لطفا کمی صبر نمایید ...
ورود
Advanced Search
Thesis
مقالات فارسی
ISI
کنفرانسها
ژورنالها
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Login / Register
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Thesis
Dark Mode
استعلام پایان نامه
جستجوی مقالات داخلی
جستجو فقط در مقالات مجله محاسبات و امنیت
جستجو در همه مقالات
Catehory
Conference Papers
Journal Papers
Books
Plans
Research documents
Rports
Result Type:
Full Text
Has Word File
Search regardless of the position of the words
Limit article publication year to:
All years
Specific years:
Search
Show
All Information
Only Paper Title
Item Per Page
10
20
Sort By
Paper title
Year
Indexing
ABS
DESC
فیلتر نتایج
Sadegh Dorri Nogoorani
Hamed VahdatNejad
نتایج 1 تا 10 از مجموع 125
1
2
3
4
...
Last
Journal Paper
Design of Optimal Progressive BKZ with Increasing Success-Probabilities and Increasing Block-Sizes
Authors:
Gholam Reza Moghissi
،
Ali Payandeh
Year 1401
Publish place:
Journal of Computing and Security Issue 2، Vol 9
Pages:
29
| Language: English
View And Download
Journal Paper
Indoor Localization Performance Optimization Using Modified kd-Tree Algorithm
Authors:
Hossein Ghaffarian
،
Seyfollah Soleimani
،
Seyedeh Habibe Zadsar
Year 1401
Publish place:
Journal of Computing and Security Issue 2، Vol 9
Pages:
10
| Language: English
View And Download
Journal Paper
Decentralized App Store and License Management Using Smart Contracts and Self-Sovereign Identities
Authors:
Sadegh Dorri Nogoorani
Year 1401
Publish place:
Journal of Computing and Security Issue 2، Vol 9
Pages:
16
| Language: English
View And Download
Journal Paper
New Influence-Aware Centrality Measures for Influence Maximization in Social Networks
Authors:
Maryam Hosseini-Pozveh
Year 1401
Publish place:
Journal of Computing and Security Issue 2، Vol 9
Pages:
16
| Language: English
View And Download
Journal Paper
Using Data Mining to Investigate the Effect of Cognitive Style on Programming Habits
Authors:
Zahra Karimi
،
S.Fatemeh Noorani
Year 1401
Publish place:
Journal of Computing and Security Issue 2، Vol 9
Pages:
12
| Language: English
View And Download
Journal Paper
Distributed Rule Anomaly Detection in SDN-based IoT: Towards a Comprehensive Approach
Authors:
Rasool Kiani
،
Ali Bohlooli
Year 1402
Publish place:
Journal of Computing and Security Issue 1، Vol 10
Pages:
10
| Language: English
View And Download
Journal Paper
A New PageRank-Based Method for Influence Maximization in Signed Social Networks
Authors:
Maryam Hosseini-Pozveh
،
Maryam Lotfi Shahreza
Year 1402
Publish place:
Journal of Computing and Security Issue 1، Vol 10
Pages:
14
| Language: English
View And Download
Journal Paper
Development of a CGAN-Based Method for Aspect Level Text Generation: Encouragement and Punishment Factors in the Aspect Knowledge
Authors:
Mohammadreza Shams
،
Maryam Lotfi Shahreza
،
Amir Masoud Soltani
Year 1402
Publish place:
Journal of Computing and Security Issue 1، Vol 10
Pages:
13
| Language: English
View And Download
Journal Paper
Summarization Algorithm for Data Stream to Speed up Outlier Data Detection
Authors:
Hadid Mollashahi
،
Hamid Saadatfar
،
Hamed Vahdatnejad
Year 1402
Publish place:
Journal of Computing and Security Issue 1، Vol 10
Pages:
12
| Language: English
View And Download
Journal Paper
Gamifault: A Gamified Motivational Framework for Software Debugging Process
Authors:
Shahrzad Sadat Mousavi Esfahani
،
Mojtaba Vahidi-Asl
،
Alireza Khalilian
،
Parastoo Alikhani
،
Bardia Abhari
Year 1402
Publish place:
Journal of Computing and Security Issue 1، Vol 10
Pages:
17
| Language: English
View And Download
نتایج 1 تا 10 از مجموع 125
1
2
3
4
...
Last