لطفا کمی صبر نمایید ...
ورود
Advanced Search
Thesis
مقالات فارسی
ISI
کنفرانسها
ژورنالها
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Login / Register
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Thesis
Dark Mode
استعلام پایان نامه
جستجوی مقالات داخلی
Catehory
Conference Papers
Journal Papers
Books
Plans
Research documents
Rports
Result Type:
Full Text
Has Word File
Search regardless of the position of the words
Limit article publication year to:
All years
Specific years:
Search
Show
All Information
Only Paper Title
Item Per Page
10
20
Sort By
Paper title
Year
Indexing
ABS
DESC
فیلتر نتایج
Mohammad Mahdi Norouzian
Hossein Samimi
نتایج 1 تا 10 از مجموع 12
1
2
Conference Paper
Scada Security Threats: For Machinelearning Engineers
Authors:
Ali Taghavirashidizadeh
Year 1402
Publish place:
the seventh International Conference on Information Technology Engineering , Computer Sciences and Telecommunication of Iran
Pages:
117
| Language: English
View And Download
Conference Paper
Secure Methods for Establishing Data Integrity in Cloud Computing
Authors:
Mohammad Mahdi Norouzian
،
Shima Norouzian
Year 1402
Publish place:
The 19th International Conference on Information Technology, Computers and Telecommunications
Pages:
8
| Language: English
View And Download
Conference Paper
A study on security, and vulnerability on the web
Authors:
Ali Khodayaran
Year 1402
Publish place:
The 4th National Conference on Management, Psychology and Behavioral Sciences
Pages:
9
| Language: English
View And Download
Conference Paper
Study about network security concepts and solutions
Authors:
Ali Khodayaran
Year 1401
Publish place:
The 18th International Conference on Information Technology, Computers and Telecommunications
Pages:
9
| Language: English
View And Download
Conference Paper
Survey of security Problems raised by virtualization in cloud computingenvironment
Authors:
Seyed marzieh hosseini
Year 1393
Publish place:
17th Iran"s Electrical Engineering Student Conference
Pages:
8
| Language: English
View And Download
Conference Paper
رویکردی نوین برای جلوگیری از آسیب پذیری در قراردادهای هوشمند و مقابله با حملات Reentrancy بر بستر بلاک چین
Authors:
محمودرضا پارسائیان
،
حسین صمیمی
Year 1400
Publish place:
11th National Congress of the New Technologies in Sustainable Development of Iran
Pages:
12
| Language: Persian
View And Download
Journal Paper
A Taxonomy for Network Vulnerabilities
Authors:
Sara Hajian
،
Faramarz Hendessi
،
Mehdi Berenjkoub
Year 1388
Publish place:
International Journal of Information and Communication Technology Research (IJICT Issue 1، Vol 2
Pages:
16
| Language: English
View And Download
Conference Paper
شبکه های مبتنی بر نرم افزار (SDN)- چالش ها، آسیب ها
Authors:
سیدحامد رضوانی
،
اکبر فرهودی نژاد
Year 1398
Publish place:
The 7th National Conference on Computer Science and Engineering and Information Technology - January 2019
Pages:
12
| Language: Persian
View And Download
Conference Paper
The Assessment of Urban Road Network Vulnerability on earthquake using geographic Information System(GIS),( Case Study ; District 5 of Zone3 of Zanjan City, IRAN)
Authors:
Hojjat Mohamadi Torkamani
،
Mousa Vaezib
،
Mohammad Mohsenzadeh
،
Omid Zeynalpour
Year 1395
Publish place:
Pages:
12
| Language: English
View And Download
Journal Paper
A survey on web penetration test
Authors:
Mahin Mirjalili
،
Alireza Nowroozi
،
Mitra Alidoosti
Year 1393
Publish place:
Advances in Computer Science : an International Journal Issue 6، Vol 3
Pages:
15
| Language: English
View And Download
نتایج 1 تا 10 از مجموع 12
1
2