[Home ] [Archive]   [ فارسی ]  
:: Main :: About :: Current Issue :: Archive :: Search :: Submit :: Contact ::
Main Menu
Home::
Journal Information::
Articles archive::
For Authors::
For Reviewers::
Registration::
Contact us::
Site Facilities::
::
Search in website

Advanced Search
..
Receive site information
Enter your Email in the following box to receive the site news and information.
..
:: Site Tops ::
:: Most Visited Articles
Design Credit Card Fraud Detection System Using Support Vector Machine, Feature Selection and Cross Validation . (3916 Views)
Security Alert Correlation Survey and Study of These Features in OSSIM (2826 Views)
A Survey of Grouping Proof Protocols in Radio Frequency Identification Systems (2573 Views)
Security and Privacy in the Internet of Things (2509 Views)
Provida Method Based onSupport VectorMachinesForIntrusion DetectioninComputer Networks (2410 Views)
A review on the authenticated key agreement protocol EAP-AKA for interworking in the 3GPP-WLAN (2333 Views)
مروری بر رمزنگاری مشبکه - مبنا (2312 Views)
A Survey on Cloud Forensics (2170 Views)
Security Architecture Improving In Cloud Computing Basic Services (1949 Views)
Security challenges and solutions in software defined networks (1914 Views)
Trust evaluation in the social networks based on the quality of service requirements and call log histories (1880 Views)
Relay Selection for Secure Device to Device Communications (1736 Views)
A (1679 Views)
Evaluate The Performance Of Meta-heuristic Different Algorithms in the Discovery of the Cryption Key Vigenere Encryption Algorithm (1537 Views)
مروری بر پروتکل های مبتنی بر مسئله LPN در سامانه های RFID (1487 Views)
Robustness Verification of Trust Systems (1462 Views)
An overview of software protection techniques against static and dynamic Attacks (1446 Views)
روشی جدید برای تعیین موجودیت‌های مخرب در محیط‌های ابری (1435 Views)
Hyper Elliptic Curve In Cryptography (1415 Views)
a review of vertical handover in wireless networks:concept, protocols, Algorithms. (1382 Views)
An Overview of Security attacks and Software Implementation of Authenticated Encryption Algorithms in CAESAR Competition (1377 Views)
A review of the smart phone botnets and their confronting Techniques (1363 Views)
Awareness and Standards in the Field of Information Security_ (1259 Views)
Identity Based Cryptography In WSN (1195 Views)
LTE network access security (985 Views)
    ... More
:: Most Downloaded Articles
Security challenges and solutions in software defined networks (1586 Downloads)
Security and Privacy in the Internet of Things (1078 Downloads)
Provida Method Based onSupport VectorMachinesForIntrusion DetectioninComputer Networks (766 Downloads)
A review on attribute based access control in cloud environment (754 Downloads)
Trust evaluation in the social networks based on the quality of service requirements and call log histories (619 Downloads)
مروری بر رمزنگاری مشبکه - مبنا (610 Downloads)
Relay Selection for Secure Device to Device Communications (602 Downloads)
Evaluate The Performance Of Meta-heuristic Different Algorithms in the Discovery of the Cryption Key Vigenere Encryption Algorithm (546 Downloads)
A review of the smart phone botnets and their confronting Techniques (540 Downloads)
An overview of software protection techniques against static and dynamic Attacks (540 Downloads)
Security Architecture Improving In Cloud Computing Basic Services (484 Downloads)
a review of vertical handover in wireless networks:concept, protocols, Algorithms. (474 Downloads)
A (450 Downloads)
روشی جدید برای تعیین موجودیت‌های مخرب در محیط‌های ابری (413 Downloads)
Design Credit Card Fraud Detection System Using Support Vector Machine, Feature Selection and Cross Validation . (397 Downloads)
مروری بر پروتکل های مبتنی بر مسئله LPN در سامانه های RFID (374 Downloads)
Security Alert Correlation Survey and Study of These Features in OSSIM (370 Downloads)
Identity Based Cryptography In WSN (363 Downloads)
A Survey on Cloud Forensics (360 Downloads)
Awareness and Standards in the Field of Information Security_ (328 Downloads)
An Overview of Security attacks and Software Implementation of Authenticated Encryption Algorithms in CAESAR Competition (328 Downloads)
Hyper Elliptic Curve In Cryptography (321 Downloads)
A Survey of Grouping Proof Protocols in Radio Frequency Identification Systems (320 Downloads)
A review on the authenticated key agreement protocol EAP-AKA for interworking in the 3GPP-WLAN (298 Downloads)
Robustness Verification of Trust Systems (280 Downloads)
    ... More
:: Most studied contents
New Journal website launched ( 1134 view)
welcome ( 356 view)
    ... More
:: Most sent contents
welcome ( 1 send)
    ... More
:: Most printed contents
New Journal website launched ( 284 print)
welcome ( 173 print)
    ... More

دوفصل نامه علمی ترویجی منادی امنیت فضای تولید و تبادل اطلاعات( افتا) Biannual Journal Monadi for Cyberspace Security (AFTA)
Persian site map - English site map - Created in 0.043 seconds with 811 queries by yektaweb 3566