧 惡悋 惆 惠愕 惘悛惆 愆悋悽惠 悴悋惡 悋惠 悽惠 拆惘惠擧 悋惡惘惆 惠悋愆 愆惆 悋愕惠 惠悋 惡悋 惠忰 惡惘惘愕 惺悋惠 拆惘惠擧 惆 惆惘 惡愕惠惘 悛慍悋愆擯悋 悋 悛愕惡拆悵惘悋 惘忰 愀惘悋忰 拆悋惆愕悋慍 惠惆惆悋 悋惠 悛 愆悋愕悋 愆惆 惡惘悽 惘悋擧悋惘悋 悋愕悋慍 惘忰 愀惘悋忰 拆惘惠擧 悋愆悋 惆惘擯惘 惆惘 悛 惡惘惘愕 愆惆.
悋惠 愕愕惠 悋 愆惡擧 悋 擧惠惘 惶惺惠: 悋 愕悋慍 悋惠 愕愕惠 悋 愆惡擧 悋 擧惠惘 惶惺惠 悋愕擧悋惆悋 惆愕拆悋擯 惠 惠惘 ... 惡悋 忰惘惠 悋愆悋 拆惘惠擧 惶惺惠 from M Mehdi Ahmadian
]]>
341 0 https://cdn.slidesharecdn.com/ss_thumbnails/ahmadianicssecurityiec104securitychallenges1399final-210324134947-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Industrial Control System Security Taxonomic Framework with Application to a Comprehensive Incidents Survey /slideshow/industrial-control-system-security-taxonomic-framework-with-application-to-a-comprehensive-incidents-survey/238841765 ahmadianicssecuritytaxonomicframeworkijcipelsevier99070212englishve-201012111704
we have proposed Hierarchical Taxonomic Framework (HTF) with 16 required characteristics for classifying attacks and security incidents in ICSs. This framework has proper characteristics such as completeness, unambiguity, repeatability, usefulness, appropriateness, and applicability. We provided semi-formal and standardized definitions of threats, events, incidents, non-incidents, non-security incidents, non-attack security incidents, and attacks This proposed taxonomy with various parameters and sub-parameters prepares an expandable hierarchical framework for any organization's requirements. In this paper, we present minimal parameters and sub-parameters for classification. Parameters and sub-parameters of the HTF can be changed, expanded, and revised for other applications that need more customization. we also classified and analyzed 268 security incidents on ICSs. Based on the HTF, we proposed the statistical analytical study to show the useful patterns and key points for threat intelligence in ICSs and critical infrastructures. These patterns and key points lead us to improve ICSs and critical infrastructures security by being aware of cyber-attacks trends. Please cite this article as: Mohammad Mehdi Ahmadian , Mehdi Shajari , Mohammad Ali Shafiee , Industrial Control System Security Taxonomic Framework with Application to a Comprehensive Incidents Survey, International Journal of Critical Infrastructure Protection (2020), doi:https://doi.org/10.1016/j.ijcip.2020.100356 ]]>

we have proposed Hierarchical Taxonomic Framework (HTF) with 16 required characteristics for classifying attacks and security incidents in ICSs. This framework has proper characteristics such as completeness, unambiguity, repeatability, usefulness, appropriateness, and applicability. We provided semi-formal and standardized definitions of threats, events, incidents, non-incidents, non-security incidents, non-attack security incidents, and attacks This proposed taxonomy with various parameters and sub-parameters prepares an expandable hierarchical framework for any organization's requirements. In this paper, we present minimal parameters and sub-parameters for classification. Parameters and sub-parameters of the HTF can be changed, expanded, and revised for other applications that need more customization. we also classified and analyzed 268 security incidents on ICSs. Based on the HTF, we proposed the statistical analytical study to show the useful patterns and key points for threat intelligence in ICSs and critical infrastructures. These patterns and key points lead us to improve ICSs and critical infrastructures security by being aware of cyber-attacks trends. Please cite this article as: Mohammad Mehdi Ahmadian , Mehdi Shajari , Mohammad Ali Shafiee , Industrial Control System Security Taxonomic Framework with Application to a Comprehensive Incidents Survey, International Journal of Critical Infrastructure Protection (2020), doi:https://doi.org/10.1016/j.ijcip.2020.100356 ]]>
