لطفا کمی صبر نمایید ...
ورود
Advanced Search
Thesis
مقالات فارسی
ISI
کنفرانسها
ژورنالها
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Login / Register
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Thesis
Dark Mode
استعلام پایان نامه
جستجوی مقالات داخلی
Catehory
Conference Papers
Journal Papers
Books
Plans
Research documents
Rports
Result Type:
Full Text
Has Word File
Search regardless of the position of the words
Limit article publication year to:
All years
Specific years:
Search
Show
All Information
Only Paper Title
Item Per Page
10
20
Sort By
Paper title
Year
Indexing
ABS
DESC
فیلتر نتایج
Mohammad Saadaat
نتایج 71 تا 80 از مجموع 109
First
...
5
6
7
8
9
10
11
Conference Paper
Security Challenges of Internet of things: Social Engineering Threats for IoT
Authors:
Mohammad Saadaat
،
Mohammad Reza Jafari
Year 1396
Publish place:
Pages:
7
| Language: English
View And Download
Conference Paper
Formal security and privacy analysis and improvements of RFID hash-based authentication protocol
Authors:
Arezoo Rezaei
،
Mahdi R. Alagheband
Year 1396
Publish place:
Fifth International Conference on Electrical and Computer Engineering with Emphasis on Indigenous Knowledge
Pages:
11
| Language: English
View And Download
Conference Paper
Threats of Social Engineering Attacks Against Security of Internet of Things (IoT)
Authors:
Mohsen Ghasemi
،
Mohammad Saadaat
،
Javad Jalalzaei
Year 1396
Publish place:
2nd International Conference on Computer Engineering and Information Technology
Pages:
7
| Language: English
View And Download
Conference Paper
Security Techniques for VANETs
Authors:
Azam hesami
،
mehdi aminian
،
Seyed Hassan Hosseini
Year 1396
Publish place:
2nd International Conference on Computer Engineering and Information Technology
Pages:
7
| Language: English
View And Download
Conference Paper
A Survey on Social Networks Privacy: attacks and defenses
Authors:
Abolfazl Qiyasi Moghadam
،
Mehdi Imani
Year 1395
Publish place:
International Conference on Engineering and Computer Science
Pages:
7
| Language: English
View And Download
Conference Paper
A Framework to Measure Impact of Beacon Falsification Attacks on Wireless Broadcast Connections
Authors:
Mina Malekzadeh
،
Zeinab Mollahasani
Year 1395
Publish place:
8th Iranian conference on electrical and electronic engineering
Pages:
5
| Language: English
View And Download
Conference Paper
CitiesBig Data Security Threats in Smart CitiesBig Data Security Threats in Smart CitiesBig Data Security Threats in Smart CitiesBig Data Security Threats in Smart CitiesBig Data Security Threats in Smart CitiesBig Data Security Threats in Smart CitiesBig Data Security Threats in Smart CitiesBig Data Security Threats in Smart CitiesBig Data Security Threats in Smart CitiesBig Data Security Threats in Smart CitiesBig Data Security Threats in Smart CitiesBig Data Security Threats in Smart CitiesBig Data Security Threats in Smart CitiesBig Data Security Threats in Smart CitiesBig Data Security Th
Authors:
Atefeh Torkaman
،
Zahra Heidari
،
Mahsa Vaziri
،
Madjid Khalilian
Year 1395
Publish place:
International Conference on the New Horizons in the Basic and Technical Sciences and Engineering
Pages:
10
| Language: English
View And Download
Conference Paper
بررسی برخی راه های نفوذ به شبکه های بیسیم و راه های مقابله با آن
Authors:
مهدی اکبرپور
،
سپیده سپاهی
،
فهیمه آقازاده
Year 1395
Publish place:
Pages:
13
| Language: Persian
View And Download
Journal Paper
SIP Vulnerability Scan Framework
Authors:
Mitra Alidoosti
،
Hassan Asgharian
،
Ahmad Akbari
Year 1393
Publish place:
The Journal of Information Systems and Telecommunication (JIST) Issue 8، Vol 2
Pages:
9
| Language: English
View And Download
Conference Paper
Intrusion Detection System and its Method in Wireless Sensor Networks: A Survey
Authors:
Azam Beheshti Asl
،
Akbar Beheshti Asl
Year 1395
Publish place:
Pages:
13
| Language: English
View And Download
نتایج 71 تا 80 از مجموع 109
First
...
5
6
7
8
9
10
11