بازگشت به فرم جستجو »

نمایش نتایج جستجو برای

کلمات کلیدی: security


موارد یافت شده: 87

1 - Sparse coding-based feature extraction for biometric remote authentication in Internet of Things (چکیده)
2 - Investigating and Analyzing the Security of Women in Urban Space with an Emphasis on Participatory Approach (Case Study: Sajjad Neighborhood of Mashhad) (چکیده)
3 - New sequential approach based on graph traversal algorithm to investigate cascading outages considering correlated wind farms (چکیده)
4 - Quality-centric security pattern mutations (چکیده)
5 - Spatiotemporal changes in aridity index and reference evapotranspiration over semi-arid and humid regions of Iran: trend, cause, and sensitivity analyses (چکیده)
6 - Identifying and ranking knowledge management tools and techniques affecting organisational information security improvement (چکیده)
7 - Investigating the mediating role of job embeddedness: evidence of Iranian context (چکیده)
8 - Transboundary Wetlands and International Environmental Security Case Study: Hamoon Wetland (چکیده)
9 - Transboundary Wetlands and International Environmental Security Case Study: Hamoon Wetland (چکیده)
10 - Anomaly ‐ based DoS detection and prevention in SIP networks by modeling SIP normal traffic (چکیده)
11 - Monitoring the Water Balance of Small Reservoirs in Semi-arid Regions from Space (چکیده)
12 - Investigating the Adaptability of Rural Physical Features to the Feeling of Security among the Residents of Toos Rural Area in Mashhad County (چکیده)
13 - Power system security assessment with high wind penetration using the farms models based on their correlation (چکیده)
14 - Integrating Implicit Leadership Theories, Leader–Member Exchange, Self-Efficacy, and Attachment Theory to Predict Job Performance (چکیده)
15 - A Systematic Review on Intrusion Detection based on the Hidden Markov Model (چکیده)
16 - A Systematic Mapping Study on Intrusion Alert Analysis in Intrusion Detection Systems (چکیده)
17 - Characteristics and Categorization of Services in CLOUBI: A CLOud-based UBIquitous Architecture (چکیده)
18 - Seeking a New Role: Japan’s Middle East Policy under Shinzo Abe (چکیده)
19 - Detection of Anomalies in Smart Meter Data: A Density-Based Approach (چکیده)
20 - Leveling Effective Factors of Maritime Border Management of Iran in Persian Gulf (چکیده)
21 - Information extraction from effective descriptor variables in reconstruction of power system security region by considering correlation between loads (چکیده)
22 - Climate variability impacts on rainfed cereal yields in west and northwest Iran (چکیده)
23 - A Secure Authentication and Key Agreement Scheme for Roaming Service with User Anonymity (چکیده)
24 - Academic Information Security Researchers: Hackers or Specialists? (چکیده)
25 - Current and potential cyber attacks on medical journals; guidelines for improving security (چکیده)
26 - Do You Ignore Information Security in Your Journal Website? (چکیده)
27 - Causal Knowledge Analysis for Detecting and Modeling (چکیده)
28 - Design of a Secure Authentication and Key Agreement Scheme Preserving User Privacy Usable in Telecare Medicine Information Systems (چکیده)
29 - Securing Gang of Four Design Patterns (چکیده)
30 - Explaining and Validating Stressed Power Systems Behavior Using Modal Series (چکیده)
31 - Risk-based Intrusion Response Management in IDS using Bayesian Decision Networks (چکیده)
32 - Providing a Source Code Security Analysis Model Using Semantic Web Techniques (چکیده)
33 - PiSHi: Click The Images and I Tell if You Are a Human (چکیده)
34 - Process Algebraic Modeling of Authentication Protocols for Analysis of Parallel Multi-Session Executions (چکیده)
35 - Network Security Risk Mitigation using Bayesian Decision Networks (چکیده)
36 - Static Security Assessment Using Radial Basis Function Neural Networks Based On Growing And Pruning Method   (چکیده)
37 - Fast Voltage and Power Flow Contingency Ranking Using Enhanced Radial Basis Function Neural Network (چکیده)
38 - On-line Voltage and Power Flow Contingencies Rankings Using Enhanced Radial Basis Function Neural Network and Kernel Principal Compnent Analysis (چکیده)
39 - A fast static security assessment method based on radial basis function neural networks using enhanced clustering (چکیده)
40 - A Polynomial-based Pairwise Key Pre-distribution and Node Authentication Protocol for Wireless Sensor Networks (چکیده)
41 - A new SIP authentication scheme by incorporation of elliptic curve cryptography with ticket server (چکیده)
