 |
Most Visited Articles |
 |
Security and Privacy in the Internet of Things (11212 Views) |
 |
Design Credit Card Fraud Detection System Using Support Vector Machine, Feature Selection and Cross Validation . (10242 Views) |
 |
Security challenges and solutions in software defined networks (8198 Views) |
 |
Security Alert Correlation Survey and Study of These Features in OSSIM (8081 Views) |
 |
A Survey of Grouping Proof Protocols in Radio Frequency Identification Systems (7710 Views) |
 |
A review on the authenticated key agreement protocol EAP-AKA for interworking in the 3GPP-WLAN (7521 Views) |
 |
Provida Method Based onSupport VectorMachinesForIntrusion DetectioninComputer Networks (7225 Views) |
 |
Trust evaluation in the social networks based on the quality of service requirements and call log histories (7037 Views) |
 |
مروری بر رمزنگاری مشبکه - مبنا (6890 Views) |
 |
A (6842 Views) |
 |
Hyper Elliptic Curve In Cryptography (6529 Views) |
 |
Security Architecture Improving In Cloud Computing Basic Services (6476 Views) |
 |
A Survey on Cloud Forensics (6445 Views) |
 |
A Trust Management Approach for Sybil Attack Detection in Wireless Sensor Networks (6441 Views) |
 |
A review on attribute based access control in cloud environment (6436 Views) |
 |
An overview of software protection techniques against static and dynamic Attacks (6218 Views) |
 |
روشی جدید برای تعیین موجودیتهای مخرب در محیطهای ابری (6195 Views) |
 |
An Overview of Security attacks and Software Implementation of Authenticated Encryption Algorithms in CAESAR Competition (6184 Views) |
 |
A review of the smart phone botnets and their confronting Techniques (5944 Views) |
 |
مروری بر پروتکل های مبتنی بر مسئله LPN در سامانه های RFID (5938 Views) |
 |
Evaluate The Performance Of Meta-heuristic Different Algorithms in the Discovery of the Cryption Key Vigenere Encryption Algorithm (5931 Views) |
 |
Awareness and Standards in the Field of Information Security_ (5909 Views) |
 |
Relay Selection for Secure Device to Device Communications (5907 Views) |
 |
An overview of privacy preserving Data Publishing Techniques (5801 Views) |
 |
a review of vertical handover in wireless networks:concept, protocols, Algorithms. (5665 Views) |
 |
A Survey of Cube, Differential Fault Analysis Attacks and Linear Structures on Keccak Hash Function (SHA-3) (5544 Views) |
 |
Robustness Verification of Trust Systems (5249 Views) |
 |
Identity Based Cryptography In WSN (5233 Views) |
 |
Jump Index in T-functions for designing a new basic structure of stream ciphers (4978 Views) |
 |
IEC 60870-5-104 Protocol Security Challenges and Countermeasures Identification (4869 Views) |
 |
A Study on evolutional process of privacy and security in identity managment system (4849 Views) |
 |
LTE network access security (4802 Views) |
 |
Survey of Electronic Election Based on HomomorphicEncryption (4700 Views) |
 |
A survey on the wi-fi wireless network systems penetration approaches (4651 Views) |
 |
A Confidence-Aware Trust Approach for Detecting Indirect Sybil Attacks in Wireless Sensor Networks Considering Time Factor (4603 Views) |
 |
A Performance Survey of Meta-Heuristic And Brute-Force Search Algorithms to Cryptanalysis The SDES Encryption Algorithm
(4584 Views) |
 |
Overview of Jamming Operation in Smart Network (4558 Views) |
 |
Performance assessment Bio- Inspired algorithms for solving backpack in the form of objective function minimization. (4466 Views) |
 |
خدمات ابری معتبر و نامعتبر: بررسی روش های موجود و ارائه راهکارهای جدید (4442 Views) |
 |
Survey the Security Function of Integration of vehicular ad hoc Networks with Software-defiend Networks (4435 Views) |
 |
Review of Image Steganography Based on LSB and Pixel Classification and Providing a New Method in This Area (4434 Views) |
 |
A review of privacy in online social networks (4395 Views) |
 |
Risk Management in Local Search Engine Systems (4345 Views) |
 |
Introduction of TMTO attack on Hash Functions (4304 Views) |
 |
Search over Encrypted Data: Functionalities and Challenges (4294 Views) |
 |
Security Indexes of Development Life Cycle of Local
Search Engines
(4294 Views) |
 |
Survey of group location privacy approaches in location-based services and its challenges (4280 Views) |
 |
An Introduction to Differential Computation Analysis (DCA) on the withe-box cryptography algorithms (4273 Views) |
 |
Identifying Security Risks in Smartphone App Distribution Ecosystem (4199 Views) |
 |
The study of the methods to increase the security of the public places using coverage improvement and their monitoring based on wireless sensor networks (4195 Views) |
 |
Total Sum: 537858 |