|
|
 |
 |
|
 |
|
 |
|
Volume 9, Issue 2 (2-2021) |
 |
|
|
 |
Determining the appropriate methodology for the security evaluation of equipment related to information and communication technology in the power industry |
P. 3-12 |
|
 |
Sofia Ahanj * , Mahsa Rahmani , Zahra Sadeghigole , Veda Nobakht  |
|
Abstract
(2515 Views) |
Full-Text (PDF)
(1847 Downloads)
|
 |
Analysis of Cybercrime and Cyber Attacks during the COVID-19 Pandemic |
P. 23-42 |
|
 |
Elnaz Katanchi , Babak Porghahramani *  |
|
Abstract
(2240 Views) |
Full-Text (PDF)
(551 Downloads)
|
 |
Browse searchable encryption schemes: Classification, methods and recent developments |
P. 43-68 |
|
 |
Mohammad Hossein Noorallahzadeh , Ahmad Gholami * , Reza Alimoradi  |
|
Abstract
(2491 Views) |
Full-Text (PDF)
(989 Downloads)
|
 |
Provide a New Way to Detect emails's Spam and Phishing and Bank Phishing Using Genetic Algorithms and Prohibited Search |
P. 69-80 |
|
 |
Majid Fani , MohammadAmin Torabi * , Matineh Moghaddam  |
|
Abstract
(3613 Views) |
Full-Text (PDF)
(1169 Downloads)
|
 |
overview of ways to enhance the security of video surveillance networks using blockchain |
P. 81-97 |
|
 |
Ali Samouti * , Yaser Elmi sola  |
|
Abstract
(4159 Views) |
Full-Text (PDF)
(2524 Downloads)
|
|
|
|
|
|
|