Keywords: امنیت ; Security; Authenticated key agreement; Sensor networks; Internet of things;
مقالات ISI امنیت (ترجمه نشده)
مقالات زیر هنوز به فارسی ترجمه نشده اند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
Keywords: امنیت ; Lebanon; Syrian refugees; Informal settlements; Security; Humanitarian; Camps;
Keywords: امنیت ; Privacy; Surveillance; Consent; Experiment; Security;
Keywords: امنیت ; Wireless Body Area Network (WBAN); Security; Privacy; Threats; Attacks; Healthcare systems;
Keywords: امنیت ; Security; Risk assessment; Terrorism; Weighted fuzzy Petri-net; Chemical industry;
Keywords: امنیت ; Criminal networks; American mafia; Efficiency; Security; Modularity; Small-world networks; Brokerage;
Keywords: امنیت ; Forensics; Security; Network; Traffic; Regression;
Keywords: امنیت ; Cyberspace law; International customary law; Opinio juris; Evidence of custom; Spam; Security; Privacy; Harmful speech; Accessibility;
Keywords: امنیت ; Security; Physically unclonable functions;
Keywords: امنیت ; Mhealth; Data privacy; Security; Data sharing;
Keywords: امنیت ; Water; Energy; Food; Nexus; Security; Asia; Pacific;
Keywords: امنیت ; Inverse problem; Phase measurement; Security;
Keywords: امنیت ; CAN bus; Security; Vehicle systems; Security attacks; Smartphone;
Keywords: امنیت ; Attributes; Security; Active authentication; Face; Mobile;
Keywords: امنیت ; IP; HLS; Low cost; Loop, CDFGs; Trojan; Security;
Keywords: امنیت ; Drones; Legislation; Riga Declaration; EASA; FAA; Privacy; Safety; Security; Insurance; Energy; Public Administration;
Keywords: امنیت ; Cloud computing; Reliability; Security; Comprehensive transmission model; Two-phase resource sharing protocol;
Keywords: امنیت ; Water; Security; Africa; SADC;
Keywords: امنیت ; Attack; Healthcare; Protocol; Security; Threat; Wearable devices;
Keywords: امنیت ; Cooperative spatial multiplexing; Security; Secure outage probability; Zero-forcing equalization;
Keywords: امنیت ; Terrorism; International tourism demand; Political instability; Security; Crisis management;
Keywords: امنیت ; Searchable encryption; Security; Cloud computing; Cloud storage;
Keywords: امنیت ; Opportunistic Networks; Security; Packet dropping attacks; Denial-of-service; Malicious node detection;
Keywords: امنیت ; Big Data; Security; Data protection; Privacy; Regulation; Fraud; Policing; Surveillance; Algorithmic accountability; the Netherlands;
Keywords: امنیت ; Manycore architecture; Virtualization; Hypervisor; Physical isolation; Security;
Keywords: امنیت ; Embedded system; Security; Safety; Energy; Design optimization;
Keywords: امنیت ; Cyber Physical Systems (CPS); Convexity; Computational Geometry; Least Square Approximation (LSA); DataStream Analysis; Nuclear Power Plant (NPP); Real-time Control System; Sequential Probability Ratio Test (SPRT); Cumulative Sum (CUSUM); Security;
Keywords: امنیت ; Attribute based access control; Access delegation; Security; Electronic health records;
Keywords: امنیت ; Access control policies; Electronic Health Records (EHR); Hierarchical Similarity Analyzer (HSA); Interoperable healthcare environment; Security;
Keywords: امنیت ; Big data; Security; Authentication; Access control; In-network data sharing; Information-centric network;
Keywords: امنیت ; Information retrieval; Security; Search engines; Documents' automatic evaluation; Hashing algorithms; Information authentication;
Keywords: امنیت ; Modern cars; AUTOSAR; On-Board Diagnostic; Vehicular communications; Privacy; Security;
Keywords: امنیت ; Internet of Things; Security; Sticky policy; Enforcement; Middleware; Prototype;
Keywords: امنیت ; Security; Database; Access control; Inference; Aggregation;
Keywords: امنیت ; Privacy-preserving; security; Full-fledged delegation; Cloud computing; Shared access privileges; Cloud storage security;
Keywords: امنیت ; Attack; Biometric; Remote user; Security; Session key; Smart card;
Keywords: امنیت ; Compressed sensing; Security; Diagonal sum technique; Security keys; WMSN;
Keywords: امنیت ; Content centric networks; Security; NOSQL; Network utilization; Role-based access;
Keywords: امنیت ; Proton; Radiography; Security; Nuclear; Cargo; Material identification;
Keywords: امنیت ; Cyber-attacks; Cyber-physical systems; Robots; Security; CUSUM method; Intelligent checker; FACT graph;
Keywords: امنیت ; Anchor Nodes; Security; Location; Authentication; Wormhole; Certificate;
Keywords: امنیت ; Workflows; Context-aware; Security; Specification;
Keywords: امنیت ; Special effort; General effort; Protection; Defense; Attack; Reliability; Vulnerability; Series system; Parallel system; Safety; Security; Terrorism;
Keywords: امنیت ; Distributed real-time systems; Security; Energy; Message protection; System design;
Keywords: امنیت ; TMIS; Authentication; Biometric; Password; Smart Card; Security; Attack;
Keywords: امنیت ; Cyber-physical systems; Security; Model-based engineering; Security engineering; Systematic mapping; Snowballing; Survey;
Keywords: امنیت ; Security; Authentication; Body-motion; Healthcare; MBAN;
Keywords: امنیت ; Domestic violence; Prevention; Security; Home security; Duress alarms;
Keywords: امنیت ; Cyber-crime; Digital forensics; Security; Crime; Research;
Keywords: امنیت ; Privacy; Security; Online social networks;