نمایش نتایج جستجو برای
کلمات کلیدی: Security
موارد یافت شده: 115
1 - Ethnobotanical study of wild edible plants in the mountainous regions of Semnan Province, Iran (چکیده)2 - Towards Side-Channel Secure Cyber-Physical Systems (چکیده)
3 - Exploring the instability in the food security due to nitrogen fertilizer regulatory policy (چکیده)
4 - Pension policies and early retirement: New evidence from a counterfactual analysis in Iran (چکیده)
5 - The mediating role of trust and security in the relationship between differentiation and marital intimacy in non-clinical married women (چکیده)
6 - Between Geography and International Relations: Explaining the neighborhood (چکیده)
7 - Aiming at low nitrogen leaching diets based on nitrogen fertilizer regulatory policy: A regional bio-economic assessment of the Zayandeh-Rud river basin-Iran (چکیده)
8 - Identifying and Evaluating Factors Affecting User Privacy in the Smart City Using the Meta-Synthesis Method and the Fuzzy Dematel Technique (چکیده)
9 - Antibiotic-Free Poultry Meat Consumption and Its Determinants (چکیده)
10 - The Impact of Blockchain on the Quality of Accounting Information: An Iraqi Case Study (چکیده)
11 - Post-Polymerization Modification of Amide Functionalized Copolymer Nanaoparticles with Oxazolidine for Advanced Anticounterfeitng and Information Encryption (چکیده)
12 - A Deep Neural Network Architecture for Intrusion Detection in Software-Defined Networks (چکیده)
13 - All-in-one photoluminescent Janus nanoparticles for smart technologies: Organic light-emitting diodes, anticounterfeiting, and optical sensors (چکیده)
14 - An Investigation Into the Effect of Dust on Wheat Yield (چکیده)
15 - A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment (چکیده)
16 - Climate change, food security, and sustainable production: a comparison between arid and semi-arid environments of Iran (چکیده)
17 - The Relay Impact on the Physical Layer Security Performance of the Wireless Wiretap Channel (چکیده)
18 - Impact of Artificial Noise Assisted Transmission on the Physical Layer Security Performances in Wireless Wiretap Channel with Active Eavesdropper (چکیده)
19 - Metal-free and ecofriendly photoluminescent nanoparticles for visualization of latent fingerprints, anticounterfeiting, and information encryption (چکیده)
20 - Factors Affecting Success of Entrepreneurship in Agribusinesses: Evidence from the City of Mashhad, Iran (چکیده)
21 - A review on the horizons using enzyme supplements in the aquafeed production industry (چکیده)
22 - Oil price shocks on shale oil supply and energy security: a case study of the United States (چکیده)
23 - بررسی نقش میانجی اعتماد و امنیت در رابطه تمایزیافتگی با صمیمیت زناشویی در زنان (چکیده)
24 - Copula based analysis of impact of wireless channels correlation on the physical layer security performances in a wireless wiretap channel with artificial noise (چکیده)
25 - Robust Authentication and Session Key Agreement Protocol for Satellite Communications (چکیده)
26 - Examining Drinking Water Security in Rural Areas of Iran: Perspectives from a Quantitative Analysis (چکیده)
27 - Photoluminescent Nanoinks with Multilevel Security for Quick Authentication of Encoded Optical Tags by Sunlight: Effective Physicochemical Parameters on Responsivity, Printability, and Brightness (چکیده)
28 - Perspectives of current and future urban water security in Iran (چکیده)
29 - ُThe Interaction of Development Projects and Climate Change on Sustaniable Security on Shares Water bodies a Case Study: Euphrates and Tigris River Basin (چکیده)
30 - Analyzing the Role of Security in local Societies Tourism Development Case Study: Rural Areas of Torqabeh and Shandiz County (چکیده)
31 - Yield Gap Analysis Using Remote Sensing and Modelling Approaches: Wheat in the Northwest of Iran (چکیده)
32 - Energy and orientation of China\\\'s foreign policy toward (چکیده)
33 - DroidTKM: Detection of Trojan Families using the KNN Classifier Based on Manhattan Distance Metric (چکیده)
34 - Blind MV-based video steganalysis based on joint inter-frame and intra-frame statistics (چکیده)
35 - New services and roles of biodiversity in modern agroecosystems: A review (چکیده)
