[
Home
] [
Archive
]
[ فارسی ]
Main Menu
Home
Journal Information
About the Journal
Editorial Board
Aims& Scopes
Journal News
Articles archive
All Issues
Current Issue
Browse by Authors
Browse by Keywords
For Authors
Call for Papers
Submission Instruction
Submission Form
For Reviewers
Reviewers Section
Reviewers Name
Registration
Registration Information
Registration Form
Site Facilities
Site map
Search contents
FAQ
Top 10 contents
Inform to friends
Indexing
ISC
SID
Contact us
Contact Information
Contact us
Search in website
Search the articles
Search the site
Advanced Search
Receive site information
Enter your Email in the following box to receive the site news and information.
Print ISSN
Print ISSN: 2476-3047
Site Tops
Most Visited Articles
Security and Privacy in the Internet of Things
(12567 Views)
Design Credit Card Fraud Detection System Using Support Vector Machine, Feature Selection and Cross Validation .
(11078 Views)
Security challenges and solutions in software defined networks
(9279 Views)
Security Alert Correlation Survey and Study of These Features in OSSIM
(8992 Views)
A Survey of Grouping Proof Protocols in Radio Frequency Identification Systems
(8690 Views)
A review on the authenticated key agreement protocol EAP-AKA for interworking in the 3GPP-WLAN
(8561 Views)
Provida Method Based onSupport VectorMachinesForIntrusion DetectioninComputer Networks
(8209 Views)
Trust evaluation in the social networks based on the quality of service requirements and call log histories
(7908 Views)
A
(7900 Views)
مروری بر رمزنگاری مشبکه - مبنا
(7838 Views)
A review on attribute based access control in cloud environment
(7653 Views)
Hyper Elliptic Curve In Cryptography
(7637 Views)
A Trust Management Approach for Sybil Attack Detection in Wireless Sensor Networks
(7486 Views)
Security Architecture Improving In Cloud Computing Basic Services
(7410 Views)
An overview of software protection techniques against static and dynamic Attacks
(7353 Views)
A Survey on Cloud Forensics
(7334 Views)
An Overview of Security attacks and Software Implementation of Authenticated Encryption Algorithms in CAESAR Competition
(7300 Views)
روشی جدید برای تعیین موجودیتهای مخرب در محیطهای ابری
(7208 Views)
A review of the smart phone botnets and their confronting Techniques
(7001 Views)
Evaluate The Performance Of Meta-heuristic Different Algorithms in the Discovery of the Cryption Key Vigenere Encryption Algorithm
(7000 Views)
Awareness and Standards in the Field of Information Security_
(6960 Views)
An overview of privacy preserving Data Publishing Techniques
(6933 Views)
Relay Selection for Secure Device to Device Communications
(6931 Views)
مروری بر پروتکل های مبتنی بر مسئله LPN در سامانه های RFID
(6928 Views)
a review of vertical handover in wireless networks:concept, protocols, Algorithms.
(6692 Views)
A Survey of Cube, Differential Fault Analysis Attacks and Linear Structures on Keccak Hash Function (SHA-3)
(6586 Views)
IEC 60870-5-104 Protocol Security Challenges and Countermeasures Identification
(6209 Views)
Robustness Verification of Trust Systems
(6157 Views)
Identity Based Cryptography In WSN
(6126 Views)
Jump Index in T-functions for designing a new basic structure of stream ciphers
(5905 Views)
Survey of Electronic Election Based on HomomorphicEncryption
(5905 Views)
A survey on the wi-fi wireless network systems penetration approaches
(5864 Views)
A Performance Survey of Meta-Heuristic And Brute-Force Search Algorithms to Cryptanalysis The SDES Encryption Algorithm
(5777 Views)
A Study on evolutional process of privacy and security in identity managment system
(5760 Views)
A Confidence-Aware Trust Approach for Detecting Indirect Sybil Attacks in Wireless Sensor Networks Considering Time Factor
(5739 Views)
LTE network access security
(5719 Views)
overview of ways to enhance the security of video surveillance networks using blockchain
(5557 Views)
Survey the Security Function of Integration of vehicular ad hoc Networks with Software-defiend Networks
(5535 Views)
An Introduction to Differential Computation Analysis (DCA) on the withe-box cryptography algorithms
(5528 Views)
A review of privacy in online social networks
(5513 Views)
Overview of Jamming Operation in Smart Network
(5481 Views)
Search over Encrypted Data: Functionalities and Challenges
(5469 Views)
Performance assessment Bio- Inspired algorithms for solving backpack in the form of objective function minimization.
(5422 Views)
Risk Management in Local Search Engine Systems
(5393 Views)
Review of Image Steganography Based on LSB and Pixel Classification and Providing a New Method in This Area
(5380 Views)
Security Indexes of Development Life Cycle of Local Search Engines
(5335 Views)
A survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions
(5317 Views)
Introduction of TMTO attack on Hash Functions
(5300 Views)
A Review on Website Fingerprinting Attacks
(5264 Views)
Survey of group location privacy approaches in location-based services and its challenges
(5253 Views)
Total Sum: 713338
Persian site map -
English site map
- Created in 0.18 seconds with 20 queries by YEKTAWEB 4741