• Home
  • About Us
  • Contact Us
  • Register
  • Log in
  • Order
Advanced
  • Home
  • Security
    • List of Articles Security

      • Open Access Article
        • Abstract Page
        • Full-Text

        1 - SDN-based Defending Against ARP Poisoning Attack
        Zeynab Sasan Majid Salehi
      • Open Access Article
        • Abstract Page
        • Full-Text

        2 - A High Performance and Secure Way to Time Synchronization in Wireless Sensor Network
        Mehdi Bagherizadeh Rezvan Kazemi
      • Open Access Article
        • Abstract Page
        • Full-Text

        3 - Providing an Image Watermarking Scheme Based on Chaotic Sequence and Cosine Transform, to Strengthen Interaction with a Variety of Software Attacks
        Mostafa Boroumandzadeh
      • Open Access Article
        • Abstract Page
        • Full-Text

        4 - Biometric Authentication of Fingerprint for Banking Users, Using Stream Cipher Algorithm
        Ali AliBabaee Ali Broumandnia
      • Open Access Article
        • Abstract Page
        • Full-Text

        5 - Enhancing Security on Social Networks with IoT-based Blockchain Hierarchical Structures with Markov Chain
        Masoud Moradi Masoud Moradkhani Mohammad Bagher Tavakoli
      • Open Access Article
        • Abstract Page
        • Full-Text

        6 - A Secure Image Encryption Algorithm Based on Chaos Theory and Fourier convert
        Faraein Aeini Mojtaba Nasri Panbe Choole Abdolreza Babaei
      • Open Access Article
        • Abstract Page
        • Full-Text

        7 - A Comparative Study on Quality of Privacy in Pervasive Computing in Health-care Systems
        Soroor Mohammadi Bezanaj Hamed VahdatNejad
      • Open Access Article
        • Abstract Page
        • Full-Text

        8 - Intrusion Response System for SIP based Applications with Engineered Feature Set
        Hassan Asgharian Ahmad Akbari Bijan Raahemi
      • Open Access Article
        • Abstract Page
        • Full-Text

        9 - RSSAT: A Wireless Intrusion Detection System Based on Received Signal Strength Acceptance Test
        S.Mobarakeh Moosavirad Peyman Kabiri Hamidreza Mahini
      • Open Access Article
        • Abstract Page
        • Full-Text

        10 - Taxonomy of Intelligent Transportation Systems (VANET): A Survey
        Gholamreza Vatanian shanjani Somayyeh jafarali jassbi
      • Open Access Article
        • Abstract Page
        • Full-Text

        11 - Fuzzy Threat Assessment on Service Availability with Data Fusion Approach
        Amin Sardeh Moghadam Behzad Moshiri
      • Open Access Article
        • Abstract Page
        • Full-Text

        12 - Proposing A Distributed Model For Intrusion Detection In Mobile Ad-HocNetwork Using Neural Fuzzy Interface
  • Home Page
  • Site Map
  • Contact Us
  • Home
  • Site Map
  • Islamic Azad University
  • Contact Us

The rights to this website are owned by the Raimag Press Management System.
Copyright © 2021-2025

Home| Login| About Us| Contact Us|
[فارسی] [العربية] [fa] [ar]
  • IAU
  • Login