[Home ] [Archive]   [ فارسی ]  
:: Main :: About :: Current Issue :: Archive :: Search :: Submit :: Contact ::
Main Menu
Home::
Journal Information::
Articles archive::
For Authors::
For Reviewers::
Registration::
Contact us::
Site Facilities::
::
Search in website

Advanced Search
..
Receive site information
Enter your Email in the following box to receive the site news and information.
..
:: Site Tops ::
:: Most Visited Articles
Design Credit Card Fraud Detection System Using Support Vector Machine, Feature Selection and Cross Validation . (7917 Views)
Security and Privacy in the Internet of Things (6175 Views)
Security Alert Correlation Survey and Study of These Features in OSSIM (5751 Views)
A Survey of Grouping Proof Protocols in Radio Frequency Identification Systems (5024 Views)
Security challenges and solutions in software defined networks (4700 Views)
Trust evaluation in the social networks based on the quality of service requirements and call log histories (4470 Views)
Provida Method Based onSupport VectorMachinesForIntrusion DetectioninComputer Networks (4406 Views)
A review on the authenticated key agreement protocol EAP-AKA for interworking in the 3GPP-WLAN (4051 Views)
مروری بر رمزنگاری مشبکه - مبنا (3954 Views)
A Survey on Cloud Forensics (3753 Views)
Security Architecture Improving In Cloud Computing Basic Services (3730 Views)
Hyper Elliptic Curve In Cryptography (3443 Views)
Evaluate The Performance Of Meta-heuristic Different Algorithms in the Discovery of the Cryption Key Vigenere Encryption Algorithm (3333 Views)
Relay Selection for Secure Device to Device Communications (3316 Views)
An Overview of Security attacks and Software Implementation of Authenticated Encryption Algorithms in CAESAR Competition (3277 Views)
An overview of software protection techniques against static and dynamic Attacks (3160 Views)
A (3111 Views)
Robustness Verification of Trust Systems (3015 Views)
a review of vertical handover in wireless networks:concept, protocols, Algorithms. (2989 Views)
مروری بر پروتکل های مبتنی بر مسئله LPN در سامانه های RFID (2966 Views)
A review of the smart phone botnets and their confronting Techniques (2940 Views)
Awareness and Standards in the Field of Information Security_ (2919 Views)
A Trust Management Approach for Sybil Attack Detection in Wireless Sensor Networks (2909 Views)
A review on attribute based access control in cloud environment (2907 Views)
روشی جدید برای تعیین موجودیت‌های مخرب در محیط‌های ابری (2875 Views)
    ... More
:: Most Downloaded Articles
Security and Privacy in the Internet of Things (3587 Downloads)
Security challenges and solutions in software defined networks (2584 Downloads)
Provida Method Based onSupport VectorMachinesForIntrusion DetectioninComputer Networks (1312 Downloads)
Trust evaluation in the social networks based on the quality of service requirements and call log histories (1232 Downloads)
A review on attribute based access control in cloud environment (1211 Downloads)
A Trust Management Approach for Sybil Attack Detection in Wireless Sensor Networks (1203 Downloads)
Evaluate The Performance Of Meta-heuristic Different Algorithms in the Discovery of the Cryption Key Vigenere Encryption Algorithm (1162 Downloads)
مروری بر رمزنگاری مشبکه - مبنا (1155 Downloads)
An overview of software protection techniques against static and dynamic Attacks (1134 Downloads)
A review of the smart phone botnets and their confronting Techniques (1053 Downloads)
a review of vertical handover in wireless networks:concept, protocols, Algorithms. (1035 Downloads)
Identity Based Cryptography In WSN (1033 Downloads)
A (973 Downloads)
Security Architecture Improving In Cloud Computing Basic Services (927 Downloads)
Relay Selection for Secure Device to Device Communications (916 Downloads)
Design Credit Card Fraud Detection System Using Support Vector Machine, Feature Selection and Cross Validation . (885 Downloads)
An Overview of Security attacks and Software Implementation of Authenticated Encryption Algorithms in CAESAR Competition (881 Downloads)
Security Alert Correlation Survey and Study of These Features in OSSIM (847 Downloads)
A Survey on Cloud Forensics (824 Downloads)
روشی جدید برای تعیین موجودیت‌های مخرب در محیط‌های ابری (735 Downloads)
Hyper Elliptic Curve In Cryptography (718 Downloads)
مروری بر پروتکل های مبتنی بر مسئله LPN در سامانه های RFID (708 Downloads)
LTE network access security (666 Downloads)
Awareness and Standards in the Field of Information Security_ (625 Downloads)
Robustness Verification of Trust Systems (612 Downloads)
    ... More
:: Most studied contents
New Journal website launched ( 2303 view)
welcome ( 604 view)
    ... More
:: Most sent contents
welcome ( 1 send)
    ... More
:: Most printed contents
New Journal website launched ( 596 print)
welcome ( 331 print)
    ... More

دوفصل نامه علمی ترویجی منادی امنیت فضای تولید و تبادل اطلاعات( افتا) Biannual Journal Monadi for Cyberspace Security (AFTA)
Persian site map - English site map - Created in 0.04 seconds with 44 queries by YEKTAWEB 4217