[Home ] [Archive]   [ فارسی ]  
:: Main :: About :: Current Issue :: Archive :: Search :: Submit :: Contact ::
Main Menu
Home::
Journal Information::
Articles archive::
For Authors::
For Reviewers::
Registration::
Site Facilities::
Indexing::
Contact us::
::
Search in website

Advanced Search
..
Receive site information
Enter your Email in the following box to receive the site news and information.
..
Print ISSN
Print ISSN: 2476-3047
..
:: Site Tops ::
:: Most Downloaded Articles
Security and Privacy in the Internet of Things (4792 Downloads)
Security challenges and solutions in software defined networks (3068 Downloads)
Provida Method Based onSupport VectorMachinesForIntrusion DetectioninComputer Networks (1953 Downloads)
A Review of Intrusion Detection Defense Solutions Based on Software Defined Network (1804 Downloads)
Trust evaluation in the social networks based on the quality of service requirements and call log histories (1724 Downloads)
An overview of software protection techniques against static and dynamic Attacks (1663 Downloads)
مروری بر رمزنگاری مشبکه - مبنا (1626 Downloads)
Evaluate The Performance Of Meta-heuristic Different Algorithms in the Discovery of the Cryption Key Vigenere Encryption Algorithm (1598 Downloads)
A review on attribute based access control in cloud environment (1580 Downloads)
A Trust Management Approach for Sybil Attack Detection in Wireless Sensor Networks (1576 Downloads)
Identity Based Cryptography In WSN (1561 Downloads)
a review of vertical handover in wireless networks:concept, protocols, Algorithms. (1533 Downloads)
overview of ways to enhance the security of video surveillance networks using blockchain (1527 Downloads)
A review of the smart phone botnets and their confronting Techniques (1498 Downloads)
Security Architecture Improving In Cloud Computing Basic Services (1494 Downloads)
An Overview of Security attacks and Software Implementation of Authenticated Encryption Algorithms in CAESAR Competition (1450 Downloads)
A (1430 Downloads)
A survey on the wi-fi wireless network systems penetration approaches (1412 Downloads)
Design Credit Card Fraud Detection System Using Support Vector Machine, Feature Selection and Cross Validation . (1333 Downloads)
Relay Selection for Secure Device to Device Communications (1333 Downloads)
A Survey on Cloud Forensics (1326 Downloads)
Security Alert Correlation Survey and Study of These Features in OSSIM (1244 Downloads)
Hyper Elliptic Curve In Cryptography (1226 Downloads)
LTE network access security (1168 Downloads)
An Overview of Security Standards in the Field of ICT in order to Determining the Appropriate Methodology for the Security Evaluation of Equipment Related to Information and Communication Technology in the Power Industry (1160 Downloads)
Determining the appropriate methodology for the security evaluation of equipment related to information and communication technology in the power industry (1142 Downloads)
روشی جدید برای تعیین موجودیت‌های مخرب در محیط‌های ابری (1105 Downloads)
Awareness and Standards in the Field of Information Security_ (1092 Downloads)
مروری بر پروتکل های مبتنی بر مسئله LPN در سامانه های RFID (1080 Downloads)
Robustness Verification of Trust Systems (1038 Downloads)
An overview of privacy preserving Data Publishing Techniques (1033 Downloads)
A review on the authenticated key agreement protocol EAP-AKA for interworking in the 3GPP-WLAN (1022 Downloads)
IEC 60870-5-104 Protocol Security Challenges and Countermeasures Identification (1014 Downloads)
A Survey of Grouping Proof Protocols in Radio Frequency Identification Systems (1003 Downloads)
Security of Sponge structures (988 Downloads)
A Review of Consensus Algorithms in Blockchain (945 Downloads)
A Study on evolutional process of privacy and security in identity managment system (927 Downloads)
Survey of Electronic Election Based on HomomorphicEncryption (919 Downloads)
Performance assessment Bio- Inspired algorithms for solving backpack in the form of objective function minimization. (896 Downloads)
A Survey of Cube, Differential Fault Analysis Attacks and Linear Structures on Keccak Hash Function (SHA-3) (877 Downloads)
A review of privacy in online social networks (852 Downloads)
Risk Management in Local Search Engine Systems (836 Downloads)
Survey of group location privacy approaches in location-based services and its challenges (828 Downloads)
Fundamental Issues in Criminalization of Virtal Cybercrime (825 Downloads)
Overview of Jamming Operation in Smart Network (821 Downloads)
Survey the Security Function of Integration of vehicular ad hoc Networks with Software-defiend Networks (819 Downloads)
A survey on RPL attacks and their countermeasures (814 Downloads)
Jump Index in T-functions for designing a new basic structure of stream ciphers (807 Downloads)
Review of Image Steganography Based on LSB and Pixel Classification and Providing a New Method in This Area (800 Downloads)
A Review on Website Fingerprinting Attacks (789 Downloads)
Total Sum: 97167

دوفصل نامه علمی  منادی امنیت فضای تولید و تبادل اطلاعات( افتا) Biannual Journal Monadi for Cyberspace Security (AFTA)
Persian site map - English site map - Created in 0.06 seconds with 22 queries by YEKTAWEB 4645