|
 |
A Review of Intrusion Detection Defense Solutions Based on Software Defined Network |
P. 18-1 |
|
 |
Masoud Mohammadalipour * , Saeed Shokrollahi  |
|
Abstract
(2792 Views) |
Full-Text (PDF)
(2531 Downloads)
|
 |
A survey on RPL attacks and their countermeasures |
P. 30-19 |
|
 |
Mohammad Pishdar * , Younes Seifi , Mozafar Bag-mohammadi  |
|
Abstract
(3562 Views) |
Full-Text (PDF)
(1292 Downloads)
|
 |
A survey on the wi-fi wireless network systems penetration approaches |
P. 38-31 |
|
 |
HamidReza Mohammadi *  |
|
Abstract
(4530 Views) |
Full-Text (PDF)
(2101 Downloads)
|
 |
A New Model for Email Spam Detection using Hybrid of Magnetic Optimization Algorithm with Harmony Search Algorithm |
P. 50-39 |
|
 |
Farhad Soleimanian Gharehchopogh * , Mohammad Sakhidek Hovshin  |
|
Abstract
(3008 Views) |
Full-Text (PDF)
(770 Downloads)
|
 |
Security of Sponge structures |
P. 62-51 |
|
 |
Akram Khalesi , Mohammad Ali Orumiehchiha *  |
|
Abstract
(3001 Views) |
Full-Text (PDF)
(1412 Downloads)
|
 |
Evaluating Challenges of the National Cryptocurrency |
P. 76-63 |
|
 |
Marjan Bahrololum * , Zahra Ferdosi  |
|
Abstract
(2914 Views) |
Full-Text (PDF)
(810 Downloads)
|