لطفا کمی صبر نمایید ...
ورود
Advanced Search
Thesis
مقالات فارسی
ISI
کنفرانسها
ژورنالها
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Login / Register
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Thesis
Dark Mode
استعلام پایان نامه
جستجوی مقالات داخلی
Catehory
Conference Papers
Journal Papers
Books
Plans
Research documents
Rports
Result Type:
Full Text
Has Word File
Search regardless of the position of the words
Limit article publication year to:
All years
Specific years:
Search
Show
All Information
Only Paper Title
Item Per Page
10
20
Sort By
Paper title
Year
Indexing
ABS
DESC
فیلتر نتایج
Davood Hosseinpoor
نتایج 51 تا 60 از مجموع 125
First
...
3
4
5
6
7
8
9
...
Last
Conference Paper
A Survey: Secure Routing Challenges In MANET
Authors:
Solmaz Nozohour Amoughein
،
Ali Soleymani
،
Ramin Karimi
Year 1397
Publish place:
Second National Conference on Modern Research in Electrical, Computer and Medical Engineering
Pages:
14
| Language: English
View And Download
Conference Paper
Toward Dynamic Approach to Enhance Cyber Security in Integrated Industrial Control Systems Using Network Segmentation
Authors:
Mehran Mahbubian
،
Mahmud Saleh Esfahani
Year 1399
Publish place:
11th International Conference on Information Technology, Computer and Telecommunications
Pages:
9
| Language: English
View And Download
Journal Paper
Detecting Bot Networks Based On HTTP And TLS Traffic Analysis
Authors:
Zahra Nafarieh
Year 1399
Publish place:
Journal of Advances in Computer Engineering and Technology Issue 2، Vol 6
Pages:
10
| Language: English
View And Download
Journal Paper
An Attack Graph Based Method for Predictive Risk Evaluation of Zero-Day Attacks
Authors:
Marjan Keramati
Year 1396
Publish place:
International Journal of Information and Communication Technology Research (IJICT Issue 3، Vol 9
Pages:
10
| Language: English
View And Download
Journal Paper
Dynamic Risk Assessment System for the Vulnerability Scoring
Authors:
Marjan Keramati
Year 1396
Publish place:
International Journal of Information and Communication Technology Research (IJICT Issue 4، Vol 9
Pages:
12
| Language: English
View And Download
Conference Paper
Application of computer network security system
Authors:
Yoonis Raysee
Year 1399
Publish place:
Third Conference on Mechanics, Electrical and Computer Engineering
Pages:
5
| Language: English
View And Download
Journal Paper
حاکمیت شبکهای در نهادهای پژوهشی امنیت سایبری
Authors:
محمدمهدی قوچانی خراسانی
،
داود حسین پور
Year 1396
Publish place:
Management and Development Process Issue 1، Vol 30
Pages:
30
| Language: Persian
View And Download
Journal Paper
Proposing a New Algorithm for Predicting Short-Term and Long-Term Trust-ability in Cloud Computing
Authors:
Samiyeh Khosravi
Year 1398
Publish place:
International Journal of Information and Communication Technology Research (IJICT Issue 2، Vol 11
Pages:
8
| Language: English
View And Download
Journal Paper
Energy Efficiency of Massive MIMO Cognitive Radio Networks in Presence of Smart Jamming
Authors:
S. Fatemeh Zamanian
،
Mohammad Hossein Kahaei
،
S. Mohammad Razavizadeh
Year 1398
Publish place:
International Journal of Information and Communication Technology Research (IJICT Issue 3، Vol 11
Pages:
8
| Language: English
View And Download
Journal Paper
A Risk Estimation Framework for Security Threats in Computer Networks
Authors:
Razieh Rezaee
،
Abbas Ghaemi Bafghi
Year 1399
Publish place:
Journal of Computing and Security Issue 1، Vol 7
Pages:
15
| Language: English
View And Download
نتایج 51 تا 60 از مجموع 125
First
...
3
4
5
6
7
8
9
...
Last