نمایش نتایج جستجو برای
کلمات کلیدی: Security
موارد یافت شده: 148
1 - Ethnobotanical study of wild edible plants in the mountainous regions of Semnan Province, Iran (چکیده)2 - Towards Side-Channel Secure Cyber-Physical Systems (چکیده)
3 - Dynamic Security Risk Management Considering Systems Structural and Probabilistic Attributes (چکیده)
4 - Exploring the instability in the food security due to nitrogen fertilizer regulatory policy (چکیده)
5 - Pension policies and early retirement: New evidence from a counterfactual analysis in Iran (چکیده)
6 - The security of nations depends on the security of aquifers (چکیده)
7 - The mediating role of trust and security in the relationship between differentiation and marital intimacy in non-clinical married women (چکیده)
8 - Securing the future of IoT-healthcare systems: A meta-synthesis of mandatory security requirements (چکیده)
9 - Between Geography and International Relations: Explaining the neighborhood (چکیده)
10 - Aiming at low nitrogen leaching diets based on nitrogen fertilizer regulatory policy: A regional bio-economic assessment of the Zayandeh-Rud river basin-Iran (چکیده)
11 - Identifying and Evaluating Factors Affecting User Privacy in the Smart City Using the Meta-Synthesis Method and the Fuzzy Dematel Technique (چکیده)
12 - Antibiotic-Free Poultry Meat Consumption and Its Determinants (چکیده)
13 - The Impact of Blockchain on the Quality of Accounting Information: An Iraqi Case Study (چکیده)
14 - Post-Polymerization Modification of Amide Functionalized Copolymer Nanaoparticles with Oxazolidine for Advanced Anticounterfeitng and Information Encryption (چکیده)
15 - A Deep Neural Network Architecture for Intrusion Detection in Software-Defined Networks (چکیده)
16 - All-in-one photoluminescent Janus nanoparticles for smart technologies: Organic light-emitting diodes, anticounterfeiting, and optical sensors (چکیده)
17 - Moving Target Defense against Advanced Persistent Threats for Cybersecurity Enhancement (چکیده)
18 - An Investigation Into the Effect of Dust on Wheat Yield (چکیده)
19 - A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment (چکیده)
20 - Climate change, food security, and sustainable production: a comparison between arid and semi-arid environments of Iran (چکیده)
21 - The Relay Impact on the Physical Layer Security Performance of the Wireless Wiretap Channel (چکیده)
22 - Impact of Artificial Noise Assisted Transmission on the Physical Layer Security Performances in Wireless Wiretap Channel with Active Eavesdropper (چکیده)
23 - Evaluation of Household Resilience Capacity Index to Food insecurity Case study: Hosein Abad Rekhneh Gol village - Iran. (چکیده)
24 - Metal-free and ecofriendly photoluminescent nanoparticles for visualization of latent fingerprints, anticounterfeiting, and information encryption (چکیده)
25 - A systematic review of technologies and solutions to improve security and privacy protection of citizens in the smart city (چکیده)
26 - Towards Event Aggregation for Reducing the Volume of Logged Events During IKC Stages of APT Attacks (چکیده)
27 - Factors Affecting Success of Entrepreneurship in Agribusinesses: Evidence from the City of Mashhad, Iran (چکیده)
28 - A review on the horizons using enzyme supplements in the aquafeed production industry (چکیده)
29 - Oil price shocks on shale oil supply and energy security: a case study of the United States (چکیده)
30 - بررسی نقش میانجی اعتماد و امنیت در رابطه تمایزیافتگی با صمیمیت زناشویی در زنان (چکیده)
31 - Copula based analysis of impact of wireless channels correlation on the physical layer security performances in a wireless wiretap channel with artificial noise (چکیده)
32 - Robust Authentication and Session Key Agreement Protocol for Satellite Communications (چکیده)
33 - Examining Drinking Water Security in Rural Areas of Iran: Perspectives from a Quantitative Analysis (چکیده)
34 - Analysis of side information impact on the physical layer security performances in wireless wiretap channel (چکیده)
