لطفا کمی صبر نمایید ...
ورود
Advanced Search
Thesis
مقالات فارسی
ISI
کنفرانسها
ژورنالها
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Login / Register
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Thesis
Dark Mode
استعلام پایان نامه
جستجوی مقالات داخلی
Catehory
Conference Papers
Journal Papers
Books
Plans
Research documents
Rports
Result Type:
Full Text
Has Word File
Search regardless of the position of the words
Limit article publication year to:
All years
Specific years:
Search
Show
All Information
Only Paper Title
Item Per Page
10
20
Sort By
Paper title
Year
Indexing
ABS
DESC
فیلتر نتایج
Saeed Rasekhi
Mohammad Hassan Shaykh al-Islami
نتایج 1 تا 10 از مجموع 1,501
1
2
3
4
...
Last
Journal Paper
بررسی مشروعیت فعالیت های موشکی کره شمالی در پرتو حقوق بین الملل
Authors:
احمدرضا توحیدی
،
مسعود احسن نژاد
،
محمدرضا ملت
Year 1397
Publish place:
Judgement Issue 94، Vol 18
Pages:
20
| Language: Persian
View And Download
Journal Paper
تاثیر سیاست های پولی و مالی بر منابع سازمان تامین اجتماعی
Authors:
لیلا احمدوند
،
مسعود صوفی مجیدپور
،
محمود محمودزاده
Year 1401
Publish place:
Journal of Economic Modeling Research Issue 50، Vol 13
Pages:
31
| Language: Persian
View And Download
Conference Paper
Providing a new method to prevent denial of service attacks in wireless sensor networks
Authors:
A.Mohammad mehrabi
Year 1403
Publish place:
23th International Conference on Information Technology,Computer and Telecommunication
Pages:
9
| Language: English
View And Download
Conference Paper
Investigation of Security Problems with Cloud Computingand Virtualization Technology
Authors:
Reyhaneh Ilaghi Hosseini
،
Raheleh Ilaghi Hosseini
،
Seyed Hamid Ghafouri Mahdi Abad
Year 1403
Publish place:
23th International Conference on Information Technology,Computer and Telecommunication
Pages:
5
| Language: English
View And Download
Conference Paper
Investigating OLSR and AODV protocols and evaluating their throughput relativeto each other in detecting and countering sudden attacks in wirelesscommunication networks
Authors:
Elham haseli
Year 1403
Publish place:
23th International Conference on Information Technology,Computer and Telecommunication
Pages:
10
| Language: English
View And Download
Conference Paper
An overview of cloud computing, its advantages and disadvantages
Authors:
Seyed Mohammad Sajjad Siadati Moghadam
،
Davood Noori
Year 1403
Publish place:
23th International Conference on Information Technology,Computer and Telecommunication
Pages:
10
| Language: English
View And Download
Conference Paper
Investigating security challenges in cloud computing
Authors:
Ali Asghar Askari
،
Amirali Faridi
،
Marziyeh Felahat
Year 1403
Publish place:
23th International Conference on Information Technology,Computer and Telecommunication
Pages:
9
| Language: English
View And Download
Conference Paper
Detection and prevention of cyber attacks and preservation of informationbased on artificial intelligence
Authors:
Alireza Ranjbar
،
Marziyeh Felahat
،
Sara Mousavi
Year 1403
Publish place:
23th International Conference on Information Technology,Computer and Telecommunication
Pages:
7
| Language: English
View And Download
Journal Paper
رویکرد ایالات متحده آمریکا در قبال ابتکار کمربند-جاده در پرتو راهبرد کلان آمریکا در قبال چین (۲۰۲۰-۲۰۱۳)
Authors:
حمیدرضا اشرفی
،
محمد حسن شیخ الاسلامی
Year 1402
Publish place:
Countries Studies Issue 1، Vol 1
Pages:
29
| Language: Persian
View And Download
Journal Paper
امنیت انرژی و فرضیه جداسازی: شواهدی از جنگ روسیه و اوکراین
Authors:
سعید راسخی
،
سارا قنبرتبار
Year 1403
Publish place:
Countries Studies Issue 1، Vol 2
Pages:
25
| Language: Persian
View And Download
نتایج 1 تا 10 از مجموع 1,501
1
2
3
4
...
Last