|
|
|
 |
 |
|
 |
|
 |
|
Volume 13, Issue 2 (12-2024) |
 |
|
|
 |
Security Analysis of a Lightweight Ownership Transfer Protocol in RFID Systems |
P. 1-11 |
|
 |
Ghodsieh Karimi * , Morteza Adeli , Mohammad Ali Hadavi  |
|
Abstract
(998 Views) |
Full-Text (PDF)
(446 Downloads)
|
 |
Analysis of strategic issues in the field of general data protection regulations |
P. 12-23 |
|
 |
Abouzar ArabSorkhi * , Tala Tafazoli  |
|
Abstract
(839 Views) |
Full-Text (PDF)
(372 Downloads)
|
 |
IEPS image encryption: Encryption based on PWLCM and SHA-512 hash function |
P. 24-33 |
|
 |
Seyed Hesam Odin Hashemi , Mohammad Hassan Majidi *  |
|
Abstract
(1011 Views) |
Full-Text (PDF)
(411 Downloads)
|
 |
Intelligent Automation of Scenario Execution in Cyber Ranges Using Machine Learning Techniques |
P. 34-44 |
|
 |
Farnoosh Karimi , Behrouz Tork Ladani * , Behrouz Shahgholi Ghahfarokhi  |
|
Abstract
(1143 Views) |
Full-Text (PDF)
(554 Downloads)
|
 |
Prevention and detection of botnet attacks in IoT using ensemble learning methods |
P. 45-55 |
|
 |
Fateme Pishdad , Reza Ebrahimi Atani *  |
|
Abstract
(1071 Views) |
Full-Text (PDF)
(815 Downloads)
|
 |
Violation of Integrity in an End-to-End Privacy-Preserving Protocol in IoT-Based Health Monitoring Systems |
P. 56-64 |
|
 |
Fatemeh Gholami Sabzevar , Masoumeh Safkhani *  |
|
Abstract
(1165 Views) |
Full-Text (PDF)
(407 Downloads)
|
 |
A Secure Auditable Log based on Blockchain |
P. 75-86 |
|
 |
Arian Arabnouri * , Soheil Eissazadeh , Alireza Shafieinejad  |
|
Abstract
(749 Views) |
Full-Text (PDF)
(313 Downloads)
|
 |
Investigation of Power Analysis Attack on the SPEEDY Block Cipher and Countermeasure Using Domain-Oriented Masking (DOM) Method |
P. 87-94 |
|
 |
Keivan Khoormehr , Javad Alizadeh , Mohsen Jahanbani *  |
|
Abstract
(864 Views) |
Full-Text (PDF)
(401 Downloads)
|
|
|
|
|
|
|
|
|
|
|