[
Home
] [
Archive
]
[ فارسی ]
Main Menu
Home
Journal Information
About the Journal
Editorial Board
Aims& Scopes
Journal News
Articles archive
All Issues
Current Issue
Browse by Authors
Browse by Keywords
For Authors
Call for Papers
Submission Instruction
Submission Form
For Reviewers
Reviewers Section
Reviewers Name
Registration
Registration Information
Registration Form
Site Facilities
Site map
Search contents
FAQ
Top 10 contents
Inform to friends
Indexing
ISC
SID
Contact us
Contact Information
Contact us
Search in website
Search the articles
Search the site
Advanced Search
Receive site information
Enter your Email in the following box to receive the site news and information.
Print ISSN
Print ISSN: 2476-3047
Site Tops
Most Visited Articles
Security and Privacy in the Internet of Things
(12351 Views)
Design Credit Card Fraud Detection System Using Support Vector Machine, Feature Selection and Cross Validation .
(10953 Views)
Security challenges and solutions in software defined networks
(9098 Views)
Security Alert Correlation Survey and Study of These Features in OSSIM
(8847 Views)
A Survey of Grouping Proof Protocols in Radio Frequency Identification Systems
(8532 Views)
A review on the authenticated key agreement protocol EAP-AKA for interworking in the 3GPP-WLAN
(8415 Views)
Provida Method Based onSupport VectorMachinesForIntrusion DetectioninComputer Networks
(8062 Views)
Trust evaluation in the social networks based on the quality of service requirements and call log histories
(7772 Views)
A
(7739 Views)
مروری بر رمزنگاری مشبکه - مبنا
(7683 Views)
A review on attribute based access control in cloud environment
(7483 Views)
Hyper Elliptic Curve In Cryptography
(7451 Views)
A Trust Management Approach for Sybil Attack Detection in Wireless Sensor Networks
(7316 Views)
Security Architecture Improving In Cloud Computing Basic Services
(7256 Views)
A Survey on Cloud Forensics
(7188 Views)
An overview of software protection techniques against static and dynamic Attacks
(7177 Views)
An Overview of Security attacks and Software Implementation of Authenticated Encryption Algorithms in CAESAR Competition
(7134 Views)
روشی جدید برای تعیین موجودیتهای مخرب در محیطهای ابری
(7061 Views)
Evaluate The Performance Of Meta-heuristic Different Algorithms in the Discovery of the Cryption Key Vigenere Encryption Algorithm
(6847 Views)
A review of the smart phone botnets and their confronting Techniques
(6822 Views)
Awareness and Standards in the Field of Information Security_
(6800 Views)
مروری بر پروتکل های مبتنی بر مسئله LPN در سامانه های RFID
(6777 Views)
Relay Selection for Secure Device to Device Communications
(6775 Views)
An overview of privacy preserving Data Publishing Techniques
(6757 Views)
a review of vertical handover in wireless networks:concept, protocols, Algorithms.
(6517 Views)
... More
Most Downloaded Articles
Security and Privacy in the Internet of Things
(5759 Downloads)
An Overview of Security Standards in the Field of ICT in order to Determining the Appropriate Methodology for the Security Evaluation of Equipment Related to Information and Communication Technology in the Power Industry
(5287 Downloads)
Security challenges and solutions in software defined networks
(3845 Downloads)
overview of ways to enhance the security of video surveillance networks using blockchain
(3266 Downloads)
A Review of Intrusion Detection Defense Solutions Based on Software Defined Network
(3197 Downloads)
FPGA Implementation of Polynomial Multiplication in NTRU Prime PQC Algorithms
(2904 Downloads)
A survey on the wi-fi wireless network systems penetration approaches
(2743 Downloads)
Management of Electronic Health Records with Preservation of Privacy using the Blockchain Technology
(2669 Downloads)
Provida Method Based onSupport VectorMachinesForIntrusion DetectioninComputer Networks
(2649 Downloads)
Electrocardiogram Signal Authentication System based on Deep Learning
(2589 Downloads)
A Survey Of Code-Based Cryptography Schemes and the Standardization Process of Post-Quantum Cryptography: The Beginning of a New Era
(2559 Downloads)
Trust evaluation in the social networks based on the quality of service requirements and call log histories
(2551 Downloads)
An overview of software protection techniques against static and dynamic Attacks
(2437 Downloads)
A Trust Management Approach for Sybil Attack Detection in Wireless Sensor Networks
(2401 Downloads)
A review on attribute based access control in cloud environment
(2392 Downloads)
Determining the appropriate methodology for the security evaluation of equipment related to information and communication technology in the power industry
(2351 Downloads)
A review of the smart phone botnets and their confronting Techniques
(2288 Downloads)
An Overview of Security attacks and Software Implementation of Authenticated Encryption Algorithms in CAESAR Competition
(2285 Downloads)
Identity Based Cryptography In WSN
(2276 Downloads)
Evaluate The Performance Of Meta-heuristic Different Algorithms in the Discovery of the Cryption Key Vigenere Encryption Algorithm
(2268 Downloads)
a review of vertical handover in wireless networks:concept, protocols, Algorithms.
(2259 Downloads)
مروری بر رمزنگاری مشبکه - مبنا
(2228 Downloads)
Security Architecture Improving In Cloud Computing Basic Services
(2213 Downloads)
Designing and Implementing two Laboratory Samples of the Intelligent System for Detecting Encrypted VoIP Skype Traffic and the Lantern Escape Tool using Deep Learning Method
(2160 Downloads)
Methods of analyzing and proving the security of security protocols
(2157 Downloads)
... More
Most studied contents
New Journal website launched
(
6200 view
)
Reviewers Name
(
1920 view
)
Word Cloud
(
1287 view
)
welcome
(
1137 view
)
... More
Most sent contents
welcome
(
1 send
)
... More
Most printed contents
New Journal website launched
(
1261 print
)
Reviewers Name
(
386 print
)
Word Cloud
(
378 print
)
welcome
(
354 print
)
... More
Persian site map -
English site map
- Created in 0.11 seconds with 58 queries by YEKTAWEB 4735