|
 |
Fundamental Issues in Criminalization of Virtal Cybercrime
|
P. 14-3 |
|
 |
Afsaneh Zamani * , Amin Pazhouhesh  |
|
Abstract
(3446 Views) |
Full-Text (PDF)
(1121 Downloads)
|
 |
IEC 60870-5-104 Protocol Security Challenges and Countermeasures Identification |
P. 30-15 |
|
 |
Mohammad mehdi Ahmadian , Mehdi Shajari *  |
|
Abstract
(4497 Views) |
Full-Text (PDF)
(1424 Downloads)
|
 |
Investigating Methods of Kleptography |
P. 40-31 |
|
 |
Hadi Soleimany * , Farokh Lagha Moazemi  |
|
Abstract
(3369 Views) |
Full-Text (PDF)
(864 Downloads)
|
 |
Survey the Security Function of Integration of vehicular ad hoc Networks with Software-defiend Networks |
P. 54-41 |
|
 |
Mozhgan Ghasabi , Mahmood Deypir *  |
|
Abstract
(4116 Views) |
Full-Text (PDF)
(1066 Downloads)
|
 |
Overview of Intrusion Detection Techniques in Database
|
P. 62-55 |
|
 |
Javad Moradi * , Majid Ghayoori sales  |
|
Abstract
(3442 Views) |
Full-Text (PDF)
(1115 Downloads)
|
 |
A Performance Survey of Meta-Heuristic And Brute-Force Search Algorithms to Cryptanalysis The SDES Encryption Algorithm
|
P. 72-63 |
|
 |
Meysam Moradi * , Mahdi Abbasi  |
|
Abstract
(4246 Views) |
Full-Text (PDF)
(862 Downloads)
|