[Home ] [Archive]   [ فارسی ]  
:: Main :: About :: Current Issue :: Archive :: Search :: Submit :: Contact ::
Main Menu
Home::
Journal Information::
Articles archive::
For Authors::
For Reviewers::
Registration::
Site Facilities::
Indexing::
Contact us::
::
Search in website

Advanced Search
..
Receive site information
Enter your Email in the following box to receive the site news and information.
..
Print ISSN
Print ISSN: 2476-3047
..

Authors Index

All issues
:: Shafieinejad, Alireza A Secure Auditable Log based on Blockchain [Volume 13, Number 2]
:: Eissazadeh, Soheil A Secure Auditable Log based on Blockchain [Volume 13, Number 2]
:: Arabnouri, Arian A Secure Auditable Log based on Blockchain [Volume 13, Number 2]
:: Safkhani, Masoumeh Violation of Integrity in an End-to-End Privacy-Preserving Protocol in IoT-Based Health Monitoring Systems [Volume 13, Number 2]
:: Gholami Sabzevar, Fatemeh Violation of Integrity in an End-to-End Privacy-Preserving Protocol in IoT-Based Health Monitoring Systems [Volume 13, Number 2]
:: Jahanbani, Mohsen Investigation of Power Analysis Attack on the SPEEDY Block Cipher and Countermeasure Using Domain-Oriented Masking (DOM) Method [Volume 13, Number 2]
:: Alizadeh, Javad Investigation of Power Analysis Attack on the SPEEDY Block Cipher and Countermeasure Using Domain-Oriented Masking (DOM) Method [Volume 13, Number 2]
:: Khoormehr, Keivan Investigation of Power Analysis Attack on the SPEEDY Block Cipher and Countermeasure Using Domain-Oriented Masking (DOM) Method [Volume 13, Number 2]
:: Ebrahimi Atani, Reza Prevention and detection of botnet attacks in IoT using ensemble learning methods [Volume 13, Number 2]
:: Pishdad, Fateme Prevention and detection of botnet attacks in IoT using ensemble learning methods [Volume 13, Number 2]
:: Shahgholi Ghahfarokhi, Behrouz Intelligent Automation of Scenario Execution in Cyber Ranges Using Machine Learning Techniques [Volume 13, Number 2]
:: Tork Ladani, Behrouz Intelligent Automation of Scenario Execution in Cyber Ranges Using Machine Learning Techniques [Volume 13, Number 2]
:: Karimi, Farnoosh Intelligent Automation of Scenario Execution in Cyber Ranges Using Machine Learning Techniques [Volume 13, Number 2]
:: Hadavi, Mohammad Ali Security Analysis of a Lightweight Ownership Transfer Protocol in RFID Systems [Volume 13, Number 2]
:: Adeli, Morteza Security Analysis of a Lightweight Ownership Transfer Protocol in RFID Systems [Volume 13, Number 2]
:: Karimi , Ghodsieh Security Analysis of a Lightweight Ownership Transfer Protocol in RFID Systems [Volume 13, Number 2]
:: Sadeghi , Atiye [Volume 13, Number 2]
:: Noroozi, Mahnaz [Volume 13, Number 2]
:: Majidi, Mohammad Hassan IEPS image encryption: Encryption based on PWLCM and SHA-512 hash function [Volume 13, Number 2]
:: Hashemi, Seyed Hesam Odin IEPS image encryption: Encryption based on PWLCM and SHA-512 hash function [Volume 13, Number 2]
:: Tafazoli, Tala Analysis of strategic issues in the field of general data protection regulations [Volume 13, Number 2]
:: ArabSorkhi, Abouzar Analysis of strategic issues in the field of general data protection regulations [Volume 13, Number 2]
:: Kalantari, Reza The method of risk analysis of communication and information infrastructure modules and the extraction of preventive security requirements [Volume 13, Number 1]
:: Arabsorkhi, Abouzar The method of risk analysis of communication and information infrastructure modules and the extraction of preventive security requirements [Volume 13, Number 1]
:: Yadegari, Amir Mansour The method of risk analysis of communication and information infrastructure modules and the extraction of preventive security requirements [Volume 13, Number 1]
:: Taaj, nasrin The method of risk analysis of communication and information infrastructure modules and the extraction of preventive security requirements [Volume 13, Number 1]
:: Rastegari, Parvin Preserving privacy in the age of information technology development, lessons from the european general data protection regulation [Volume 13, Number 1]
:: Siabi, Babak Preserving privacy in the age of information technology development, lessons from the european general data protection regulation [Volume 13, Number 1]
