[Home ] [Archive]   [ فارسی ]  
:: Main :: About :: Current Issue :: Archive :: Search :: Submit :: Contact ::
Main Menu
Home::
Journal Information::
Articles archive::
For Authors::
For Reviewers::
Registration::
Site Facilities::
Indexing::
Contact us::
::
Search in website

Advanced Search
..
Receive site information
Enter your Email in the following box to receive the site news and information.
..
Print ISSN
Print ISSN: 2476-3047
..

Keywords Index

All issues
:: پویشگر A [Volume 3, Number 2]
:: AE An Overview of Security attacks and Software Implementation of Authenticated Encryption Algorithms in CAESAR Competition [Volume 4, Number 2]
:: Accuracy A New Model for Email Spam Detection using Hybrid of Magnetic Optimization Algorithm with Harmony Search Algorithm [Volume 9, Number 1]
:: Adversary Review of the security models with emphasis on leakage-resilient key exchange protocols [Volume 12, Number 1]
:: Aghajari Oil & Gas Utilization Company Identification and ranking of occupational and technical stress factors of information security in Aghajari oil and gas Exploitation Company [Volume 8, Number 2]
:: Anonymization An overview of privacy preserving Data Publishing Techniques [Volume 5, Number 2]
:: Artificial Bee Colony Algorithm. Performance assessment Bio- Inspired algorithms for solving backpack in the form of objective function minimization. [Volume 5, Number 1]
:: Attack Tree Identifying Security Risks in Smartphone App Distribution Ecosystem [Volume 6, Number 1]
:: Attacks Security and Privacy in the Internet of Things [Volume 4, Number 2]
:: Australian Cyber Skills Framework (ASD) Analysis of global trends in providing educational frameworks for training cyber security professionals [Volume 12, Number 2]
:: BAN A Secure Authentication and Key Agreement Scheme for LoRaWAN [Volume 12, Number 2]
:: C channels. A review of the smart phone botnets and their confronting Techniques [Volume 4, Number 1]
:: COVID-19 Analysis of Cybercrime and Cyber Attacks during the COVID-19 Pandemic [Volume 9, Number 2]
:: Challenge. Evaluating Challenges of the National Cryptocurrency [Volume 9, Number 1]
:: Clock A Survey on Lightweight Hardware Implementation of AES [Volume 6, Number 2]
:: Cloud Computing Security Challenge A survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions [Volume 8, Number 2]
:: Cloud storagei· Searchable encryptioni· Privacy preservingi· Search  functionalityi· Security Browse searchable encryption schemes: Classification, methods and recent developments [Volume 9, Number 2]
:: Collective signature Consensus Method with High Security and Low Communication Load [Volume 11, Number 2]
:: Collusion Attack. Survey of group location privacy approaches in location-based services and its challenges [Volume 5, Number 2]
:: Confidentiality Review of Image Steganography Based on LSB and Pixel Classification and Providing a New Method in This Area [Volume 5, Number 2]
:: Content analysis Analysis of strategic issues in the field of general data protection regulations [Volume 13, Number 2]
:: Convolutional Network Electrocardiogram Signal Authentication System based on Deep Learning [Volume 12, Number 2]
:: Convolutional neural network A comprehensive evaluation of deep learning based steganalysis performance in detecting spatial methods [Volume 12, Number 2]
:: Criminalization Fundamental Issues in Criminalization of Virtal Cybercrime [Volume 7, Number 2]
:: DOM method Investigation of Power Analysis Attack on the SPEEDY Block Cipher and Countermeasure Using Domain-Oriented Masking (DOM) Method [Volume 13, Number 2]
:: Data and software security. Privacy-preserving data and function in cloud environments using homomorphic encryption [Volume 12, Number 1]
:: Data outsourcing A review on attribute based access control in cloud environment [Volume 5, Number 1]
:: Differential Computation Analysis An Introduction to Differential Computation Analysis (DCA) on the withe-box cryptography algorithms [Volume 8, Number 2]
:: Digital currency A Review of Consensus Algorithms in Blockchain [Volume 8, Number 1]
:: Distributed Denial of Service Attack A Review of Intrusion Detection Defense Solutions Based on Software Defined Network [Volume 9, Number 1]
