
Number of Journals | 34 |
Number of Issues | 1,306 |
Number of Articles | 9,427 |
Article View | 9,189,270 |
PDF Download | 5,621,868 |
1. | The Analysis and Simulation of Crypto-Trojan Attacks on RSA Key Generating Algorithms | |
Pages 1-18 | ||
s.hasan hoseini | ||
2. | The Presentation of a Solution to Optimize the Time and Cost of Software Component Placement Using a Multi-Objective Meta-Exploratory Algorithm in the Cloud Environment | |
Pages 19-33 | ||
مریم رضائی; mostafa ghobaei | ||
3. | The Improvement of the Iris-Based Authentication by Presenting the Wireless Sensor Network Architecture to Maintain Industrial Internet of Things Privacy | |
Pages 35-50 | ||
Keivan Borna; Omid Mahdi Ebadati; Shayan Zeynali | ||
4. | Provide a Way to Detect and Combat Wormhole and Black Hole Attacks in Ad-Hoc Networks | |
Pages 51-58 | ||
reza molae fard | ||
5. | The IoT Data Collection by UAV, Based on Multi-Objective Evolutionary Algorithm Using Gaussian Process Based on Reverse Modeling | |
Pages 59-71 | ||
Pezhman Gholamnezhad; Jalil Mazloum | ||
6. | The Scrutiny of the NIST Lightweight Encryption Competition Finalists | |
Pages 73-82 | ||
ali madadi | ||