لطفا کمی صبر نمایید ...
ورود
Advanced Search
Thesis
مقالات فارسی
ISI
کنفرانسها
ژورنالها
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Login / Register
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Thesis
Dark Mode
استعلام پایان نامه
جستجوی مقالات داخلی
Catehory
Conference Papers
Journal Papers
Books
Plans
Research documents
Rports
Result Type:
Full Text
Has Word File
Search regardless of the position of the words
Limit article publication year to:
All years
Specific years:
Search
Show
All Information
Only Paper Title
Item Per Page
10
20
Sort By
Paper title
Year
Indexing
ABS
DESC
فیلتر نتایج
Mehdi fasanghari
نتایج 41 تا 50 از مجموع 125
First
...
2
3
4
5
6
7
8
...
Last
Conference Paper
Security-Probabilistic Transmission Line Planning Based on Benders Decomposition Algorithm Considering Wind Farms
Authors:
Hesam famil sagharichi
،
Abdullah mahmoudi
Year 1400
Publish place:
The 9th Iranian Conference on Renewable Energy & Distributed Generation
Pages:
8
| Language: English
View And Download
Journal Paper
Designing the performance evaluation indicators of Hormozgan Social Security Organization's service supply chain by the Network Data Envelopment Analysis Model
Authors:
Taleb pargar
،
Morteza Shafiee
،
Mohamadali Afsharkazemi
Year 1401
Publish place:
International Journal of Finance and Managerial Accounting Issue 27، Vol 7
Pages:
10
| Language: English
View And Download
Conference Paper
Security issues over Software-Defined Networks (SDN)
Authors:
Soodeh Asgari
Year 1400
Publish place:
Sixth International Conference on Electrical Engineering, Computer Science and Information Technology
Pages:
5
| Language: English
View And Download
Journal Paper
A Taxonomy for Network Vulnerabilities
Authors:
Sara Hajian
،
Faramarz Hendessi
،
Mehdi Berenjkoub
Year 1388
Publish place:
International Journal of Information and Communication Technology Research (IJICT Issue 1، Vol 2
Pages:
16
| Language: English
View And Download
Journal Paper
Predicting Network Attacks Using Ontology-Driven Inference
Authors:
Ahmad Salahi
،
Morteza Ansarinia
Year 1391
Publish place:
International Journal of Information and Communication Technology Research (IJICT Issue 2، Vol 4
Pages:
9
| Language: English
View And Download
Journal Paper
Security Enhancement in Open-Source Healthcare Developer Network using Graph Theory
Authors:
Mehdi Fasanghari
،
Hamideh Sadat Cheraghchi
،
Farhad Pouladi
،
Farzaneh Abazari
Year 1400
Publish place:
International Journal of Information and Communication Technology Research (IJICT Issue 3، Vol 13
Pages:
15
| Language: English
View And Download
Journal Paper
An Efficient End to End Key Establishment Protocol for Wireless Sensor Networks
Authors:
Ali Fanian
،
Mehdi Berenjkoub
Year 1393
Publish place:
Journal of Computing and Security Issue 1، Vol 1
Pages:
16
| Language: English
View And Download
Conference Paper
شناسایی حمله های ارسالی انتخابی در شبکه های حسگر بی سیم
Authors:
بهنام بهرامی
،
پوریا نیک وند
Year 1400
Publish place:
Fourth National Conference on New Technologies in Electrical, Computer and Mechanical Engineering of Iran
Pages:
6
| Language: Persian
View And Download
Conference Paper
Investigation of combined intrusion ate detection systems with network security approach Case study of RPL protocols
Authors:
Sadaf Taghipoor Tabrizi
Year 1400
Publish place:
Twelfth International Conference on Information Technology, Computer and Telecommunications
Pages:
6
| Language: English
View And Download
Conference Paper
The role of distributed generation in the reduction of transmission capacities and promotion of the security of the network
Authors:
Amir Hassanli
،
Alireza Ostvar zijerdi
Year 1399
Publish place:
The first engineering and technology conference
Pages:
19
| Language: English
View And Download
نتایج 41 تا 50 از مجموع 125
First
...
2
3
4
5
6
7
8
...
Last