لطفا کمی صبر نمایید ...
ورود
Advanced Search
Thesis
مقالات فارسی
ISI
کنفرانسها
ژورنالها
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Login / Register
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Thesis
Dark Mode
استعلام پایان نامه
جستجوی مقالات داخلی
Catehory
Conference Papers
Journal Papers
Books
Plans
Research documents
Rports
Result Type:
Full Text
Has Word File
Search regardless of the position of the words
Limit article publication year to:
All years
Specific years:
Search
Show
All Information
Only Paper Title
Item Per Page
10
20
Sort By
Paper title
Year
Indexing
ABS
DESC
فیلتر نتایج
Abbas Karimi
Nasrollah Pakniat
نتایج 31 تا 40 از مجموع 52
1
2
3
4
5
6
Journal Paper
Health safety of drinking water in the Dragash zone
Authors:
f.u kryeziu
،
s abdushi
،
t gjergji
،
f mazreku
Year 1392
Publish place:
Health, Safety and Environment Issue 2، Vol 1
Pages:
8
| Language: English
View And Download
Conference Paper
Investigating NFC technology from the perspective of security, analysis of attacks and existing risk
Authors:
S. Mahdi Shariati
،
a Abouzarjomehri
،
M. Hossein Ahmadzadegan
Year 1394
Publish place:
2nd Internatioanl Conference on Knowledge -Base Engineering and Innovation
Pages:
5
| Language: English
View And Download
Conference Paper
A comprehensive research on Cyber Security Operations System (SOC): Modeling, Architectures and Classifications
Authors:
abbas karimi
،
Mahboobeh ziea ghoochani
Year 1395
Publish place:
Pages:
21
| Language: English
View And Download
Conference Paper
Malware detection techniques in security gateway
Authors:
Alireza Jalinous
Year 1394
Publish place:
3rd International Conference on Applied Research in Computer Engineering and Information Technology
Pages:
5
| Language: English
View And Download
Conference Paper
A Survey on Secure Environments for Malware Analysis
Authors:
saeed Parsa
،
maryam Derakhshankar
Year 1393
Publish place:
The Second National Conference on Applied Research in Computer Science and Information Technology
Pages:
10
| Language: English
View And Download
Conference Paper
A novel method for Security and data protection
Authors:
z Lashkaripour
،
A Ghaemi bafghi
Year 1393
Publish place:
The Second National Conference on Applied Research in Computer Science and Information Technology
Pages:
10
| Language: English
View And Download
Journal Paper
Cryptanalysis of an Attribute-based Key Agreement Protocol
Authors:
Ziba Eslami
،
Nasrollah Pakniat
،
Mahnaz Noroozi
Year 1393
Publish place:
International Journal of Computer & Information Technologies Issue 1، Vol 2
Pages:
8
| Language: English
View And Download
Conference Paper
Weak Points Identification of HL2 Systems Using Contingency Analysis
Authors:
Mehdi Akhlaghi
،
Parviz Ramezanpour
،
Reza Effatnezad
Year 1394
Publish place:
International Conference on New Research Findings in Electrical Engineering and Computer Science
Pages:
6
| Language: English
View And Download
Conference Paper
INFORMATION SECURITY AWARENESS MODEL FOR INFORMATION SYSTEM
Authors:
Oldouz Karimi
Year 1394
Publish place:
First International Conference on Web Research
Pages:
7
| Language: English
View And Download
Conference Paper
CBRFD: Case Based Reasoning Flaw Detector
Authors:
Ali Reza Honarvar
،
Mohsen Katebi Jaahromi
Year 1393
Publish place:
2nd National Conference on Computer Engineering and Information Technology
Pages:
6
| Language: English
View And Download
نتایج 31 تا 40 از مجموع 52
1
2
3
4
5
6