[Home ] [Archive]   [ فارسی ]  
:: Main :: About :: Current Issue :: Archive :: Search :: Submit :: Contact ::
Main Menu
Home::
Journal Information::
Articles archive::
For Authors::
For Reviewers::
Registration::
Site Facilities::
Indexing::
Contact us::
::
Search in website

Advanced Search
..
Receive site information
Enter your Email in the following box to receive the site news and information.
..
Print ISSN
Print ISSN: 2476-3047
..
:: Site Tops ::
:: Most Visited Articles
Security and Privacy in the Internet of Things (11212 Views)
Design Credit Card Fraud Detection System Using Support Vector Machine, Feature Selection and Cross Validation . (10242 Views)
Security challenges and solutions in software defined networks (8198 Views)
Security Alert Correlation Survey and Study of These Features in OSSIM (8081 Views)
A Survey of Grouping Proof Protocols in Radio Frequency Identification Systems (7710 Views)
A review on the authenticated key agreement protocol EAP-AKA for interworking in the 3GPP-WLAN (7521 Views)
Provida Method Based onSupport VectorMachinesForIntrusion DetectioninComputer Networks (7225 Views)
Trust evaluation in the social networks based on the quality of service requirements and call log histories (7037 Views)
مروری بر رمزنگاری مشبکه - مبنا (6890 Views)
A (6842 Views)
Hyper Elliptic Curve In Cryptography (6529 Views)
Security Architecture Improving In Cloud Computing Basic Services (6476 Views)
A Survey on Cloud Forensics (6445 Views)
A Trust Management Approach for Sybil Attack Detection in Wireless Sensor Networks (6441 Views)
A review on attribute based access control in cloud environment (6436 Views)
An overview of software protection techniques against static and dynamic Attacks (6218 Views)
روشی جدید برای تعیین موجودیت‌های مخرب در محیط‌های ابری (6195 Views)
An Overview of Security attacks and Software Implementation of Authenticated Encryption Algorithms in CAESAR Competition (6184 Views)
A review of the smart phone botnets and their confronting Techniques (5944 Views)
مروری بر پروتکل های مبتنی بر مسئله LPN در سامانه های RFID (5938 Views)
Evaluate The Performance Of Meta-heuristic Different Algorithms in the Discovery of the Cryption Key Vigenere Encryption Algorithm (5931 Views)
Awareness and Standards in the Field of Information Security_ (5909 Views)
Relay Selection for Secure Device to Device Communications (5907 Views)
An overview of privacy preserving Data Publishing Techniques (5801 Views)
a review of vertical handover in wireless networks:concept, protocols, Algorithms. (5665 Views)
A Survey of Cube, Differential Fault Analysis Attacks and Linear Structures on Keccak Hash Function (SHA-3) (5544 Views)
Robustness Verification of Trust Systems (5249 Views)
Identity Based Cryptography In WSN (5233 Views)
Jump Index in T-functions for designing a new basic structure of stream ciphers (4978 Views)
IEC 60870-5-104 Protocol Security Challenges and Countermeasures Identification (4869 Views)
A Study on evolutional process of privacy and security in identity managment system (4849 Views)
LTE network access security (4802 Views)
Survey of Electronic Election Based on HomomorphicEncryption (4700 Views)
A survey on the wi-fi wireless network systems penetration approaches (4651 Views)
A Confidence-Aware Trust Approach for Detecting Indirect Sybil Attacks in Wireless Sensor Networks Considering Time Factor (4603 Views)
A Performance Survey of Meta-Heuristic And Brute-Force Search Algorithms to Cryptanalysis The SDES Encryption Algorithm (4584 Views)
Overview of Jamming Operation in Smart Network (4558 Views)
Performance assessment Bio- Inspired algorithms for solving backpack in the form of objective function minimization. (4466 Views)
خدمات ابری معتبر و نامعتبر: بررسی روش های موجود و ارائه راهکارهای جدید (4442 Views)
Survey the Security Function of Integration of vehicular ad hoc Networks with Software-defiend Networks (4435 Views)
Review of Image Steganography Based on LSB and Pixel Classification and Providing a New Method in This Area (4434 Views)
A review of privacy in online social networks (4395 Views)
Risk Management in Local Search Engine Systems (4345 Views)
Introduction of TMTO attack on Hash Functions (4304 Views)
Search over Encrypted Data: Functionalities and Challenges (4294 Views)
Security Indexes of Development Life Cycle of Local Search Engines (4294 Views)
Survey of group location privacy approaches in location-based services and its challenges (4280 Views)
An Introduction to Differential Computation Analysis (DCA) on the withe-box cryptography algorithms (4273 Views)
Identifying Security Risks in Smartphone App Distribution Ecosystem (4199 Views)
The study of the methods to increase the security of the public places using coverage improvement and their monitoring based on wireless sensor networks (4195 Views)
Total Sum: 537858

دوفصل نامه علمی  منادی امنیت فضای تولید و تبادل اطلاعات( افتا) Biannual Journal Monadi for Cyberspace Security (AFTA)
Persian site map - English site map - Created in 0.05 seconds with 22 queries by YEKTAWEB 4714