[Home ] [Archive]   [ فارسی ]  
:: Main :: About :: Current Issue :: Archive :: Search :: Submit :: Contact ::
Main Menu
Home::
Journal Information::
Articles archive::
For Authors::
For Reviewers::
Registration::
Contact us::
Site Facilities::
::
Search in website

Advanced Search
..
Receive site information
Enter your Email in the following box to receive the site news and information.
..
:: Site Tops ::
:: Most Visited Articles
Design Credit Card Fraud Detection System Using Support Vector Machine, Feature Selection and Cross Validation . (9005 Views)
Security and Privacy in the Internet of Things (8095 Views)
Security Alert Correlation Survey and Study of These Features in OSSIM (6675 Views)
A Survey of Grouping Proof Protocols in Radio Frequency Identification Systems (5991 Views)
Security challenges and solutions in software defined networks (5908 Views)
Provida Method Based onSupport VectorMachinesForIntrusion DetectioninComputer Networks (5462 Views)
Trust evaluation in the social networks based on the quality of service requirements and call log histories (5404 Views)
A review on the authenticated key agreement protocol EAP-AKA for interworking in the 3GPP-WLAN (5192 Views)
مروری بر رمزنگاری مشبکه - مبنا (4857 Views)
Security Architecture Improving In Cloud Computing Basic Services (4662 Views)
A Survey on Cloud Forensics (4614 Views)
Hyper Elliptic Curve In Cryptography (4423 Views)
A (4402 Views)
Evaluate The Performance Of Meta-heuristic Different Algorithms in the Discovery of the Cryption Key Vigenere Encryption Algorithm (4252 Views)
An Overview of Security attacks and Software Implementation of Authenticated Encryption Algorithms in CAESAR Competition (4242 Views)
Relay Selection for Secure Device to Device Communications (4206 Views)
A review on attribute based access control in cloud environment (4039 Views)
An overview of software protection techniques against static and dynamic Attacks (4031 Views)
A Trust Management Approach for Sybil Attack Detection in Wireless Sensor Networks (3879 Views)
روشی جدید برای تعیین موجودیت‌های مخرب در محیط‌های ابری (3869 Views)
Awareness and Standards in the Field of Information Security_ (3862 Views)
مروری بر پروتکل های مبتنی بر مسئله LPN در سامانه های RFID (3842 Views)
a review of vertical handover in wireless networks:concept, protocols, Algorithms. (3840 Views)
Robustness Verification of Trust Systems (3822 Views)
A review of the smart phone botnets and their confronting Techniques (3755 Views)
    ... More
:: Most Downloaded Articles
Security and Privacy in the Internet of Things (4300 Downloads)
Security challenges and solutions in software defined networks (2891 Downloads)
Provida Method Based onSupport VectorMachinesForIntrusion DetectioninComputer Networks (1666 Downloads)
Trust evaluation in the social networks based on the quality of service requirements and call log histories (1487 Downloads)
A review on attribute based access control in cloud environment (1457 Downloads)
A Trust Management Approach for Sybil Attack Detection in Wireless Sensor Networks (1439 Downloads)
An overview of software protection techniques against static and dynamic Attacks (1431 Downloads)
مروری بر رمزنگاری مشبکه - مبنا (1425 Downloads)
Evaluate The Performance Of Meta-heuristic Different Algorithms in the Discovery of the Cryption Key Vigenere Encryption Algorithm (1399 Downloads)
Identity Based Cryptography In WSN (1316 Downloads)
A review of the smart phone botnets and their confronting Techniques (1312 Downloads)
a review of vertical handover in wireless networks:concept, protocols, Algorithms. (1267 Downloads)
Security Architecture Improving In Cloud Computing Basic Services (1245 Downloads)
An Overview of Security attacks and Software Implementation of Authenticated Encryption Algorithms in CAESAR Competition (1236 Downloads)
A (1215 Downloads)
Design Credit Card Fraud Detection System Using Support Vector Machine, Feature Selection and Cross Validation . (1135 Downloads)
Relay Selection for Secure Device to Device Communications (1132 Downloads)
A Survey on Cloud Forensics (1126 Downloads)
Security Alert Correlation Survey and Study of These Features in OSSIM (1064 Downloads)
Hyper Elliptic Curve In Cryptography (993 Downloads)
روشی جدید برای تعیین موجودیت‌های مخرب در محیط‌های ابری (967 Downloads)
LTE network access security (924 Downloads)
مروری بر پروتکل های مبتنی بر مسئله LPN در سامانه های RFID (904 Downloads)
Awareness and Standards in the Field of Information Security_ (867 Downloads)
A review on the authenticated key agreement protocol EAP-AKA for interworking in the 3GPP-WLAN (832 Downloads)
    ... More
:: Most studied contents
New Journal website launched ( 3424 view)
welcome ( 939 view)
    ... More
:: Most sent contents
welcome ( 1 send)
    ... More
:: Most printed contents
New Journal website launched ( 760 print)
welcome ( 343 print)
    ... More

دوفصل نامه علمی ترویجی منادی امنیت فضای تولید و تبادل اطلاعات( افتا) Biannual Journal Monadi for Cyberspace Security (AFTA)
Persian site map - English site map - Created in 0.04 seconds with 44 queries by YEKTAWEB 4514