:: Tawakoli, Kasra FIDO Authentication Standard: Key Applications for Securing Information Exchange [Volume 13, Number 1]
:: Zamani, Mohammad Reza FIDO Authentication Standard: Key Applications for Securing Information Exchange [Volume 13, Number 1]
:: Asadi, Morteza FIDO Authentication Standard: Key Applications for Securing Information Exchange [Volume 13, Number 1]
:: Tadayon, Mohammad Hesam An Overview of Physical-Layer Authentication Methods, Performance Metrics, and Their Vulnerabilities to Attacks [Volume 13, Number 1]
:: Razavizadeh, Seyed Mohammad An Overview of Physical-Layer Authentication Methods, Performance Metrics, and Their Vulnerabilities to Attacks [Volume 13, Number 1]
:: Rajabi, Parsa An Overview of Physical-Layer Authentication Methods, Performance Metrics, and Their Vulnerabilities to Attacks [Volume 13, Number 1]
:: Rajabzadeh Asaar, Maryam A review of blockchain-based data auditing protocols and analyzing their general framework [Volume 13, Number 1]
:: Banaeian Far, Saeed A review of blockchain-based data auditing protocols and analyzing their general framework [Volume 13, Number 1]
:: Ahmadian Attari, Mahmoud A Survey Of Code-Based Cryptography Schemes and the Standardization Process of Post-Quantum Cryptography: The Beginning of a New Era [Volume 13, Number 1]
:: Zali, Amirhossein A Survey Of Code-Based Cryptography Schemes and the Standardization Process of Post-Quantum Cryptography: The Beginning of a New Era [Volume 13, Number 1]
:: Khalvan, Arash A Survey Of Code-Based Cryptography Schemes and the Standardization Process of Post-Quantum Cryptography: The Beginning of a New Era [Volume 13, Number 1]
:: Sadeghi, Sadegh A Comprehensive Exploration of Deep Learning Approaches in Differential Cryptanalysis of Lightweight Block Ciphers [Volume 12, Number 1]
:: Bagheri, Nasour A Comprehensive Exploration of Deep Learning Approaches in Differential Cryptanalysis of Lightweight Block Ciphers [Volume 12, Number 1]
:: Mirzaali Mazandarani, Iman A Comprehensive Exploration of Deep Learning Approaches in Differential Cryptanalysis of Lightweight Block Ciphers [Volume 12, Number 1]
:: Amini, Morteza Integrity checking of outsourced computations [Volume 12, Number 1]
:: Dolatnezhad Samarin, Somayeh Integrity checking of outsourced computations [Volume 12, Number 1]
:: Ali, Mohammad Privacy-preserving data and function in cloud environments using homomorphic encryption [Volume 12, Number 1]
:: Rahmati, Farhad Privacy-preserving data and function in cloud environments using homomorphic encryption [Volume 12, Number 1]
:: Hosseingholizadeh, Amin Privacy-preserving data and function in cloud environments using homomorphic encryption [Volume 12, Number 1]
:: Pirmoradian, Fatemeh Methods of analyzing and proving the security of security protocols [Volume 12, Number 1]
:: Safkhani, Masomeh Methods of analyzing and proving the security of security protocols [Volume 12, Number 1]
:: Dakhilalian, MOhammad Methods of analyzing and proving the security of security protocols [Volume 12, Number 1]
:: Sadeghi, Sadegh An overview of secure authentication methods using ECG biometrics with deep learning algorithms [Volume 12, Number 1]
:: Safari, Amirhossein An overview of secure authentication methods using ECG biometrics with deep learning algorithms [Volume 12, Number 1]
:: Mokhtari, Narges An overview of secure authentication methods using ECG biometrics with deep learning algorithms [Volume 12, Number 1]
:: Bagheri, Nasour Review of the security models with emphasis on leakage-resilient key exchange protocols [Volume 12, Number 1]
:: Zaeembashi, Ali Review of the security models with emphasis on leakage-resilient key exchange protocols [Volume 12, Number 1]
:: Zarbi, Nasser Review of the security models with emphasis on leakage-resilient key exchange protocols [Volume 12, Number 1]
:: Mala, Hamid Verifiable Database Supporting Range Query [Volume 12, Number 2]
:: Tahami, Seyed Hossein Verifiable Database Supporting Range Query [Volume 12, Number 2]
:: Jahanian, Ali FPGA Implementation of Polynomial Multiplication in NTRU Prime PQC Algorithms [Volume 12, Number 2]
:: Salarifard , Raziyeh FPGA Implementation of Polynomial Multiplication in NTRU Prime PQC Algorithms [Volume 12, Number 2]
:: Rashidian, Reza FPGA Implementation of Polynomial Multiplication in NTRU Prime PQC Algorithms [Volume 12, Number 2]
