Keywords: امنیت ; Secure authentication; Integrity; Digital certificates; Security; Network security;
مقالات ISI امنیت (ترجمه نشده)
مقالات زیر هنوز به فارسی ترجمه نشده اند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
Keywords: امنیت ; Low emission zones; Privacy by design; Smart cities; Privacy; Smartphone; Security;
Keywords: امنیت ; Electronic road pricing; Privacy; Security; Low emission zone;
Keywords: امنیت ; Classification; Indicators; Adequacy; Security; Reliability management;
Keywords: امنیت ; Access management; Authentication; Authorization; Cloud computing; Security; Web services;
Keywords: امنیت ; Access control; Authentication; Identity management; IoT; Key management; Security; Privacy; Sensing devices;
Keywords: امنیت ; Animal biometrics; Pet animal; Face recognition; Smart city; Security; Monitoring; Dog; OSS; FLPP; LBP; SURF; LDA;
Keywords: امنیت ; Key establishment; Security; Matrix; Cross-layer; Smart homes; Internet of things;
Keywords: امنیت ; Hybrid energy system; Alkaline electrolyzer; Hydrogen production rate; Hydrogen purity level; Contamination; Security;
Keywords: امنیت ; Mobile-cloud computing; Tamper resistance; Autonomous agents; Performance; Security;
Keywords: امنیت ; Distributed real-time system; Mixed-criticality; Security; Energy; Scheduling; System design;
Keywords: امنیت ; Workflow scheduling; Cloud computing; Security; Genetic algorithm; Particle swarm optimization; Deadline;
Keywords: امنیت ; Biometrics; Touchstroke authentication; Fuzzy proximity; Mathematical fuzzy sets; Security;
Keywords: امنیت ; Smart grid; Malicious meter inspection; Theft of electricity; Grouping; Intrusion detection; Security;
Keywords: امنیت ; Access control; Context awareness; BYOD; Security; Mobility; Biometric; Authentication; Reliability; Proximity;
Keywords: امنیت ; Security; Containers; Docker; Virtual Machines; DevOps; Orchestration;
Keywords: امنیت ; Security; Authentication scheme; Multi-factor authentication method; Systematic literature review;
Keywords: امنیت ; Trust and reputation systems; Security; WSN; Bad mouthing; Ballot stuffing; Cloud model; ABC;
Keywords: امنیت ; Blockchain technology; Intelligent vehicles; Communication; Privacy; Trust; Security;
Keywords: امنیت ; Data perturbation; Privacy; Security; Smart grid protection;
Keywords: امنیت ; Twitter; Spam detection; Machine learning; Social media; Security;
Keywords: امنیت ; Telemedicine; Security; Authentication; Anonymity; Mobility;
Keywords: امنیت ; Threat; Vulnerability; Risk recommendation; Security;
Keywords: امنیت ; Data privacy; Decentralized online social network; Access control; Security; Peer to peer computing;
Keywords: امنیت ; Cross layer design; Wireless sensor network; Energy efficiency; Network lifetime; QoS; Security; Applications;
Keywords: امنیت ; Security; Software patching; Deceptive impact; Game-based modeling; Implementing deceptive patches;
Keywords: امنیت ; Connected objects; Clinical research; Validation; Regulatory; Security;
Keywords: امنیت ; Aggregate Computing; Computational fields; Collaborative P2P systems; Security; Trust;
Keywords: امنیت ; Cloud computing; Authentication; Key agreement; Cloud data security; Security; AVISPA;
Keywords: امنیت ; Certificateless aggregate signature scheme; Diffie-Hellman assumption; Healthcare wireless sensor network; Security;
Keywords: امنیت ; Internet of Things; Security; Privacy; Cryptography; Blockchain; Software defined networking;
Keywords: امنیت ; Smartcard; