|
|
|
|
|
|
 |
 |
|
 |
|
 |
|
Volume 13, Issue 2 (12-2024) |
 |
|
|
|
 |
Security Analysis of a Lightweight Ownership Transfer Protocol in RFID Systems |
P. 1-11 |
|
 |
Ghodsieh Karimi * , Morteza Adeli , Mohammad Ali Hadavi  |
|
Abstract
(1950 Views) |
Full-Text (PDF)
(817 Downloads)
|
 |
Analysis of strategic issues in the field of general data protection regulations |
P. 12-23 |
|
 |
Abouzar ArabSorkhi * , Tala Tafazoli  |
|
Abstract
(1588 Views) |
Full-Text (PDF)
(992 Downloads)
|
 |
IEPS image encryption: Encryption based on PWLCM and SHA-512 hash function |
P. 24-33 |
|
 |
Seyed Hesam Odin Hashemi , Mohammad Hassan Majidi *  |
|
Abstract
(1897 Views) |
Full-Text (PDF)
(707 Downloads)
|
 |
Intelligent Automation of Scenario Execution in Cyber Ranges Using Machine Learning Techniques |
P. 34-44 |
|
 |
Farnoosh Karimi , Behrouz Tork Ladani * , Behrouz Shahgholi Ghahfarokhi  |
|
Abstract
(2088 Views) |
Full-Text (PDF)
(1054 Downloads)
|
 |
Prevention and detection of botnet attacks in IoT using ensemble learning methods |
P. 45-55 |
|
 |
Fateme Pishdad , Reza Ebrahimi Atani *  |
|
Abstract
(1939 Views) |
Full-Text (PDF)
(1322 Downloads)
|
 |
Violation of Integrity in an End-to-End Privacy-Preserving Protocol in IoT-Based Health Monitoring Systems |
P. 56-64 |
|
 |
Fatemeh Gholami Sabzevar , Masoumeh Safkhani *  |
|
Abstract
(2166 Views) |
Full-Text (PDF)
(745 Downloads)
|
 |
A Secure Auditable Log based on Blockchain |
P. 75-86 |
|
 |
Arian Arabnouri * , Soheil Eissazadeh , Alireza Shafieinejad  |
|
Abstract
(1512 Views) |
Full-Text (PDF)
(718 Downloads)
|
 |
Investigation of Power Analysis Attack on the SPEEDY Block Cipher and Countermeasure Using Domain-Oriented Masking (DOM) Method |
P. 87-94 |
|
 |
Keivan Khoormehr , Javad Alizadeh , Mohsen Jahanbani *  |
|
Abstract
(1726 Views) |
Full-Text (PDF)
(742 Downloads)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|