Filter by:

Order by: Present date
Item Counts: 33

Proposing a privacy-aware model for verifiable information sharing on blockchain

Mohammad Ghahri
M.Sc. | 2024-02-19

A privacy-aware decentralized model for phishing detection

Mohammad mahdi Rahimnia
M.Sc. | 2024-02-19

Privacy preserving in decetralized storage

Keivan Vafaee
M.Sc. | 2024-02-19

Designing a deep learning privacy audit framework from a membership inference perspective

Hamid Karimkhani
Ph.D | 2024-02-19

Decentralized ia-enabled quality control in online participatory systems

Mahdiyeh Talebzadeh
M.Sc. | 2023-09-21

Designing a role based access control for smart health systems

Farnaz Kamranfar
M.Sc. | 2023-09-21

Quality control in blockchain based supply chains

Sadegh Sohani
M.Sc. | 2023-01-29

Blockchain-based secure supply chain

Mohammadreza Arabameri
M.Sc. | 2023-01-24

Novel worker recruitment method based on clarity and fairness of requester

Seyyed javad Bozorg zadeh razavi
M.Sc. | 2022-09-22

Privacy preserving person tracking and counting in video analytics with edge computing

Farideh Parastar
M.Sc. | 2022-09-21

Preparation and implementation of api security essentials and testcases for payment systems

Vida Sanaei
M.Sc. | 2022-09-21

Asynchronous collaborative content generation systems

Fariba Abedin zadeh zare
M.Sc. | 2022-03-09

Explainable neural network-based model for evidence detection and analysis in digital forensics investigation

Tahereh Nayerifard
Ph.D | 2022-03-08

Method of signature-based intrusion detection using shallow neural networks

Nedhal ahmadhamdi Qaiwmchi
Ph.D | 2022-01-29

Credit card fraud detection by combining neural network and optimization algorithm

Noor Al-sahlanee
M.Sc. | 2022-01-02

Network intrusion detection using an improved crow search optimization algorithm and feature selection

Reham Althabhawi
M.Sc. | 2021-10-20

Performance and security improvements and prediction of block creation delay in monitor nodes in the trust chain

Seyed salar Ghazi
M.Sc. | 2021-10-17

A multi-stage intrusion detection model for attacks with few training data

Wael Ibrahim
M.Sc. | 2021-08-07

A secure authentication protocol for cloud-assisted internet of things with physical unclonable functions

Zahra Karimi
M.Sc. | 2021-03-14

A secure and efficient scheme for storing, sharing, and accessing medical data stored on cloud service providers

Mahdi Nikooghadam
M.Sc. | 2021-02-14

Ontology - based trust management model for dynamic distributed networks

Wurood murad raisan Alshadood
M.Sc. | 2021-02-07

Provide a secure authentication method based on certificateless encryption and based on fog computing to ensure safety in calculating the reputation of devices in the internet of things

Dhamyaa Humairi
M.Sc. | 2020-10-12

Identifying and preventing membership inference attack in machine learning models

Ala Ekramifard
Ph.D | 2020-08-05

Detect anomalies in the iot with using autoencoder neural networks

Ahmad fahim Maqsodi
M.Sc. | 2020-02-19

Design and implementation of a privacy-aware framework for cloud based demand response in smart grid

Hadiseh Kamalgharibi
M.Sc. | 2019-09-21

Statistical based early detection system of multi-rate ddos attacks using dynamic window size in qos environments

Hasan Hillawi
M.Sc. | 2019-06-03

Iot smart city lighting, crisis management approach

Ammar salahuldeen mahdi Al - saffar
M.Sc. | 2018-09-22

A hybrid multi-objective genetic algorithm for scientific workflow scheduling

Hussein ali Mousa
M.Sc. | 2018-09-17

Design and implementation of a novel recruitment and incentive allocation framework in multi task-requester participatory sensing system

Milad Davari
M.Sc. | 2018-08-05

A new remote biometric user identification based on sparse coding for secure access to iot services

Ali jaber taresh Alchaab
M.Sc. | 2018-08-05

A hybrid method of genetic algorithm and support vector machine for intrusion detection

Fuqdan abdulfadhil gatea Al ibraheemi
M.Sc. | 2017-07-27

Dns tunneling detection based on genetic algorithm and support vector machine

Mushtaq Tally
M.Sc. | 2017-07-27

Dns tunneling detection method based on multi-label support vector machine

Ahmed hashim murtadha Al musawi
M.Sc. | 2017-07-27