:: Noorani Asl, Seyyed Hadi Practical key recovery attack on authentication and key agreement protocol SecAuthUAV in a network of drones and provide an improved protocol [Volume 12, Number 2]
:: Alizadeh, Javad Practical key recovery attack on authentication and key agreement protocol SecAuthUAV in a network of drones and provide an improved protocol [Volume 12, Number 2]
:: Samiei, Mahdiyeh A comprehensive evaluation of deep learning based steganalysis performance in detecting spatial methods [Volume 12, Number 2]
:: Sabeti, Vajiheh A comprehensive evaluation of deep learning based steganalysis performance in detecting spatial methods [Volume 12, Number 2]
:: Bagheri, Nasour Electrocardiogram Signal Authentication System based on Deep Learning [Volume 12, Number 2]
:: Beigi, Akram Electrocardiogram Signal Authentication System based on Deep Learning [Volume 12, Number 2]
:: Maleki Lonbar, Sajjad Electrocardiogram Signal Authentication System based on Deep Learning [Volume 12, Number 2]
:: Tadayon, Mohammad Hesam Analysis of global trends in providing educational frameworks for training cyber security professionals [Volume 12, Number 2]
:: Rahdari, Ahmad Analysis of global trends in providing educational frameworks for training cyber security professionals [Volume 12, Number 2]
:: Niksefat, Salman A New Mixing Scheme to Improve Privacy in Bitcoin Cryptocurrency Transactions [Volume 12, Number 2]
:: Norouzi Cholcheh, Hadi A New Mixing Scheme to Improve Privacy in Bitcoin Cryptocurrency Transactions [Volume 12, Number 2]
:: Erfani, Hossein A Secure Authentication and Key Agreement Scheme for LoRaWAN [Volume 12, Number 2]
:: Hajian, Rahman A Secure Authentication and Key Agreement Scheme for LoRaWAN [Volume 12, Number 2]
:: sabaei, Mohamadamin A Secure Authentication and Key Agreement Scheme for LoRaWAN [Volume 12, Number 2]
:: Palimi, Sahar A Secure Authentication and Key Agreement Scheme for LoRaWAN [Volume 12, Number 2]
:: Jafari, Zahra A Secure Authentication and Key Agreement Scheme for LoRaWAN [Volume 12, Number 2]
:: Aref, Mohammadreza Consensus Method with High Security and Low Communication Load [Volume 11, Number 2]
:: Mohajery, Javad Consensus Method with High Security and Low Communication Load [Volume 11, Number 2]
:: Hediehloo, Alireza Consensus Method with High Security and Low Communication Load [Volume 11, Number 2]
:: Houshmand , Monireh Multi-Party Quantum Dialogue with the Capability to Expand the Number of Users at Runtime [Volume 11, Number 2]
:: Homaei , Hossein Multi-Party Quantum Dialogue with the Capability to Expand the Number of Users at Runtime [Volume 11, Number 2]
:: Khazaei, Ali Multi-Party Quantum Dialogue with the Capability to Expand the Number of Users at Runtime [Volume 11, Number 2]
:: Sadeghigol, Zahra An Overview of Security Standards in the Field of ICT in order to Determining the Appropriate Methodology for the Security Evaluation of Equipment Related to Information and Communication Technology in the Power Industry [Volume 11, Number 1]
:: Nobakht, Vida An Overview of Security Standards in the Field of ICT in order to Determining the Appropriate Methodology for the Security Evaluation of Equipment Related to Information and Communication Technology in the Power Industry [Volume 11, Number 1]
:: Rahmani, Mahsa An Overview of Security Standards in the Field of ICT in order to Determining the Appropriate Methodology for the Security Evaluation of Equipment Related to Information and Communication Technology in the Power Industry [Volume 11, Number 1]
:: Ahanj , Sofia An Overview of Security Standards in the Field of ICT in order to Determining the Appropriate Methodology for the Security Evaluation of Equipment Related to Information and Communication Technology in the Power Industry [Volume 11, Number 1]
:: Sedighian Kashi, Saeed Inventing a Method to Save the Fog Node from Attacks [Volume 11, Number 1]
:: Khasteh, Seyed Hossein Inventing a Method to Save the Fog Node from Attacks [Volume 11, Number 1]
:: Azarkasb, Seyed Omid Inventing a Method to Save the Fog Node from Attacks [Volume 11, Number 1]
:: Ghasemi Gol, Mohammad Providing an RPL-based Reliable Routing Method in the Internet of Things [Volume 11, Number 1]