36 - Undetectable video steganography by considering spatio-temporal steganalytic features in the embedding cost function (چکیده)
37 - A Systematic Literature Review on Blockchain-based Solutions for IoT Security (چکیده)
38 - Physical layer security in shotgun cellular systems over correlated/independent shadow fading channels (چکیده)
39 - A Cooperation of Fog Computing and Smart Gateways in a Secure and Efficient Architecture for IoT - Based Smart Homes (چکیده)
40 - Secure communication in CloudIoT through design of a lightweight authentication and session key agreement scheme (چکیده)
41 - Design Space Exploration of the AES Encryption Algorithm Implementation for Securing CAN Protocol (چکیده)
42 - A Systematic Literature Review on Blockchain-based Solutions for IoT Security (چکیده)
43 - Sparse coding-based feature extraction for biometric remote authentication in Internet of Things (چکیده)
44 - Investigating and Analyzing the Security of Women in Urban Space with an Emphasis on Participatory Approach (Case Study: Sajjad Neighborhood of Mashhad) (چکیده)
45 - Quality-centric security pattern mutations (چکیده)
46 - Spatiotemporal changes in aridity index and reference evapotranspiration over semi-arid and humid regions of Iran: trend, cause, and sensitivity analyses (چکیده)
47 - Identifying and Ranking Knowledge Management Tools and Techniques Affecting Organizational Information Security Improvement (چکیده)
48 - Investigating the mediating role of job embeddedness: evidence of Iranian context (چکیده)
49 - Transboundary Wetlands and International Environmental Security Case Study: Hamoon Wetland (چکیده)
50 - Transboundary Wetlands and International Environmental Security Case Study: Hamoon Wetland (چکیده)
51 - Anomaly ‐ based DoS detection and prevention in SIP networks by modeling SIP normal traffic (چکیده)
52 - Monitoring the Water Balance of Small Reservoirs in Semi-arid Regions from Space (چکیده)
53 - Investigating the Adaptability of Rural Physical Features to the Feeling of Security among the Residents of Toos Rural Area in Mashhad County (چکیده)
54 - Power system security assessment with high wind penetration using the farms models based on their correlation (چکیده)
55 - A systematic review on intrusion detection based on the Hidden Markov Model (چکیده)
56 - A Systematic Mapping Study on Intrusion Alert Analysis in Intrusion Detection Systems (چکیده)
57 - Characteristics and Categorization of Services in CLOUBI: A CLOud-based UBIquitous Architecture (چکیده)
58 - Seeking a New Role: Japan’s Middle East Policy under Shinzo Abe (چکیده)
59 - Detection of Anomalies in Smart Meter Data: A Density-Based Approach (چکیده)
60 - Leveling Effective Factors of Maritime Border Management of Iran in Persian Gulf (چکیده)
61 - Information extraction from effective descriptor variables in reconstruction of power system security region by considering correlation between loads (چکیده)
62 - Climate variability impacts on rainfed cereal yields in west and northwest Iran (چکیده)
63 - A secure authentication and key agreement scheme for roaming service with user anonymity (چکیده)
64 - Academic Information Security Researchers: Hackers or Specialists? (چکیده)
65 - Current and potential cyber attacks on medical journals; guidelines for improving security (چکیده)
66 - Do You Ignore Information Security in Your Journal Website? (چکیده)
67 - Causal Knowledge Analysis for Detecting and Modeling (چکیده)
68 - Design of a Secure Authentication and Key Agreement Scheme Preserving User Privacy Usable in Telecare Medicine Information Systems (چکیده)
69 - Explaining and validating stressed power systems behavior using modal series (چکیده)
70 - Risk-based Intrusion Response Management in IDS using Bayesian Decision Networks (چکیده)
71 - PiSHi: click the images and I tell if you are a human (چکیده)
72 - Process Algebraic Modeling of Authentication Protocols for Analysis of Parallel Multi-Session Executions (چکیده)
73 - Static Security Assessment Using Radial Basis Function Neural Networks Based On Growing And Pruning Method (چکیده)
74 - Fast Voltage and Power Flow Contingency Ranking Using Enhanced Radial Basis Function Neural Network (چکیده)