:: Dynamic analysis Metamorphic Malware Identification Combining Static and Dynamic Analyzes [Volume 7, Number 1]
:: Electronic Health Records Search over Encrypted Data: Functionalities and Challenges [Volume 7, Number 1]
:: Encryption Key A Performance Survey of Meta-Heuristic And Brute-Force Search Algorithms to Cryptanalysis The SDES Encryption Algorithm [Volume 7, Number 2]
:: Extraction feature and Classification Design Credit Card Fraud Detection System Using Support Vector Machine, Feature Selection and Cross Validation . [Volume 3, Number 1]
:: Feature Extraction A Review on Website Fingerprinting Attacks [Volume 6, Number 2]
:: Feature Selection Prevention and detection of botnet attacks in IoT using ensemble learning methods [Volume 13, Number 2]
:: Forgery attack Practical key recovery attack on authentication and key agreement protocol SecAuthUAV in a network of drones and provide an improved protocol [Volume 12, Number 2]
:: GDPR Preserving privacy in the age of information technology development, lessons from the european general data protection regulation [Volume 13, Number 1]
:: GNY logic Methods of analyzing and proving the security of security protocols [Volume 12, Number 1]
:: HB [Volume 3, Number 2]
:: Healthcare systems Violation of Integrity in an End-to-End Privacy-Preserving Protocol in IoT-Based Health Monitoring Systems [Volume 13, Number 2]
:: Homomorphic authenticators Integrity checking of outsourced computations [Volume 12, Number 1]
:: Hyperledger fabric A secure and privacy-preserving electronic invoice based on blockchain technology [Volume 14, Number 1]
:: ISA/IEC 62443 series. Determining the appropriate methodology for the security evaluation of equipment related to information and communication technology in the power industry [Volume 9, Number 2]
:: ISA/IEC 62443 series An Overview of Security Standards in the Field of ICT in order to Determining the Appropriate Methodology for the Security Evaluation of Equipment Related to Information and Communication Technology in the Power Industry [Volume 11, Number 1]
:: Insecure Channel Survey of Secure Multiparty Summation protocols and their challenges [Volume 6, Number 1]
:: LTE Network LTE network access security [Volume 4, Number 2]
:: Leagues Analysis of frameworks, standards, platforms, and coalitions supporting the development of cyber threat intelligence in organizations [Volume 14, Number 1]
:: Linear Structures. A Survey of Cube, Differential Fault Analysis Attacks and Linear Structures on Keccak Hash Function (SHA-3) [Volume 5, Number 2]
:: Logging A Survey on Cloud Forensics [Volume 3, Number 1]
:: MILP Method Cryptanalysis of Modular Operations [Volume 14, Number 1]
:: Multistage Attacks Security Alert Correlation Survey and Study of These Features in OSSIM [Volume 3, Number 1]
:: NSS. [Volume 3, Number 1]
:: Nano-based Communication An Overview of the Methods for Enhancing the Communication Security in Designing Quantum-dot Cellular Automata Circuits [Volume 8, Number 1]
:: Neural Network A survey of rumor detection methods in social networks [Volume 8, Number 1]
:: Neural network. A Comprehensive Exploration of Deep Learning Approaches in Differential Cryptanalysis of Lightweight Block Ciphers [Volume 12, Number 1]
:: Non-criminal prevention Criminology Analysis of Cybercrime [Volume 8, Number 1]
:: Optimization A New Hybrid Approach of K-Nearest Neighbors Algorithm with Particle Swarm Optimization for E-Mail Spam Detection [Volume 8, Number 1]
:: Outage Probability Relay Selection for Secure Device to Device Communications [Volume 3, Number 2]
:: Partialy Blind Signatue A New Mixing Scheme to Improve Privacy in Bitcoin Cryptocurrency Transactions [Volume 12, Number 2]
:: Passwordless FIDO Authentication Standard: Key Applications for Securing Information Exchange [Volume 13, Number 1]
:: Physical Layer Features An Overview of Physical-Layer Authentication Methods, Performance Metrics, and Their Vulnerabilities to Attacks [Volume 13, Number 1]
:: Polynomial Multiplication FPGA Implementation of Polynomial Multiplication in NTRU Prime PQC Algorithms [Volume 12, Number 2]
