[Home ] [Archive]   [ فارسی ]  
:: Main :: About :: Current Issue :: Archive :: Search :: Submit :: Contact ::
Main Menu
Home::
Journal Information::
Articles archive::
For Authors::
For Reviewers::
Registration::
Site Facilities::
Indexing::
Contact us::
::
Search in website

Advanced Search
..
Receive site information
Enter your Email in the following box to receive the site news and information.
..
Print ISSN
Print ISSN: 2476-3047
..
:: Site Tops ::
:: Most Visited Articles
Security and Privacy in the Internet of Things (9528 Views)
Design Credit Card Fraud Detection System Using Support Vector Machine, Feature Selection and Cross Validation . (9483 Views)
Security Alert Correlation Survey and Study of These Features in OSSIM (7231 Views)
Security challenges and solutions in software defined networks (6995 Views)
A Survey of Grouping Proof Protocols in Radio Frequency Identification Systems (6730 Views)
A review on the authenticated key agreement protocol EAP-AKA for interworking in the 3GPP-WLAN (6398 Views)
Provida Method Based onSupport VectorMachinesForIntrusion DetectioninComputer Networks (6249 Views)
Trust evaluation in the social networks based on the quality of service requirements and call log histories (6166 Views)
مروری بر رمزنگاری مشبکه - مبنا (5785 Views)
A (5715 Views)
Security Architecture Improving In Cloud Computing Basic Services (5561 Views)
A Survey on Cloud Forensics (5521 Views)
Hyper Elliptic Curve In Cryptography (5364 Views)
A Trust Management Approach for Sybil Attack Detection in Wireless Sensor Networks (5274 Views)
A review on attribute based access control in cloud environment (5149 Views)
An Overview of Security attacks and Software Implementation of Authenticated Encryption Algorithms in CAESAR Competition (5103 Views)
Relay Selection for Secure Device to Device Communications (4987 Views)
An overview of software protection techniques against static and dynamic Attacks (4985 Views)
روشی جدید برای تعیین موجودیت‌های مخرب در محیط‌های ابری (4942 Views)
Evaluate The Performance Of Meta-heuristic Different Algorithms in the Discovery of the Cryption Key Vigenere Encryption Algorithm (4910 Views)
Awareness and Standards in the Field of Information Security_ (4836 Views)
مروری بر پروتکل های مبتنی بر مسئله LPN در سامانه های RFID (4833 Views)
A review of the smart phone botnets and their confronting Techniques (4749 Views)
a review of vertical handover in wireless networks:concept, protocols, Algorithms. (4649 Views)
A Survey of Cube, Differential Fault Analysis Attacks and Linear Structures on Keccak Hash Function (SHA-3) (4512 Views)
    ... More
:: Most Downloaded Articles
Security and Privacy in the Internet of Things (4798 Downloads)
Security challenges and solutions in software defined networks (3071 Downloads)
Provida Method Based onSupport VectorMachinesForIntrusion DetectioninComputer Networks (1953 Downloads)
A Review of Intrusion Detection Defense Solutions Based on Software Defined Network (1810 Downloads)
Trust evaluation in the social networks based on the quality of service requirements and call log histories (1728 Downloads)
An overview of software protection techniques against static and dynamic Attacks (1665 Downloads)
مروری بر رمزنگاری مشبکه - مبنا (1628 Downloads)
Evaluate The Performance Of Meta-heuristic Different Algorithms in the Discovery of the Cryption Key Vigenere Encryption Algorithm (1602 Downloads)
A review on attribute based access control in cloud environment (1581 Downloads)
A Trust Management Approach for Sybil Attack Detection in Wireless Sensor Networks (1577 Downloads)
Identity Based Cryptography In WSN (1563 Downloads)
overview of ways to enhance the security of video surveillance networks using blockchain (1540 Downloads)
a review of vertical handover in wireless networks:concept, protocols, Algorithms. (1535 Downloads)
A review of the smart phone botnets and their confronting Techniques (1504 Downloads)
Security Architecture Improving In Cloud Computing Basic Services (1494 Downloads)
An Overview of Security attacks and Software Implementation of Authenticated Encryption Algorithms in CAESAR Competition (1456 Downloads)
A (1436 Downloads)
A survey on the wi-fi wireless network systems penetration approaches (1417 Downloads)
Relay Selection for Secure Device to Device Communications (1339 Downloads)
Design Credit Card Fraud Detection System Using Support Vector Machine, Feature Selection and Cross Validation . (1333 Downloads)
A Survey on Cloud Forensics (1326 Downloads)
Security Alert Correlation Survey and Study of These Features in OSSIM (1244 Downloads)
Hyper Elliptic Curve In Cryptography (1226 Downloads)
An Overview of Security Standards in the Field of ICT in order to Determining the Appropriate Methodology for the Security Evaluation of Equipment Related to Information and Communication Technology in the Power Industry (1185 Downloads)
LTE network access security (1172 Downloads)
    ... More
:: Most studied contents
New Journal website launched ( 4336 view)
welcome ( 1030 view)
    ... More
:: Most sent contents
welcome ( 1 send)
    ... More
:: Most printed contents
New Journal website launched ( 861 print)
welcome ( 348 print)
    ... More

دوفصل نامه علمی  منادی امنیت فضای تولید و تبادل اطلاعات( افتا) Biannual Journal Monadi for Cyberspace Security (AFTA)
Persian site map - English site map - Created in 0.04 seconds with 52 queries by YEKTAWEB 4645