Mon, 12 Oct 2020 11:17:04 GMT /slideshow/industrial-control-system-security-taxonomic-framework-with-application-to-a-comprehensive-incidents-survey/238841765 MMehdiAhmadian@slideshare.net(MMehdiAhmadian) Industrial Control System Security Taxonomic Framework with Application to a Comprehensive Incidents Survey MMehdiAhmadian we have proposed Hierarchical Taxonomic Framework (HTF) with 16 required characteristics for classifying attacks and security incidents in ICSs. This framework has proper characteristics such as completeness, unambiguity, repeatability, usefulness, appropriateness, and applicability. We provided semi-formal and standardized definitions of threats, events, incidents, non-incidents, non-security incidents, non-attack security incidents, and attacks This proposed taxonomy with various parameters and sub-parameters prepares an expandable hierarchical framework for any organization's requirements. In this paper, we present minimal parameters and sub-parameters for classification. Parameters and sub-parameters of the HTF can be changed, expanded, and revised for other applications that need more customization. we also classified and analyzed 268 security incidents on ICSs. Based on the HTF, we proposed the statistical analytical study to show the useful patterns and key points for threat intelligence in ICSs and critical infrastructures. These patterns and key points lead us to improve ICSs and critical infrastructures security by being aware of cyber-attacks trends. Please cite this article as: Mohammad Mehdi Ahmadian , Mehdi Shajari , Mohammad Ali Shafiee , Industrial Control System Security Taxonomic Framework with Application to a Comprehensive Incidents Survey, International Journal of Critical Infrastructure Protection (2020), doi:https://doi.org/10.1016/j.ijcip.2020.100356 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ahmadianicssecuritytaxonomicframeworkijcipelsevier99070212englishve-201012111704-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> we have proposed Hierarchical Taxonomic Framework (HTF) with 16 required characteristics for classifying attacks and security incidents in ICSs. This framework has proper characteristics such as completeness, unambiguity, repeatability, usefulness, appropriateness, and applicability. We provided semi-formal and standardized definitions of threats, events, incidents, non-incidents, non-security incidents, non-attack security incidents, and attacks This proposed taxonomy with various parameters and sub-parameters prepares an expandable hierarchical framework for any organization&#39;s requirements. In this paper, we present minimal parameters and sub-parameters for classification. Parameters and sub-parameters of the HTF can be changed, expanded, and revised for other applications that need more customization. we also classified and analyzed 268 security incidents on ICSs. Based on the HTF, we proposed the statistical analytical study to show the useful patterns and key points for threat intelligence in ICSs and critical infrastructures. These patterns and key points lead us to improve ICSs and critical infrastructures security by being aware of cyber-attacks trends. Please cite this article as: Mohammad Mehdi Ahmadian , Mehdi Shajari , Mohammad Ali Shafiee , Industrial Control System Security Taxonomic Framework with Application to a Comprehensive Incidents Survey, International Journal of Critical Infrastructure Protection (2020), doi:https://doi.org/10.1016/j.ijcip.2020.100356
Industrial Control System Security Taxonomic Framework with Application to a Comprehensive Incidents Survey from M Mehdi Ahmadian
]]>
219 0 https://cdn.slidesharecdn.com/ss_thumbnails/ahmadianicssecuritytaxonomicframeworkijcipelsevier99070212englishve-201012111704-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
悋惠 愕愕惠 悋 擧惠惘 惶惺惠 : 愀惡 惡惆 惘悽惆悋惆悋 悋惠 愕悋惡惘 愕愕惠 悋 擧惠惘 惶惺惠 悋愕擧悋惆悋 /slideshow/ss-238070926/238070926 ahmadianicssecuritytaxonomicframeworkijcipelsevier99040122-200820063927
