[Home ] [Archive]   [ فارسی ]  
:: Main :: About :: Current Issue :: Archive :: Search :: Submit :: Contact ::
Main Menu
Home::
Journal Information::
Articles archive::
For Authors::
For Reviewers::
Registration::
Contact us::
Site Facilities::
::
Search in website

Advanced Search
..
Receive site information
Enter your Email in the following box to receive the site news and information.
..
:: Site Tops ::
:: Most Visited Articles
Design Credit Card Fraud Detection System Using Support Vector Machine, Feature Selection and Cross Validation . (8937 Views)
Security and Privacy in the Internet of Things (7870 Views)
Security Alert Correlation Survey and Study of These Features in OSSIM (6609 Views)
A Survey of Grouping Proof Protocols in Radio Frequency Identification Systems (5887 Views)
Security challenges and solutions in software defined networks (5769 Views)
Provida Method Based onSupport VectorMachinesForIntrusion DetectioninComputer Networks (5361 Views)
Trust evaluation in the social networks based on the quality of service requirements and call log histories (5314 Views)
A review on the authenticated key agreement protocol EAP-AKA for interworking in the 3GPP-WLAN (4983 Views)
مروری بر رمزنگاری مشبکه - مبنا (4747 Views)
Security Architecture Improving In Cloud Computing Basic Services (4558 Views)
A Survey on Cloud Forensics (4502 Views)
Hyper Elliptic Curve In Cryptography (4328 Views)
A (4225 Views)
Evaluate The Performance Of Meta-heuristic Different Algorithms in the Discovery of the Cryption Key Vigenere Encryption Algorithm (4169 Views)
An Overview of Security attacks and Software Implementation of Authenticated Encryption Algorithms in CAESAR Competition (4142 Views)
Relay Selection for Secure Device to Device Communications (4124 Views)
An overview of software protection techniques against static and dynamic Attacks (3942 Views)
A review on attribute based access control in cloud environment (3908 Views)
a review of vertical handover in wireless networks:concept, protocols, Algorithms. (3752 Views)
Robustness Verification of Trust Systems (3749 Views)
Awareness and Standards in the Field of Information Security_ (3744 Views)
مروری بر پروتکل های مبتنی بر مسئله LPN در سامانه های RFID (3741 Views)
A Trust Management Approach for Sybil Attack Detection in Wireless Sensor Networks (3734 Views)
روشی جدید برای تعیین موجودیت‌های مخرب در محیط‌های ابری (3713 Views)
A review of the smart phone botnets and their confronting Techniques (3636 Views)
    ... More
:: Most Downloaded Articles
Security and Privacy in the Internet of Things (4223 Downloads)
Security challenges and solutions in software defined networks (2876 Downloads)
Provida Method Based onSupport VectorMachinesForIntrusion DetectioninComputer Networks (1625 Downloads)
Trust evaluation in the social networks based on the quality of service requirements and call log histories (1462 Downloads)
A review on attribute based access control in cloud environment (1441 Downloads)
A Trust Management Approach for Sybil Attack Detection in Wireless Sensor Networks (1424 Downloads)
مروری بر رمزنگاری مشبکه - مبنا (1408 Downloads)
An overview of software protection techniques against static and dynamic Attacks (1406 Downloads)
Evaluate The Performance Of Meta-heuristic Different Algorithms in the Discovery of the Cryption Key Vigenere Encryption Algorithm (1379 Downloads)
Identity Based Cryptography In WSN (1296 Downloads)
A review of the smart phone botnets and their confronting Techniques (1280 Downloads)
a review of vertical handover in wireless networks:concept, protocols, Algorithms. (1244 Downloads)
An Overview of Security attacks and Software Implementation of Authenticated Encryption Algorithms in CAESAR Competition (1211 Downloads)
Security Architecture Improving In Cloud Computing Basic Services (1210 Downloads)
A (1188 Downloads)
Relay Selection for Secure Device to Device Communications (1118 Downloads)
Design Credit Card Fraud Detection System Using Support Vector Machine, Feature Selection and Cross Validation . (1115 Downloads)
A Survey on Cloud Forensics (1104 Downloads)
Security Alert Correlation Survey and Study of These Features in OSSIM (1047 Downloads)
Hyper Elliptic Curve In Cryptography (966 Downloads)
روشی جدید برای تعیین موجودیت‌های مخرب در محیط‌های ابری (957 Downloads)
LTE network access security (902 Downloads)
مروری بر پروتکل های مبتنی بر مسئله LPN در سامانه های RFID (891 Downloads)
Awareness and Standards in the Field of Information Security_ (843 Downloads)
A review on the authenticated key agreement protocol EAP-AKA for interworking in the 3GPP-WLAN (812 Downloads)
    ... More
:: Most studied contents
New Journal website launched ( 3300 view)
welcome ( 890 view)
    ... More
:: Most sent contents
welcome ( 1 send)
    ... More
:: Most printed contents
New Journal website launched ( 744 print)
welcome ( 343 print)
    ... More

دوفصل نامه علمی ترویجی منادی امنیت فضای تولید و تبادل اطلاعات( افتا) Biannual Journal Monadi for Cyberspace Security (AFTA)
Persian site map - English site map - Created in 0.04 seconds with 46 queries by YEKTAWEB 4460