:: Preventive strategies Prevention Management of Realization and continuity of the futile cycle of cyber-crimes [Volume 7, Number 1]
:: Privacy Policy A Study on evolutional process of privacy and security in identity managment system [Volume 5, Number 2]
:: Prohibited Search Provide a New Way to Detect emails's Spam and Phishing and Bank Phishing Using Genetic Algorithms and Prohibited Search [Volume 9, Number 2]
:: Public key cryptography A Survey Of Code-Based Cryptography Schemes and the Standardization Process of Post-Quantum Cryptography: The Beginning of a New Era [Volume 13, Number 1]
:: Public verifiability A review of blockchain-based data auditing protocols and analyzing their general framework [Volume 13, Number 1]
:: Ranking and negative SEO Survey Security Aspects in Components and Architecture Local Search Engines [Volume 6, Number 1]
:: Ransomware Classification An automated approach to analysis and classification of Crypto-ransomwares’ family [Volume 8, Number 2]
:: Receipt-Free Survey of Electronic Election Based on HomomorphicEncryption [Volume 6, Number 2]
:: Reinforcement Learning Intelligent Automation of Scenario Execution in Cyber Ranges Using Machine Learning Techniques [Volume 13, Number 2]
:: Risk Assessment A Survey on the Important Security Attacks on Industrial Control Systems from 2000 up to Now [Volume 7, Number 1]
:: Rough set theory. Provida Method Based onSupport VectorMachinesForIntrusion DetectioninComputer Networks [Volume 3, Number 2]
:: SCADA IEC 60870-5-104 Protocol Security Challenges and Countermeasures Identification [Volume 7, Number 2]
:: SHA-512 hash function IEPS image encryption: Encryption based on PWLCM and SHA-512 hash function [Volume 13, Number 2]
:: Safety in C++ Codes Check the Safe coding standards in language C++ [Volume 7, Number 1]
:: Secret disclosure attack Security Analysis of a Lightweight Ownership Transfer Protocol in RFID Systems [Volume 13, Number 2]
:: Secure outsourcing Verifiable Database Supporting Range Query [Volume 12, Number 2]
:: Security Architecture.‎ Security Architecture Improving In Cloud Computing Basic Services [Volume 3, Number 2]
:: Security in RPL A survey on RPL attacks and their countermeasures [Volume 9, Number 1]
:: Security policies. Awareness and Standards in the Field of Information Security_ [Volume 4, Number 2]
:: Sensor node impersonation attack Security Analysis of an Anonymous Authentication and Key Agreement Scheme in Wireless Body Area Network [Volume 11, Number 2]
:: Signal Pre-Processing An overview of secure authentication methods using ECG biometrics with deep learning algorithms [Volume 12, Number 1]
:: TACT Overview of Jamming Operation in Smart Network [Volume 5, Number 2]
:: Threat. Risk Management in Local Search Engine Systems [Volume 6, Number 2]
:: Threshold implementation Threshold Implementation as a Countermeasure against Power Analysis Attacks [Volume 8, Number 2]
:: Time Memory Trade Off Introduction of TMTO attack on Hash Functions [Volume 6, Number 1]
:: Verifiable excerpts A Secure Auditable Log based on Blockchain [Volume 13, Number 2]
:: Verifier . A Survey of Grouping Proof Protocols in Radio Frequency Identification Systems [Volume 3, Number 1]
:: WPA &WEP A survey on the wi-fi wireless network systems penetration approaches [Volume 9, Number 1]
:: White-box cryptography Approaches and challenges of the white-box model of the block cipher schemes implementation [Volume 7, Number 1]
:: Wireless Networks Survey the Security Function of Integration of vehicular ad hoc Networks with Software-defiend Networks [Volume 7, Number 2]
:: access control overview of ways to enhance the security of video surveillance networks using blockchain [Volume 9, Number 2]
:: and Challenge On the Use of Fuzzy-WLC modeling technique for Evaluating Security of Cryptographic Module [Volume 12, Number 1]
:: authenticated encryption algorithm Sponge structure; an introduction and its applications [Volume 8, Number 1]
:: backdoor Investigating Methods of Kleptography [Volume 7, Number 2]
:: binding output Security of Sponge structures [Volume 9, Number 1]
:: cloud Management of Electronic Health Records with Preservation of Privacy using the Blockchain Technology [Volume 11, Number 1]