35 - Photoluminescent Nanoinks with Multilevel Security for Quick Authentication of Encoded Optical Tags by Sunlight: Effective Physicochemical Parameters on Responsivity, Printability, and Brightness (چکیده)
36 - Perspectives of current and future urban water security in Iran (چکیده)
37 - ُThe Interaction of Development Projects and Climate Change on Sustaniable Security on Shares Water bodies a Case Study: Euphrates and Tigris River Basin (چکیده)
38 - Analyzing the Role of Security in local Societies Tourism Development Case Study: Rural Areas of Torqabeh and Shandiz County (چکیده)
39 - Wide-area security assessment based on informative variables of power system (چکیده)
40 - A New Model to Identify the Reliability and Trust of Internet Banking Users Using Fuzzy Theory and Data-Mining (چکیده)
41 - Yield Gap Analysis Using Remote Sensing and Modelling Approaches: Wheat in the Northwest of Iran (چکیده)
42 - Improving the Security and Reliability of Embedded Networks With TTMAC-CAN (چکیده)
43 - An Efficient Authentication and Key Agreement Scheme Based on ECDH for Wireless Sensor Network (چکیده)
44 - ARisk Estimation Framework for Security Threats in Computer Networks (چکیده)
45 - A provably secure and lightweight authentication scheme for Internet of Drones for smart city surveillance (چکیده)
46 - Energy and orientation of China\\\'s foreign policy toward (چکیده)
47 - DroidTKM: Detection of Trojan Families using the KNN Classifier Based on Manhattan Distance Metric (چکیده)
48 - Blind MV-based video steganalysis based on joint inter-frame and intra-frame statistics (چکیده)
49 - Implementation of high-level biosecurity measures can reduce the baseline antibody titers of Newcastle disease in non-integrated layer flocks in northeast Iran (چکیده)
50 - New services and roles of biodiversity in modern agroecosystems: A review (چکیده)
51 - Undetectable video steganography by considering spatio-temporal steganalytic features in the embedding cost function (چکیده)
52 - A Systematic Literature Review on Blockchain-based Solutions for IoT Security (چکیده)
53 - Physical layer security in shotgun cellular systems over correlated/independent shadow fading channels (چکیده)
54 - A Cooperation of Fog Computing and Smart Gateways in a Secure and Efficient Architecture for IoT - Based Smart Homes (چکیده)
55 - prevention and control of newcastle disease : challenges and strategies (چکیده)
56 - Secure communication in CloudIoT through design of a lightweight authentication and session key agreement scheme (چکیده)
57 - Security patterns: A systematic mapping study (چکیده)
58 - A lightweight key management protocol for secure communication in smart grids (چکیده)
59 - Internet of Things in agriculture: A survey (چکیده)
60 - Design Space Exploration of the AES Encryption Algorithm Implementation for Securing CAN Protocol (چکیده)
61 - A Systematic Literature Review on Blockchain-based Solutions for IoT Security (چکیده)
62 - Sparse coding-based feature extraction for biometric remote authentication in Internet of Things (چکیده)
63 - Investigating and Analyzing the Security of Women in Urban Space with an Emphasis on Participatory Approach (Case Study: Sajjad Neighborhood of Mashhad) (چکیده)
64 - New sequential approach based on graph traversal algorithm to investigate cascading outages considering correlated wind farms (چکیده)
65 - Quality-centric security pattern mutations (چکیده)
66 - Spatiotemporal changes in aridity index and reference evapotranspiration over semi-arid and humid regions of Iran: trend, cause, and sensitivity analyses (چکیده)
67 - Identifying and Ranking Knowledge Management Tools and Techniques Affecting Organizational Information Security Improvement (چکیده)
68 - Investigating the mediating role of job embeddedness: evidence of Iranian context (چکیده)
69 - Transboundary Wetlands and International Environmental Security Case Study: Hamoon Wetland (چکیده)
