 |
Most Visited Articles |
 |
Security and Privacy in the Internet of Things (11139 Views) |
 |
Design Credit Card Fraud Detection System Using Support Vector Machine, Feature Selection and Cross Validation . (10195 Views) |
 |
Security challenges and solutions in software defined networks (8145 Views) |
 |
Security Alert Correlation Survey and Study of These Features in OSSIM (8029 Views) |
 |
A Survey of Grouping Proof Protocols in Radio Frequency Identification Systems (7658 Views) |
 |
A review on the authenticated key agreement protocol EAP-AKA for interworking in the 3GPP-WLAN (7447 Views) |
 |
Provida Method Based onSupport VectorMachinesForIntrusion DetectioninComputer Networks (7180 Views) |
 |
Trust evaluation in the social networks based on the quality of service requirements and call log histories (6983 Views) |
 |
مروری بر رمزنگاری مشبکه - مبنا (6846 Views) |
 |
A (6801 Views) |
 |
Hyper Elliptic Curve In Cryptography (6480 Views) |
 |
Security Architecture Improving In Cloud Computing Basic Services (6427 Views) |
 |
A Survey on Cloud Forensics (6398 Views) |
 |
A Trust Management Approach for Sybil Attack Detection in Wireless Sensor Networks (6380 Views) |
 |
A review on attribute based access control in cloud environment (6370 Views) |
 |
An overview of software protection techniques against static and dynamic Attacks (6147 Views) |
 |
روشی جدید برای تعیین موجودیتهای مخرب در محیطهای ابری (6143 Views) |
 |
An Overview of Security attacks and Software Implementation of Authenticated Encryption Algorithms in CAESAR Competition (6133 Views) |
 |
A review of the smart phone botnets and their confronting Techniques (5883 Views) |
 |
مروری بر پروتکل های مبتنی بر مسئله LPN در سامانه های RFID (5878 Views) |
 |
Evaluate The Performance Of Meta-heuristic Different Algorithms in the Discovery of the Cryption Key Vigenere Encryption Algorithm (5872 Views) |
 |
Relay Selection for Secure Device to Device Communications (5857 Views) |
 |
Awareness and Standards in the Field of Information Security_ (5853 Views) |
 |
An overview of privacy preserving Data Publishing Techniques (5735 Views) |
 |
a review of vertical handover in wireless networks:concept, protocols, Algorithms. (5607 Views) |
 |
A Survey of Cube, Differential Fault Analysis Attacks and Linear Structures on Keccak Hash Function (SHA-3) (5472 Views) |
 |
Robustness Verification of Trust Systems (5201 Views) |
 |
Identity Based Cryptography In WSN (5185 Views) |
 |
Jump Index in T-functions for designing a new basic structure of stream ciphers (4921 Views) |
 |
A Study on evolutional process of privacy and security in identity managment system (4807 Views) |
 |
IEC 60870-5-104 Protocol Security Challenges and Countermeasures Identification (4790 Views) |
 |
LTE network access security (4761 Views) |
 |
Survey of Electronic Election Based on HomomorphicEncryption (4637 Views) |
 |
A survey on the wi-fi wireless network systems penetration approaches (4579 Views) |
 |
A Confidence-Aware Trust Approach for Detecting Indirect Sybil Attacks in Wireless Sensor Networks Considering Time Factor (4532 Views) |
 |
A Performance Survey of Meta-Heuristic And Brute-Force Search Algorithms to Cryptanalysis The SDES Encryption Algorithm
(4522 Views) |
 |
Overview of Jamming Operation in Smart Network (4503 Views) |
 |
Performance assessment Bio- Inspired algorithms for solving backpack in the form of objective function minimization. (4423 Views) |
 |
خدمات ابری معتبر و نامعتبر: بررسی روش های موجود و ارائه راهکارهای جدید (4390 Views) |
 |
Review of Image Steganography Based on LSB and Pixel Classification and Providing a New Method in This Area (4386 Views) |
 |
Survey the Security Function of Integration of vehicular ad hoc Networks with Software-defiend Networks (4372 Views) |
 |
A review of privacy in online social networks (4319 Views) |
 |
Risk Management in Local Search Engine Systems (4288 Views) |
 |
Introduction of TMTO attack on Hash Functions (4259 Views) |
 |
Security Indexes of Development Life Cycle of Local
Search Engines
(4244 Views) |
 |
Survey of group location privacy approaches in location-based services and its challenges (4228 Views) |
 |
Search over Encrypted Data: Functionalities and Challenges (4219 Views) |
 |
An Introduction to Differential Computation Analysis (DCA) on the withe-box cryptography algorithms (4201 Views) |
 |
The study of the methods to increase the security of the public places using coverage improvement and their monitoring based on wireless sensor networks (4157 Views) |
 |
Identifying Security Risks in Smartphone App Distribution Ecosystem (4147 Views) |
 |
Total Sum: 527733 |