:: Khatouni, Reza Providing an RPL-based Reliable Routing Method in the Internet of Things [Volume 11, Number 1]
:: Salarifard, Raziyeh A High-Speed Systolic Field Multiplication for Edwards 25519 Curve [Volume 11, Number 1]
:: Akhoundi Zardeyni, Muhammad Rasoul A High-Speed Systolic Field Multiplication for Edwards 25519 Curve [Volume 11, Number 1]
:: Tork Ladani, Behrouz A Tool for Detecting Man in the Browser (MitB) Attacks using Dynamic Analysis of Web Pages [Volume 11, Number 1]
:: Iranpour Mobarakeh, Majid A Tool for Detecting Man in the Browser (MitB) Attacks using Dynamic Analysis of Web Pages [Volume 11, Number 1]
:: Dorri Nogoorani , Sadegh Management of Electronic Health Records with Preservation of Privacy using the Blockchain Technology [Volume 11, Number 1]
:: Rezaei, Mahsa Management of Electronic Health Records with Preservation of Privacy using the Blockchain Technology [Volume 11, Number 1]
:: Jadidi, Mohammad Masking Midori64 against Correlation Power Analysis Attack [Volume 11, Number 1]
:: Khadem, Behrooz Masking Midori64 against Correlation Power Analysis Attack [Volume 11, Number 1]
:: Ghanbari , Hamid Masking Midori64 against Correlation Power Analysis Attack [Volume 11, Number 1]
:: Moazami, Farokhlagha Lightweight and Secure Authentication Key Agreement Protocol for Smart Grid [Volume 11, Number 1]
:: Baghestani , Seyed Hamid Lightweight and Secure Authentication Key Agreement Protocol for Smart Grid [Volume 11, Number 1]
:: Alizadeh, Bijan Vulnerability Analysis of Digital Circuits against Capacitor-based Timing Hardware Trojan [Volume 11, Number 1]
:: Khormizi, Fatemeh Vulnerability Analysis of Digital Circuits against Capacitor-based Timing Hardware Trojan [Volume 11, Number 1]
:: Hamian, Negin Unmanned Cyber Security Requirements in sub-Transmission Substation [Volume 11, Number 1]
:: Zafari, Leila Unmanned Cyber Security Requirements in sub-Transmission Substation [Volume 11, Number 1]
:: Mozafari , Azam Unmanned Cyber Security Requirements in sub-Transmission Substation [Volume 11, Number 1]
:: Alizadeh, Javad Key Discovery and Forgery Attack on a Key Agreement Protocol with Authentication for Wireless Sensor Network [Volume 11, Number 1]
:: Allahdadi Ghiyasabadi , Amir Key Discovery and Forgery Attack on a Key Agreement Protocol with Authentication for Wireless Sensor Network [Volume 11, Number 1]
:: Sobhani, Masomeh Wavelet-based Image Steganography using the Idea of Embedding in Areas of High Frequency Subbands with Large Variations [Volume 11, Number 2]
:: Sabeti , Vajiheh Wavelet-based Image Steganography using the Idea of Embedding in Areas of High Frequency Subbands with Large Variations [Volume 11, Number 2]
:: Hadavi, Mohammad Ali Modeling Attacker’s Capability Level Focusing on Injection Attacks on Web Applications [Volume 11, Number 2]
:: Moqimi , Sara Modeling Attacker’s Capability Level Focusing on Injection Attacks on Web Applications [Volume 11, Number 2]
:: Moazzami, Farrokhlagha Security Analysis of an Anonymous Authentication and Key Agreement Scheme in Wireless Body Area Network [Volume 11, Number 2]
:: Marandi, Saba Security Analysis of an Anonymous Authentication and Key Agreement Scheme in Wireless Body Area Network [Volume 11, Number 2]
:: Bamdad Moghaddam, Azadeh Designing and Implementing two Laboratory Samples of the Intelligent System for Detecting Encrypted VoIP Skype Traffic and the Lantern Escape Tool using Deep Learning Method [Volume 11, Number 2]
:: Taaj, Nasrin Designing and Implementing two Laboratory Samples of the Intelligent System for Detecting Encrypted VoIP Skype Traffic and the Lantern Escape Tool using Deep Learning Method [Volume 11, Number 2]
:: saeidi, Mahmoud Designing and Implementing two Laboratory Samples of the Intelligent System for Detecting Encrypted VoIP Skype Traffic and the Lantern Escape Tool using Deep Learning Method [Volume 11, Number 2]
:: Sadeghiyan, Babak Electronic Money Laundering Detection in Transactions of Payment Service Providers [Volume 11, Number 2]
:: Nazari, Ali Electronic Money Laundering Detection in Transactions of Payment Service Providers [Volume 11, Number 2]
:: Elmi sola, Yaser overview of ways to enhance the security of video surveillance networks using blockchain [Volume 9, Number 2]
