[Home ] [Archive]   [ فارسی ]  
:: Main :: About :: Current Issue :: Archive :: Search :: Submit :: Contact ::
Main Menu
Home::
Journal Information::
Articles archive::
For Authors::
For Reviewers::
Registration::
Contact us::
Site Facilities::
::
Search in website

Advanced Search
..
Receive site information
Enter your Email in the following box to receive the site news and information.
..
:: Site Tops ::
:: Most Visited Articles
Design Credit Card Fraud Detection System Using Support Vector Machine, Feature Selection and Cross Validation . (6779 Views)
Security and Privacy in the Internet of Things (5416 Views)
Security Alert Correlation Survey and Study of These Features in OSSIM (4985 Views)
A Survey of Grouping Proof Protocols in Radio Frequency Identification Systems (4380 Views)
Security challenges and solutions in software defined networks (4205 Views)
Trust evaluation in the social networks based on the quality of service requirements and call log histories (3982 Views)
Provida Method Based onSupport VectorMachinesForIntrusion DetectioninComputer Networks (3962 Views)
A review on the authenticated key agreement protocol EAP-AKA for interworking in the 3GPP-WLAN (3602 Views)
مروری بر رمزنگاری مشبکه - مبنا (3578 Views)
A Survey on Cloud Forensics (3318 Views)
Security Architecture Improving In Cloud Computing Basic Services (3299 Views)
Hyper Elliptic Curve In Cryptography (2940 Views)
Relay Selection for Secure Device to Device Communications (2910 Views)
Evaluate The Performance Of Meta-heuristic Different Algorithms in the Discovery of the Cryption Key Vigenere Encryption Algorithm (2889 Views)
An Overview of Security attacks and Software Implementation of Authenticated Encryption Algorithms in CAESAR Competition (2845 Views)
A (2759 Views)
An overview of software protection techniques against static and dynamic Attacks (2719 Views)
مروری بر پروتکل های مبتنی بر مسئله LPN در سامانه های RFID (2627 Views)
Robustness Verification of Trust Systems (2597 Views)
a review of vertical handover in wireless networks:concept, protocols, Algorithms. (2571 Views)
روشی جدید برای تعیین موجودیت‌های مخرب در محیط‌های ابری (2567 Views)
A review of the smart phone botnets and their confronting Techniques (2527 Views)
Awareness and Standards in the Field of Information Security_ (2492 Views)
A Trust Management Approach for Sybil Attack Detection in Wireless Sensor Networks (2417 Views)
Identity Based Cryptography In WSN (2402 Views)
A review on attribute based access control in cloud environment (2366 Views)
LTE network access security (2112 Views)
A Survey of Cube, Differential Fault Analysis Attacks and Linear Structures on Keccak Hash Function (SHA-3) (2110 Views)
A Study on evolutional process of privacy and security in identity managment system (2034 Views)
An overview of privacy preserving Data Publishing Techniques (1868 Views)
Review of Image Steganography Based on LSB and Pixel Classification and Providing a New Method in This Area (1826 Views)
Performance assessment Bio- Inspired algorithms for solving backpack in the form of objective function minimization. (1815 Views)
Jump Index in T-functions for designing a new basic structure of stream ciphers (1674 Views)
خدمات ابری معتبر و نامعتبر: بررسی روش های موجود و ارائه راهکارهای جدید (1631 Views)
Survey of group location privacy approaches in location-based services and its challenges (1551 Views)
Overview of Jamming Operation in Smart Network (1534 Views)
Survey of Secure Multiparty Summation protocols and their challenges (1302 Views)
Survey Security Aspects in Components and Architecture Local Search Engines (1240 Views)
Identifying Security Risks in Smartphone App Distribution Ecosystem (1197 Views)
The study of the methods to increase the security of the public places using coverage improvement and their monitoring based on wireless sensor networks (1181 Views)
Introduction of TMTO attack on Hash Functions (1176 Views)
Security Indexes of Development Life Cycle of Local Search Engines (1167 Views)
Survey of Electronic Election Based on HomomorphicEncryption (1021 Views)
A Review on Website Fingerprinting Attacks (831 Views)
Risk Management in Local Search Engine Systems (739 Views)
A Survey on Lightweight Hardware Implementation of AES (714 Views)
A review of privacy in online social networks (631 Views)
Survey the Security Function of Integration of vehicular ad hoc Networks with Software-defiend Networks (622 Views)
A Confidence-Aware Trust Approach for Detecting Indirect Sybil Attacks in Wireless Sensor Networks Considering Time Factor (593 Views)
Metamorphic Malware Identification Combining Static and Dynamic Analyzes (479 Views)
Total Sum: 121191

دوفصل نامه علمی ترویجی منادی امنیت فضای تولید و تبادل اطلاعات( افتا) Biannual Journal Monadi for Cyberspace Security (AFTA)
Persian site map - English site map - Created in 0.05 seconds with 22 queries by YEKTAWEB 4009