惆惘 悋 悋惘悋悧 惡 愆擧 悽惠惶惘 惡 惺惘 惡擧悋惘擯惘 悋惘惡 愀惡惡惆 惘悽惆悋惆悋 悋惠 愕悋惡惘 愕愕惠悋 擧惠惘 惶惺惠 悋愕擧悋惆悋 拆惘惆悋慍. 惺悋 惡惘 惠悽惶惶 拆愆擯惘悋 悋惠 愕悋悋 悋 擧惠惘 惶惺惠 惡 擧 惺悋惆悋 忰慍 悋惠 愕悋惡惘 擧 惡 惡悋忰惓 惆 愕悋慍 惠惆惆悋惠 忰悋惠 惘悽惆悋惆悋 悋惠 惺悋 惆悋惘惆 惠惶 擧 悋 悛慍愆 惘悋 愆悋惆 擧惆. 惠惷忰悋惠 惡愆惠惘 悋 悋惘悋悧 惆惘 : http://ahmadian.blog.ir/post/ICSSecurityTaxonomicFramework ]]>

惆惘 悋 悋惘悋悧 惡 愆擧 悽惠惶惘 惡 惺惘 惡擧悋惘擯惘 悋惘惡 愀惡惡惆 惘悽惆悋惆悋 悋惠 愕悋惡惘 愕愕惠悋 擧惠惘 惶惺惠 悋愕擧悋惆悋 拆惘惆悋慍. 惺悋 惡惘 惠悽惶惶 拆愆擯惘悋 悋惠 愕悋悋 悋 擧惠惘 惶惺惠 惡 擧 惺悋惆悋 忰慍 悋惠 愕悋惡惘 擧 惡 惡悋忰惓 惆 愕悋慍 惠惆惆悋惠 忰悋惠 惘悽惆悋惆悋 悋惠 惺悋 惆悋惘惆 惠惶 擧 悋 悛慍愆 惘悋 愆悋惆 擧惆. 惠惷忰悋惠 惡愆惠惘 悋 悋惘悋悧 惆惘 : http://ahmadian.blog.ir/post/ICSSecurityTaxonomicFramework ]]>
Thu, 20 Aug 2020 06:39:27 GMT /slideshow/ss-238070926/238070926 MMehdiAhmadian@slideshare.net(MMehdiAhmadian) 悋惠 愕愕惠 悋 擧惠惘 惶惺惠 : 愀惡 惡惆 惘悽惆悋惆悋 悋惠 愕悋惡惘 愕愕惠 悋 擧惠惘 惶惺惠 悋愕擧悋惆悋 MMehdiAhmadian 惆惘 悋 悋惘悋悧 惡 愆擧 悽惠惶惘 惡 惺惘 惡擧悋惘擯惘 悋惘惡 愀惡惡惆 惘悽惆悋惆悋 悋惠 愕悋惡惘 愕愕惠悋 擧惠惘 惶惺惠 悋愕擧悋惆悋 拆惘惆悋慍. 惺悋 惡惘 惠悽惶惶 拆愆擯惘悋 悋惠 愕悋悋 悋 擧惠惘 惶惺惠 惡 擧 惺悋惆悋 忰慍 悋惠 愕悋惡惘 擧 惡 惡悋忰惓 惆 愕悋慍 惠惆惆悋惠 忰悋惠 惘悽惆悋惆悋 悋惠 惺悋 惆悋惘惆 惠惶 擧 悋 悛慍愆 惘悋 愆悋惆 擧惆. 惠惷忰悋惠 惡愆惠惘 悋 悋惘悋悧 惆惘 : http://ahmadian.blog.ir/post/ICSSecurityTaxonomicFramework <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ahmadianicssecuritytaxonomicframeworkijcipelsevier99040122-200820063927-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> 惆惘 悋 悋惘悋悧 惡 愆擧 悽惠惶惘 惡 惺惘 惡擧悋惘擯惘 悋惘惡 愀惡惡惆 惘悽惆悋惆悋 悋惠 愕悋惡惘 愕愕惠悋 擧惠惘 惶惺惠 悋愕擧悋惆悋 拆惘惆悋慍. 惺悋 惡惘 惠悽惶惶 拆愆擯惘悋 悋惠 愕悋悋 悋 擧惠惘 惶惺惠 惡 擧 惺悋惆悋 忰慍 悋惠 愕悋惡惘 擧 惡 惡悋忰惓 惆 愕悋慍 惠惆惆悋惠 忰悋惠 惘悽惆悋惆悋 悋惠 惺悋 惆悋惘惆 惠惶 擧 悋 悛慍愆 惘悋 愆悋惆 擧惆. 惠惷忰悋惠 惡愆惠惘 悋 悋惘悋悧 惆惘 : http://ahmadian.blog.ir/post/ICSSecurityTaxonomicFramework
悋惠 愕愕惠 悋 擧惠惘 惶惺惠 : 愀惡 惡惆 惘悽惆悋惆悋 悋惠 愕悋惡惘 愕愕惠 悋 擧惠惘 惶惺惠 悋愕擧悋惆悋 from M Mehdi Ahmadian
]]>
187 0 https://cdn.slidesharecdn.com/ss_thumbnails/ahmadianicssecuritytaxonomicframeworkijcipelsevier99040122-200820063927-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
悋惠 愕悋惡惘 愕愕惠 悋 擧惠惘 惶惺惠 /slideshow/ss-235534073/235534073 icsscadacybersecuritytraining3forpdf-200613080458
惆惘 悋惠 愕悋惡惘 惠悧惘 惺 愕悋悋 悋 擧惠惘 悋惠悋愕 惶惺惠 (DCS 悋愕擧悋惆悋 惠惠惘 惆愕拆悋擯 ...) ]]>

惆惘 悋惠 愕悋惡惘 惠悧惘 惺 愕悋悋 悋 擧惠惘 悋惠悋愕 惶惺惠 (DCS 悋愕擧悋惆悋 惠惠惘 惆愕拆悋擯 ...) ]]>
Sat, 13 Jun 2020 08:04:58 GMT /slideshow/ss-235534073/235534073 MMehdiAhmadian@slideshare.net(MMehdiAhmadian) 悋惠 愕悋惡惘 愕愕惠 悋 擧惠惘 惶惺惠 MMehdiAhmadian 惆惘 悋惠 愕悋惡惘 惠悧惘 惺 愕悋悋 悋 擧惠惘 悋惠悋愕 惶惺惠 (DCS 悋愕擧悋惆悋 惠惠惘 惆愕拆悋擯 ...) <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/icsscadacybersecuritytraining3forpdf-200613080458-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> 惆惘 悋惠 愕悋惡惘 惠悧惘 惺 愕悋悋 悋 擧惠惘 悋惠悋愕 惶惺惠 (DCS 悋愕擧悋惆悋 惠惠惘 惆愕拆悋擯 ...)
悋惠 愕悋惡惘 愕愕惠 悋 擧惠惘 惶惺惠 from M Mehdi Ahmadian
]]>
146 0 https://cdn.slidesharecdn.com/ss_thumbnails/icsscadacybersecuritytraining3forpdf-200613080458-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
悋惠 愕愕惠 悋 擧惠惘 惶惺惠 : 惡惘惘愕 悋悴悋 愕惠惆 束悛惠悋惡 悋損 悋慍 慍悋 愆惠 悋愀悋惺悋惠 愕悋惡惘-慍擧 惶悋惺 慍惘愕悋悽惠悋 忰悋惠 /slideshow/ss-97736420/97736420 aftabenahanleakage2final-180520123853
惡惘惘愕 悋悴悋 愕惠惆 束悛惠悋惡 悋損 悋慍 慍悋 愆惠 悋愀悋惺悋惠 愕悋惡惘-慍擧 惶悋惺 慍惘愕悋悽惠悋 忰悋惠 ]]>

惡惘惘愕 悋悴悋 愕惠惆 束悛惠悋惡 悋損 悋慍 慍悋 愆惠 悋愀悋惺悋惠 愕悋惡惘-慍擧 惶悋惺 慍惘愕悋悽惠悋 忰悋惠 ]]>
Sun, 20 May 2018 12:38:53 GMT /slideshow/ss-97736420/97736420 MMehdiAhmadian@slideshare.net(MMehdiAhmadian) 悋惠 愕愕惠 悋 擧惠惘 惶惺惠 : 惡惘惘愕 悋悴悋 愕惠惆 束悛惠悋惡 悋損 悋慍 慍悋 愆惠 悋愀悋惺悋惠 愕悋惡惘-慍擧 惶悋惺 慍惘愕悋悽惠悋 忰悋惠 MMehdiAhmadian 惡惘惘愕 悋悴悋 愕惠惆 束悛惠悋惡 悋損 悋慍 慍悋 愆惠 悋愀悋惺悋惠 愕悋惡惘-慍擧 惶悋惺 慍惘愕悋悽惠悋 忰悋惠 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/aftabenahanleakage2final-180520123853-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> 惡惘惘愕 悋悴悋 愕惠惆 束悛惠悋惡 悋損 悋慍 慍悋 愆惠 悋愀悋惺悋惠 愕悋惡惘-慍擧 惶悋惺 慍惘愕悋悽惠悋 忰悋惠
悋惠 愕愕惠 悋 擧惠惘 惶惺惠 : 惡惘惘愕 悋悴悋 愕惠惆 束悛惠悋惡 悋損 悋慍 慍悋 愆惠 悋愀悋惺悋惠 愕悋惡惘-慍擧 惶悋惺 慍惘愕悋悽惠悋 忰悋惠 from M Mehdi Ahmadian
]]>
374 1 https://cdn.slidesharecdn.com/ss_thumbnails/aftabenahanleakage2final-180520123853-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
悋惠 惆惘 愕愕惠 悋 擧惠惘 惶惺惠CyberPhysical Systems Security Challenges(Case study: Information Flow Security Analysis in Natural Gas Pipeline System )[Persian] /slideshow/cyberphysical-systems-security-challengescase-study-information-flow-security-analysis-in-natural-gas-pipeline-system-persian/86367533 ictpetroahmadianpublicversion-180118190559
CyberPhysical Systems Security Challenges(Case study: Information Flow Security Analysis in Natural Gas and Oil Pipeline System ) PetroICT2018 愕悽惘悋 悋愆 悋 悋惠 惆惘 愕悋悋 悋 愕悋惡惘-慍擧 (惡悋 忰惘惠 惠忰 悴惘悋 悋愀悋惺悋惠 惆惘 悽愀愀 惠 擯悋慍) 惆惘 愆愆 擧惘悋愕 悋惘 悋愀悋惺悋惠 悋惘惠惡悋愀悋惠 惆惘 惠 擯悋慍 拆悋悋愆 拆惠惘愆 27 惆 惠惘悋 惘擧慍 悋愆 悋 惡 悋 愆惆 惡愆惠 ]]>

CyberPhysical Systems Security Challenges(Case study: Information Flow Security Analysis in Natural Gas and Oil Pipeline System ) PetroICT2018 愕悽惘悋 悋愆 悋 悋惠 惆惘 愕悋悋 悋 愕悋惡惘-慍擧 (惡悋 忰惘惠 惠忰 悴惘悋 悋愀悋惺悋惠 惆惘 悽愀愀 惠 擯悋慍) 惆惘 愆愆 擧惘悋愕 悋惘 悋愀悋惺悋惠 悋惘惠惡悋愀悋惠 惆惘 惠 擯悋慍 拆悋悋愆 拆惠惘愆 27 惆 惠惘悋 惘擧慍 悋愆 悋 惡 悋 愆惆 惡愆惠 ]]>
Thu, 18 Jan 2018 19:05:59 GMT /slideshow/cyberphysical-systems-security-challengescase-study-information-flow-security-analysis-in-natural-gas-pipeline-system-persian/86367533 MMehdiAhmadian@slideshare.net(MMehdiAhmadian) 悋惠 惆惘 愕愕惠 悋 擧惠惘 惶惺惠CyberPhysical Systems Security Challenges(Case study: Information Flow Security Analysis in Natural Gas Pipeline System )[Persian] MMehdiAhmadian CyberPhysical Systems Security Challenges(Case study: Information Flow Security Analysis in Natural Gas and Oil Pipeline System ) PetroICT2018 愕悽惘悋 悋愆 悋 悋惠 惆惘 愕悋悋 悋 愕悋惡惘-慍擧 (惡悋 忰惘惠 惠忰 悴惘悋 悋愀悋惺悋惠 惆惘 悽愀愀 惠 擯悋慍) 惆惘 愆愆 擧惘悋愕 悋惘 悋愀悋惺悋惠 悋惘惠惡悋愀悋惠 惆惘 惠 擯悋慍 拆悋悋愆 拆惠惘愆 27 惆 惠惘悋 惘擧慍 悋愆 悋 惡 悋 愆惆 惡愆惠 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ictpetroahmadianpublicversion-180118190559-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> CyberPhysical Systems Security Challenges(Case study: Information Flow Security Analysis in Natural Gas and Oil Pipeline System ) PetroICT2018 愕悽惘悋 悋愆 悋 悋惠 惆惘 愕悋悋 悋 愕悋惡惘-慍擧 (惡悋 忰惘惠 惠忰 悴惘悋 悋愀悋惺悋惠 惆惘 悽愀愀 惠 擯悋慍) 惆惘 愆愆 擧惘悋愕 悋惘 悋愀悋惺悋惠 悋惘惠惡悋愀悋惠 惆惘 惠 擯悋慍 拆悋悋愆 拆惠惘愆 27 惆 惠惘悋 惘擧慍 悋愆 悋 惡 悋 愆惆 惡愆惠
悋惠 惆惘 愕愕惠 悋 擧惠惘 惶惺惠CyberPhysical Systems Security Challenges(Case study: Information Flow Security Analysis in Natural Gas Pipeline System )[Persian] from M Mehdi Ahmadian
]]>
589 5 https://cdn.slidesharecdn.com/ss_thumbnails/ictpetroahmadianpublicversion-180118190559-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
悋惘惡 惠愆悽惶 惡悋悴擯惘悋 2entFOX: A framework for high survivable ransomwares detection /slideshow/2entfox-a-framework-for-high-survivable-ransomwares-detection/77096687 ahmadian2entfoxransomwaresdetection-170620071759
Ransomwares have become a growing threat since 2012, and the situation continues to worsen until now. In this paper, a new framework called 2entFOX is proposed in order to detect high survivable ransomwares (HSR). Because of little research in ransomware detection, this framework can be considered as one of the first frameworks in this field. We analyze Windows ransomwares behaviour and we tried to find appropriate features that are particular useful in detecting this type of malwares with high detection accuracy and low false positive rate. The outcome of this part of the work, was extraction of 20 features which due to two highly efficient features in this set that according to our assessments are identified and have been used for the first time in this field we could achieve an appropriate set for HSRs detection. In final stage, after proposing architecture based on Bayesian decision network, the final evaluation is done on some known ransomware samples and unknown ones based on six different scenarios. The result of this evaluations shows the high accuracy of 2entFox in detection of HSRs.]]>

Ransomwares have become a growing threat since 2012, and the situation continues to worsen until now. In this paper, a new framework called 2entFOX is proposed in order to detect high survivable ransomwares (HSR). Because of little research in ransomware detection, this framework can be considered as one of the first frameworks in this field. We analyze Windows ransomwares behaviour and we tried to find appropriate features that are particular useful in detecting this type of malwares with high detection accuracy and low false positive rate. The outcome of this part of the work, was extraction of 20 features which due to two highly efficient features in this set that according to our assessments are identified and have been used for the first time in this field we could achieve an appropriate set for HSRs detection. In final stage, after proposing architecture based on Bayesian decision network, the final evaluation is done on some known ransomware samples and unknown ones based on six different scenarios. The result of this evaluations shows the high accuracy of 2entFox in detection of HSRs.]]>
Tue, 20 Jun 2017 07:17:59 GMT /slideshow/2entfox-a-framework-for-high-survivable-ransomwares-detection/77096687 MMehdiAhmadian@slideshare.net(MMehdiAhmadian) 悋惘惡 惠愆悽惶 惡悋悴擯惘悋 2entFOX: A framework for high survivable ransomwares detection MMehdiAhmadian Ransomwares have become a growing threat since 2012, and the situation continues to worsen until now. In this paper, a new framework called 2entFOX is proposed in order to detect high survivable ransomwares (HSR). Because of little research in ransomware detection, this framework can be considered as one of the first frameworks in this field. We analyze Windows ransomwares behaviour and we tried to find appropriate features that are particular useful in detecting this type of malwares with high detection accuracy and low false positive rate. The outcome of this part of the work, was extraction of 20 features which due to two highly efficient features in this set that according to our assessments are identified and have been used for the first time in this field we could achieve an appropriate set for HSRs detection. In final stage, after proposing architecture based on Bayesian decision network, the final evaluation is done on some known ransomware samples and unknown ones based on six different scenarios. The result of this evaluations shows the high accuracy of 2entFox in detection of HSRs. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ahmadian2entfoxransomwaresdetection-170620071759-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Ransomwares have become a growing threat since 2012, and the situation continues to worsen until now. In this paper, a new framework called 2entFOX is proposed in order to detect high survivable ransomwares (HSR). Because of little research in ransomware detection, this framework can be considered as one of the first frameworks in this field. We analyze Windows ransomwares behaviour and we tried to find appropriate features that are particular useful in detecting this type of malwares with high detection accuracy and low false positive rate. The outcome of this part of the work, was extraction of 20 features which due to two highly efficient features in this set that according to our assessments are identified and have been used for the first time in this field we could achieve an appropriate set for HSRs detection. In final stage, after proposing architecture based on Bayesian decision network, the final evaluation is done on some known ransomware samples and unknown ones based on six different scenarios. The result of this evaluations shows the high accuracy of 2entFox in detection of HSRs.
悋惘惡 惠愆悽惶 惡悋悴擯惘悋 2entFOX: A framework for high survivable ransomwares detection from M Mehdi Ahmadian
]]>
401 2 https://cdn.slidesharecdn.com/ss_thumbnails/ahmadian2entfoxransomwaresdetection-170620071759-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
惶忰惠 悴惘悋 擧惠惘 惆惘 悋惠 悋愀悋惺悋惠Control Flow Integrity /slideshow/control-flow-integrity/73052396 ahmadiancfipublicversion-170311184727
Control-flow integrity (CFI) is a general term for computer security techniques which prevent a wide variety of malware attacks from redirecting the flow of execution of a program. Associated techniques include Code-Pointer Separation (CPS), Code-Pointer Integrity (CPI), stack canaries, shadow stacks, and vtable pointer verification]]>

Control-flow integrity (CFI) is a general term for computer security techniques which prevent a wide variety of malware attacks from redirecting the flow of execution of a program. Associated techniques include Code-Pointer Separation (CPS), Code-Pointer Integrity (CPI), stack canaries, shadow stacks, and vtable pointer verification]]>
Sat, 11 Mar 2017 18:47:27 GMT /slideshow/control-flow-integrity/73052396 MMehdiAhmadian@slideshare.net(MMehdiAhmadian) 惶忰惠 悴惘悋 擧惠惘 惆惘 悋惠 悋愀悋惺悋惠Control Flow Integrity MMehdiAhmadian Control-flow integrity (CFI) is a general term for computer security techniques which prevent a wide variety of malware attacks from redirecting the flow of execution of a program. Associated techniques include Code-Pointer Separation (CPS), Code-Pointer Integrity (CPI), stack canaries, shadow stacks, and vtable pointer verification <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ahmadiancfipublicversion-170311184727-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Control-flow integrity (CFI) is a general term for computer security techniques which prevent a wide variety of malware attacks from redirecting the flow of execution of a program. Associated techniques include Code-Pointer Separation (CPS), Code-Pointer Integrity (CPI), stack canaries, shadow stacks, and vtable pointer verification
惶忰惠 悴惘悋 擧惠惘 惆惘 悋惠 悋愀悋惺悋惠Control Flow Integrity from M Mehdi Ahmadian
]]>
410 3 https://cdn.slidesharecdn.com/ss_thumbnails/ahmadiancfipublicversion-170311184727-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
悋惠 愕愕惠 悋 擧惠惘 惶惺惠 /slideshow/part3-941118-ahamdian2/65603936 part3941118ahamdian2-160901191917
惆惘 悛慍愆 (惆悋惠)悋惠 愕悋惡惘 惆惘 愕悋悋 悋 惶惺惠 (惡悽愆 惆悋惠 惡惆悋慍悋惘悋 惠惆惆悋惠 惆悋 拆愆惘惠 ) ]]>

惆惘 悛慍愆 (惆悋惠)悋惠 愕悋惡惘 惆惘 愕悋悋 悋 惶惺惠 (惡悽愆 惆悋惠 惡惆悋慍悋惘悋 惠惆惆悋惠 惆悋 拆愆惘惠 ) ]]>
Thu, 01 Sep 2016 19:19:16 GMT /slideshow/part3-941118-ahamdian2/65603936 MMehdiAhmadian@slideshare.net(MMehdiAhmadian) 悋惠 愕愕惠 悋 擧惠惘 惶惺惠 MMehdiAhmadian 惆惘 悛慍愆 (惆悋惠)悋惠 愕悋惡惘 惆惘 愕悋悋 悋 惶惺惠 (惡悽愆 惆悋惠 惡惆悋慍悋惘悋 惠惆惆悋惠 惆悋 拆愆惘惠 ) <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/part3941118ahamdian2-160901191917-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> 惆惘 悛慍愆 (惆悋惠)悋惠 愕悋惡惘 惆惘 愕悋悋 悋 惶惺惠 (惡悽愆 惆悋惠 惡惆悋慍悋惘悋 惠惆惆悋惠 惆悋 拆愆惘惠 )
悋惠 愕愕惠 悋 擧惠惘 惶惺惠 from M Mehdi Ahmadian
]]>
1101 3 https://cdn.slidesharecdn.com/ss_thumbnails/part3941118ahamdian2-160901191917-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cryptovirology Introduction, SecurityThreats, Safeguards and Countermeasures /slideshow/cryptovirology-introduction-securitythreats-safeguards-and-countermeasures/64910971 cryptovirologyfinal-160811150657
Cryptovirology Introduction, SecurityThreats, Safeguards and Countermeasures 惺惘 惘慍擧悋惘 惘愕 愆悋愕 惠惆惆悋惠 悋惠 惘悋擧悋惘 悋 忰悋惴惠 悋惡 惡悋 悛悋 ]]>

Cryptovirology Introduction, SecurityThreats, Safeguards and Countermeasures 惺惘 惘慍擧悋惘 惘愕 愆悋愕 惠惆惆悋惠 悋惠 惘悋擧悋惘 悋 忰悋惴惠 悋惡 惡悋 悛悋 ]]>
Thu, 11 Aug 2016 15:06:57 GMT /slideshow/cryptovirology-introduction-securitythreats-safeguards-and-countermeasures/64910971 MMehdiAhmadian@slideshare.net(MMehdiAhmadian) Cryptovirology Introduction, SecurityThreats, Safeguards and Countermeasures MMehdiAhmadian Cryptovirology Introduction, SecurityThreats, Safeguards and Countermeasures 惺惘 惘慍擧悋惘 惘愕 愆悋愕 惠惆惆悋惠 悋惠 惘悋擧悋惘 悋 忰悋惴惠 悋惡 惡悋 悛悋 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cryptovirologyfinal-160811150657-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cryptovirology Introduction, SecurityThreats, Safeguards and Countermeasures 惺惘 惘慍擧悋惘 惘愕 愆悋愕 惠惆惆悋惠 悋惠 惘悋擧悋惘 悋 忰悋惴惠 悋惡 惡悋 悛悋
Cryptovirology Introduction, SecurityThreats, Safeguards and Countermeasures from M Mehdi Ahmadian
]]>
465 5 https://cdn.slidesharecdn.com/ss_thumbnails/cryptovirologyfinal-160811150657-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Malware futureology ahmadian /MMehdiAhmadian/malware-futureology-ahmadian malwarefutureology-ahmadian-160805075531
Malware and antimalware futureology ahmadian (In Persian)]]>

Malware and antimalware futureology ahmadian (In Persian)]]>
Fri, 05 Aug 2016 07:55:31 GMT /MMehdiAhmadian/malware-futureology-ahmadian MMehdiAhmadian@slideshare.net(MMehdiAhmadian) Malware futureology ahmadian MMehdiAhmadian Malware and antimalware futureology ahmadian (In Persian) <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/malwarefutureology-ahmadian-160805075531-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Malware and antimalware futureology ahmadian (In Persian)
Malware futureology ahmadian from M Mehdi Ahmadian
]]>
227 2 https://cdn.slidesharecdn.com/ss_thumbnails/malwarefutureology-ahmadian-160805075531-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
忰惴 忰惘 悽惶惶 惆惘 悽惆悋惠 擧悋-惡悋 /slideshow/ss-48529754/48529754 lwssinkfsncxynnay3bg-signature-35a07ae39a37eee8394e3137da701a26ea0f47c186d4c916fb542b37271c7366-poli-150524033808-lva1-app6891
忰惴 忰惘 悽惶惶 惆惘 悽惆悋惠 擧悋-惡悋 privacy preserving in Location-Based Services (LBS)]]>

忰惴 忰惘 悽惶惶 惆惘 悽惆悋惠 擧悋-惡悋 privacy preserving in Location-Based Services (LBS)]]>
Sun, 24 May 2015 03:38:08 GMT /slideshow/ss-48529754/48529754 MMehdiAhmadian@slideshare.net(MMehdiAhmadian) 忰惴 忰惘 悽惶惶 惆惘 悽惆悋惠 擧悋-惡悋 MMehdiAhmadian 忰惴 忰惘 悽惶惶 惆惘 悽惆悋惠 擧悋-惡悋 privacy preserving in Location-Based Services (LBS) <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/lwssinkfsncxynnay3bg-signature-35a07ae39a37eee8394e3137da701a26ea0f47c186d4c916fb542b37271c7366-poli-150524033808-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> 忰惴 忰惘 悽惶惶 惆惘 悽惆悋惠 擧悋-惡悋 privacy preserving in Location-Based Services (LBS)
忰惴 忰惘 悽惶惶 惆惘 悽惆悋惠 擧悋-惡悋 from M Mehdi Ahmadian
]]>
1301 2 https://cdn.slidesharecdn.com/ss_thumbnails/lwssinkfsncxynnay3bg-signature-35a07ae39a37eee8394e3137da701a26ea0f47c186d4c916fb542b37271c7366-poli-150524033808-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
惡惘惘愕 悋惠 惡惠 擧 Is Bitcoin a secure online digital currency?! /slideshow/is-bitcoinsecure-publicversion/48378317 8idzsmzmqedgvss5uvl1-signature-1267671fd67799871eba64cc7dde8ce0f648f71b95e0b582151cdf7ad44818b7-poli-150520102130-lva1-app6892
Is Bitcoin a secure online digital currency?! 惡惘惘愕 悋惠 惡惠 擧]]>

Is Bitcoin a secure online digital currency?! 惡惘惘愕 悋惠 惡惠 擧]]>
Wed, 20 May 2015 10:21:30 GMT /slideshow/is-bitcoinsecure-publicversion/48378317 MMehdiAhmadian@slideshare.net(MMehdiAhmadian) 惡惘惘愕 悋惠 惡惠 擧 Is Bitcoin a secure online digital currency?! MMehdiAhmadian Is Bitcoin a secure online digital currency?! 惡惘惘愕 悋惠 惡惠 擧 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/8idzsmzmqedgvss5uvl1-signature-1267671fd67799871eba64cc7dde8ce0f648f71b95e0b582151cdf7ad44818b7-poli-150520102130-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Is Bitcoin a secure online digital currency?! 惡惘惘愕 悋惠 惡惠 擧
惡惘惘愕 悋惠 惡惠 擧 Is Bitcoin a secure online digital currency?! from M Mehdi Ahmadian
]]>
794 1 https://cdn.slidesharecdn.com/ss_thumbnails/8idzsmzmqedgvss5uvl1-signature-1267671fd67799871eba64cc7dde8ce0f648f71b95e0b582151cdf7ad44818b7-poli-150520102130-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
擧 拆悋擯悋 惆悋惆 惘悋擧悋惘悋 悋惡Databases hacking, safeguards and countermeasures /slideshow/ahmadian-hacking-databasespublicver/48133985 1wlpsjtzspmqmlocouu8-signature-3efc7ffe1208596d0d2d57644422e37dd5520356e6cac42136bc67efe6b9a953-poli-150514072002-lva1-app6892
Databases hacking, safeguards and countermeasures Case study : Oracle & SQL server malwares]]>

Databases hacking, safeguards and countermeasures Case study : Oracle & SQL server malwares]]>
Thu, 14 May 2015 07:20:02 GMT /slideshow/ahmadian-hacking-databasespublicver/48133985 MMehdiAhmadian@slideshare.net(MMehdiAhmadian) 擧 拆悋擯悋 惆悋惆 惘悋擧悋惘悋 悋惡Databases hacking, safeguards and countermeasures MMehdiAhmadian Databases hacking, safeguards and countermeasures Case study : Oracle & SQL server malwares <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/1wlpsjtzspmqmlocouu8-signature-3efc7ffe1208596d0d2d57644422e37dd5520356e6cac42136bc67efe6b9a953-poli-150514072002-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Databases hacking, safeguards and countermeasures Case study : Oracle &amp; SQL server malwares
擧 拆悋擯悋 惆悋惆 惘悋擧悋惘悋 悋惡Databases hacking, safeguards and countermeasures from M Mehdi Ahmadian
]]>
934 5 https://cdn.slidesharecdn.com/ss_thumbnails/1wlpsjtzspmqmlocouu8-signature-3efc7ffe1208596d0d2d57644422e37dd5520356e6cac42136bc67efe6b9a953-poli-150514072002-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
悋惡 愕悋慍 惆惘 惠忰 惡惆悋慍悋惘悋Hooking in Malware Analysis /slideshow/hooking-48133830/48133830 wkl1fdtlrvyfwfpuaqx5-signature-69a9569fe6ed5d28e63c04bb3b0bbd569298f92085c60fec04e66ffaa07236bd-poli-150514071451-lva1-app6891
悋惡 愕悋慍 擧 惡惘悋 惡 惆愕惠 悛惘惆 擧惠惘 悴惘悋 悋悴惘悋 惡惘悋 惡惆 惠愃惘 擧悋拆悋 悴惆惆 擧惆 惡惺 悛 悋愕惠 . 惠愕愀 惠 愕悋慍 惘悋悽悋 惠悋惡惺 惆悋惠 悴惆惆 悛 惡 擧惆 愕悋惘愆愆惆 惡 惆愕惠 悛惆. 惡悋 惠慍惘 擧惆 愕悋惘愆 惘 惺悋惠 惘悋 惠悋 悋悴惘悋 惆 . 拆愕悋慍悛 悋惡惠悋 悋惶 惠悋惡惺 惠悋惆 悋悴惘悋愆惆 惠悴 惠悋惆 悋 惡愕悋惆擯 惡惘擯愆惠 惆悋惆 愆惆 悋 惠愃惘 惆悋惆 愆惆 忰惆 惆 悋忰惆悋]]>

悋惡 愕悋慍 擧 惡惘悋 惡 惆愕惠 悛惘惆 擧惠惘 悴惘悋 悋悴惘悋 惡惘悋 惡惆 惠愃惘 擧悋拆悋 悴惆惆 擧惆 惡惺 悛 悋愕惠 . 惠愕愀 惠 愕悋慍 惘悋悽悋 惠悋惡惺 惆悋惠 悴惆惆 悛 惡 擧惆 愕悋惘愆愆惆 惡 惆愕惠 悛惆. 惡悋 惠慍惘 擧惆 愕悋惘愆 惘 惺悋惠 惘悋 惠悋 悋悴惘悋 惆 . 拆愕悋慍悛 悋惡惠悋 悋惶 惠悋惡惺 惠悋惆 悋悴惘悋愆惆 惠悴 惠悋惆 悋 惡愕悋惆擯 惡惘擯愆惠 惆悋惆 愆惆 悋 惠愃惘 惆悋惆 愆惆 忰惆 惆 悋忰惆悋]]>
Thu, 14 May 2015 07:14:51 GMT /slideshow/hooking-48133830/48133830 MMehdiAhmadian@slideshare.net(MMehdiAhmadian) 悋惡 愕悋慍 惆惘 惠忰 惡惆悋慍悋惘悋Hooking in Malware Analysis MMehdiAhmadian 悋惡 愕悋慍 擧 惡惘悋 惡 惆愕惠 悛惘惆 擧惠惘 悴惘悋 悋悴惘悋 惡惘悋 惡惆 惠愃惘 擧悋拆悋 悴惆惆 擧惆 惡惺 悛 悋愕惠 . 惠愕愀 惠 愕悋慍 惘悋悽悋 惠悋惡惺 惆悋惠 悴惆惆 悛 惡 擧惆 愕悋惘愆愆惆 惡 惆愕惠 悛惆. 惡悋 惠慍惘 擧惆 愕悋惘愆 惘 惺悋惠 惘悋 惠悋 悋悴惘悋 惆 . 拆愕悋慍悛 悋惡惠悋 悋惶 惠悋惡惺 惠悋惆 悋悴惘悋愆惆 惠悴 惠悋惆 悋 惡愕悋惆擯 惡惘擯愆惠 惆悋惆 愆惆 悋 惠愃惘 惆悋惆 愆惆 忰惆 惆 悋忰惆悋 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/wkl1fdtlrvyfwfpuaqx5-signature-69a9569fe6ed5d28e63c04bb3b0bbd569298f92085c60fec04e66ffaa07236bd-poli-150514071451-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> 悋惡 愕悋慍 擧 惡惘悋 惡 惆愕惠 悛惘惆 擧惠惘 悴惘悋 悋悴惘悋 惡惘悋 惡惆 惠愃惘 擧悋拆悋 悴惆惆 擧惆 惡惺 悛 悋愕惠 . 惠愕愀 惠 愕悋慍 惘悋悽悋 惠悋惡惺 惆悋惠 悴惆惆 悛 惡 擧惆 愕悋惘愆愆惆 惡 惆愕惠 悛惆. 惡悋 惠慍惘 擧惆 愕悋惘愆 惘 惺悋惠 惘悋 惠悋 悋悴惘悋 惆 . 拆愕悋慍悛 悋惡惠悋 悋惶 惠悋惡惺 惠悋惆 悋悴惘悋愆惆 惠悴 惠悋惆 悋 惡愕悋惆擯 惡惘擯愆惠 惆悋惆 愆惆 悋 惠愃惘 惆悋惆 愆惆 忰惆 惆 悋忰惆悋
悋惡 愕悋慍 惆惘 惠忰 惡惆悋慍悋惘悋Hooking in Malware Analysis from M Mehdi Ahmadian
]]>
1069 3 https://cdn.slidesharecdn.com/ss_thumbnails/wkl1fdtlrvyfwfpuaqx5-signature-69a9569fe6ed5d28e63c04bb3b0bbd569298f92085c60fec04e66ffaa07236bd-poli-150514071451-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-MMehdiAhmadian-48x48.jpg?cb=1723653866 Mohammad Mehdi Ahmadian is a Ph.D. candidate of information security in the Department of Computer Engineering and Information Technology at Amirkabir University of Technology, Tehran, Iran. He received the B.S. degree in computer engineering (2012) and M.S. degree in information security (2015). His research focuses on computer and network security, industrial control systems security, and cyber-physical systems security. He has cooperated in different cyber-security and cyber-physical security projects. www.mmAhmadian.ir https://cdn.slidesharecdn.com/ss_thumbnails/ahmadianicssecurityiec104securitychallenges1399final-210324134947-thumbnail.jpg?width=320&height=320&fit=bounds MMehdiAhmadian/ss-244996399 悋惠 愕愕惠 悋 愆惡擧 ... https://cdn.slidesharecdn.com/ss_thumbnails/ahmadianicssecuritytaxonomicframeworkijcipelsevier99070212englishve-201012111704-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/industrial-control-system-security-taxonomic-framework-with-application-to-a-comprehensive-incidents-survey/238841765 Industrial Control Sys... https://cdn.slidesharecdn.com/ss_thumbnails/ahmadianicssecuritytaxonomicframeworkijcipelsevier99040122-200820063927-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/ss-238070926/238070926 悋惠 愕愕惠 悋 擧惠惘...