:: Samouti, Ali overview of ways to enhance the security of video surveillance networks using blockchain [Volume 9, Number 2]
:: Moghaddam, Matineh Provide a New Way to Detect emails's Spam and Phishing and Bank Phishing Using Genetic Algorithms and Prohibited Search [Volume 9, Number 2]
:: Torabi, MohammadAmin Provide a New Way to Detect emails's Spam and Phishing and Bank Phishing Using Genetic Algorithms and Prohibited Search [Volume 9, Number 2]
:: Fani, Majid Provide a New Way to Detect emails's Spam and Phishing and Bank Phishing Using Genetic Algorithms and Prohibited Search [Volume 9, Number 2]
:: Alimoradi, Reza Browse searchable encryption schemes: Classification, methods and recent developments [Volume 9, Number 2]
:: Gholami, Ahmad Browse searchable encryption schemes: Classification, methods and recent developments [Volume 9, Number 2]
:: Noorallahzadeh, Mohammad Hossein Browse searchable encryption schemes: Classification, methods and recent developments [Volume 9, Number 2]
:: porghahramani, babak Analysis of Cybercrime and Cyber Attacks during the COVID-19 Pandemic [Volume 9, Number 2]
:: katanchi, elnaz Analysis of Cybercrime and Cyber Attacks during the COVID-19 Pandemic [Volume 9, Number 2]
:: Nobakht, Veda Determining the appropriate methodology for the security evaluation of equipment related to information and communication technology in the power industry [Volume 9, Number 2]
:: Sadeghigole, Zahra Determining the appropriate methodology for the security evaluation of equipment related to information and communication technology in the power industry [Volume 9, Number 2]
:: Rahmani, Mahsa Determining the appropriate methodology for the security evaluation of equipment related to information and communication technology in the power industry [Volume 9, Number 2]
:: Ahanj, Sofia Determining the appropriate methodology for the security evaluation of equipment related to information and communication technology in the power industry [Volume 9, Number 2]
:: Ferdosi, Zahra Evaluating Challenges of the National Cryptocurrency [Volume 9, Number 1]
:: Bahrololum, Marjan Evaluating Challenges of the National Cryptocurrency [Volume 9, Number 1]
:: Orumiehchiha, Mohammad Ali Security of Sponge structures [Volume 9, Number 1]
:: Khalesi, Akram Security of Sponge structures [Volume 9, Number 1]
:: Shokrollahi, Saeed A Review of Intrusion Detection Defense Solutions Based on Software Defined Network [Volume 9, Number 1]
:: Mohammadalipour, Masoud A Review of Intrusion Detection Defense Solutions Based on Software Defined Network [Volume 9, Number 1]
:: Sakhidek Hovshin, Mohammad A New Model for Email Spam Detection using Hybrid of Magnetic Optimization Algorithm with Harmony Search Algorithm [Volume 9, Number 1]
:: Soleimanian Gharehchopogh, farhad A New Model for Email Spam Detection using Hybrid of Magnetic Optimization Algorithm with Harmony Search Algorithm [Volume 9, Number 1]
:: Mohammadi, HamidReza A survey on the wi-fi wireless network systems penetration approaches [Volume 9, Number 1]
:: bag-mohammadi, Mozafar A survey on RPL attacks and their countermeasures [Volume 9, Number 1]
:: Seifi, Younes A survey on RPL attacks and their countermeasures [Volume 9, Number 1]
:: Pishdar, Mohammad A survey on RPL attacks and their countermeasures [Volume 9, Number 1]
:: nazari, fariba Identification and ranking of occupational and technical stress factors of information security in Aghajari oil and gas Exploitation Company [Volume 8, Number 2]
:: jari, mohamad Identification and ranking of occupational and technical stress factors of information security in Aghajari oil and gas Exploitation Company [Volume 8, Number 2]
:: Parsa, aeed An automated approach to analysis and classification of Crypto-ransomwares’ family [Volume 8, Number 2]
:: Alaeiyan, Mohammadhadi An automated approach to analysis and classification of Crypto-ransomwares’ family [Volume 8, Number 2]
:: S. jafari, Seyed Ata An automated approach to analysis and classification of Crypto-ransomwares’ family [Volume 8, Number 2]
:: Soleimany, Hadi An Introduction to Differential Computation Analysis (DCA) on the withe-box cryptography algorithms [Volume 8, Number 2]
:: Seddighi, Mohsen An Introduction to Differential Computation Analysis (DCA) on the withe-box cryptography algorithms [Volume 8, Number 2]
