لطفا کمی صبر نمایید ...
ورود
Advanced Search
Thesis
مقالات فارسی
ISI
کنفرانسها
ژورنالها
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Login / Register
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Thesis
Dark Mode
استعلام پایان نامه
جستجوی مقالات داخلی
Catehory
Conference Papers
Journal Papers
Books
Plans
Research documents
Rports
Result Type:
Full Text
Has Word File
Search regardless of the position of the words
Limit article publication year to:
All years
Specific years:
Search
Show
All Information
Only Paper Title
Item Per Page
10
20
Sort By
Paper title
Year
Indexing
ABS
DESC
فیلتر نتایج
MESBAH SAYEHBANI
Mohammad Fathian
Mahmood Fathy
نتایج 1501 تا 1510 از مجموع 1,537
First
...
148
149
150
151
152
153
154
Conference Paper
Examining the Influences of Business Continuity Plan on Security Strategies
Authors:
Saeed Ghorbani
،
Mohammad reza alsharif۲
Year 1389
Publish place:
8th International Management Conference
Pages:
15
| Language: English
View And Download
Conference Paper
Novel Client to Server Password Authentication Key Exchange Protocol (N-C2S-P)
Authors:
Ali Mackvandi
Year 1389
Publish place:
13th Iranian Student Conference on Electrical Engieering
Pages:
5
| Language: English
View And Download
Conference Paper
Novel Method to Select Security Patterns Using SVM (Support Vector Machines)
Authors:
Seyed Mohammad Hossein Hasheminejad
،
Saeed Jalili
Year 1388
Publish place:
6th Iranian Security Community Conference
Pages:
6
| Language: English
View And Download
Conference Paper
A Robust Reputation Framework for Mitigating Dropping Attacks in MANETs
Authors:
Mohammad Karami
،
Mohammad Fathian
،
Mahmoud Fathi
Year 1388
Publish place:
6th Iranian Security Community Conference
Pages:
6
| Language: English
View And Download
Conference Paper
Improved EndSec: A Practical Protocol for Securing Core Network Signaling in UMTS
Authors:
Mitra Fatemi
،
Somayeh Salimi۲
،
Ahmad Salahi۳
Year 1388
Publish place:
6th Iranian Security Community Conference
Pages:
6
| Language: English
View And Download
Conference Paper
A Conceptual Approach on the Influence of Website Encryption and Authentication on Customers’ perceived Security and Purchase Intention
Authors:
Hamid Reza Peikaria
Year 1388
Publish place:
1st International Marketing Research Conference
Pages:
11
| Language: English
View And Download
Conference Paper
Customers’ Perception of Technological Solutions and their Trust in the B2C e-Commerce: An empirical study
Authors:
Hamid Reza Peikaria
،
Syed Shah Alam
Year 1388
Publish place:
1st International Marketing Research Conference
Pages:
11
| Language: English
View And Download
Conference Paper
A Composite Generation and Transmission Expansion Planning Pinpointing the Optimal Location of Candidate Generating Unit
Authors:
Shahab Dehghan
،
Ahad Kazemi
،
Shahram Jadid
Year 1388
Publish place:
24nd International Power System Conference
Pages:
13
| Language: English
View And Download
Conference Paper
A study on the role of managers for information security strategy in Iranian organizations
Authors:
bahareh navabpour
Year 1387
Publish place:
5th International Conference on Information and Communication Technology Management
Pages:
25
| Language: English
View And Download
Conference Paper
ضرورت اجرای آیین نامه بین المللی امنیت کشتیها و تسهیلات بنادر در ایران
Authors:
کیاوش قدیمی
،
محمد محسنی
،
مصباح سایبانی
Year 1387
Publish place:
10th National Symposium of Marine Industries
Pages:
11
| Language: Persian
View And Download
نتایج 1501 تا 1510 از مجموع 1,537
First
...
148
149
150
151
152
153
154