|
|
 |
 |
|
 |
|
 |
|
Volume 9, Issue 2 (2-2021) |
 |
|
|
 |
Determining the appropriate methodology for the security evaluation of equipment related to information and communication technology in the power industry |
P. 3-12 |
|
 |
Sofia Ahanj * , Mahsa Rahmani , Zahra Sadeghigole , Veda Nobakht  |
|
Abstract
(2438 Views) |
Full-Text (PDF)
(1796 Downloads)
|
 |
Analysis of Cybercrime and Cyber Attacks during the COVID-19 Pandemic |
P. 23-42 |
|
 |
Elnaz Katanchi , Babak Porghahramani *  |
|
Abstract
(2175 Views) |
Full-Text (PDF)
(512 Downloads)
|
 |
Browse searchable encryption schemes: Classification, methods and recent developments |
P. 43-68 |
|
 |
Mohammad Hossein Noorallahzadeh , Ahmad Gholami * , Reza Alimoradi  |
|
Abstract
(2429 Views) |
Full-Text (PDF)
(943 Downloads)
|
 |
Provide a New Way to Detect emails's Spam and Phishing and Bank Phishing Using Genetic Algorithms and Prohibited Search |
P. 69-80 |
|
 |
Majid Fani , MohammadAmin Torabi * , Matineh Moghaddam  |
|
Abstract
(3529 Views) |
Full-Text (PDF)
(1124 Downloads)
|
 |
overview of ways to enhance the security of video surveillance networks using blockchain |
P. 81-97 |
|
 |
Ali Samouti * , Yaser Elmi sola  |
|
Abstract
(4050 Views) |
Full-Text (PDF)
(2455 Downloads)
|
|
|
|
|
|
|