:: Alizadeh, Javad An Introduction to Differential Computation Analysis (DCA) on the withe-box cryptography algorithms [Volume 8, Number 2]
:: Saleh Esfahani, Mahmoud A survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions [Volume 8, Number 2]
:: Hasani Ahangar, Mohammad Reza A survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions [Volume 8, Number 2]
:: Pourshams, AmirHossein A survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions [Volume 8, Number 2]
:: Soleimany, Hadi Threshold Implementation as a Countermeasure against Power Analysis Attacks [Volume 8, Number 2]
:: Zarei , Sara Threshold Implementation as a Countermeasure against Power Analysis Attacks [Volume 8, Number 2]
:: ghayoori, majid Intrusion Detection Using Evolutionary Hidden Markov Model [Volume 8, Number 2]
:: darvishi, mohammad Intrusion Detection Using Evolutionary Hidden Markov Model [Volume 8, Number 2]
:: Jalaly Bidgoly, Amir A survey of rumor detection methods in social networks [Volume 8, Number 1]
:: Sadeghi, Fariba A survey of rumor detection methods in social networks [Volume 8, Number 1]
:: Soleimanian Gharehchopogh, farhad A New Hybrid Approach of K-Nearest Neighbors Algorithm with Particle Swarm Optimization for E-Mail Spam Detection [Volume 8, Number 1]
:: Mortazavi, Atefeh A New Hybrid Approach of K-Nearest Neighbors Algorithm with Particle Swarm Optimization for E-Mail Spam Detection [Volume 8, Number 1]
:: shayeghbrojeni, hamidreza A Review of Consensus Algorithms in Blockchain [Volume 8, Number 1]
:: bahri, jamileh A Review of Consensus Algorithms in Blockchain [Volume 8, Number 1]
:: Abbasi, Mahdi A Performance Survey of Meta-Heuristic And Brute-Force Search Algorithms to Cryptanalysis The SDES Encryption Algorithm [Volume 7, Number 2]
:: Moradi, Meysam A Performance Survey of Meta-Heuristic And Brute-Force Search Algorithms to Cryptanalysis The SDES Encryption Algorithm [Volume 7, Number 2]
:: pazhouhesh, amin Fundamental Issues in Criminalization of Virtal Cybercrime [Volume 7, Number 2]
:: zamani, afsaneh Fundamental Issues in Criminalization of Virtal Cybercrime [Volume 7, Number 2]
:: ghayoori sales, majid Overview of Intrusion Detection Techniques in Database [Volume 7, Number 2]
:: moradi, javad Overview of Intrusion Detection Techniques in Database [Volume 7, Number 2]
:: Deypir, Mahmood Survey the Security Function of Integration of vehicular ad hoc Networks with Software-defiend Networks [Volume 7, Number 2]
:: ghasabi, Mozhgan Survey the Security Function of Integration of vehicular ad hoc Networks with Software-defiend Networks [Volume 7, Number 2]
:: Moazemi, Farokh Lagha Investigating Methods of Kleptography [Volume 7, Number 2]
:: Soleimany, Hadi Investigating Methods of Kleptography [Volume 7, Number 2]
:: Shajari, Mehdi IEC 60870-5-104 Protocol Security Challenges and Countermeasures Identification [Volume 7, Number 2]
:: Ahmadian, Mohammad mehdi IEC 60870-5-104 Protocol Security Challenges and Countermeasures Identification [Volume 7, Number 2]
:: zamani, afsaneh Prevention Management of Realization and continuity of the futile cycle of cyber-crimes [Volume 7, Number 1]
:: pazhouhesh, amin Prevention Management of Realization and continuity of the futile cycle of cyber-crimes [Volume 7, Number 1]
:: Asgari Mehr, Masoud Check the Safe coding standards in language C++ [Volume 7, Number 1]
:: mohammadnia, mousa Check the Safe coding standards in language C++ [Volume 7, Number 1]
:: moammer, morteza Check the Safe coding standards in language C++ [Volume 7, Number 1]
:: amiri, Mohammed Mohsen Check the Safe coding standards in language C++ [Volume 7, Number 1]
:: Haj Seyyed Javadi, Hamid Search over Encrypted Data: Functionalities and Challenges [Volume 7, Number 1]
:: Bayat, Majid Search over Encrypted Data: Functionalities and Challenges [Volume 7, Number 1]
:: Najafi, Aniseh Search over Encrypted Data: Functionalities and Challenges [Volume 7, Number 1]
:: Sadeghi, Mohammad Reaza Approaches and challenges of the white-box model of the block cipher schemes implementation [Volume 7, Number 1]
:: Soleimany, Hadi Approaches and challenges of the white-box model of the block cipher schemes implementation [Volume 7, Number 1]
