|
 |
A survey of rumor detection methods in social networks |
P. 3-14 |
|
 |
Fariba Sadeghi , Amir Jalaly Bidgoly *  |
|
Abstract
(3719 Views) |
Full-Text (PDF)
(972 Downloads)
|
 |
Sponge structure; an introduction and its applications |
P. 15-30 |
|
 |
|
|
Abstract
(3023 Views) |
Full-Text (PDF)
(626 Downloads)
|
 |
A Review of Consensus Algorithms in Blockchain |
P. 31-42 |
|
 |
Jamileh Bahri * , Hamidreza Shayeghbrojeni  |
|
Abstract
(3174 Views) |
Full-Text (PDF)
(1178 Downloads)
|
 |
Criminology Analysis of Cybercrime |
P. 43-56 |
|
 |
|
|
Abstract
(3177 Views) |
Full-Text (PDF)
(818 Downloads)
|
 |
A New Hybrid Approach of K-Nearest Neighbors Algorithm with Particle Swarm Optimization for E-Mail Spam Detection |
P. 57-72 |
|
 |
Atefeh Mortazavi , Farhad Soleimanian Gharehchopogh *  |
|
Abstract
(3623 Views) |
Full-Text (PDF)
(737 Downloads)
|
 |
An Overview of the Methods for Enhancing the Communication Security in Designing Quantum-dot Cellular Automata Circuits |
P. 73-83 |
|
 |
|
|
Abstract
(2172 Views) |
Full-Text (PDF)
(528 Downloads)
|