:: confidence-Aware Trust A Confidence-Aware Trust Approach for Detecting Indirect Sybil Attacks in Wireless Sensor Networks Considering Time Factor [Volume 6, Number 2]
:: coordinator node The study of the methods to increase the security of the public places using coverage improvement and their monitoring based on wireless sensor networks [Volume 6, Number 1]
:: crime investigation Electronic Money Laundering Detection in Transactions of Payment Service Providers [Volume 11, Number 2]
:: cryption key Evaluate The Performance Of Meta-heuristic Different Algorithms in the Discovery of the Cryption Key Vigenere Encryption Algorithm [Volume 4, Number 1]
:: database attacks Overview of Intrusion Detection Techniques in Database [Volume 7, Number 2]
:: denial of service attack. Security challenges and solutions in software defined networks [Volume 5, Number 1]
:: dynamic analysis A Tool for Detecting Man in the Browser (MitB) Attacks using Dynamic Analysis of Web Pages [Volume 11, Number 1]
:: evaluation of system performance tests Designing and Implementing two Laboratory Samples of the Intelligent System for Detecting Encrypted VoIP Skype Traffic and the Lantern Escape Tool using Deep Learning Method [Volume 11, Number 2]
:: evolutionary programming algorithm Intrusion Detection Using Evolutionary Hidden Markov Model [Volume 8, Number 2]
:: forgery attack Key Discovery and Forgery Attack on a Key Agreement Protocol with Authentication for Wireless Sensor Network [Volume 11, Number 1]
:: great period Jump Index in T-functions for designing a new basic structure of stream ciphers [Volume 5, Number 1]
:: heterogeneous networks. a review of vertical handover in wireless networks:concept, protocols, Algorithms. [Volume 4, Number 1]
:: integer wavelet transform Wavelet-based Image Steganography using the Idea of Embedding in Areas of High Frequency Subbands with Large Variations [Volume 11, Number 2]
:: internet of things Inventing a Method to Save the Fog Node from Attacks [Volume 11, Number 1]
:: logic testing based detection Vulnerability Analysis of Digital Circuits against Capacitor-based Timing Hardware Trojan [Volume 11, Number 1]
:: malicious attacks Robustness Verification of Trust Systems [Volume 3, Number 2]
:: masking Masking Midori64 against Correlation Power Analysis Attack [Volume 11, Number 1]
:: multi-user quantum dialogue Multi-Party Quantum Dialogue with the Capability to Expand the Number of Users at Runtime [Volume 11, Number 2]
:: obfuscation An overview of software protection techniques against static and dynamic Attacks [Volume 4, Number 1]
:: pairing.‎ Identity Based Cryptography In WSN [Volume 4, Number 1]
:: reliable routing Providing an RPL-based Reliable Routing Method in the Internet of Things [Volume 11, Number 1]
:: scalar multiplication.‎ Hyper Elliptic Curve In Cryptography [Volume 4, Number 2]
:: security A review of privacy in online social networks [Volume 6, Number 2]
:: security check Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System [Volume 10, Number 2]
:: security components in development life cycle of local search engines Security Indexes of Development Life Cycle of Local Search Engines [Volume 6, Number 1]
:: security requirements The method of risk analysis of communication and information infrastructure modules and the extraction of preventive security requirements [Volume 13, Number 1]
:: semi-systolic architecture A High-Speed Systolic Field Multiplication for Edwards 25519 Curve [Volume 11, Number 1]
:: sub-transmission substation Unmanned Cyber Security Requirements in sub-Transmission Substation [Volume 11, Number 1]
:: system security Modeling Attacker’s Capability Level Focusing on Injection Attacks on Web Applications [Volume 11, Number 2]
:: trust management A Trust Management Approach for Sybil Attack Detection in Wireless Sensor Networks [Volume 5, Number 1]
:: update Lightweight and Secure Authentication Key Agreement Protocol for Smart Grid [Volume 11, Number 1]
دوفصل نامه علمی  منادی امنیت فضای تولید و تبادل اطلاعات( افتا) Biannual Journal Monadi for Cyberspace Security (AFTA)
Persian site map - English site map - Created in 0.06 seconds with 26 queries by YEKTAWEB 4710