>
Fa
  |  
Ar
  |  
En
  
the isc international journal of information security
  
سال:2019 - دوره:11 - شماره:3
  
 
a fair power allocation for non-orthogonal multiple access in the power domain
- صفحه:123-130
  
 
a sudy on information privacy issue on social networks
- صفحه:19-27
  
 
access and mobility policy control at the network edge
- صفحه:105-111
  
 
algebraic matching of vulnerabilities in a low-level code
- صفحه:1-7
  
 
an optimal utilization of cloud resources using adaptive back propagation neural network and multi-level priority queue scheduling
- صفحه:145-151
  
 
aspect oriented uml to ecore model transformation
- صفحه:97-103
  
 
cloud and iot based smart car parking system by using mamdani fuzzy inference system (mfis)
- صفحه:153-160
  
 
cognitive strategic model applied to a port system
- صفحه:73-78
  
 
considering uncertainty in modeling historical knowledge
- صفحه:59-65
  
 
critical success factors for data virtualization: a literature review
- صفحه:131-137
  
 
enhancing learning from imbalanced classes via data preprocessing: a data-driven application in metabolomics data mining
- صفحه:79-89
  
 
evaluating multipath tcp resilience against link failures
- صفحه:113-122
  
 
evaluation of planet factors of smart city through multi-layer fuzzy logic (mfl)
- صفحه:51-58
  
 
face recognition based rank reduction svd approach
- صفحه:39-50
  
 
hand gestures classification with multi-core dtw
- صفحه:91-96
  
 
iot protocols based fog/cloud over high traffic
- صفحه:173-180
  
 
medical image compression based on region of interest
- صفحه:29-34
  
 
proposed st-slotted-cs-aloha protocol for time saving and collision avoidance
- صفحه:67-72
  
 
role and application of rfid technology in internet of things: communication, authentication, risk, and security concerns
- صفحه:9-17
  
 
the role of packet tracer in learning wireless networks and managing iot devices
- صفحه:35-38
  
 
towards measuring the project management process during large scale software system implementation phase
- صفحه:161-172
  
 
using machine learning arima to predict the price of cryptocurrencies
- صفحه:139-144
  
 
virtualized network management laboratory for educational purposes
- صفحه:181-186
Copyright 2023
Islamic World Science Citation Center
All Rights Reserved