-
Open Access Article
1 - SDN-based Defending Against ARP Poisoning Attack
Zeynab Sasan Majid Salehi -
Open Access Article
2 - A High Performance and Secure Way to Time Synchronization in Wireless Sensor Network
Mehdi Bagherizadeh Rezvan Kazemi -
Open Access Article
3 - Providing an Image Watermarking Scheme Based on Chaotic Sequence and Cosine Transform, to Strengthen Interaction with a Variety of Software Attacks
Mostafa Boroumandzadeh -
Open Access Article
4 - Biometric Authentication of Fingerprint for Banking Users, Using Stream Cipher Algorithm
Ali AliBabaee Ali Broumandnia -
Open Access Article
5 - Enhancing Security on Social Networks with IoT-based Blockchain Hierarchical Structures with Markov Chain
Masoud Moradi Masoud Moradkhani Mohammad Bagher Tavakoli -
Open Access Article
6 - A Secure Image Encryption Algorithm Based on Chaos Theory and Fourier convert
Faraein Aeini Mojtaba Nasri Panbe Choole Abdolreza Babaei -
Open Access Article
7 - A Comparative Study on Quality of Privacy in Pervasive Computing in Health-care Systems
Soroor Mohammadi Bezanaj Hamed VahdatNejad -
Open Access Article
8 - Intrusion Response System for SIP based Applications with Engineered Feature Set
Hassan Asgharian Ahmad Akbari Bijan Raahemi -
Open Access Article
9 - RSSAT: A Wireless Intrusion Detection System Based on Received Signal Strength Acceptance Test
S.Mobarakeh Moosavirad Peyman Kabiri Hamidreza Mahini -
Open Access Article
10 - Taxonomy of Intelligent Transportation Systems (VANET): A Survey
Gholamreza Vatanian shanjani Somayyeh jafarali jassbi -
Open Access Article
11 - Fuzzy Threat Assessment on Service Availability with Data Fusion Approach
Amin Sardeh Moghadam Behzad Moshiri -
Open Access Article
12 - Proposing A Distributed Model For Intrusion Detection In Mobile Ad-HocNetwork Using Neural Fuzzy Interface