|
 |
A survey of rumor detection methods in social networks |
P. 3-14 |
|
 |
Fariba Sadeghi , Amir Jalaly Bidgoly *  |
|
Abstract
(3985 Views) |
Full-Text (PDF)
(1100 Downloads)
|
 |
Sponge structure; an introduction and its applications |
P. 15-30 |
|
 |
|
|
Abstract
(3292 Views) |
Full-Text (PDF)
(762 Downloads)
|
 |
A Review of Consensus Algorithms in Blockchain |
P. 31-42 |
|
 |
Jamileh Bahri * , Hamidreza Shayeghbrojeni  |
|
Abstract
(3370 Views) |
Full-Text (PDF)
(1307 Downloads)
|
 |
Criminology Analysis of Cybercrime |
P. 43-56 |
|
 |
|
|
Abstract
(3436 Views) |
Full-Text (PDF)
(938 Downloads)
|
 |
A New Hybrid Approach of K-Nearest Neighbors Algorithm with Particle Swarm Optimization for E-Mail Spam Detection |
P. 57-72 |
|
 |
Atefeh Mortazavi , Farhad Soleimanian Gharehchopogh *  |
|
Abstract
(3882 Views) |
Full-Text (PDF)
(867 Downloads)
|
 |
An Overview of the Methods for Enhancing the Communication Security in Designing Quantum-dot Cellular Automata Circuits |
P. 73-83 |
|
 |
|
|
Abstract
(2356 Views) |
Full-Text (PDF)
(628 Downloads)
|