مقالات Journal of Computing and Security، دوره 7، شماره 11.Mining Association Rules from Semantic Web Data without User Intervention FullText2.A Lightweight Anomaly Detection Model using SVM for WSNs in IoT through a Hybrid Feature Selection Algorithm based on GA and GWO FullText3.Formalizing the main characteristics of QVT-based model transformation languages FullText4.A Risk Estimation Framework for Security Threats in Computer Networks FullText5.Generating dynamical S-boxes using ۱D Chebyshev chaotic maps FullTextpublish: 7 February 2021 - view: 257 Archive of year 1401 Journal of Computing and SecurityVolume: 9Issue: 2Volume: 9Issue: 1Archive of year 1400 Journal of Computing and SecurityVolume: 8Issue: 2Volume: 8Issue: 1Archive of year 1399 Journal of Computing and SecurityVolume: 7Issue: 1Volume: 7Issue: 2Archive of year 1398 Journal of Computing and SecurityVolume: 6Issue: 1Volume: 6Issue: 2Archive of year 1397 Journal of Computing and SecurityVolume: 5Issue: 1Volume: 5Issue: 2Archive of year 1396 Journal of Computing and SecurityVolume: 4Issue: 2Volume: 4Issue: 1Archive of year 1395 Journal of Computing and SecurityVolume: 3Issue: 4Volume: 3Issue: 3Volume: 3Issue: 2Volume: 3Issue: 1Archive of year 1394 Journal of Computing and SecurityVolume: 2Issue: 4Volume: 2Issue: 3Volume: 2Issue: 2Volume: 2Issue: 1Archive of year 1393 Journal of Computing and SecurityVolume: 1Issue: 4Volume: 1Issue: 3Volume: 1Issue: 2Volume: 1Issue: 1