 |
Most Visited Articles |
 |
Security and Privacy in the Internet of Things (11326 Views) |
 |
Design Credit Card Fraud Detection System Using Support Vector Machine, Feature Selection and Cross Validation . (10312 Views) |
 |
Security challenges and solutions in software defined networks (8286 Views) |
 |
Security Alert Correlation Survey and Study of These Features in OSSIM (8149 Views) |
 |
A Survey of Grouping Proof Protocols in Radio Frequency Identification Systems (7784 Views) |
 |
A review on the authenticated key agreement protocol EAP-AKA for interworking in the 3GPP-WLAN (7591 Views) |
 |
Provida Method Based onSupport VectorMachinesForIntrusion DetectioninComputer Networks (7308 Views) |
 |
Trust evaluation in the social networks based on the quality of service requirements and call log histories (7105 Views) |
 |
مروری بر رمزنگاری مشبکه - مبنا (6970 Views) |
 |
A (6917 Views) |
 |
Hyper Elliptic Curve In Cryptography (6616 Views) |
 |
Security Architecture Improving In Cloud Computing Basic Services (6558 Views) |
 |
A review on attribute based access control in cloud environment (6540 Views) |
 |
A Trust Management Approach for Sybil Attack Detection in Wireless Sensor Networks (6532 Views) |
 |
A Survey on Cloud Forensics (6513 Views) |
 |
An overview of software protection techniques against static and dynamic Attacks (6318 Views) |
 |
An Overview of Security attacks and Software Implementation of Authenticated Encryption Algorithms in CAESAR Competition (6282 Views) |
 |
روشی جدید برای تعیین موجودیتهای مخرب در محیطهای ابری (6255 Views) |
 |
Evaluate The Performance Of Meta-heuristic Different Algorithms in the Discovery of the Cryption Key Vigenere Encryption Algorithm (6030 Views) |
 |
A review of the smart phone botnets and their confronting Techniques (6030 Views) |
 |
مروری بر پروتکل های مبتنی بر مسئله LPN در سامانه های RFID (6025 Views) |
 |
Awareness and Standards in the Field of Information Security_ (6009 Views) |
 |
Relay Selection for Secure Device to Device Communications (5997 Views) |
 |
An overview of privacy preserving Data Publishing Techniques (5890 Views) |
 |
a review of vertical handover in wireless networks:concept, protocols, Algorithms. (5751 Views) |
... More |
 |
Most Downloaded Articles |
 |
Security and Privacy in the Internet of Things (5318 Downloads) |
 |
An Overview of Security Standards in the Field of ICT in order to Determining the Appropriate Methodology for the Security Evaluation of Equipment Related to Information and Communication Technology in the Power Industry (4092 Downloads) |
 |
Security challenges and solutions in software defined networks (3407 Downloads) |
 |
A Review of Intrusion Detection Defense Solutions Based on Software Defined Network (2655 Downloads) |
 |
overview of ways to enhance the security of video surveillance networks using blockchain (2598 Downloads) |
 |
Provida Method Based onSupport VectorMachinesForIntrusion DetectioninComputer Networks (2350 Downloads) |
 |
A survey on the wi-fi wireless network systems penetration approaches (2214 Downloads) |
 |
Trust evaluation in the social networks based on the quality of service requirements and call log histories (2187 Downloads) |
 |
An overview of software protection techniques against static and dynamic Attacks (2124 Downloads) |
 |
FPGA Implementation of Polynomial Multiplication in NTRU Prime PQC Algorithms (2062 Downloads) |
 |
Evaluate The Performance Of Meta-heuristic Different Algorithms in the Discovery of the Cryption Key Vigenere Encryption Algorithm (1985 Downloads) |
 |
Identity Based Cryptography In WSN (1957 Downloads) |
 |
مروری بر رمزنگاری مشبکه - مبنا (1956 Downloads) |
 |
A review on attribute based access control in cloud environment (1945 Downloads) |
 |
a review of vertical handover in wireless networks:concept, protocols, Algorithms. (1943 Downloads) |
 |
A Trust Management Approach for Sybil Attack Detection in Wireless Sensor Networks (1931 Downloads) |
 |
A review of the smart phone botnets and their confronting Techniques (1910 Downloads) |
 |
Determining the appropriate methodology for the security evaluation of equipment related to information and communication technology in the power industry (1903 Downloads) |
 |
Electrocardiogram Signal Authentication System based on Deep Learning (1885 Downloads) |
 |
Security Architecture Improving In Cloud Computing Basic Services (1882 Downloads) |
 |
An Overview of Security attacks and Software Implementation of Authenticated Encryption Algorithms in CAESAR Competition (1857 Downloads) |
 |
A (1773 Downloads) |
 |
A Survey on Cloud Forensics (1764 Downloads) |
 |
Design Credit Card Fraud Detection System Using Support Vector Machine, Feature Selection and Cross Validation . (1727 Downloads) |
 |
Relay Selection for Secure Device to Device Communications (1688 Downloads) |
... More |
 |
Most studied contents |
 |
New Journal website launched ( 5487 view) |
 |
welcome ( 1096 view) |
 |
Reviewers Name ( 1026 view) |
 |
Word Cloud ( 687 view) |
... More |
 |
Most sent contents |
 |
welcome ( 1 send) |
... More |
 |
Most printed contents |
 |
New Journal website launched ( 1081 print) |
 |
welcome ( 351 print) |
 |
Reviewers Name ( 196 print) |
 |
Word Cloud ( 188 print) |
... More |