 |
Most Visited Articles |
 |
Security and Privacy in the Internet of Things (10778 Views) |
 |
Design Credit Card Fraud Detection System Using Support Vector Machine, Feature Selection and Cross Validation . (10003 Views) |
 |
Security challenges and solutions in software defined networks (7853 Views) |
 |
Security Alert Correlation Survey and Study of These Features in OSSIM (7824 Views) |
 |
A Survey of Grouping Proof Protocols in Radio Frequency Identification Systems (7420 Views) |
 |
A review on the authenticated key agreement protocol EAP-AKA for interworking in the 3GPP-WLAN (7194 Views) |
 |
Provida Method Based onSupport VectorMachinesForIntrusion DetectioninComputer Networks (6947 Views) |
 |
Trust evaluation in the social networks based on the quality of service requirements and call log histories (6768 Views) |
 |
مروری بر رمزنگاری مشبکه - مبنا (6588 Views) |
 |
A (6467 Views) |
 |
Security Architecture Improving In Cloud Computing Basic Services (6203 Views) |
 |
Hyper Elliptic Curve In Cryptography (6190 Views) |
 |
A Survey on Cloud Forensics (6171 Views) |
 |
A Trust Management Approach for Sybil Attack Detection in Wireless Sensor Networks (6092 Views) |
 |
A review on attribute based access control in cloud environment (6068 Views) |
 |
روشی جدید برای تعیین موجودیتهای مخرب در محیطهای ابری (5887 Views) |
 |
An overview of software protection techniques against static and dynamic Attacks (5881 Views) |
 |
An Overview of Security attacks and Software Implementation of Authenticated Encryption Algorithms in CAESAR Competition (5848 Views) |
 |
Relay Selection for Secure Device to Device Communications (5622 Views) |
 |
Evaluate The Performance Of Meta-heuristic Different Algorithms in the Discovery of the Cryption Key Vigenere Encryption Algorithm (5608 Views) |
 |
مروری بر پروتکل های مبتنی بر مسئله LPN در سامانه های RFID (5597 Views) |
 |
A review of the smart phone botnets and their confronting Techniques (5596 Views) |
 |
Awareness and Standards in the Field of Information Security_ (5574 Views) |
 |
An overview of privacy preserving Data Publishing Techniques (5440 Views) |
 |
a review of vertical handover in wireless networks:concept, protocols, Algorithms. (5363 Views) |
... More |
 |
Most Downloaded Articles |
 |
Security and Privacy in the Internet of Things (5194 Downloads) |
 |
An Overview of Security Standards in the Field of ICT in order to Determining the Appropriate Methodology for the Security Evaluation of Equipment Related to Information and Communication Technology in the Power Industry (3364 Downloads) |
 |
Security challenges and solutions in software defined networks (3230 Downloads) |
 |
A Review of Intrusion Detection Defense Solutions Based on Software Defined Network (2397 Downloads) |
 |
overview of ways to enhance the security of video surveillance networks using blockchain (2251 Downloads) |
 |
Provida Method Based onSupport VectorMachinesForIntrusion DetectioninComputer Networks (2225 Downloads) |
 |
Trust evaluation in the social networks based on the quality of service requirements and call log histories (2039 Downloads) |
 |
An overview of software protection techniques against static and dynamic Attacks (2018 Downloads) |
 |
A survey on the wi-fi wireless network systems penetration approaches (1935 Downloads) |
 |
Evaluate The Performance Of Meta-heuristic Different Algorithms in the Discovery of the Cryption Key Vigenere Encryption Algorithm (1860 Downloads) |
 |
مروری بر رمزنگاری مشبکه - مبنا (1857 Downloads) |
 |
Identity Based Cryptography In WSN (1835 Downloads) |
 |
a review of vertical handover in wireless networks:concept, protocols, Algorithms. (1818 Downloads) |
 |
A review on attribute based access control in cloud environment (1780 Downloads) |
 |
A review of the smart phone botnets and their confronting Techniques (1778 Downloads) |
 |
Security Architecture Improving In Cloud Computing Basic Services (1756 Downloads) |
 |
A Trust Management Approach for Sybil Attack Detection in Wireless Sensor Networks (1747 Downloads) |
 |
An Overview of Security attacks and Software Implementation of Authenticated Encryption Algorithms in CAESAR Competition (1726 Downloads) |
 |
A (1661 Downloads) |
 |
Determining the appropriate methodology for the security evaluation of equipment related to information and communication technology in the power industry (1642 Downloads) |
 |
A Survey on Cloud Forensics (1628 Downloads) |
 |
Design Credit Card Fraud Detection System Using Support Vector Machine, Feature Selection and Cross Validation . (1613 Downloads) |
 |
FPGA Implementation of Polynomial Multiplication in NTRU Prime PQC Algorithms (1599 Downloads) |
 |
Relay Selection for Secure Device to Device Communications (1580 Downloads) |
 |
Hyper Elliptic Curve In Cryptography (1510 Downloads) |
... More |
 |
Most studied contents |
 |
New Journal website launched ( 5170 view) |
 |
welcome ( 1087 view) |
 |
Reviewers Name ( 637 view) |
 |
Word Cloud ( 444 view) |
... More |
 |
Most sent contents |
 |
welcome ( 1 send) |
... More |
 |
Most printed contents |
 |
New Journal website launched ( 1007 print) |
 |
welcome ( 351 print) |
 |
Word Cloud ( 109 print) |
 |
Reviewers Name ( 102 print) |
... More |