:: MoradAfifi, Raheleh Jump Index in T-functions for designing a new basic structure of stream ciphers [Volume 5, Number 1]
:: Sajadieh, Seyed Mahdi Jump Index in T-functions for designing a new basic structure of stream ciphers [Volume 5, Number 1]
:: Hadipour, Ali Jump Index in T-functions for designing a new basic structure of stream ciphers [Volume 5, Number 1]
:: golbaghi, hadi Metamorphic Malware Identification Combining Static and Dynamic Analyzes [Volume 7, Number 1]
:: khalilian, alireza Metamorphic Malware Identification Combining Static and Dynamic Analyzes [Volume 7, Number 1]
:: vahidi asl, mojtaba Metamorphic Malware Identification Combining Static and Dynamic Analyzes [Volume 7, Number 1]
:: Nowroozi, Alireza A review of privacy in online social networks [Volume 6, Number 2]
:: Ghezavati, Kamaleddin A review of privacy in online social networks [Volume 6, Number 2]
:: Naderi, Shaghayegh Risk Management in Local Search Engine Systems [Volume 6, Number 2]
:: Koushkaki, Hassan Risk Management in Local Search Engine Systems [Volume 6, Number 2]
:: Taj Neyshabouri, Nasrin Risk Management in Local Search Engine Systems [Volume 6, Number 2]
:: Omidvar Sarkandi, Mahsa Risk Management in Local Search Engine Systems [Volume 6, Number 2]
:: Kaedi, Marjan A Review on Website Fingerprinting Attacks [Volume 6, Number 2]
:: Bohlooli, Ali A Review on Website Fingerprinting Attacks [Volume 6, Number 2]
:: Taebi, Maryam A Review on Website Fingerprinting Attacks [Volume 6, Number 2]
:: Shakeri, Hassan A Confidence-Aware Trust Approach for Detecting Indirect Sybil Attacks in Wireless Sensor Networks Considering Time Factor [Volume 6, Number 2]
:: Tabatabaei Parsa, Sayed Mohammad A Confidence-Aware Trust Approach for Detecting Indirect Sybil Attacks in Wireless Sensor Networks Considering Time Factor [Volume 6, Number 2]
:: Zaghyan, Ali Survey of Electronic Election Based on HomomorphicEncryption [Volume 6, Number 2]
:: Sajjadieh, Seyed Mahdi Survey of Electronic Election Based on HomomorphicEncryption [Volume 6, Number 2]
:: Rezaee Adaryani, Sajad Survey of Electronic Election Based on HomomorphicEncryption [Volume 6, Number 2]
:: Norozi, Zeinolabedin A Survey on Lightweight Hardware Implementation of AES [Volume 6, Number 2]
:: Bagheri, Nasour A Survey on Lightweight Hardware Implementation of AES [Volume 6, Number 2]
:: Jahanbani, Mohsen A Survey on Lightweight Hardware Implementation of AES [Volume 6, Number 2]
:: Naderi, Shaghayegh Security Indexes of Development Life Cycle of Local Search Engines [Volume 6, Number 1]
:: Koushkaki, Hassan Security Indexes of Development Life Cycle of Local Search Engines [Volume 6, Number 1]
:: Omidvar Sarkandi, Mahsa Security Indexes of Development Life Cycle of Local Search Engines [Volume 6, Number 1]
:: Taj Neyshabouri, Nasrin Security Indexes of Development Life Cycle of Local Search Engines [Volume 6, Number 1]
:: Zolfaghari, Zahra Introduction of TMTO attack on Hash Functions [Volume 6, Number 1]
:: Bagheri, Nasour Introduction of TMTO attack on Hash Functions [Volume 6, Number 1]
:: mala, hamid Survey of Secure Multiparty Summation protocols and their challenges [Volume 6, Number 1]
:: ashouri talouki, maede Survey of Secure Multiparty Summation protocols and their challenges [Volume 6, Number 1]
:: azizi, shadi Survey of Secure Multiparty Summation protocols and their challenges [Volume 6, Number 1]
:: mala, hamid Survey of group location privacy approaches in location-based services and its challenges [Volume 5, Number 2]
:: Ashouri-Talouki, maede Survey of group location privacy approaches in location-based services and its challenges [Volume 5, Number 2]
:: azizi, shadi Survey of group location privacy approaches in location-based services and its challenges [Volume 5, Number 2]
:: alipour, elahe Review of Image Steganography Based on LSB and Pixel Classification and Providing a New Method in This Area [Volume 5, Number 2]
:: rajabloo, samira Review of Image Steganography Based on LSB and Pixel Classification and Providing a New Method in This Area [Volume 5, Number 2]
:: fateh, mansoor Review of Image Steganography Based on LSB and Pixel Classification and Providing a New Method in This Area [Volume 5, Number 2]
:: Ebrahimi Atani, Reza An overview of privacy preserving Data Publishing Techniques [Volume 5, Number 2]
