 |
Most Visited Articles |
 |
Security and Privacy in the Internet of Things (11539 Views) |
 |
Design Credit Card Fraud Detection System Using Support Vector Machine, Feature Selection and Cross Validation . (10464 Views) |
 |
Security challenges and solutions in software defined networks (8482 Views) |
 |
Security Alert Correlation Survey and Study of These Features in OSSIM (8315 Views) |
 |
A Survey of Grouping Proof Protocols in Radio Frequency Identification Systems (7958 Views) |
 |
A review on the authenticated key agreement protocol EAP-AKA for interworking in the 3GPP-WLAN (7762 Views) |
 |
Provida Method Based onSupport VectorMachinesForIntrusion DetectioninComputer Networks (7478 Views) |
 |
Trust evaluation in the social networks based on the quality of service requirements and call log histories (7258 Views) |
 |
مروری بر رمزنگاری مشبکه - مبنا (7129 Views) |
 |
A (7107 Views) |
 |
Hyper Elliptic Curve In Cryptography (6800 Views) |
 |
A review on attribute based access control in cloud environment (6742 Views) |
 |
Security Architecture Improving In Cloud Computing Basic Services (6714 Views) |
 |
A Trust Management Approach for Sybil Attack Detection in Wireless Sensor Networks (6708 Views) |
 |
A Survey on Cloud Forensics (6672 Views) |
 |
An overview of software protection techniques against static and dynamic Attacks (6508 Views) |
 |
An Overview of Security attacks and Software Implementation of Authenticated Encryption Algorithms in CAESAR Competition (6466 Views) |
 |
روشی جدید برای تعیین موجودیتهای مخرب در محیطهای ابری (6411 Views) |
 |
A review of the smart phone botnets and their confronting Techniques (6216 Views) |
 |
Evaluate The Performance Of Meta-heuristic Different Algorithms in the Discovery of the Cryption Key Vigenere Encryption Algorithm (6209 Views) |
 |
مروری بر پروتکل های مبتنی بر مسئله LPN در سامانه های RFID (6196 Views) |
 |
Awareness and Standards in the Field of Information Security_ (6190 Views) |
 |
Relay Selection for Secure Device to Device Communications (6173 Views) |
 |
An overview of privacy preserving Data Publishing Techniques (6078 Views) |
 |
a review of vertical handover in wireless networks:concept, protocols, Algorithms. (5926 Views) |
... More |
 |
Most Downloaded Articles |
 |
Security and Privacy in the Internet of Things (5394 Downloads) |
 |
An Overview of Security Standards in the Field of ICT in order to Determining the Appropriate Methodology for the Security Evaluation of Equipment Related to Information and Communication Technology in the Power Industry (4306 Downloads) |
 |
Security challenges and solutions in software defined networks (3504 Downloads) |
 |
A Review of Intrusion Detection Defense Solutions Based on Software Defined Network (2759 Downloads) |
 |
overview of ways to enhance the security of video surveillance networks using blockchain (2727 Downloads) |
 |
Provida Method Based onSupport VectorMachinesForIntrusion DetectioninComputer Networks (2416 Downloads) |
 |
A survey on the wi-fi wireless network systems penetration approaches (2349 Downloads) |
 |
Trust evaluation in the social networks based on the quality of service requirements and call log histories (2257 Downloads) |
 |
FPGA Implementation of Polynomial Multiplication in NTRU Prime PQC Algorithms (2227 Downloads) |
 |
An overview of software protection techniques against static and dynamic Attacks (2184 Downloads) |
 |
Evaluate The Performance Of Meta-heuristic Different Algorithms in the Discovery of the Cryption Key Vigenere Encryption Algorithm (2051 Downloads) |
 |
A review on attribute based access control in cloud environment (2039 Downloads) |
 |
Electrocardiogram Signal Authentication System based on Deep Learning (2035 Downloads) |
 |
A Trust Management Approach for Sybil Attack Detection in Wireless Sensor Networks (2021 Downloads) |
 |
Identity Based Cryptography In WSN (2018 Downloads) |
 |
a review of vertical handover in wireless networks:concept, protocols, Algorithms. (2011 Downloads) |
 |
مروری بر رمزنگاری مشبکه - مبنا (2004 Downloads) |
 |
Determining the appropriate methodology for the security evaluation of equipment related to information and communication technology in the power industry (1996 Downloads) |
 |
A review of the smart phone botnets and their confronting Techniques (1986 Downloads) |
 |
Security Architecture Improving In Cloud Computing Basic Services (1951 Downloads) |
 |
An Overview of Security attacks and Software Implementation of Authenticated Encryption Algorithms in CAESAR Competition (1933 Downloads) |
 |
A Survey on Cloud Forensics (1845 Downloads) |
 |
A (1828 Downloads) |
 |
A Survey Of Code-Based Cryptography Schemes and the Standardization Process of Post-Quantum Cryptography: The Beginning of a New Era (1823 Downloads) |
 |
Design Credit Card Fraud Detection System Using Support Vector Machine, Feature Selection and Cross Validation . (1797 Downloads) |
... More |
 |
Most studied contents |
 |
New Journal website launched ( 5632 view) |
 |
Reviewers Name ( 1224 view) |
 |
welcome ( 1111 view) |
 |
Word Cloud ( 801 view) |
... More |
 |
Most sent contents |
 |
welcome ( 1 send) |
... More |
 |
Most printed contents |
 |
New Journal website launched ( 1127 print) |
 |
welcome ( 351 print) |
 |
Reviewers Name ( 247 print) |
 |
Word Cloud ( 241 print) |
... More |