|
 |
A survey of rumor detection methods in social networks |
P. 3-14 |
|
 |
Fariba Sadeghi , Amir Jalaly Bidgoly *  |
|
Abstract
(3984 Views) |
Full-Text (PDF)
(1099 Downloads)
|
 |
Sponge structure; an introduction and its applications |
P. 15-30 |
|
 |
|
|
Abstract
(3290 Views) |
Full-Text (PDF)
(761 Downloads)
|
 |
A Review of Consensus Algorithms in Blockchain |
P. 31-42 |
|
 |
Jamileh Bahri * , Hamidreza Shayeghbrojeni  |
|
Abstract
(3369 Views) |
Full-Text (PDF)
(1306 Downloads)
|
 |
Criminology Analysis of Cybercrime |
P. 43-56 |
|
 |
|
|
Abstract
(3434 Views) |
Full-Text (PDF)
(937 Downloads)
|
 |
A New Hybrid Approach of K-Nearest Neighbors Algorithm with Particle Swarm Optimization for E-Mail Spam Detection |
P. 57-72 |
|
 |
Atefeh Mortazavi , Farhad Soleimanian Gharehchopogh *  |
|
Abstract
(3882 Views) |
Full-Text (PDF)
(866 Downloads)
|
 |
An Overview of the Methods for Enhancing the Communication Security in Designing Quantum-dot Cellular Automata Circuits |
P. 73-83 |
|
 |
|
|
Abstract
(2356 Views) |
Full-Text (PDF)
(624 Downloads)
|