:: Sadeghpour, Mehdi An overview of privacy preserving Data Publishing Techniques [Volume 5, Number 2]
:: Goharei, Mohammad Reza Overview of Jamming Operation in Smart Network [Volume 5, Number 2]
:: Arghavani, Mohamadamin A Survey of Cube, Differential Fault Analysis Attacks and Linear Structures on Keccak Hash Function (SHA-3) [Volume 5, Number 2]
:: Safkhani, Masoumeh A Survey of Cube, Differential Fault Analysis Attacks and Linear Structures on Keccak Hash Function (SHA-3) [Volume 5, Number 2]
:: Bayat, Majid A review on attribute based access control in cloud environment [Volume 5, Number 1]
:: Doostari, Mohammad Ali A review on attribute based access control in cloud environment [Volume 5, Number 1]
:: Rezaei, Saeid A review on attribute based access control in cloud environment [Volume 5, Number 1]
:: mansoori, parvaneh Performance assessment Bio- Inspired algorithms for solving backpack in the form of objective function minimization. [Volume 5, Number 1]
:: moradi, meysam Performance assessment Bio- Inspired algorithms for solving backpack in the form of objective function minimization. [Volume 5, Number 1]
:: roozbahani, mahtab Performance assessment Bio- Inspired algorithms for solving backpack in the form of objective function minimization. [Volume 5, Number 1]
:: Shakeri, Hassan A Trust Management Approach for Sybil Attack Detection in Wireless Sensor Networks [Volume 5, Number 1]
:: Tabatabaei parsa, Sayed Mohamamd A Trust Management Approach for Sybil Attack Detection in Wireless Sensor Networks [Volume 5, Number 1]
:: Ghasabi, Mozhgan Security challenges and solutions in software defined networks [Volume 5, Number 1]
:: Deypir, Mahmood Security challenges and solutions in software defined networks [Volume 5, Number 1]
:: Jafari Navimipour, Nima [Volume 5, Number 1]
:: Mohammadi, Seyedeh Zeinab [Volume 5, Number 1]
:: Feili, Mina Awareness and Standards in the Field of Information Security_ [Volume 4, Number 2]
:: esmaeilpour, mansour Awareness and Standards in the Field of Information Security_ [Volume 4, Number 2]
:: Ebrahimi Atani, Reza An Overview of Security attacks and Software Implementation of Authenticated Encryption Algorithms in CAESAR Competition [Volume 4, Number 2]
:: Rezaei, Mohsen An Overview of Security attacks and Software Implementation of Authenticated Encryption Algorithms in CAESAR Competition [Volume 4, Number 2]
:: alimoradi, reza Hyper Elliptic Curve In Cryptography [Volume 4, Number 2]
:: moradi, meysam Evaluate The Performance Of Meta-heuristic Different Algorithms in the Discovery of the Cryption Key Vigenere Encryption Algorithm [Volume 4, Number 1]
:: ahmadipari, mahdi Evaluate The Performance Of Meta-heuristic Different Algorithms in the Discovery of the Cryption Key Vigenere Encryption Algorithm [Volume 4, Number 1]
:: nazari farokhi, ebrahim Provida Method Based onSupport VectorMachinesForIntrusion DetectioninComputer Networks [Volume 3, Number 2]
:: nazari farokhi, Mohammad Provida Method Based onSupport VectorMachinesForIntrusion DetectioninComputer Networks [Volume 3, Number 2]
:: salehpour, narges Provida Method Based onSupport VectorMachinesForIntrusion DetectioninComputer Networks [Volume 3, Number 2]
:: javan, mohammadreza Relay Selection for Secure Device to Device Communications [Volume 3, Number 2]
:: naderi, sonia Relay Selection for Secure Device to Device Communications [Volume 3, Number 2]
:: Aghamohammadi, Reza [Volume 3, Number 2]
:: Bagheri, Nasoor [Volume 3, Number 2]
:: Nasiri, Hamid An overview of software protection techniques against static and dynamic Attacks [Volume 4, Number 1]
:: Ebrahimi Atani, Reza An overview of software protection techniques against static and dynamic Attacks [Volume 4, Number 1]
:: Rashidi, Afshin An overview of software protection techniques against static and dynamic Attacks [Volume 4, Number 1]
:: Ebrahimi Atani, Reza A review of the smart phone botnets and their confronting Techniques [Volume 4, Number 1]
:: Abed, Elham A review of the smart phone botnets and their confronting Techniques [Volume 4, Number 1]
دوفصل نامه علمی  منادی امنیت فضای تولید و تبادل اطلاعات( افتا) Biannual Journal Monadi for Cyberspace Security (AFTA)
Persian site map - English site map - Created in 0.06 seconds with 27 queries by YEKTAWEB 4700