 |
Most Downloaded Articles |
 |
Security and Privacy in the Internet of Things (5283 Downloads) |
 |
An Overview of Security Standards in the Field of ICT in order to Determining the Appropriate Methodology for the Security Evaluation of Equipment Related to Information and Communication Technology in the Power Industry (3962 Downloads) |
 |
Security challenges and solutions in software defined networks (3365 Downloads) |
 |
A Review of Intrusion Detection Defense Solutions Based on Software Defined Network (2598 Downloads) |
 |
overview of ways to enhance the security of video surveillance networks using blockchain (2530 Downloads) |
 |
Provida Method Based onSupport VectorMachinesForIntrusion DetectioninComputer Networks (2307 Downloads) |
 |
A survey on the wi-fi wireless network systems penetration approaches (2157 Downloads) |
 |
Trust evaluation in the social networks based on the quality of service requirements and call log histories (2143 Downloads) |
 |
An overview of software protection techniques against static and dynamic Attacks (2097 Downloads) |
 |
Evaluate The Performance Of Meta-heuristic Different Algorithms in the Discovery of the Cryption Key Vigenere Encryption Algorithm (1958 Downloads) |
 |
FPGA Implementation of Polynomial Multiplication in NTRU Prime PQC Algorithms (1949 Downloads) |
 |
مروری بر رمزنگاری مشبکه - مبنا (1931 Downloads) |
 |
Identity Based Cryptography In WSN (1919 Downloads) |
 |
a review of vertical handover in wireless networks:concept, protocols, Algorithms. (1907 Downloads) |
 |
A review on attribute based access control in cloud environment (1900 Downloads) |
 |
A Trust Management Approach for Sybil Attack Detection in Wireless Sensor Networks (1879 Downloads) |
 |
A review of the smart phone botnets and their confronting Techniques (1870 Downloads) |
 |
Determining the appropriate methodology for the security evaluation of equipment related to information and communication technology in the power industry (1852 Downloads) |
 |
Security Architecture Improving In Cloud Computing Basic Services (1847 Downloads) |
 |
An Overview of Security attacks and Software Implementation of Authenticated Encryption Algorithms in CAESAR Competition (1812 Downloads) |
 |
Electrocardiogram Signal Authentication System based on Deep Learning (1796 Downloads) |
 |
A (1734 Downloads) |
 |
A Survey on Cloud Forensics (1731 Downloads) |
 |
Design Credit Card Fraud Detection System Using Support Vector Machine, Feature Selection and Cross Validation . (1699 Downloads) |
 |
Relay Selection for Secure Device to Device Communications (1652 Downloads) |
 |
Designing and Implementing two Laboratory Samples of the Intelligent System for Detecting Encrypted VoIP Skype Traffic and the Lantern Escape Tool using Deep Learning Method (1608 Downloads) |
 |
Hyper Elliptic Curve In Cryptography (1607 Downloads) |
 |
Management of Electronic Health Records with Preservation of Privacy using the Blockchain Technology (1597 Downloads) |
 |
Security Alert Correlation Survey and Study of These Features in OSSIM (1596 Downloads) |
 |
LTE network access security (1557 Downloads) |
 |
A Survey Of Code-Based Cryptography Schemes and the Standardization Process of Post-Quantum Cryptography: The Beginning of a New Era (1541 Downloads) |
 |
A Comprehensive Exploration of Deep Learning Approaches in Differential Cryptanalysis of Lightweight Block Ciphers (1524 Downloads) |
 |
IEC 60870-5-104 Protocol Security Challenges and Countermeasures Identification (1516 Downloads) |
 |
Awareness and Standards in the Field of Information Security_ (1496 Downloads) |
 |
Security of Sponge structures (1472 Downloads) |
 |
An overview of secure authentication methods using ECG biometrics with deep learning algorithms (1450 Downloads) |
 |
An overview of privacy preserving Data Publishing Techniques (1429 Downloads) |
 |
روشی جدید برای تعیین موجودیتهای مخرب در محیطهای ابری (1385 Downloads) |
 |
A review on the authenticated key agreement protocol EAP-AKA for interworking in the 3GPP-WLAN (1363 Downloads) |
 |
Providing an RPL-based Reliable Routing Method in the Internet of Things (1361 Downloads) |
 |
مروری بر پروتکل های مبتنی بر مسئله LPN در سامانه های RFID (1353 Downloads) |
 |
Robustness Verification of Trust Systems (1347 Downloads) |
 |
A survey on RPL attacks and their countermeasures (1333 Downloads) |
 |
A Survey of Grouping Proof Protocols in Radio Frequency Identification Systems (1333 Downloads) |
 |
Methods of analyzing and proving the security of security protocols (1323 Downloads) |
 |
A Study on evolutional process of privacy and security in identity managment system (1320 Downloads) |
 |
A Review of Consensus Algorithms in Blockchain (1306 Downloads) |
 |
Survey of Electronic Election Based on HomomorphicEncryption (1303 Downloads) |
 |
Fundamental Issues in Criminalization of Virtal Cybercrime
(1243 Downloads) |
 |
Overview of Intrusion Detection Techniques in Database
(1213 Downloads) |
 |
Total Sum: 171391 |