[Home ] [Archive]   [ فارسی ]  
:: Main :: About :: Current Issue :: Archive :: Search :: Submit :: Contact ::
Main Menu
Home::
Journal Information::
Articles archive::
For Authors::
For Reviewers::
Registration::
Contact us::
Site Facilities::
::
Search in website

Advanced Search
..
Receive site information
Enter your Email in the following box to receive the site news and information.
..
:: Site Tops ::
:: Most Visited Articles
Design Credit Card Fraud Detection System Using Support Vector Machine, Feature Selection and Cross Validation . (5021 Views)
Security and Privacy in the Internet of Things (3953 Views)
Security Alert Correlation Survey and Study of These Features in OSSIM (3746 Views)
A Survey of Grouping Proof Protocols in Radio Frequency Identification Systems (3336 Views)
Provida Method Based onSupport VectorMachinesForIntrusion DetectioninComputer Networks (3242 Views)
A review on the authenticated key agreement protocol EAP-AKA for interworking in the 3GPP-WLAN (2994 Views)
Security challenges and solutions in software defined networks (2972 Views)
مروری بر رمزنگاری مشبکه - مبنا (2970 Views)
Trust evaluation in the social networks based on the quality of service requirements and call log histories (2935 Views)
A Survey on Cloud Forensics (2742 Views)
Security Architecture Improving In Cloud Computing Basic Services (2674 Views)
Relay Selection for Secure Device to Device Communications (2331 Views)
A (2289 Views)
Evaluate The Performance Of Meta-heuristic Different Algorithms in the Discovery of the Cryption Key Vigenere Encryption Algorithm (2212 Views)
An Overview of Security attacks and Software Implementation of Authenticated Encryption Algorithms in CAESAR Competition (2147 Views)
Hyper Elliptic Curve In Cryptography (2127 Views)
روشی جدید برای تعیین موجودیت‌های مخرب در محیط‌های ابری (2091 Views)
مروری بر پروتکل های مبتنی بر مسئله LPN در سامانه های RFID (2073 Views)
An overview of software protection techniques against static and dynamic Attacks (2067 Views)
Robustness Verification of Trust Systems (2039 Views)
a review of vertical handover in wireless networks:concept, protocols, Algorithms. (1964 Views)
A review of the smart phone botnets and their confronting Techniques (1924 Views)
Awareness and Standards in the Field of Information Security_ (1915 Views)
Identity Based Cryptography In WSN (1848 Views)
A Trust Management Approach for Sybil Attack Detection in Wireless Sensor Networks (1692 Views)
    ... More
:: Most Downloaded Articles
Security challenges and solutions in software defined networks (1968 Downloads)
Security and Privacy in the Internet of Things (1531 Downloads)
Provida Method Based onSupport VectorMachinesForIntrusion DetectioninComputer Networks (954 Downloads)
A review on attribute based access control in cloud environment (929 Downloads)
Trust evaluation in the social networks based on the quality of service requirements and call log histories (874 Downloads)
Evaluate The Performance Of Meta-heuristic Different Algorithms in the Discovery of the Cryption Key Vigenere Encryption Algorithm (831 Downloads)
An overview of software protection techniques against static and dynamic Attacks (795 Downloads)
A review of the smart phone botnets and their confronting Techniques (793 Downloads)
مروری بر رمزنگاری مشبکه - مبنا (763 Downloads)
Relay Selection for Secure Device to Device Communications (731 Downloads)
a review of vertical handover in wireless networks:concept, protocols, Algorithms. (713 Downloads)
Security Architecture Improving In Cloud Computing Basic Services (679 Downloads)
A (669 Downloads)
Identity Based Cryptography In WSN (648 Downloads)
An Overview of Security attacks and Software Implementation of Authenticated Encryption Algorithms in CAESAR Competition (572 Downloads)
Design Credit Card Fraud Detection System Using Support Vector Machine, Feature Selection and Cross Validation . (568 Downloads)
A Trust Management Approach for Sybil Attack Detection in Wireless Sensor Networks (561 Downloads)
روشی جدید برای تعیین موجودیت‌های مخرب در محیط‌های ابری (555 Downloads)
A Survey on Cloud Forensics (549 Downloads)
Security Alert Correlation Survey and Study of These Features in OSSIM (525 Downloads)
مروری بر پروتکل های مبتنی بر مسئله LPN در سامانه های RFID (488 Downloads)
Awareness and Standards in the Field of Information Security_ (470 Downloads)
Hyper Elliptic Curve In Cryptography (456 Downloads)
A Survey of Grouping Proof Protocols in Radio Frequency Identification Systems (452 Downloads)
A review on the authenticated key agreement protocol EAP-AKA for interworking in the 3GPP-WLAN (446 Downloads)
    ... More
:: Most studied contents
New Journal website launched ( 1692 view)
welcome ( 521 view)
    ... More
:: Most sent contents
welcome ( 1 send)
    ... More
:: Most printed contents
New Journal website launched ( 459 print)
welcome ( 251 print)
    ... More

دوفصل نامه علمی ترویجی منادی امنیت فضای تولید و تبادل اطلاعات( افتا) Biannual Journal Monadi for Cyberspace Security (AFTA)
Persian site map - English site map - Created in 0.04 seconds with 45 queries by YEKTAWEB 3742