Statistics

Number of Journals34
Number of Issues1,306
Number of Articles9,427
Article View9,188,328
PDF Download5,620,752

1.

Identify malicious traffic on IoT infrastructure using neural networks and deep learning

Pages 1-13
hamid tanha; mostafa abbasi

2.

Developing a Threat-Tolerability Bilateral Concept within a Differential Game for the Analysis of the Insider/Adversary Behavior in Operational environment

Pages 15-29
saeed kamelian; Ali Karimpour; Naser Pariz

3.

Mobile botnets detection using deep learning techniques

Pages 31-43
Maryam Ghanavati Nasab; Mahdieh Ghazvini; Fahimeh Ghasemian

4.

Security of UAV Relay Networks based on Covert Communication in the Presence of an Eavesdropping UAV

Pages 45-56
Vahidreza Soltaninia; saeed Talati; MohammadReza Hasani Ahangar; Farid Samsami Khodadad; Pooya Baei

5.

A Dynamic Metaheuristic Algorithm for Influence Maximization in Social Networks

Pages 57-69
Jalil Jabbari Lotf; Mohammad Abdollahi Azgomi; Mohammad Reza Ebrahimi Dishabi

6.

A method for quantitative evaluation of security risk in cyber-physical systems

Pages 71-80
Hamed Sepehrzadeh

7.

Presenting A Method Based on Nearest Neighbors and Hamming Distance in Order to Identify Malicious Applications

Pages 81-90
Mahmood Deypir

8.

Detection of Interfering Signals and Estimation of Their Carrier Frequency in CNC Satellite Communications using Cyclic Spectrum Density

Pages 91-101
Habib Alizadeh; Morteza Babaei; Mohsen Rezaei Kheir Abadi

9.

A novel way to identify effective test-case in software testing

Pages 103-116
Sadegh Bejani; Amir Hossein keymanesh

10.

Recognition Chaff from target by determining the optimal waveform in the radar detector using artificial neural network

Pages 117-132
seied mehdi ziyaei; pouriya etezadifar; yaser noruzi