[Home ] [Archive]   [ فارسی ]  
:: Main :: About :: Current Issue :: Archive :: Search :: Submit :: Contact ::
Main Menu
Home::
Journal Information::
Articles archive::
For Authors::
For Reviewers::
Registration::
Site Facilities::
Indexing::
Contact us::
::
Search in website

Advanced Search
..
Receive site information
Enter your Email in the following box to receive the site news and information.
..
Print ISSN
Print ISSN: 2476-3047
..
:: Site Tops ::
:: Most Visited Articles
Security and Privacy in the Internet of Things (12561 Views)
Design Credit Card Fraud Detection System Using Support Vector Machine, Feature Selection and Cross Validation . (11074 Views)
Security challenges and solutions in software defined networks (9272 Views)
Security Alert Correlation Survey and Study of These Features in OSSIM (8986 Views)
A Survey of Grouping Proof Protocols in Radio Frequency Identification Systems (8686 Views)
A review on the authenticated key agreement protocol EAP-AKA for interworking in the 3GPP-WLAN (8555 Views)
Provida Method Based onSupport VectorMachinesForIntrusion DetectioninComputer Networks (8201 Views)
Trust evaluation in the social networks based on the quality of service requirements and call log histories (7902 Views)
A (7894 Views)
مروری بر رمزنگاری مشبکه - مبنا (7832 Views)
A review on attribute based access control in cloud environment (7646 Views)
Hyper Elliptic Curve In Cryptography (7633 Views)
A Trust Management Approach for Sybil Attack Detection in Wireless Sensor Networks (7476 Views)
Security Architecture Improving In Cloud Computing Basic Services (7404 Views)
An overview of software protection techniques against static and dynamic Attacks (7347 Views)
A Survey on Cloud Forensics (7329 Views)
An Overview of Security attacks and Software Implementation of Authenticated Encryption Algorithms in CAESAR Competition (7293 Views)
روشی جدید برای تعیین موجودیت‌های مخرب در محیط‌های ابری (7201 Views)
Evaluate The Performance Of Meta-heuristic Different Algorithms in the Discovery of the Cryption Key Vigenere Encryption Algorithm (6994 Views)
A review of the smart phone botnets and their confronting Techniques (6994 Views)
Awareness and Standards in the Field of Information Security_ (6955 Views)
An overview of privacy preserving Data Publishing Techniques (6927 Views)
Relay Selection for Secure Device to Device Communications (6927 Views)
مروری بر پروتکل های مبتنی بر مسئله LPN در سامانه های RFID (6924 Views)
a review of vertical handover in wireless networks:concept, protocols, Algorithms. (6686 Views)
    ... More
:: Most Downloaded Articles
Security and Privacy in the Internet of Things (5865 Downloads)
An Overview of Security Standards in the Field of ICT in order to Determining the Appropriate Methodology for the Security Evaluation of Equipment Related to Information and Communication Technology in the Power Industry (5551 Downloads)
Security challenges and solutions in software defined networks (3931 Downloads)
overview of ways to enhance the security of video surveillance networks using blockchain (3458 Downloads)
A Review of Intrusion Detection Defense Solutions Based on Software Defined Network (3348 Downloads)
FPGA Implementation of Polynomial Multiplication in NTRU Prime PQC Algorithms (3098 Downloads)
A survey on the wi-fi wireless network systems penetration approaches (2885 Downloads)
Management of Electronic Health Records with Preservation of Privacy using the Blockchain Technology (2878 Downloads)
A Survey Of Code-Based Cryptography Schemes and the Standardization Process of Post-Quantum Cryptography: The Beginning of a New Era (2781 Downloads)
Electrocardiogram Signal Authentication System based on Deep Learning (2733 Downloads)
Provida Method Based onSupport VectorMachinesForIntrusion DetectioninComputer Networks (2730 Downloads)
Trust evaluation in the social networks based on the quality of service requirements and call log histories (2623 Downloads)
An overview of software protection techniques against static and dynamic Attacks (2524 Downloads)
A Trust Management Approach for Sybil Attack Detection in Wireless Sensor Networks (2487 Downloads)
A review on attribute based access control in cloud environment (2478 Downloads)
Determining the appropriate methodology for the security evaluation of equipment related to information and communication technology in the power industry (2472 Downloads)
A review of the smart phone botnets and their confronting Techniques (2375 Downloads)
Evaluate The Performance Of Meta-heuristic Different Algorithms in the Discovery of the Cryption Key Vigenere Encryption Algorithm (2369 Downloads)
An Overview of Security attacks and Software Implementation of Authenticated Encryption Algorithms in CAESAR Competition (2363 Downloads)
a review of vertical handover in wireless networks:concept, protocols, Algorithms. (2360 Downloads)
A Comprehensive Exploration of Deep Learning Approaches in Differential Cryptanalysis of Lightweight Block Ciphers (2359 Downloads)
Identity Based Cryptography In WSN (2346 Downloads)
Methods of analyzing and proving the security of security protocols (2330 Downloads)
Designing and Implementing two Laboratory Samples of the Intelligent System for Detecting Encrypted VoIP Skype Traffic and the Lantern Escape Tool using Deep Learning Method (2300 Downloads)
Security Architecture Improving In Cloud Computing Basic Services (2297 Downloads)
    ... More
:: Most studied contents
New Journal website launched ( 6317 view)
Reviewers Name ( 2026 view)
Word Cloud ( 1403 view)
welcome ( 1137 view)
    ... More
:: Most sent contents
welcome ( 1 send)
    ... More
:: Most printed contents
New Journal website launched ( 1289 print)
Word Cloud ( 427 print)
Reviewers Name ( 416 print)
welcome ( 354 print)
    ... More

دوفصل نامه علمی  منادی امنیت فضای تولید و تبادل اطلاعات( افتا) Biannual Journal Monadi for Cyberspace Security (AFTA)
Persian site map - English site map - Created in 0.12 seconds with 60 queries by YEKTAWEB 4741