بازگشت به فرم جستجو »

نمایش نتایج جستجو برای

کلمات کلیدی: Security


موارد یافت شده: 73

1 - Sparse coding-based feature extraction for biometric remote authentication in Internet of Things (چکیده)
2 - Investigating and Analyzing the Security of Women in Urban Space with an Emphasis on Participatory Approach (Case Study: Sajjad Neighborhood of Mashhad) (چکیده)
3 - Quality-centric security pattern mutations (چکیده)
4 - Spatiotemporal changes in aridity index and reference evapotranspiration over semi-arid and humid regions of Iran: trend, cause, and sensitivity analyses (چکیده)
5 - Identifying and ranking knowledge management tools and techniques affecting organisational information security improvement (چکیده)
6 - Investigating the mediating role of job embeddedness: evidence of Iranian context (چکیده)
7 - Transboundary Wetlands and International Environmental Security Case Study: Hamoon Wetland (چکیده)
8 - Transboundary Wetlands and International Environmental Security Case Study: Hamoon Wetland (چکیده)
9 - Anomaly ‐ based DoS detection and prevention in SIP networks by modeling SIP normal traffic (چکیده)
10 - Monitoring the Water Balance of Small Reservoirs in Semi-arid Regions from Space (چکیده)
11 - Investigating the Adaptability of Rural Physical Features to the Feeling of Security among the Residents of Toos Rural Area in Mashhad County (چکیده)
12 - Power system security assessment with high wind penetration using the farms models based on their correlation (چکیده)
13 - A Systematic Review on Intrusion Detection based on the Hidden Markov Model (چکیده)
14 - A Systematic Mapping Study on Intrusion Alert Analysis in Intrusion Detection Systems (چکیده)
15 - Characteristics and Categorization of Services in CLOUBI: A CLOud-based UBIquitous Architecture (چکیده)
16 - Seeking a New Role: Japan’s Middle East Policy under Shinzo Abe (چکیده)
17 - Detection of Anomalies in Smart Meter Data: A Density-Based Approach (چکیده)
18 - Leveling Effective Factors of Maritime Border Management of Iran in Persian Gulf (چکیده)
19 - Information extraction from effective descriptor variables in reconstruction of power system security region by considering correlation between loads (چکیده)
20 - Climate variability impacts on rainfed cereal yields in west and northwest Iran (چکیده)
21 - A Secure Authentication and Key Agreement Scheme for Roaming Service with User Anonymity (چکیده)
22 - Academic Information Security Researchers: Hackers or Specialists? (چکیده)
23 - Current and potential cyber attacks on medical journals; guidelines for improving security (چکیده)
24 - Do You Ignore Information Security in Your Journal Website? (چکیده)
25 - Causal Knowledge Analysis for Detecting and Modeling (چکیده)
26 - Design of a Secure Authentication and Key Agreement Scheme Preserving User Privacy Usable in Telecare Medicine Information Systems (چکیده)
27 - Explaining and Validating Stressed Power Systems Behavior Using Modal Series (چکیده)
28 - Risk-based Intrusion Response Management in IDS using Bayesian Decision Networks (چکیده)
29 - PiSHi: Click The Images and I Tell if You Are a Human (چکیده)
30 - Process Algebraic Modeling of Authentication Protocols for Analysis of Parallel Multi-Session Executions (چکیده)
31 - Static Security Assessment Using Radial Basis Function Neural Networks Based On Growing And Pruning Method   (چکیده)
32 - Fast Voltage and Power Flow Contingency Ranking Using Enhanced Radial Basis Function Neural Network (چکیده)
33 - On-line Voltage and Power Flow Contingencies Rankings Using Enhanced Radial Basis Function Neural Network and Kernel Principal Compnent Analysis (چکیده)
34 - A fast static security assessment method based on radial basis function neural networks using enhanced clustering (چکیده)
