لطفا کمی صبر نمایید ...
ورود
Advanced Search
Thesis
مقالات فارسی
ISI
کنفرانسها
ژورنالها
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Login / Register
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Thesis
Dark Mode
استعلام پایان نامه
جستجوی مقالات داخلی
Catehory
Conference Papers
Journal Papers
Books
Plans
Research documents
Rports
Result Type:
Full Text
Has Word File
Search regardless of the position of the words
Limit article publication year to:
All years
Specific years:
Search
Show
All Information
Only Paper Title
Item Per Page
10
20
Sort By
Paper title
Year
Indexing
ABS
DESC
فیلتر نتایج
سید هادی زرقانی
Afshin Motaghi
نتایج 21 تا 30 از مجموع 52
1
2
3
4
5
6
Journal Paper
Ranking the barriers of implementing Information Security Management System and Investigation of readiness rate of exploration management
Authors:
امیرهوشنگ تاج فر
،
محمد محمودی میمند
،
فاطمه رضاسلطانی
،
پوریا رضاسلطانی
Year 1394
Publish place:
Journal of Information Technology Management Issue 4، Vol 6
Pages:
16
| Language: English
View And Download
Journal Paper
Automatic Black-Box Detection of Resistance Against CSRF Vulnerabilities in Web Applications
Authors:
Mohammad Ali Hadavi
،
Samira Sadeghi
Year 1400
Publish place:
Journal of Computing and Security Issue 1، Vol 8
Pages:
14
| Language: English
View And Download
Journal Paper
شناسایی و تحلیل تاثیر متغیرها و شاخص های موثر در اهمیت راهبردی هریرود برای ایران با رویکرد تحلیل تاثیرات متقابل
Authors:
مراد کاویانی راد
،
افشین متقی
،
سید هادی زرقانی
،
حسن صدرانیا
Year 1398
Publish place:
Journal of Applied Researches in Geographical Sciences Issue 55، Vol 19
Pages:
22
| Language: Persian
View And Download
Journal Paper
Detecting Bot Networks Based On HTTP And TLS Traffic Analysis
Authors:
Zahra Nafarieh
Year 1399
Publish place:
Journal of Advances in Computer Engineering and Technology Issue 2، Vol 6
Pages:
10
| Language: English
View And Download
Journal Paper
A Risk Estimation Framework for Security Threats in Computer Networks
Authors:
Razieh Rezaee
،
Abbas Ghaemi Bafghi
Year 1399
Publish place:
Journal of Computing and Security Issue 1، Vol 7
Pages:
15
| Language: English
View And Download
Conference Paper
Performance Appraisal of Middle Managers by Using an Integrated DEAHP Approach: A Case Study
Authors:
Parisa Pendar
،
Pegah Pendar
،
Azam Mehrbod
،
Farshad Gholami
Year 1399
Publish place:
Fourth International Conference on Recent Advances in Industrial Management and Engineering
Pages:
31
| Language: English
View And Download
Journal Paper
A New Approach to Improve Mobile Network’s Security Through Android Malware Detection Utilizing StaticAnalysis
Authors:
Mahmood Deypir
،
Mani Saffarnia
Year 1397
Publish place:
Electronics Industries Quarterly Issue 4، Vol 9
Pages:
15
| Language: English
View And Download
Journal Paper
Detecting Active Bot Networks Based on DNS Traffic Analysis
Authors:
Zahra Nafarieh
،
Ebrahim Mahdipur
،
Haj Hamid Haj Seyed Javadi
Year 1398
Publish place:
Journal of Advances in Computer Engineering and Technology Issue 3، Vol 5
Pages:
14
| Language: English
View And Download
Journal Paper
Formal approach on modeling and predicting of software system security: Stochastic petri net
Authors:
H. Motameni
Year 1394
Publish place:
Journal of Artificial Intelligence & Data Mining Issue 1، Vol 3
Pages:
7
| Language: English
View And Download
Conference Paper
Network Security Analysis Using Big Data Technology
Authors:
Fatemeh Kashirifard
،
Mohsen Mohammadi
Year 1396
Publish place:
Fifth International Conference on Electrical and Computer Engineering with Emphasis on Indigenous Knowledge
Pages:
6
| Language: English
View And Download
نتایج 21 تا 30 از مجموع 52
1
2
3
4
5
6