|
 |
Intrusion Detection Using Evolutionary Hidden Markov Model |
P. 3-16 |
|
 |
Mohammad Darvishi * , Majid Ghayoori  |
|
Abstract
(2416 Views) |
Full-Text (PDF)
(748 Downloads)
|
 |
Threshold Implementation as a Countermeasure against Power Analysis Attacks |
P. 17-28 |
|
 |
Sara Zarei , Hadi Soleimany *  |
|
Abstract
(2673 Views) |
Full-Text (PDF)
(569 Downloads)
|
 |
A survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions |
P. 29-50 |
|
 |
AmirHossein Pourshams * , Mohammad Reza Hasani Ahangar , Mahmoud Saleh Esfahani  |
|
Abstract
(3930 Views) |
Full-Text (PDF)
(776 Downloads)
|
 |
An Introduction to Differential Computation Analysis (DCA) on the withe-box cryptography algorithms |
P. 51-62 |
|
 |
Javad Alizadeh * , Mohsen Seddighi , Hadi Soleimany  |
|
Abstract
(4162 Views) |
Full-Text (PDF)
(608 Downloads)
|
 |
Identification and ranking of occupational and technical stress factors of information security in Aghajari oil and gas Exploitation Company |
P. 63-74 |
|
 |
Mohamad Jari , Fariba Nazari *  |
|
Abstract
(2277 Views) |
Full-Text (PDF)
(541 Downloads)
|
 |
An automated approach to analysis and classification of Crypto-ransomwares’ family |
P. 75-88 |
|
 |
Seyed Ata S. jafari , Mohammadhadi Alaeiyan * , Aeed Parsa  |
|
Abstract
(3755 Views) |
Full-Text (PDF)
(596 Downloads)
|