|
 |
A Review of Intrusion Detection Defense Solutions Based on Software Defined Network |
P. 18-1 |
|
 |
Masoud Mohammadalipour * , Saeed Shokrollahi  |
|
Abstract
(2865 Views) |
Full-Text (PDF)
(2597 Downloads)
|
 |
A survey on RPL attacks and their countermeasures |
P. 30-19 |
|
 |
Mohammad Pishdar * , Younes Seifi , Mozafar Bag-mohammadi  |
|
Abstract
(3649 Views) |
Full-Text (PDF)
(1334 Downloads)
|
 |
A survey on the wi-fi wireless network systems penetration approaches |
P. 38-31 |
|
 |
HamidReza Mohammadi *  |
|
Abstract
(4621 Views) |
Full-Text (PDF)
(2158 Downloads)
|
 |
A New Model for Email Spam Detection using Hybrid of Magnetic Optimization Algorithm with Harmony Search Algorithm |
P. 50-39 |
|
 |
Farhad Soleimanian Gharehchopogh * , Mohammad Sakhidek Hovshin  |
|
Abstract
(3083 Views) |
Full-Text (PDF)
(812 Downloads)
|
 |
Security of Sponge structures |
P. 62-51 |
|
 |
Akram Khalesi , Mohammad Ali Orumiehchiha *  |
|
Abstract
(3087 Views) |
Full-Text (PDF)
(1472 Downloads)
|
 |
Evaluating Challenges of the National Cryptocurrency |
P. 76-63 |
|
 |
Marjan Bahrololum * , Zahra Ferdosi  |
|
Abstract
(3000 Views) |
Full-Text (PDF)
(862 Downloads)
|