70 - Transboundary Wetlands and International Environmental Security Case Study: Hamoon Wetland (چکیده)
71 - Anomaly ‐ based DoS detection and prevention in SIP networks by modeling SIP normal traffic (چکیده)
72 - Monitoring the Water Balance of Small Reservoirs in Semi-arid Regions from Space (چکیده)
73 - Investigating the Adaptability of Rural Physical Features to the Feeling of Security among the Residents of Toos Rural Area in Mashhad County (چکیده)
74 - Power system security assessment with high wind penetration using the farms models based on their correlation (چکیده)
75 - Integrating Implicit Leadership Theories, Leader–Member Exchange, Self-Efficacy, and Attachment Theory to Predict Job Performance (چکیده)
76 - A systematic review on intrusion detection based on the Hidden Markov Model (چکیده)
77 - A Systematic Mapping Study on Intrusion Alert Analysis in Intrusion Detection Systems (چکیده)
78 - Characteristics and Categorization of Services in CLOUBI: A CLOud-based UBIquitous Architecture (چکیده)
79 - Seeking a New Role: Japan’s Middle East Policy under Shinzo Abe (چکیده)
80 - Detection of Anomalies in Smart Meter Data: A Density-Based Approach (چکیده)
81 - Leveling Effective Factors of Maritime Border Management of Iran in Persian Gulf (چکیده)
82 - Information extraction from effective descriptor variables in reconstruction of power system security region by considering correlation between loads (چکیده)
83 - Climate variability impacts on rainfed cereal yields in west and northwest Iran (چکیده)
84 - A secure authentication and key agreement scheme for roaming service with user anonymity (چکیده)
85 - Academic Information Security Researchers: Hackers or Specialists? (چکیده)
86 - Current and potential cyber attacks on medical journals; guidelines for improving security (چکیده)
87 - Do You Ignore Information Security in Your Journal Website? (چکیده)
88 - Causal Knowledge Analysis for Detecting and Modeling (چکیده)
89 - Design of a Secure Authentication and Key Agreement Scheme Preserving User Privacy Usable in Telecare Medicine Information Systems (چکیده)
90 - Securing Gang of Four Design Patterns (چکیده)
91 - Explaining and validating stressed power systems behavior using modal series (چکیده)
92 - Risk-based Intrusion Response Management in IDS using Bayesian Decision Networks (چکیده)
93 - Providing a Source Code Security Analysis Model Using Semantic Web Techniques (چکیده)
94 - PiSHi: click the images and I tell if you are a human (چکیده)
95 - Process Algebraic Modeling of Authentication Protocols for Analysis of Parallel Multi-Session Executions (چکیده)
96 - Network Security Risk Mitigation using Bayesian Decision Networks (چکیده)
97 - Static Security Assessment Using Radial Basis Function Neural Networks Based On Growing And Pruning Method (چکیده)
98 - Fast Voltage and Power Flow Contingency Ranking Using Enhanced Radial Basis Function Neural Network (چکیده)
99 - On-line Voltage and Power Flow Contingencies Rankings Using Enhanced Radial Basis Function Neural Network and Kernel Principal Compnent Analysis (چکیده)
100 - A fast static security assessment method based on radial basis function neural networks using enhanced clustering (چکیده)
101 - A Polynomial-based Pairwise Key Pre-distribution and Node Authentication Protocol for Wireless Sensor Networks (چکیده)
102 - A new SIP authentication scheme by incorporation of elliptic curve cryptography with ticket server (چکیده)
103 - Information Security Diagnosis in Electronic Banking (Case Study: Tejarat Bank’s Branches of Isfahan) (چکیده)
104 - Supervisory Control and Data Acquisition Systems security and risk management (چکیده)
105 - Information Security in Knowledge Management Based on ISO 27001 and CWA 14924 (چکیده)
106 - ارزیابی توان تولید گیاهان دارویی: از کجا آغاز کنیم (چکیده)
107 - Analysis and Improving the Security of the Scalar Costa Scheme against Known Message Attack (چکیده)
108 - Security-Based Tariff forWheeling Contracts Considering Fair Congestion Cost Allocation (چکیده)
