|
|
|
|
|
 |
Information |
 |
|
You can copy/paste HTML codes anywhere you like, for example in homepage, or even other sites
Intrusion Detection Using Evolutionary Hidden Markov Model mohammad darvishi *, majid ghayoori Abstract - Full Text (PDF)
Threshold Implementation as a Countermeasure against Power Analysis Attacks Sara Zarei, Hadi Soleimany *Abstract - Full Text (PDF)
A survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions AmirHossein Pourshams *, Mohammad Reza Hasani Ahangar, Mahmoud Saleh Esfahani Abstract - Full Text (PDF)
An Introduction to Differential Computation Analysis (DCA) on the withe-box cryptography algorithms Javad Alizadeh *, Mohsen Seddighi, Hadi Soleimany Abstract - Full Text (PDF)
Identification and ranking of occupational and technical stress factors of information security in Aghajari oil and gas Exploitation Company mohamad jari, fariba nazari *Abstract - Full Text (PDF)
An automated approach to analysis and classification of Crypto-ransomwares’ family Seyed Ata S. jafari, Mohammadhadi Alaeiyan *, aeed Parsa Abstract - Full Text (PDF)
Back to Original Issue
|
|
|
|
|
|
|
|
|
|
|