[Home ] [Archive]   [ فارسی ]  
:: Main :: About :: Current Issue :: Archive :: Search :: Submit :: Contact ::
Main Menu
Home::
Journal Information::
Articles archive::
For Authors::
For Reviewers::
Registration::
Site Facilities::
Indexing::
Contact us::
::
Search in website

Advanced Search
..
Receive site information
Enter your Email in the following box to receive the site news and information.
..
Print ISSN
Print ISSN: 2476-3047
..
:: Site Tops ::
:: Most Visited Articles
Security and Privacy in the Internet of Things (11333 Views)
Design Credit Card Fraud Detection System Using Support Vector Machine, Feature Selection and Cross Validation . (10320 Views)
Security challenges and solutions in software defined networks (8293 Views)
Security Alert Correlation Survey and Study of These Features in OSSIM (8160 Views)
A Survey of Grouping Proof Protocols in Radio Frequency Identification Systems (7791 Views)
A review on the authenticated key agreement protocol EAP-AKA for interworking in the 3GPP-WLAN (7599 Views)
Provida Method Based onSupport VectorMachinesForIntrusion DetectioninComputer Networks (7313 Views)
Trust evaluation in the social networks based on the quality of service requirements and call log histories (7116 Views)
مروری بر رمزنگاری مشبکه - مبنا (6975 Views)
A (6928 Views)
Hyper Elliptic Curve In Cryptography (6624 Views)
Security Architecture Improving In Cloud Computing Basic Services (6565 Views)
A review on attribute based access control in cloud environment (6547 Views)
A Trust Management Approach for Sybil Attack Detection in Wireless Sensor Networks (6541 Views)
A Survey on Cloud Forensics (6522 Views)
An overview of software protection techniques against static and dynamic Attacks (6323 Views)
An Overview of Security attacks and Software Implementation of Authenticated Encryption Algorithms in CAESAR Competition (6291 Views)
روشی جدید برای تعیین موجودیت‌های مخرب در محیط‌های ابری (6261 Views)
Evaluate The Performance Of Meta-heuristic Different Algorithms in the Discovery of the Cryption Key Vigenere Encryption Algorithm (6038 Views)
A review of the smart phone botnets and their confronting Techniques (6037 Views)
مروری بر پروتکل های مبتنی بر مسئله LPN در سامانه های RFID (6032 Views)
Awareness and Standards in the Field of Information Security_ (6018 Views)
Relay Selection for Secure Device to Device Communications (6004 Views)
An overview of privacy preserving Data Publishing Techniques (5900 Views)
a review of vertical handover in wireless networks:concept, protocols, Algorithms. (5756 Views)
    ... More
:: Most Downloaded Articles
Security and Privacy in the Internet of Things (5323 Downloads)
An Overview of Security Standards in the Field of ICT in order to Determining the Appropriate Methodology for the Security Evaluation of Equipment Related to Information and Communication Technology in the Power Industry (4116 Downloads)
Security challenges and solutions in software defined networks (3410 Downloads)
A Review of Intrusion Detection Defense Solutions Based on Software Defined Network (2659 Downloads)
overview of ways to enhance the security of video surveillance networks using blockchain (2604 Downloads)
Provida Method Based onSupport VectorMachinesForIntrusion DetectioninComputer Networks (2351 Downloads)
A survey on the wi-fi wireless network systems penetration approaches (2227 Downloads)
Trust evaluation in the social networks based on the quality of service requirements and call log histories (2194 Downloads)
An overview of software protection techniques against static and dynamic Attacks (2128 Downloads)
FPGA Implementation of Polynomial Multiplication in NTRU Prime PQC Algorithms (2075 Downloads)
Evaluate The Performance Of Meta-heuristic Different Algorithms in the Discovery of the Cryption Key Vigenere Encryption Algorithm (1992 Downloads)
Identity Based Cryptography In WSN (1959 Downloads)
مروری بر رمزنگاری مشبکه - مبنا (1958 Downloads)
A review on attribute based access control in cloud environment (1949 Downloads)
a review of vertical handover in wireless networks:concept, protocols, Algorithms. (1949 Downloads)
A Trust Management Approach for Sybil Attack Detection in Wireless Sensor Networks (1938 Downloads)
A review of the smart phone botnets and their confronting Techniques (1914 Downloads)
Determining the appropriate methodology for the security evaluation of equipment related to information and communication technology in the power industry (1911 Downloads)
Electrocardiogram Signal Authentication System based on Deep Learning (1893 Downloads)
Security Architecture Improving In Cloud Computing Basic Services (1887 Downloads)
An Overview of Security attacks and Software Implementation of Authenticated Encryption Algorithms in CAESAR Competition (1867 Downloads)
A (1779 Downloads)
A Survey on Cloud Forensics (1764 Downloads)
Design Credit Card Fraud Detection System Using Support Vector Machine, Feature Selection and Cross Validation . (1736 Downloads)
Relay Selection for Secure Device to Device Communications (1693 Downloads)
    ... More
:: Most studied contents
New Journal website launched ( 5493 view)
welcome ( 1096 view)
Reviewers Name ( 1045 view)
Word Cloud ( 699 view)
    ... More
:: Most sent contents
welcome ( 1 send)
    ... More
:: Most printed contents
New Journal website launched ( 1085 print)
welcome ( 351 print)
Reviewers Name ( 205 print)
Word Cloud ( 197 print)
    ... More

دوفصل نامه علمی  منادی امنیت فضای تولید و تبادل اطلاعات( افتا) Biannual Journal Monadi for Cyberspace Security (AFTA)
Persian site map - English site map - Created in 0.03 seconds with 58 queries by YEKTAWEB 4714