[Home ] [Archive]   [ فارسی ]  
:: Main :: About :: Current Issue :: Archive :: Search :: Submit :: Contact ::
Main Menu
Home::
Journal Information::
Articles archive::
For Authors::
For Reviewers::
Registration::
Contact us::
Site Facilities::
::
Search in website

Advanced Search
..
Receive site information
Enter your Email in the following box to receive the site news and information.
..
:: Site Tops ::
:: Most Downloaded Articles
Security and Privacy in the Internet of Things (3355 Downloads)
Security challenges and solutions in software defined networks (2466 Downloads)
Provida Method Based onSupport VectorMachinesForIntrusion DetectioninComputer Networks (1219 Downloads)
Trust evaluation in the social networks based on the quality of service requirements and call log histories (1152 Downloads)
A review on attribute based access control in cloud environment (1137 Downloads)
Evaluate The Performance Of Meta-heuristic Different Algorithms in the Discovery of the Cryption Key Vigenere Encryption Algorithm (1109 Downloads)
An overview of software protection techniques against static and dynamic Attacks (1061 Downloads)
مروری بر رمزنگاری مشبکه - مبنا (1049 Downloads)
A Trust Management Approach for Sybil Attack Detection in Wireless Sensor Networks (1007 Downloads)
A review of the smart phone botnets and their confronting Techniques (970 Downloads)
Identity Based Cryptography In WSN (959 Downloads)
a review of vertical handover in wireless networks:concept, protocols, Algorithms. (913 Downloads)
A (872 Downloads)
Relay Selection for Secure Device to Device Communications (858 Downloads)
Security Architecture Improving In Cloud Computing Basic Services (855 Downloads)
Design Credit Card Fraud Detection System Using Support Vector Machine, Feature Selection and Cross Validation . (816 Downloads)
An Overview of Security attacks and Software Implementation of Authenticated Encryption Algorithms in CAESAR Competition (795 Downloads)
A Survey on Cloud Forensics (759 Downloads)
Security Alert Correlation Survey and Study of These Features in OSSIM (758 Downloads)
روشی جدید برای تعیین موجودیت‌های مخرب در محیط‌های ابری (666 Downloads)
Hyper Elliptic Curve In Cryptography (648 Downloads)
مروری بر پروتکل های مبتنی بر مسئله LPN در سامانه های RFID (621 Downloads)
LTE network access security (598 Downloads)
Awareness and Standards in the Field of Information Security_ (569 Downloads)
Robustness Verification of Trust Systems (551 Downloads)
A review on the authenticated key agreement protocol EAP-AKA for interworking in the 3GPP-WLAN (549 Downloads)
A Survey of Grouping Proof Protocols in Radio Frequency Identification Systems (530 Downloads)
Performance assessment Bio- Inspired algorithms for solving backpack in the form of objective function minimization. (507 Downloads)
Jump Index in T-functions for designing a new basic structure of stream ciphers (488 Downloads)
خدمات ابری معتبر و نامعتبر: بررسی روش های موجود و ارائه راهکارهای جدید (468 Downloads)
An overview of privacy preserving Data Publishing Techniques (415 Downloads)
A Study on evolutional process of privacy and security in identity managment system (379 Downloads)
Review of Image Steganography Based on LSB and Pixel Classification and Providing a New Method in This Area (363 Downloads)
Survey of Electronic Election Based on HomomorphicEncryption (359 Downloads)
A Survey of Cube, Differential Fault Analysis Attacks and Linear Structures on Keccak Hash Function (SHA-3) (351 Downloads)
Survey of Secure Multiparty Summation protocols and their challenges (341 Downloads)
The study of the methods to increase the security of the public places using coverage improvement and their monitoring based on wireless sensor networks (335 Downloads)
Survey of group location privacy approaches in location-based services and its challenges (329 Downloads)
Survey the Security Function of Integration of vehicular ad hoc Networks with Software-defiend Networks (324 Downloads)
Overview of Jamming Operation in Smart Network (303 Downloads)
Survey Security Aspects in Components and Architecture Local Search Engines (302 Downloads)
A Review on Website Fingerprinting Attacks (297 Downloads)
A review of privacy in online social networks (262 Downloads)
Introduction of TMTO attack on Hash Functions (262 Downloads)
Risk Management in Local Search Engine Systems (259 Downloads)
Identifying Security Risks in Smartphone App Distribution Ecosystem (259 Downloads)
Security Indexes of Development Life Cycle of Local Search Engines (246 Downloads)
A Survey on Lightweight Hardware Implementation of AES (229 Downloads)
A Confidence-Aware Trust Approach for Detecting Indirect Sybil Attacks in Wireless Sensor Networks Considering Time Factor (192 Downloads)
Metamorphic Malware Identification Combining Static and Dynamic Analyzes (154 Downloads)
Total Sum: 35064

دوفصل نامه علمی ترویجی منادی امنیت فضای تولید و تبادل اطلاعات( افتا) Biannual Journal Monadi for Cyberspace Security (AFTA)
Persian site map - English site map - Created in 0.04 seconds with 22 queries by YEKTAWEB 4009