[Home ] [Archive]   [ فارسی ]  
:: Main :: About :: Current Issue :: Archive :: Search :: Submit :: Contact ::
Main Menu
Home::
Journal Information::
Articles archive::
For Authors::
For Reviewers::
Registration::
Site Facilities::
Indexing::
Contact us::
::
Search in website

Advanced Search
..
Receive site information
Enter your Email in the following box to receive the site news and information.
..
Print ISSN
Print ISSN: 2476-3047
..
:: Site Tops ::
:: Most Downloaded Articles
Security and Privacy in the Internet of Things (5763 Downloads)
An Overview of Security Standards in the Field of ICT in order to Determining the Appropriate Methodology for the Security Evaluation of Equipment Related to Information and Communication Technology in the Power Industry (5292 Downloads)
Security challenges and solutions in software defined networks (3846 Downloads)
overview of ways to enhance the security of video surveillance networks using blockchain (3271 Downloads)
A Review of Intrusion Detection Defense Solutions Based on Software Defined Network (3200 Downloads)
FPGA Implementation of Polynomial Multiplication in NTRU Prime PQC Algorithms (2910 Downloads)
A survey on the wi-fi wireless network systems penetration approaches (2748 Downloads)
Management of Electronic Health Records with Preservation of Privacy using the Blockchain Technology (2691 Downloads)
Provida Method Based onSupport VectorMachinesForIntrusion DetectioninComputer Networks (2653 Downloads)
Electrocardiogram Signal Authentication System based on Deep Learning (2589 Downloads)
A Survey Of Code-Based Cryptography Schemes and the Standardization Process of Post-Quantum Cryptography: The Beginning of a New Era (2561 Downloads)
Trust evaluation in the social networks based on the quality of service requirements and call log histories (2555 Downloads)
An overview of software protection techniques against static and dynamic Attacks (2437 Downloads)
A Trust Management Approach for Sybil Attack Detection in Wireless Sensor Networks (2402 Downloads)
A review on attribute based access control in cloud environment (2393 Downloads)
Determining the appropriate methodology for the security evaluation of equipment related to information and communication technology in the power industry (2353 Downloads)
A review of the smart phone botnets and their confronting Techniques (2290 Downloads)
An Overview of Security attacks and Software Implementation of Authenticated Encryption Algorithms in CAESAR Competition (2289 Downloads)
Identity Based Cryptography In WSN (2276 Downloads)
Evaluate The Performance Of Meta-heuristic Different Algorithms in the Discovery of the Cryption Key Vigenere Encryption Algorithm (2270 Downloads)
a review of vertical handover in wireless networks:concept, protocols, Algorithms. (2263 Downloads)
مروری بر رمزنگاری مشبکه - مبنا (2234 Downloads)
Security Architecture Improving In Cloud Computing Basic Services (2217 Downloads)
Designing and Implementing two Laboratory Samples of the Intelligent System for Detecting Encrypted VoIP Skype Traffic and the Lantern Escape Tool using Deep Learning Method (2164 Downloads)
Methods of analyzing and proving the security of security protocols (2159 Downloads)
A Survey on Cloud Forensics (2156 Downloads)
A Comprehensive Exploration of Deep Learning Approaches in Differential Cryptanalysis of Lightweight Block Ciphers (2139 Downloads)
A (2059 Downloads)
Design Credit Card Fraud Detection System Using Support Vector Machine, Feature Selection and Cross Validation . (2045 Downloads)
Hyper Elliptic Curve In Cryptography (2037 Downloads)
Security Alert Correlation Survey and Study of These Features in OSSIM (2013 Downloads)
Relay Selection for Secure Device to Device Communications (2010 Downloads)
An overview of secure authentication methods using ECG biometrics with deep learning algorithms (2007 Downloads)
Security of Sponge structures (1944 Downloads)
Awareness and Standards in the Field of Information Security_ (1930 Downloads)
IEC 60870-5-104 Protocol Security Challenges and Countermeasures Identification (1906 Downloads)
LTE network access security (1905 Downloads)
Preserving privacy in the age of information technology development, lessons from the european general data protection regulation (1900 Downloads)
An overview of privacy preserving Data Publishing Techniques (1826 Downloads)
A Review of Consensus Algorithms in Blockchain (1807 Downloads)
A survey on RPL attacks and their countermeasures (1746 Downloads)
A Survey of Grouping Proof Protocols in Radio Frequency Identification Systems (1743 Downloads)
A review on the authenticated key agreement protocol EAP-AKA for interworking in the 3GPP-WLAN (1740 Downloads)
Providing an RPL-based Reliable Routing Method in the Internet of Things (1722 Downloads)
Robustness Verification of Trust Systems (1702 Downloads)
روشی جدید برای تعیین موجودیت‌های مخرب در محیط‌های ابری (1698 Downloads)
Survey of Electronic Election Based on HomomorphicEncryption (1683 Downloads)
A Study on evolutional process of privacy and security in identity managment system (1676 Downloads)
Provide a New Way to Detect emails's Spam and Phishing and Bank Phishing Using Genetic Algorithms and Prohibited Search (1670 Downloads)
Performance assessment Bio- Inspired algorithms for solving backpack in the form of objective function minimization. (1670 Downloads)
Total Sum: 246185

دوفصل نامه علمی  منادی امنیت فضای تولید و تبادل اطلاعات( افتا) Biannual Journal Monadi for Cyberspace Security (AFTA)
Persian site map - English site map - Created in 0.15 seconds with 22 queries by YEKTAWEB 4735