You can copy/paste HTML codes anywhere you like, for example in homepage, or even other sites
Intrusion Detection Using Evolutionary Hidden Markov Model mohammad darvishi
*, majid ghayoori
Abstract -
Full Text (PDF)
Threshold Implementation as a Countermeasure against Power Analysis Attacks Sara Zarei, Hadi Soleimany
*Abstract -
Full Text (PDF)
A survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions AmirHossein Pourshams
*, Mohammad Reza Hasani Ahangar, Mahmoud Saleh Esfahani
Abstract -
Full Text (PDF)
An Introduction to Differential Computation Analysis (DCA) on the withe-box cryptography algorithms Javad Alizadeh
*, Mohsen Seddighi, Hadi Soleimany
Abstract -
Full Text (PDF)
Identification and ranking of occupational and technical stress factors of information security in Aghajari oil and gas Exploitation Company mohamad jari, fariba nazari
*Abstract -
Full Text (PDF)
An automated approach to analysis and classification of Crypto-ransomwares’ family Seyed Ata S. jafari, Mohammadhadi Alaeiyan
*, aeed Parsa
Abstract -
Full Text (PDF)
Back to Original Issue