[Home ] [Archive]   [ فارسی ]  
:: Main :: About :: Current Issue :: Archive :: Search :: Submit :: Contact ::
Main Menu
Home::
Journal Information::
Articles archive::
For Authors::
For Reviewers::
Registration::
Contact us::
Site Facilities::
::
Search in website

Advanced Search
..
Receive site information
Enter your Email in the following box to receive the site news and information.
..
:: Site Tops ::
:: Most Visited Articles
Design Credit Card Fraud Detection System Using Support Vector Machine, Feature Selection and Cross Validation . (5882 Views)
Security and Privacy in the Internet of Things (4820 Views)
Security Alert Correlation Survey and Study of These Features in OSSIM (4395 Views)
A Survey of Grouping Proof Protocols in Radio Frequency Identification Systems (3887 Views)
Provida Method Based onSupport VectorMachinesForIntrusion DetectioninComputer Networks (3666 Views)
Trust evaluation in the social networks based on the quality of service requirements and call log histories (3554 Views)
Security challenges and solutions in software defined networks (3554 Views)
مروری بر رمزنگاری مشبکه - مبنا (3316 Views)
A review on the authenticated key agreement protocol EAP-AKA for interworking in the 3GPP-WLAN (3311 Views)
A Survey on Cloud Forensics (3060 Views)
Security Architecture Improving In Cloud Computing Basic Services (3029 Views)
Relay Selection for Secure Device to Device Communications (2667 Views)
Hyper Elliptic Curve In Cryptography (2589 Views)
Evaluate The Performance Of Meta-heuristic Different Algorithms in the Discovery of the Cryption Key Vigenere Encryption Algorithm (2583 Views)
A (2548 Views)
An Overview of Security attacks and Software Implementation of Authenticated Encryption Algorithms in CAESAR Competition (2544 Views)
An overview of software protection techniques against static and dynamic Attacks (2466 Views)
مروری بر پروتکل های مبتنی بر مسئله LPN در سامانه های RFID (2383 Views)
روشی جدید برای تعیین موجودیت‌های مخرب در محیط‌های ابری (2361 Views)
Robustness Verification of Trust Systems (2342 Views)
a review of vertical handover in wireless networks:concept, protocols, Algorithms. (2320 Views)
A review of the smart phone botnets and their confronting Techniques (2263 Views)
Awareness and Standards in the Field of Information Security_ (2231 Views)
Identity Based Cryptography In WSN (2161 Views)
A Trust Management Approach for Sybil Attack Detection in Wireless Sensor Networks (2109 Views)
    ... More
:: Most Downloaded Articles
Security and Privacy in the Internet of Things (2902 Downloads)
Security challenges and solutions in software defined networks (2213 Downloads)
Provida Method Based onSupport VectorMachinesForIntrusion DetectioninComputer Networks (1149 Downloads)
Trust evaluation in the social networks based on the quality of service requirements and call log histories (1084 Downloads)
A review on attribute based access control in cloud environment (1063 Downloads)
Evaluate The Performance Of Meta-heuristic Different Algorithms in the Discovery of the Cryption Key Vigenere Encryption Algorithm (1045 Downloads)
An overview of software protection techniques against static and dynamic Attacks (987 Downloads)
مروری بر رمزنگاری مشبکه - مبنا (955 Downloads)
A review of the smart phone botnets and their confronting Techniques (934 Downloads)
Identity Based Cryptography In WSN (884 Downloads)
a review of vertical handover in wireless networks:concept, protocols, Algorithms. (874 Downloads)
Relay Selection for Secure Device to Device Communications (827 Downloads)
A (812 Downloads)
Security Architecture Improving In Cloud Computing Basic Services (798 Downloads)
A Trust Management Approach for Sybil Attack Detection in Wireless Sensor Networks (769 Downloads)
Design Credit Card Fraud Detection System Using Support Vector Machine, Feature Selection and Cross Validation . (737 Downloads)
An Overview of Security attacks and Software Implementation of Authenticated Encryption Algorithms in CAESAR Competition (715 Downloads)
A Survey on Cloud Forensics (685 Downloads)
Security Alert Correlation Survey and Study of These Features in OSSIM (678 Downloads)
روشی جدید برای تعیین موجودیت‌های مخرب در محیط‌های ابری (636 Downloads)
Hyper Elliptic Curve In Cryptography (600 Downloads)
مروری بر پروتکل های مبتنی بر مسئله LPN در سامانه های RFID (590 Downloads)
LTE network access security (559 Downloads)
Awareness and Standards in the Field of Information Security_ (533 Downloads)
A review on the authenticated key agreement protocol EAP-AKA for interworking in the 3GPP-WLAN (516 Downloads)
    ... More
:: Most studied contents
New Journal website launched ( 1854 view)
welcome ( 555 view)
    ... More
:: Most sent contents
welcome ( 1 send)
    ... More
:: Most printed contents
New Journal website launched ( 502 print)
welcome ( 283 print)
    ... More

دوفصل نامه علمی ترویجی منادی امنیت فضای تولید و تبادل اطلاعات( افتا) Biannual Journal Monadi for Cyberspace Security (AFTA)
Persian site map - English site map - Created in 0.05 seconds with 46 queries by YEKTAWEB 3858