35 - A Polynomial-based Pairwise Key Pre-distribution and Node Authentication Protocol for Wireless Sensor Networks (چکیده)
36 - A new SIP authentication scheme by incorporation of elliptic curve cryptography with ticket server (چکیده)
37 - Information Security Diagnosis in Electronic Banking (Case Study: Tejarat Bank’s Branches of Isfahan) (چکیده)
38 - Supervisory Control and Data Acquisition Systems security and risk management (چکیده)
39 - Information Security in Knowledge Management Based on ISO 27001 and CWA 14924 (چکیده)
40 - ارزیابی توان تولید گیاهان دارویی: از کجا آغاز کنیم (چکیده)
41 - Analysis and Improving the Security of the Scalar Costa Scheme against Known Message Attack (چکیده)
42 - Security-Based Tariff forWheeling Contracts Considering Fair Congestion Cost Allocation (چکیده)
43 - Biotechnology and its Impact on Food Security and Safety (چکیده)
44 - Network intrusion detection based on neuro-fuzzy classification (چکیده)
45 - A Simple and Fast Technique for Detection and Prevention of SQL Injection Attacks (چکیده)
46 - An efficient privacy preserving scheme of high frequency reports for secure smart grid communications (چکیده)
47 - Border Management; as Strategy of States to Maintain Order and Security in the Country (چکیده)
48 - Analysis the Satisfaction of the residents of Golbahar new town with the living conditions and its effects on Mashhad metropolis (چکیده)
49 - Security Based Congestion Management Considering Transmission Network Contingencies in a Competitive Environment (چکیده)
50 - A fast static security assessment method based on radial basis function neural networks using enhanced clustering (چکیده)
51 - Fast Voltage and Power Flow Contingencies Ranking using Enhanced Radial Basis Function Neural Network (چکیده)
52 - On-line Voltage and Power Flow Contingencies Rankings Using Enhanced Radial Basis Function Neural Network and Kernel Principal Component Analysis (چکیده)
53 - A New Watermarking Attack Using Long-Range Correlation Image Restoration (چکیده)
54 - SEIMCHA: A New Semantic Image CAPTCHA Using Geometric Transformations (چکیده)
55 - Voltage security constrained active and reactive power pricing considering reactive market power (چکیده)
56 - Hydropolitics and Human Security: Water Cooperation in Relations between Iran, Afghanistan and Turkmenistan (چکیده)
57 - Security Analyzing and Designing GUI with the Resources Model (چکیده)
58 - A SECURITY SCHEME FOR CLUSTER BASED MOBILE AD HOC NETWORKS (چکیده)
59 - A Survey on How to Break Hash Functions (چکیده)
60 - SHSDAP: Secure Hierarchical Service Discovery and Advertisement Protocol in Cluster Based Mobile Ad hoc Network, (چکیده)
61 - گزارش اقدام پژوهی پیرامون کاربرد قصه درمانی به مثابه تکنیک و ابزار مشاوره و رواندرمانی کودک (چکیده)
62 - A novel secure and energy-efficient protocol for authentication in wireless sensor networks (چکیده)
63 - Transmission Expansion Planning and Cost Allocation Under Market Environments (چکیده)
64 - Static Security Assessment Using Radial Basis Function Neural Networks Based on Growing and Pruning Method (چکیده)
65 - Transmission Expansion Planning Considering Security Cost under Market Environment (چکیده)
66 - Counter Synchronization in CCMP Algorithm (چکیده)
67 - Biotechnology and its impact on food security (چکیده)
68 - Application of string matching in internet security and reliability (چکیده)
69 - Internet security - cyber crime paradox (چکیده)
70 - A chaotic secure communication scheme using fractional chaotic systems based on an extended fractional Kalman filter (چکیده)
71 - Transmission Expansion Planning considering security cost under market environment (چکیده)
72 - An application of Chen system for secure chaotic communication based on extended Kalman filter and multi-shift cipher algorithm (چکیده)
73 - general nonlinear modal representation of large scale power systems (چکیده)