>
Fa
  |  
Ar
  |  
En
  
journal of universal computer science
  
سال:2017 - دوره:23 - شماره:4
  
 
Contactless vulnerability analysis using Google and Shodan
- صفحه:404-430
  
 
Managing editor’s column
  
 
Selecting a software elicitation technique according to layers of knowledge and preciseness: A case study
- صفحه:385-403
  
 
Twister generator of arbitrary uniform sequences
- صفحه:353-384
Copyright 2023
Islamic World Science Citation Center
All Rights Reserved