[Home ] [Archive]   [ فارسی ]  
:: Main :: About :: Current Issue :: Archive :: Search :: Submit :: Contact ::
Main Menu
Home::
Journal Information::
Articles archive::
For Authors::
For Reviewers::
Registration::
Contact us::
Site Facilities::
::
Search in website

Advanced Search
..
Receive site information
Enter your Email in the following box to receive the site news and information.
..
:: Site Tops ::
:: Most Visited Articles
Design Credit Card Fraud Detection System Using Support Vector Machine, Feature Selection and Cross Validation . (5438 Views)
Security and Privacy in the Internet of Things (4404 Views)
Security Alert Correlation Survey and Study of These Features in OSSIM (4059 Views)
A Survey of Grouping Proof Protocols in Radio Frequency Identification Systems (3601 Views)
Provida Method Based onSupport VectorMachinesForIntrusion DetectioninComputer Networks (3468 Views)
Security challenges and solutions in software defined networks (3300 Views)
Trust evaluation in the social networks based on the quality of service requirements and call log histories (3263 Views)
A review on the authenticated key agreement protocol EAP-AKA for interworking in the 3GPP-WLAN (3153 Views)
مروری بر رمزنگاری مشبکه - مبنا (3146 Views)
A Survey on Cloud Forensics (2898 Views)
Security Architecture Improving In Cloud Computing Basic Services (2848 Views)
Relay Selection for Secure Device to Device Communications (2492 Views)
A (2408 Views)
Evaluate The Performance Of Meta-heuristic Different Algorithms in the Discovery of the Cryption Key Vigenere Encryption Algorithm (2392 Views)
Hyper Elliptic Curve In Cryptography (2347 Views)
An Overview of Security attacks and Software Implementation of Authenticated Encryption Algorithms in CAESAR Competition (2341 Views)
An overview of software protection techniques against static and dynamic Attacks (2265 Views)
روشی جدید برای تعیین موجودیت‌های مخرب در محیط‌های ابری (2230 Views)
مروری بر پروتکل های مبتنی بر مسئله LPN در سامانه های RFID (2221 Views)
Robustness Verification of Trust Systems (2172 Views)
a review of vertical handover in wireless networks:concept, protocols, Algorithms. (2141 Views)
A review of the smart phone botnets and their confronting Techniques (2091 Views)
Awareness and Standards in the Field of Information Security_ (2058 Views)
Identity Based Cryptography In WSN (1990 Views)
A Trust Management Approach for Sybil Attack Detection in Wireless Sensor Networks (1902 Views)
    ... More
:: Most Downloaded Articles
Security and Privacy in the Internet of Things (2168 Downloads)
Security challenges and solutions in software defined networks (2083 Downloads)
Provida Method Based onSupport VectorMachinesForIntrusion DetectioninComputer Networks (1039 Downloads)
Trust evaluation in the social networks based on the quality of service requirements and call log histories (1008 Downloads)
A review on attribute based access control in cloud environment (988 Downloads)
Evaluate The Performance Of Meta-heuristic Different Algorithms in the Discovery of the Cryption Key Vigenere Encryption Algorithm (956 Downloads)
An overview of software protection techniques against static and dynamic Attacks (895 Downloads)
A review of the smart phone botnets and their confronting Techniques (860 Downloads)
مروری بر رمزنگاری مشبکه - مبنا (858 Downloads)
a review of vertical handover in wireless networks:concept, protocols, Algorithms. (813 Downloads)
Relay Selection for Secure Device to Device Communications (772 Downloads)
Identity Based Cryptography In WSN (767 Downloads)
A (740 Downloads)
Security Architecture Improving In Cloud Computing Basic Services (732 Downloads)
A Trust Management Approach for Sybil Attack Detection in Wireless Sensor Networks (701 Downloads)
Design Credit Card Fraud Detection System Using Support Vector Machine, Feature Selection and Cross Validation . (653 Downloads)
An Overview of Security attacks and Software Implementation of Authenticated Encryption Algorithms in CAESAR Competition (651 Downloads)
A Survey on Cloud Forensics (637 Downloads)
روشی جدید برای تعیین موجودیت‌های مخرب در محیط‌های ابری (593 Downloads)
Security Alert Correlation Survey and Study of These Features in OSSIM (587 Downloads)
مروری بر پروتکل های مبتنی بر مسئله LPN در سامانه های RFID (554 Downloads)
Hyper Elliptic Curve In Cryptography (522 Downloads)
LTE network access security (499 Downloads)
Awareness and Standards in the Field of Information Security_ (496 Downloads)
A review on the authenticated key agreement protocol EAP-AKA for interworking in the 3GPP-WLAN (488 Downloads)
    ... More
:: Most studied contents
New Journal website launched ( 1777 view)
welcome ( 539 view)
    ... More
:: Most sent contents
welcome ( 1 send)
    ... More
:: Most printed contents
New Journal website launched ( 482 print)
welcome ( 267 print)
    ... More

دوفصل نامه علمی ترویجی منادی امنیت فضای تولید و تبادل اطلاعات( افتا) Biannual Journal Monadi for Cyberspace Security (AFTA)
Persian site map - English site map - Created in 0.04 seconds with 45 queries by YEKTAWEB 3792