Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             8 results found
no title author magazine year volume issue page(s) type
1 A generalized framework for accelerating exhaustive search utilizing deterministic related-key differential characteristics Soleimany, Hadi

18 2 p. 141-146
article
2 Anomaly detection in business processes logs using social network analysis Ebrahim, Mina

18 2 p. 127-139
article
3 Covert timing channels: analyzing WEB traffic Nasseralfoghara, Mehrdad

18 2 p. 117-126
article
4 Cross-VM cache attacks on Camellia Seddigh, Milad

18 2 p. 91-99
article
5 Editorial Sadeghiyan, Babak

18 2 p. 69-70
article
6 Markhor: malware detection using fuzzy similarity of system call dependency sequences Lajevardi, Amir Mohammadzade

18 2 p. 81-90
article
7 On delegatability of MDVS schemes Rastegari, Parvin

18 2 p. 71-80
article
8 Zipf’s law analysis on the leaked Iranian users’ passwords Alebouyeh, Zeinab

18 2 p. 101-116
article
                             8 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands