Davood Maleki

Learn More
Expansion of IT applications creates serious needs for environments with huge storage. In storage systems, capacity and agility are two factors which face limitations. This article evaluates the role of different techniques with regard to the possible methods for accessing to the storage systems. We have prepared three different scenarios using direct,(More)
Increasing the number of intrusions 1 and attacks 2 especially in large scale and distributed public data networks has initiated a new phenomenon in cyberspace's security. We have presented a novel approach using cooperative co-evolutionary immune system for intrusion detection in data networks. This is a machine learning method based on genetic algorithm(More)
  • 1