75 - On-line Voltage and Power Flow Contingencies Rankings Using Enhanced Radial Basis Function Neural Network and Kernel Principal Compnent Analysis (چکیده)
76 - A fast static security assessment method based on radial basis function neural networks using enhanced clustering (چکیده)
77 - A Polynomial-based Pairwise Key Pre-distribution and Node Authentication Protocol for Wireless Sensor Networks (چکیده)
78 - A new SIP authentication scheme by incorporation of elliptic curve cryptography with ticket server (چکیده)
79 - Information Security Diagnosis in Electronic Banking (Case Study: Tejarat Bank’s Branches of Isfahan) (چکیده)
80 - Supervisory Control and Data Acquisition Systems security and risk management (چکیده)
81 - Information Security in Knowledge Management Based on ISO 27001 and CWA 14924 (چکیده)
82 - ارزیابی توان تولید گیاهان دارویی: از کجا آغاز کنیم (چکیده)
83 - Analysis and Improving the Security of the Scalar Costa Scheme against Known Message Attack (چکیده)
84 - Security-Based Tariff forWheeling Contracts Considering Fair Congestion Cost Allocation (چکیده)
85 - Biotechnology and its Impact on Food Security and Safety (چکیده)
86 - Network intrusion detection based on neuro-fuzzy classification (چکیده)
87 - A Simple and Fast Technique for Detection and Prevention of SQL Injection Attacks (چکیده)
88 - An efficient privacy preserving scheme of high frequency reports for secure smart grid communications (چکیده)
89 - Border Management; as Strategy of States to Maintain Order and Security in the Country (چکیده)
90 - Analysis the Satisfaction of the residents of Golbahar new town with the living conditions and its effects on Mashhad metropolis (چکیده)
91 - Security Based Congestion Management Considering Transmission Network Contingencies in a Competitive Environment (چکیده)
92 - A fast static security assessment method based on radial basis function neural networks using enhanced clustering (چکیده)
93 - Fast Voltage and Power Flow Contingencies Ranking using Enhanced Radial Basis Function Neural Network (چکیده)
94 - On-line Voltage and Power Flow Contingencies Rankings Using Enhanced Radial Basis Function Neural Network and Kernel Principal Component Analysis (چکیده)
95 - A New Watermarking Attack Using Long-Range Correlation Image Restoration (چکیده)
96 - SEIMCHA: A New Semantic Image CAPTCHA Using Geometric Transformations (چکیده)
97 - Voltage security constrained active and reactive power pricing considering reactive market power (چکیده)
98 - Hydropolitics and Human Security: Water Cooperation in Relations between Iran, Afghanistan and Turkmenistan (چکیده)
99 - Security Analyzing and Designing GUI with the Resources Model (چکیده)
100 - A SECURITY SCHEME FOR CLUSTER BASED MOBILE AD HOC NETWORKS (چکیده)
101 - A Survey on How to Break Hash Functions (چکیده)
102 - SHSDAP: Secure Hierarchical Service Discovery and Advertisement Protocol in Cluster Based Mobile Ad hoc Network, (چکیده)
103 - گزارش اقدام پژوهی پیرامون کاربرد قصه درمانی به مثابه تکنیک و ابزار مشاوره و رواندرمانی کودک (چکیده)
104 - A novel secure and energy-efficient protocol for authentication in wireless sensor networks (چکیده)
105 - Transmission Expansion Planning and Cost Allocation Under Market Environments (چکیده)
106 - Static Security Assessment Using Radial Basis Function Neural Networks Based on Growing and Pruning Method (چکیده)
107 - Transmission Expansion Planning Considering Security Cost under Market Environment (چکیده)
108 - Counter Synchronization in CCMP Algorithm (چکیده)
109 - Biotechnology and its impact on food security (چکیده)
110 - Application of string matching in internet security and reliability (چکیده)
111 - Internet security - cyber crime paradox (چکیده)
112 - A chaotic secure communication scheme using fractional chaotic systems based on an extended fractional Kalman filter (چکیده)
113 - Transmission Expansion Planning considering security cost under market environment (چکیده)
114 - An application of Chen system for secure chaotic communication based on extended Kalman filter and multi-shift cipher algorithm (چکیده)
115 - General nonlinear modal representation of large scale power systems (چکیده)