42 - Information Security Diagnosis in Electronic Banking (Case Study: Tejarat Bank’s Branches of Isfahan) (چکیده)
43 - Supervisory Control and Data Acquisition Systems security and risk management (چکیده)
44 - Information Security in Knowledge Management Based on ISO 27001 and CWA 14924 (چکیده)
45 - ارزیابی توان تولید گیاهان دارویی: از کجا آغاز کنیم (چکیده)
46 - Analysis and Improving the Security of the Scalar Costa Scheme against Known Message Attack (چکیده)
47 - Security-Based Tariff forWheeling Contracts Considering Fair Congestion Cost Allocation (چکیده)
48 - Authentic Leadership and Employee Well-Being: The Mediating Role of Attachment Insecurity (چکیده)
49 - Biotechnology and its Impact on Food Security and Safety (چکیده)
50 - Network intrusion detection based on neuro-fuzzy classification (چکیده)
51 - Ranking of the E-Trust Factors in Electronic Transactions in the Context of B2C E-Commerce (چکیده)
52 - A Simple and Fast Technique for Detection and Prevention of SQL Injection Attacks (چکیده)
53 - An efficient privacy preserving scheme of high frequency reports for secure smart grid communications (چکیده)
54 - Border Management; as Strategy of States to Maintain Order and Security in the Country (چکیده)
55 - Analysis the Satisfaction of the residents of Golbahar new town with the living conditions and its effects on Mashhad metropolis (چکیده)
56 - Security Based Congestion Management Considering Transmission Network Contingencies in a Competitive Environment (چکیده)
57 - A fast static security assessment method based on radial basis function neural networks using enhanced clustering (چکیده)
58 - Fast Voltage and Power Flow Contingencies Ranking using Enhanced Radial Basis Function Neural Network (چکیده)
59 - On-line Voltage and Power Flow Contingencies Rankings Using Enhanced Radial Basis Function Neural Network and Kernel Principal Component Analysis (چکیده)
60 - A New Watermarking Attack Using Long-Range Correlation Image Restoration (چکیده)
61 - SEIMCHA: A New Semantic Image CAPTCHA Using Geometric Transformations (چکیده)
62 - Voltage security constrained active and reactive power pricing considering reactive market power (چکیده)
63 - Hydropolitics and Human Security: Water Cooperation in Relations between Iran, Afghanistan and Turkmenistan (چکیده)
64 - Security Analyzing and Designing GUI with the Resources Model (چکیده)
65 - A SECURITY SCHEME FOR CLUSTER BASED MOBILE AD HOC NETWORKS (چکیده)
66 - A Survey on How to Break Hash Functions (چکیده)
67 - SHSDAP: Secure Hierarchical Service Discovery and Advertisement Protocol in Cluster Based Mobile Ad hoc Network, (چکیده)
68 - گزارش اقدام پژوهی پیرامون کاربرد قصه درمانی به مثابه تکنیک و ابزار مشاوره و رواندرمانی کودک (چکیده)
69 - A novel secure and energy-efficient protocol for authentication in wireless sensor networks (چکیده)
70 - Transmission Expansion Planning and Cost Allocation Under Market Environments (چکیده)
71 - Static Security Assessment Using Radial Basis Function Neural Networks Based on Growing and Pruning Method (چکیده)
72 - Alternative Shared Key Replacement in Heterogeneous Wireless Sensor Networks (چکیده)
73 - A Lightweight Security Protocol for Ultra-Low Power VLSI Implementation for Wireless Implantable Medical Devices (چکیده)
74 - Transmission Expansion Planning Considering Security Cost under Market Environment (چکیده)
75 - Wives’ Positions and the Relationship between Coping and Insecurity Feeling (چکیده)
76 - Insecurity feeling amongst Wives (چکیده)
77 - Counter Synchronization in CCMP Algorithm (چکیده)
78 - By-alternative key management in heterogeneous wireless sensor networks (چکیده)
79 - Biotechnology and its impact on food security (چکیده)
80 - A new key management scheme in heterogeneous wireless sensor networks (چکیده)
81 - Comparison of insecurity feeling between Normal and Self sacrificer Wives: the Case of Khorasan Razavi Province (چکیده)
82 - Application of string matching in internet security and reliability (چکیده)
83 - Internet security - cyber crime paradox (چکیده)
84 - A chaotic secure communication scheme using fractional chaotic systems based on an extended fractional Kalman filter (چکیده)
85 - Transmission Expansion Planning considering security cost under market environment (چکیده)
86 - An application of Chen system for secure chaotic communication based on extended Kalman filter and multi-shift cipher algorithm (چکیده)
87 - general nonlinear modal representation of large scale power systems (چکیده)