Quality control in blockchain-based supply chain management systems
Sadegh Sohani
M.Sc.
|
2024-09-21
Proposing a model for making convolutional neural networks explainable in source camera identification
Tahereh Nayerifard
Ph.D
|
2024-09-18
Secure multi-layer model for data privacy in healthcare networks
Morteza Khoramdelnik
M.Sc.
|
2024-09-18
Proposing a privacy-aware model for verifiable information sharing on blockchain
Mohammad Ghahri
M.Sc.
|
2024-02-19
A privacy-aware decentralized model for phishing detection
Mohammad mahdi Rahimnia
M.Sc.
|
2024-02-19
Privacy preserving in decetralized storage
Keivan Vafaee
M.Sc.
|
2024-02-19
Designing a deep learning privacy audit framework from a membership inference perspective
Hamid Karimkhani
Ph.D
|
2024-02-19
Decentralized ia-enabled quality control in online participatory systems
Mahdiyeh Talebzadeh
M.Sc.
|
2023-09-21
Designing a role based access control for smart health systems
Farnaz Kamranfar
M.Sc.
|
2023-09-21
Blockchain-based secure supply chain
Mohammadreza Arabameri
M.Sc.
|
2023-01-24
Novel worker recruitment method based on clarity and fairness of requester
Seyyed javad Bozorg zadeh razavi
M.Sc.
|
2022-09-22
Privacy preserving person tracking and counting in video analytics with edge computing
Farideh Parastar
M.Sc.
|
2022-09-21
Preparation and implementation of api security essentials and testcases for payment systems
Vida Sanaei
M.Sc.
|
2022-09-21
Asynchronous collaborative content generation systems
Fariba Abedin zadeh zare
M.Sc.
|
2022-03-09
Method of signature-based intrusion detection using shallow neural networks
Nedhal ahmadhamdi Qaiwmchi
Ph.D
|
2022-01-29
Credit card fraud detection by combining neural network and optimization algorithm
Noor Al-sahlanee
M.Sc.
|
2022-01-02
Network intrusion detection using an improved crow search optimization algorithm and feature selection
Reham Althabhawi
M.Sc.
|
2021-10-20
Performance and security improvements and prediction of block creation delay in monitor nodes in the trust chain
Seyed salar Ghazi
M.Sc.
|
2021-10-17
A multi-stage intrusion detection model for attacks with few training data
Wael Ibrahim
M.Sc.
|
2021-08-07
A secure authentication protocol for cloud-assisted internet of things with physical unclonable functions
Zahra Karimi
M.Sc.
|
2021-03-14
A secure and efficient scheme for storing, sharing, and accessing medical data stored on cloud service providers
Mahdi Nikooghadam
M.Sc.
|
2021-02-14
Ontology - based trust management model for dynamic distributed networks
Wurood murad raisan Alshadood
M.Sc.
|
2021-02-07
Provide a secure authentication method based on certificateless encryption and based on fog computing to ensure safety in calculating the reputation of devices in the internet of things
Dhamyaa Humairi
M.Sc.
|
2020-10-12
Identifying and preventing membership inference attack in machine learning models
Ala Ekramifard
Ph.D
|
2020-08-05
Detect anomalies in the iot with using autoencoder neural networks
Ahmad fahim Maqsodi
M.Sc.
|
2020-02-19
Design and implementation of a privacy-aware framework for cloud based demand response in smart grid
Hadiseh Kamalgharibi
M.Sc.
|
2019-09-21
Statistical based early detection system of multi-rate ddos attacks using dynamic window size in qos environments
Hasan Hillawi
M.Sc.
|
2019-06-03
Iot smart city lighting, crisis management approach
Ammar salahuldeen mahdi Al - saffar
M.Sc.
|
2018-09-22
A hybrid multi-objective genetic algorithm for scientific workflow scheduling
Hussein ali Mousa
M.Sc.
|
2018-09-17
Design and implementation of a novel recruitment and incentive allocation framework in multi task-requester participatory sensing system
Milad Davari
M.Sc.
|
2018-08-05
A new remote biometric user identification based on sparse coding for secure access to iot services
Ali jaber taresh Alchaab
M.Sc.
|
2018-08-05
A hybrid method of genetic algorithm and support vector machine for intrusion detection
Fuqdan abdulfadhil gatea Al ibraheemi
M.Sc.
|
2017-07-27
Dns tunneling detection based on genetic algorithm and support vector machine
Mushtaq Tally
M.Sc.
|
2017-07-27
Dns tunneling detection method based on multi-label support vector machine