 |
Most Visited Articles |
 |
Security and Privacy in the Internet of Things (11456 Views) |
 |
Design Credit Card Fraud Detection System Using Support Vector Machine, Feature Selection and Cross Validation . (10421 Views) |
 |
Security challenges and solutions in software defined networks (8401 Views) |
 |
Security Alert Correlation Survey and Study of These Features in OSSIM (8263 Views) |
 |
A Survey of Grouping Proof Protocols in Radio Frequency Identification Systems (7900 Views) |
 |
A review on the authenticated key agreement protocol EAP-AKA for interworking in the 3GPP-WLAN (7683 Views) |
 |
Provida Method Based onSupport VectorMachinesForIntrusion DetectioninComputer Networks (7418 Views) |
 |
Trust evaluation in the social networks based on the quality of service requirements and call log histories (7201 Views) |
 |
مروری بر رمزنگاری مشبکه - مبنا (7059 Views) |
 |
A (7025 Views) |
 |
Hyper Elliptic Curve In Cryptography (6735 Views) |
 |
Security Architecture Improving In Cloud Computing Basic Services (6670 Views) |
 |
A review on attribute based access control in cloud environment (6666 Views) |
 |
A Trust Management Approach for Sybil Attack Detection in Wireless Sensor Networks (6643 Views) |
 |
A Survey on Cloud Forensics (6615 Views) |
 |
An overview of software protection techniques against static and dynamic Attacks (6440 Views) |
 |
An Overview of Security attacks and Software Implementation of Authenticated Encryption Algorithms in CAESAR Competition (6406 Views) |
 |
روشی جدید برای تعیین موجودیتهای مخرب در محیطهای ابری (6348 Views) |
 |
Evaluate The Performance Of Meta-heuristic Different Algorithms in the Discovery of the Cryption Key Vigenere Encryption Algorithm (6167 Views) |
 |
A review of the smart phone botnets and their confronting Techniques (6156 Views) |
 |
مروری بر پروتکل های مبتنی بر مسئله LPN در سامانه های RFID (6142 Views) |
 |
Awareness and Standards in the Field of Information Security_ (6126 Views) |
 |
Relay Selection for Secure Device to Device Communications (6124 Views) |
 |
An overview of privacy preserving Data Publishing Techniques (6008 Views) |
 |
a review of vertical handover in wireless networks:concept, protocols, Algorithms. (5866 Views) |
 |
A Survey of Cube, Differential Fault Analysis Attacks and Linear Structures on Keccak Hash Function (SHA-3) (5759 Views) |
 |
Robustness Verification of Trust Systems (5451 Views) |
 |
Identity Based Cryptography In WSN (5417 Views) |
 |
Jump Index in T-functions for designing a new basic structure of stream ciphers (5165 Views) |
 |
IEC 60870-5-104 Protocol Security Challenges and Countermeasures Identification (5134 Views) |
 |
A Study on evolutional process of privacy and security in identity managment system (5027 Views) |
 |
LTE network access security (4982 Views) |
 |
Survey of Electronic Election Based on HomomorphicEncryption (4922 Views) |
 |
A survey on the wi-fi wireless network systems penetration approaches (4892 Views) |
 |
A Confidence-Aware Trust Approach for Detecting Indirect Sybil Attacks in Wireless Sensor Networks Considering Time Factor (4822 Views) |
 |
A Performance Survey of Meta-Heuristic And Brute-Force Search Algorithms to Cryptanalysis The SDES Encryption Algorithm
(4821 Views) |
 |
Overview of Jamming Operation in Smart Network (4742 Views) |
 |
Performance assessment Bio- Inspired algorithms for solving backpack in the form of objective function minimization. (4675 Views) |
 |
Survey the Security Function of Integration of vehicular ad hoc Networks with Software-defiend Networks (4644 Views) |
 |
Review of Image Steganography Based on LSB and Pixel Classification and Providing a New Method in This Area (4623 Views) |
 |
A review of privacy in online social networks (4607 Views) |
 |
خدمات ابری معتبر و نامعتبر: بررسی روش های موجود و ارائه راهکارهای جدید (4607 Views) |
 |
Risk Management in Local Search Engine Systems (4537 Views) |
 |
Search over Encrypted Data: Functionalities and Challenges (4521 Views) |
 |
An Introduction to Differential Computation Analysis (DCA) on the withe-box cryptography algorithms (4509 Views) |
 |
Security Indexes of Development Life Cycle of Local
Search Engines
(4505 Views) |
 |
Introduction of TMTO attack on Hash Functions (4496 Views) |
 |
Survey of group location privacy approaches in location-based services and its challenges (4488 Views) |
 |
overview of ways to enhance the security of video surveillance networks using blockchain (4458 Views) |
 |
Identifying Security Risks in Smartphone App Distribution Ecosystem (4419 Views) |
 |
Total Sum: 570871 |