You can copy/paste HTML codes anywhere you like, for example in homepage, or even other sites
Determining the appropriate methodology for the security evaluation of equipment related to information and communication technology in the power industry Sofia Ahanj
*, Mahsa Rahmani, Zahra Sadeghigole, Veda Nobakht
Abstract -
Full Text (PDF)
Analysis of Cybercrime and Cyber Attacks during the COVID-19 Pandemic elnaz katanchi, babak porghahramani
*Abstract -
Full Text (PDF)
Browse searchable encryption schemes: Classification, methods and recent developments Mohammad Hossein Noorallahzadeh, Ahmad Gholami
*, Reza Alimoradi
Abstract -
Full Text (PDF)
Provide a New Way to Detect emails's Spam and Phishing and Bank Phishing Using Genetic Algorithms and Prohibited Search Majid Fani, MohammadAmin Torabi
*, Matineh Moghaddam
Abstract -
Full Text (PDF)
overview of ways to enhance the security of video surveillance networks using blockchain Ali Samouti
*, Yaser Elmi sola
Abstract -
Full Text (PDF)
Back to Original Issue