لطفا کمی صبر نمایید ...
ورود
Advanced Search
Thesis
مقالات فارسی
ISI
کنفرانسها
ژورنالها
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Login / Register
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Thesis
Dark Mode
استعلام پایان نامه
جستجوی مقالات داخلی
Catehory
Conference Papers
Journal Papers
Books
Plans
Research documents
Rports
Result Type:
Full Text
Has Word File
Search regardless of the position of the words
Limit article publication year to:
All years
Specific years:
Search
Show
All Information
Only Paper Title
Item Per Page
10
20
Sort By
Paper title
Year
Indexing
ABS
DESC
فیلتر نتایج
Mohammad Esmaeil Akbari
Ali Ghaffari
نتایج 31 تا 40 از مجموع 109
1
2
3
4
5
6
7
...
Last
Journal Paper
Difference between Domestic and Hostile Applications of Wireless Sensor Networks
Authors:
Haoran Yu
Year 1401
Publish place:
Big Data and Computing Visions Issue 4، Vol 2
Pages:
5
| Language: English
View And Download
Journal Paper
A Honeypot-assisted Industrial Control System to Detect Replication Attacks on Wireless Sensor Networks
Authors:
Abbasgholi Pashaei
،
Mohammad Esmaeil Akbari
،
Mina Zolfy Lighvan
،
Asghar Charmin
Year 1401
Publish place:
Telecommunication devices Issue 3، Vol 11
Pages:
6
| Language: English
View And Download
Journal Paper
An experimental study on cloud honeypot and data visualization using ELK stack
Authors:
- -
،
- -
،
- -
Year 1400
Publish place:
International Journal of Nonlinear Analysis and Applications Issue 0، Vol 12
Pages:
16
| Language: English
View And Download
Journal Paper
VANET Vulnerabilities Classification and Countermeasures: A Review
Authors:
Vamshi Krishna K
،
Ganesh Reddy K
Year 1401
Publish place:
majlesi Journal of Electrical Engineering Issue 3، Vol 16
Pages:
21
| Language: English
View And Download
Journal Paper
ارائه معماری نوین شبکه های دفاعی گسترده مستحکم در برابر حملات هدفمند
Authors:
محمد مهدی عمادی کوچک
،
بیژن ساعدی
،
مهدی نجف زاده
،
حمید محسنی
Year 1401
Publish place:
Journal Of Command & Control Issue 4، Vol 5
Pages:
24
| Language: Persian
View And Download
Journal Paper
Taxonomy of Threats and Attacks in IoT
Authors:
Maryam Shamsadini
،
Ali Ghaffari
Year 1401
Publish place:
Journal of Computer and Robotics Issue 1، Vol 15
Pages:
14
| Language: English
View And Download
Journal Paper
A Lightweight Authentication Scheme for RFID with Permutation Operation on Passive Tags
Authors:
Alireza Abdellahi Khorasgani
،
Mahdi Sadjadieh
،
Mohammad Rohollah Yazdani
Year 1400
Publish place:
Journal of Computing and Security Issue 2، Vol 8
Pages:
16
| Language: English
View And Download
Journal Paper
Multi Trust-based Secure Trust Model for WSNs
Authors:
Khan
،
Singh
،
Gupta
،
Manjul
Year 1401
Publish place:
Journal of Information Technology Management Issue 6، Vol 14
Pages:
12
| Language: English
View And Download
Journal Paper
Energy Consumption Analysis of Iot-Manet Based Systems with Anova Assessment for Tackling Covid-۱۹
Authors:
Gautam
،
Mahajan
،
Zafar
Year 1401
Publish place:
Journal of Information Technology Management Issue 6، Vol 14
Pages:
14
| Language: English
View And Download
Journal Paper
Evaluation of an Intrusion Detection System for Routing Attacks in Wireless Self-organised Networks
Authors:
O. Adaobi
،
M. Ghassemian
Year 1390
Publish place:
The International Journal of Communications and Information Technology Issue 1، Vol 1
Pages:
5
| Language: English
View And Download
نتایج 31 تا 40 از مجموع 109
1
2
3
4
5
6
7
...
Last