|
|
|
|
|
 |
Information |
 |
|
You can copy/paste HTML codes anywhere you like, for example in homepage, or even other sites
Efficient Tripartite Remote State Preparation of a Known Single-Qubit Mohammad Bolokian *, , Monireh Houshmand Abstract - Full Text (PDF)
A Novel Semi-Quantum Secret Sharing Scheme Secure against Eavesdropping Without Direct Transmission of Message-Carrying Qubits Mohammad Bolokian *, Monireh Houshmand Abstract - Full Text (PDF)
The Evolution of Next-Generation Firewalls: Distributed Policy Enforcement at the Endpoints (A Practical Approach to Building Software-Defined Perimeters (SDP)) Mahdi Faraji *Abstract - Full Text (PDF)
A novel DNA based steganography algorithm using random table generation with segmentation *, Masood Omoomi, Jalal Zahabi Abstract - Full Text (PDF)
A Tool Prototype for Deepfake Detection Based on the Enhancement and Integration of Pre-trained Neural Networks Morteza Ziabakhsh, Seyed Amirhossein Tabatabaei *, Sadegh Eskandari Abstract - Full Text (PDF)
Design and Implementation of a Web Technology Identification Tool Amir Fathalizadeh *, Ali Poursohi Abstract - Full Text (PDF)
Assessment of DDoS Attacks Using IoT Communication Protocols Zahra Bastani *, Peyman Pahlevani, Abolfazl Mortezapour Abstract - Full Text (PDF)
A novel method for training energy-based models for efficient purification of adversarial images Reza Hajimohammadi Tabriz, Sajjad Amini *, Reza Kazemi Abstract - Full Text (PDF)
A Systematic Review of Cybersecurity Governance in the Age of Artificial Intelligence: From Transparency to Resilience Peyman Hajizadeh *, Hamed Naderi, Abstract - Full Text (PDF)
Back to Original Issue
|
|
|
|
|
|
|
|
|
|
|