|
 |
A survey of rumor detection methods in social networks |
P. 3-14 |
|
 |
Fariba Sadeghi , Amir Jalaly Bidgoly *  |
|
Abstract
(3812 Views) |
Full-Text (PDF)
(990 Downloads)
|
 |
Sponge structure; an introduction and its applications |
P. 15-30 |
|
 |
|
|
Abstract
(3129 Views) |
Full-Text (PDF)
(646 Downloads)
|
 |
A Review of Consensus Algorithms in Blockchain |
P. 31-42 |
|
 |
Jamileh Bahri * , Hamidreza Shayeghbrojeni  |
|
Abstract
(3247 Views) |
Full-Text (PDF)
(1200 Downloads)
|
 |
Criminology Analysis of Cybercrime |
P. 43-56 |
|
 |
|
|
Abstract
(3280 Views) |
Full-Text (PDF)
(836 Downloads)
|
 |
A New Hybrid Approach of K-Nearest Neighbors Algorithm with Particle Swarm Optimization for E-Mail Spam Detection |
P. 57-72 |
|
 |
Atefeh Mortazavi , Farhad Soleimanian Gharehchopogh *  |
|
Abstract
(3723 Views) |
Full-Text (PDF)
(757 Downloads)
|
 |
An Overview of the Methods for Enhancing the Communication Security in Designing Quantum-dot Cellular Automata Circuits |
P. 73-83 |
|
 |
|
|
Abstract
(2235 Views) |
Full-Text (PDF)
(539 Downloads)
|