109 - Authentic Leadership and Employee Well-Being: The Mediating Role of Attachment Insecurity (چکیده)
110 - Biotechnology and its Impact on Food Security and Safety (چکیده)
111 - Network intrusion detection based on neuro-fuzzy classification (چکیده)
112 - Ranking of the E-Trust Factors in Electronic Transactions in the Context of B2C E-Commerce (چکیده)
113 - A Simple and Fast Technique for Detection and Prevention of SQL Injection Attacks (چکیده)
114 - An efficient privacy preserving scheme of high frequency reports for secure smart grid communications (چکیده)
115 - Border Management; as Strategy of States to Maintain Order and Security in the Country (چکیده)
116 - Analysis the Satisfaction of the residents of Golbahar new town with the living conditions and its effects on Mashhad metropolis (چکیده)
117 - Security Based Congestion Management Considering Transmission Network Contingencies in a Competitive Environment (چکیده)
118 - A fast static security assessment method based on radial basis function neural networks using enhanced clustering (چکیده)
119 - Fast Voltage and Power Flow Contingencies Ranking using Enhanced Radial Basis Function Neural Network (چکیده)
120 - On-line Voltage and Power Flow Contingencies Rankings Using Enhanced Radial Basis Function Neural Network and Kernel Principal Component Analysis (چکیده)
121 - A New Watermarking Attack Using Long-Range Correlation Image Restoration (چکیده)
122 - SEIMCHA: A New Semantic Image CAPTCHA Using Geometric Transformations (چکیده)
123 - Voltage security constrained active and reactive power pricing considering reactive market power (چکیده)
124 - Hydropolitics and Human Security: Water Cooperation in Relations between Iran, Afghanistan and Turkmenistan (چکیده)
125 - Security Analyzing and Designing GUI with the Resources Model (چکیده)
126 - A SECURITY SCHEME FOR CLUSTER BASED MOBILE AD HOC NETWORKS (چکیده)
127 - A Survey on How to Break Hash Functions (چکیده)
128 - SHSDAP: Secure Hierarchical Service Discovery and Advertisement Protocol in Cluster Based Mobile Ad hoc Network, (چکیده)
129 - گزارش اقدام پژوهی پیرامون کاربرد قصه درمانی به مثابه تکنیک و ابزار مشاوره و رواندرمانی کودک (چکیده)
130 - A novel secure and energy-efficient protocol for authentication in wireless sensor networks (چکیده)
131 - Transmission Expansion Planning and Cost Allocation Under Market Environments (چکیده)
132 - Static Security Assessment Using Radial Basis Function Neural Networks Based on Growing and Pruning Method (چکیده)
133 - Alternative Shared Key Replacement in Heterogeneous Wireless Sensor Networks (چکیده)
134 - A Lightweight Security Protocol for Ultra-Low Power VLSI Implementation for Wireless Implantable Medical Devices (چکیده)
135 - Transmission Expansion Planning Considering Security Cost under Market Environment (چکیده)
136 - Wives’ Positions and the Relationship between Coping and Insecurity Feeling (چکیده)
137 - Insecurity feeling amongst Wives (چکیده)
138 - Counter Synchronization in CCMP Algorithm (چکیده)
139 - By-alternative key management in heterogeneous wireless sensor networks (چکیده)
140 - Biotechnology and its impact on food security (چکیده)
141 - A new key management scheme in heterogeneous wireless sensor networks (چکیده)
142 - Comparison of insecurity feeling between Normal and Self sacrificer Wives: the Case of Khorasan Razavi Province (چکیده)
143 - Application of string matching in internet security and reliability (چکیده)
144 - Internet security - cyber crime paradox (چکیده)
145 - A chaotic secure communication scheme using fractional chaotic systems based on an extended fractional Kalman filter (چکیده)
146 - Transmission Expansion Planning considering security cost under market environment (چکیده)
147 - An application of Chen system for secure chaotic communication based on extended Kalman filter and multi-shift cipher algorithm (چکیده)
148 - General nonlinear modal representation of large scale power systems (چکیده)