You can copy/paste HTML codes anywhere you like, for example in homepage, or even other sites
Intrusion Detection Using Evolutionary Hidden Markov Model
mohammad darvishi *, majid ghayoori
Abstract - Full Text (PDF)
mohammad darvishi *, majid ghayoori
Abstract - Full Text (PDF)
Threshold Implementation as a Countermeasure against Power Analysis Attacks
Sara Zarei, Hadi Soleimany *
Abstract - Full Text (PDF)
Sara Zarei, Hadi Soleimany *
Abstract - Full Text (PDF)
A survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions
AmirHossein Pourshams *, Mohammad Reza Hasani Ahangar, Mahmoud Saleh Esfahani
Abstract - Full Text (PDF)
AmirHossein Pourshams *, Mohammad Reza Hasani Ahangar, Mahmoud Saleh Esfahani
Abstract - Full Text (PDF)
An Introduction to Differential Computation Analysis (DCA) on the withe-box cryptography algorithms
Javad Alizadeh *, Mohsen Seddighi, Hadi Soleimany
Abstract - Full Text (PDF)
Javad Alizadeh *, Mohsen Seddighi, Hadi Soleimany
Abstract - Full Text (PDF)