|
|
|
 |
 |
|
 |
|
 |
|
Volume 9, Issue 2 (2-2021) |
 |
|
|
 |
Determining the appropriate methodology for the security evaluation of equipment related to information and communication technology in the power industry |
P. 3-12 |
 |
Sofia Ahanj *, Mahsa Rahmani, Zahra Sadeghigole, Veda Nobakht |
|
Abstract
(699 Views) |
Full-Text (PDF)
(630 Downloads)
|
 |
Analysis of Cybercrime and Cyber Attacks during the COVID-19 Pandemic |
P. 23-42 |
 |
Elnaz Katanchi, Babak Porghahramani * |
|
Abstract
(703 Views) |
Full-Text (PDF)
(153 Downloads)
|
 |
Browse searchable encryption schemes: Classification, methods and recent developments |
P. 43-68 |
 |
Mohammad Hossein Noorallahzadeh, Ahmad Gholami *, Reza Alimoradi |
|
Abstract
(735 Views) |
Full-Text (PDF)
(253 Downloads)
|
 |
Provide a New Way to Detect emails's Spam and Phishing and Bank Phishing Using Genetic Algorithms and Prohibited Search |
P. 69-80 |
 |
Majid Fani, MohammadAmin Torabi *, Matineh Moghaddam |
|
Abstract
(1398 Views) |
Full-Text (PDF)
(391 Downloads)
|
 |
overview of ways to enhance the security of video surveillance networks using blockchain |
P. 81-97 |
 |
Ali Samouti *, Yaser Elmi sola |
|
Abstract
(1252 Views) |
Full-Text (PDF)
(740 Downloads)
|
|
|
|
|
|
|
|
|
|
|