|
 |
A survey of rumor detection methods in social networks |
P. 3-14 |
|
 |
Fariba Sadeghi , Amir Jalaly Bidgoly *  |
|
Abstract
(4096 Views) |
Full-Text (PDF)
(1154 Downloads)
|
 |
Sponge structure; an introduction and its applications |
P. 15-30 |
|
 |
|
|
Abstract
(3405 Views) |
Full-Text (PDF)
(809 Downloads)
|
 |
A Review of Consensus Algorithms in Blockchain |
P. 31-42 |
|
 |
Jamileh Bahri * , Hamidreza Shayeghbrojeni  |
|
Abstract
(3478 Views) |
Full-Text (PDF)
(1347 Downloads)
|
 |
Criminology Analysis of Cybercrime |
P. 43-56 |
|
 |
|
|
Abstract
(3541 Views) |
Full-Text (PDF)
(982 Downloads)
|
 |
A New Hybrid Approach of K-Nearest Neighbors Algorithm with Particle Swarm Optimization for E-Mail Spam Detection |
P. 57-72 |
|
 |
Atefeh Mortazavi , Farhad Soleimanian Gharehchopogh *  |
|
Abstract
(4008 Views) |
Full-Text (PDF)
(914 Downloads)
|
 |
An Overview of the Methods for Enhancing the Communication Security in Designing Quantum-dot Cellular Automata Circuits |
P. 73-83 |
|
 |
|
|
Abstract
(2438 Views) |
Full-Text (PDF)
(679 Downloads)
|