لطفا کمی صبر نمایید ...
ورود
Advanced Search
Thesis
مقالات فارسی
ISI
کنفرانسها
ژورنالها
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Login / Register
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Thesis
Dark Mode
استعلام پایان نامه
جستجوی مقالات داخلی
Catehory
Conference Papers
Journal Papers
Books
Plans
Research documents
Rports
Result Type:
Full Text
Has Word File
Search regardless of the position of the words
Limit article publication year to:
All years
Specific years:
Search
Show
All Information
Only Paper Title
Item Per Page
10
20
Sort By
Paper title
Year
Indexing
ABS
DESC
فیلتر نتایج
Mahdieh Zakizadeh
Mohammadreza Shayestehkhou
نتایج 1 تا 10 از مجموع 15
1
2
Conference Paper
Wireless Body Area Networks (WBANs); A survey
Authors:
Mahdieh Zakizadeh
،
Hossein Erfani
Year 1402
Publish place:
The ninth international Conference on Knowledge and Technology of Mechanical, Electrical Engineering and Computer Of Iran
Pages:
16
| Language: English
View And Download
Conference Paper
Scada Security Threats: For Machinelearning Engineers
Authors:
Ali Taghavirashidizadeh
Year 1402
Publish place:
the seventh International Conference on Information Technology Engineering , Computer Sciences and Telecommunication of Iran
Pages:
117
| Language: English
View And Download
Conference Paper
A Roadmap for Implementing BIM and Management Frameworks in Construction Projects
Authors:
MOHAMMADREZA SHAYESTEHKHOU
Year 1402
Publish place:
The 10th International Conference on Civil Engineering, Architecture and Urban Management
Pages:
9
| Language: English
View And Download
Conference Paper
Check the security of cloud processing and protect the privacy of data storage in it
Authors:
Borhan kargarbideh
Year 1401
Publish place:
15th International Conference on Information Technology, Computers and Telecommunications
Pages:
9
| Language: English
View And Download
Conference Paper
Security and privacy of data storage in cloud computing
Authors:
Naser Molla AliAkbari
Year 1400
Publish place:
14th International Conference on Information Technology, Computers and Telecommunications
Pages:
9
| Language: English
View And Download
Journal Paper
Analysis of an RFID Authentication Protocol in Accordance with EPC Standards
Authors:
Behzad Abdolmaleki
،
Hamidreza Bakhshi
،
Karim Baghery
،
Mohammad Reza Aref
Year 1393
Publish place:
International Journal of Information and Communication Technology Research (IJICT Issue 4، Vol 6
Pages:
6
| Language: English
View And Download
Conference Paper
Formal security and privacy analysis and improvements of RFID hash-based authentication protocol
Authors:
Arezoo Rezaei
،
Mahdi R. Alagheband
Year 1396
Publish place:
Fifth International Conference on Electrical and Computer Engineering with Emphasis on Indigenous Knowledge
Pages:
11
| Language: English
View And Download
Conference Paper
A New Secure e-Health Structure Based On Mobile Trusted Computing
Authors:
MohammadAli Doostari
،
Salimeh Yasari Zare
Year 1395
Publish place:
Pages:
14
| Language: English
View And Download
Conference Paper
Approach Security Routing In Cloud Environment: A Survey
Authors:
Mohammadamin Sadeghi
Year 1394
Publish place:
First International Conference on Information Technology
Pages:
5
| Language: English
View And Download
Journal Paper
Various Types of Attacks in VANETs
Authors:
Yasser Safinejhad
،
Mehran Abdali
Year 1394
Publish place:
International Journal of Computer & Information Technologies Issue 4، Vol 3
Pages:
6
| Language: English
View And Download
نتایج 1 تا 10 از مجموع 15
1
2