[Home ] [Archive]   [ فارسی ]  
:: Main :: About :: Current Issue :: Archive :: Search :: Submit :: Contact ::
Main Menu
Home::
Journal Information::
Articles archive::
For Authors::
For Reviewers::
Registration::
Contact us::
Site Facilities::
::
Search in website

Advanced Search
..
Receive site information
Enter your Email in the following box to receive the site news and information.
..
:: Site Tops ::
:: Most Visited Articles
Design Credit Card Fraud Detection System Using Support Vector Machine, Feature Selection and Cross Validation . (9005 Views)
Security and Privacy in the Internet of Things (8095 Views)
Security Alert Correlation Survey and Study of These Features in OSSIM (6675 Views)
A Survey of Grouping Proof Protocols in Radio Frequency Identification Systems (5991 Views)
Security challenges and solutions in software defined networks (5908 Views)
Provida Method Based onSupport VectorMachinesForIntrusion DetectioninComputer Networks (5462 Views)
Trust evaluation in the social networks based on the quality of service requirements and call log histories (5404 Views)
A review on the authenticated key agreement protocol EAP-AKA for interworking in the 3GPP-WLAN (5192 Views)
مروری بر رمزنگاری مشبکه - مبنا (4857 Views)
Security Architecture Improving In Cloud Computing Basic Services (4662 Views)
A Survey on Cloud Forensics (4614 Views)
Hyper Elliptic Curve In Cryptography (4423 Views)
A (4402 Views)
Evaluate The Performance Of Meta-heuristic Different Algorithms in the Discovery of the Cryption Key Vigenere Encryption Algorithm (4252 Views)
An Overview of Security attacks and Software Implementation of Authenticated Encryption Algorithms in CAESAR Competition (4242 Views)
Relay Selection for Secure Device to Device Communications (4206 Views)
A review on attribute based access control in cloud environment (4039 Views)
An overview of software protection techniques against static and dynamic Attacks (4031 Views)
A Trust Management Approach for Sybil Attack Detection in Wireless Sensor Networks (3879 Views)
روشی جدید برای تعیین موجودیت‌های مخرب در محیط‌های ابری (3869 Views)
Awareness and Standards in the Field of Information Security_ (3862 Views)
مروری بر پروتکل های مبتنی بر مسئله LPN در سامانه های RFID (3842 Views)
a review of vertical handover in wireless networks:concept, protocols, Algorithms. (3840 Views)
Robustness Verification of Trust Systems (3822 Views)
A review of the smart phone botnets and their confronting Techniques (3754 Views)
Identity Based Cryptography In WSN (3693 Views)
A Survey of Cube, Differential Fault Analysis Attacks and Linear Structures on Keccak Hash Function (SHA-3) (3558 Views)
A Study on evolutional process of privacy and security in identity managment system (3346 Views)
LTE network access security (3288 Views)
An overview of privacy preserving Data Publishing Techniques (3279 Views)
Review of Image Steganography Based on LSB and Pixel Classification and Providing a New Method in This Area (3074 Views)
Performance assessment Bio- Inspired algorithms for solving backpack in the form of objective function minimization. (2933 Views)
Jump Index in T-functions for designing a new basic structure of stream ciphers (2852 Views)
Overview of Jamming Operation in Smart Network (2837 Views)
خدمات ابری معتبر و نامعتبر: بررسی روش های موجود و ارائه راهکارهای جدید (2711 Views)
Survey of group location privacy approaches in location-based services and its challenges (2672 Views)
Survey of Secure Multiparty Summation protocols and their challenges (2548 Views)
Survey Security Aspects in Components and Architecture Local Search Engines (2475 Views)
Security Indexes of Development Life Cycle of Local Search Engines (2469 Views)
Survey of Electronic Election Based on HomomorphicEncryption (2415 Views)
Identifying Security Risks in Smartphone App Distribution Ecosystem (2389 Views)
The study of the methods to increase the security of the public places using coverage improvement and their monitoring based on wireless sensor networks (2373 Views)
IEC 60870-5-104 Protocol Security Challenges and Countermeasures Identification (2298 Views)
Introduction of TMTO attack on Hash Functions (2285 Views)
A Review on Website Fingerprinting Attacks (2108 Views)
Risk Management in Local Search Engine Systems (2086 Views)
A Survey on Lightweight Hardware Implementation of AES (2078 Views)
Survey the Security Function of Integration of vehicular ad hoc Networks with Software-defiend Networks (2004 Views)
Overview of Intrusion Detection Techniques in Database (2003 Views)
A review of privacy in online social networks (1976 Views)
Total Sum: 231876

دوفصل نامه علمی ترویجی منادی امنیت فضای تولید و تبادل اطلاعات( افتا) Biannual Journal Monadi for Cyberspace Security (AFTA)
Persian site map - English site map - Created in 0.04 seconds with 20 queries by YEKTAWEB 4514