لطفا کمی صبر نمایید ...
ورود
Advanced Search
Thesis
مقالات فارسی
ISI
کنفرانسها
ژورنالها
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Login / Register
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Thesis
Dark Mode
استعلام پایان نامه
جستجوی مقالات داخلی
Catehory
Conference Papers
Journal Papers
Books
Plans
Research documents
Rports
Result Type:
Full Text
Has Word File
Search regardless of the position of the words
Limit article publication year to:
All years
Specific years:
Search
Show
All Information
Only Paper Title
Item Per Page
10
20
Sort By
Paper title
Year
Indexing
ABS
DESC
فیلتر نتایج
Sajjad Daliri
نتایج 91 تا 100 از مجموع 112
First
...
7
8
9
10
11
12
Conference Paper
Feasibility of Network Security Measures in IRAN
Authors:
Sajjad Daliri
Year 1394
Publish place:
International Conference on Research in Engineering, Science and Technology
Pages:
6
| Language: English
View And Download
Conference Paper
The Appropriate Ad-Hoc Routing Protocols Determination under Jamming Attacks
Authors:
Kamal Bazargan
،
Behrooz Razzaghi
،
Mojtaba Rajabi
Year 1394
Publish place:
International Conference on
Pages:
17
| Language: English
View And Download
Conference Paper
An attack-Resistant trust management model on three attacks of Newcomer attack, On -off attack and unfair rating
Authors:
Maryam Tavakoli
،
Hasan Shakeri
Year 1393
Publish place:
6th iranian conference on electrical and electronic engineering
Pages:
7
| Language: English
View And Download
Journal Paper
Dynamic anomaly by using incremental approximate pca in AODV-based MANETS
Authors:
m alikhani
،
m ahmadi livani
Year 1391
Publish place:
Journal of Artificial Intelligence & Data Mining Issue 2، Vol 1
Pages:
13
| Language: English
View And Download
Journal Paper
The Innocent Perpetrators: Reflectors and Reflection Attacks
Authors:
Srinivas Arukonda
،
Samta Sinha
Year 1393
Publish place:
Advances in Computer Science : an International Journal Issue 1، Vol 4
Pages:
5
| Language: English
View And Download
Conference Paper
A Survey of Security Challenges in Wireless Sensor Networks and Their Secured Protocols
Authors:
Morteza Alijani
Year 1392
Publish place:
16th Iran"s Electrical Engineering Student Conference
Pages:
6
| Language: English
View And Download
Journal Paper
Using Contourlet Transform and Discrete Cosine Transform and SVD for Digital Watermarking
Authors:
S. A. Hosseini
،
S. Ghofrani
Year 1392
Publish place:
Advances in Computer Science : an International Journal Issue 5، Vol 2
Pages:
9
| Language: English
View And Download
Conference Paper
Security and Speed Improvement of GGH based on polynomial rings, quaternion algebra and Gaussian method
Authors:
Massoud Sokouti
،
Ali Zakerolhosseini
،
Babak Sokouti
Year 1392
Publish place:
2nd Conference on Innovation in Electrical Engineering
Pages:
8
| Language: English
View And Download
Conference Paper
طبقه بندی حملات به DNS Server ها و راهکارهای مقابله با آنها
Authors:
سیداسمعیل سادات دیلمی
،
سیدبهروز سجادی
،
ناصر علی پناه
Year 1392
Publish place:
First National Conference on Advances in computer science and information retrieval approaches
Pages:
7
| Language: Persian
View And Download
Conference Paper
Improvement of GGH a lattice based cryptography using polynomial rings and quaternion algebra
Authors:
Massoud Sokouti
،
Ali Zakerolhosseini
،
Babak Sokouti
Year 1392
Publish place:
First National Conference on Advances in computer science and information retrieval approaches
Pages:
7
| Language: English
View And Download
نتایج 91 تا 100 از مجموع 112
First
...
7
8
9
10
11
12