[Home ] [Archive]   [ فارسی ]  
:: Main :: About :: Current Issue :: Archive :: Search :: Submit :: Contact ::
Main Menu
Home::
Journal Information::
Articles archive::
For Authors::
For Reviewers::
Registration::
Contact us::
Site Facilities::
::
Search in website

Advanced Search
..
Receive site information
Enter your Email in the following box to receive the site news and information.
..
:: Site Tops ::
:: Most Visited Articles
Design Credit Card Fraud Detection System Using Support Vector Machine, Feature Selection and Cross Validation . (4790 Views)
Security and Privacy in the Internet of Things (3739 Views)
Security Alert Correlation Survey and Study of These Features in OSSIM (3566 Views)
A Survey of Grouping Proof Protocols in Radio Frequency Identification Systems (3189 Views)
Provida Method Based onSupport VectorMachinesForIntrusion DetectioninComputer Networks (3126 Views)
A review on the authenticated key agreement protocol EAP-AKA for interworking in the 3GPP-WLAN (2883 Views)
مروری بر رمزنگاری مشبکه - مبنا (2882 Views)
Security challenges and solutions in software defined networks (2849 Views)
Trust evaluation in the social networks based on the quality of service requirements and call log histories (2747 Views)
A Survey on Cloud Forensics (2643 Views)
Security Architecture Improving In Cloud Computing Basic Services (2574 Views)
Relay Selection for Secure Device to Device Communications (2249 Views)
A (2224 Views)
Evaluate The Performance Of Meta-heuristic Different Algorithms in the Discovery of the Cryption Key Vigenere Encryption Algorithm (2129 Views)
An Overview of Security attacks and Software Implementation of Authenticated Encryption Algorithms in CAESAR Competition (2055 Views)
Hyper Elliptic Curve In Cryptography (2037 Views)
روشی جدید برای تعیین موجودیت‌های مخرب در محیط‌های ابری (2022 Views)
مروری بر پروتکل های مبتنی بر مسئله LPN در سامانه های RFID (1997 Views)
An overview of software protection techniques against static and dynamic Attacks (1987 Views)
Robustness Verification of Trust Systems (1970 Views)
a review of vertical handover in wireless networks:concept, protocols, Algorithms. (1885 Views)
A review of the smart phone botnets and their confronting Techniques (1850 Views)
Awareness and Standards in the Field of Information Security_ (1839 Views)
Identity Based Cryptography In WSN (1781 Views)
A Trust Management Approach for Sybil Attack Detection in Wireless Sensor Networks (1585 Views)
    ... More
:: Most Downloaded Articles
Security challenges and solutions in software defined networks (1895 Downloads)
Security and Privacy in the Internet of Things (1402 Downloads)
Provida Method Based onSupport VectorMachinesForIntrusion DetectioninComputer Networks (909 Downloads)
A review on attribute based access control in cloud environment (898 Downloads)
Trust evaluation in the social networks based on the quality of service requirements and call log histories (812 Downloads)
Evaluate The Performance Of Meta-heuristic Different Algorithms in the Discovery of the Cryption Key Vigenere Encryption Algorithm (781 Downloads)
An overview of software protection techniques against static and dynamic Attacks (748 Downloads)
A review of the smart phone botnets and their confronting Techniques (746 Downloads)
مروری بر رمزنگاری مشبکه - مبنا (716 Downloads)
Relay Selection for Secure Device to Device Communications (710 Downloads)
a review of vertical handover in wireless networks:concept, protocols, Algorithms. (665 Downloads)
Security Architecture Improving In Cloud Computing Basic Services (630 Downloads)
A (569 Downloads)
Identity Based Cryptography In WSN (563 Downloads)
روشی جدید برای تعیین موجودیت‌های مخرب در محیط‌های ابری (528 Downloads)
Design Credit Card Fraud Detection System Using Support Vector Machine, Feature Selection and Cross Validation . (527 Downloads)
A Trust Management Approach for Sybil Attack Detection in Wireless Sensor Networks (512 Downloads)
An Overview of Security attacks and Software Implementation of Authenticated Encryption Algorithms in CAESAR Competition (507 Downloads)
A Survey on Cloud Forensics (488 Downloads)
Security Alert Correlation Survey and Study of These Features in OSSIM (483 Downloads)
مروری بر پروتکل های مبتنی بر مسئله LPN در سامانه های RFID (465 Downloads)
Awareness and Standards in the Field of Information Security_ (449 Downloads)
A Survey of Grouping Proof Protocols in Radio Frequency Identification Systems (427 Downloads)
Hyper Elliptic Curve In Cryptography (419 Downloads)
A review on the authenticated key agreement protocol EAP-AKA for interworking in the 3GPP-WLAN (405 Downloads)
    ... More
:: Most studied contents
New Journal website launched ( 1621 view)
welcome ( 499 view)
    ... More
:: Most sent contents
welcome ( 1 send)
    ... More
:: Most printed contents
New Journal website launched ( 444 print)
welcome ( 237 print)
    ... More

دوفصل نامه علمی ترویجی منادی امنیت فضای تولید و تبادل اطلاعات( افتا) Biannual Journal Monadi for Cyberspace Security (AFTA)
Persian site map - English site map - Created in 0.04 seconds with 45 queries by YEKTAWEB 3705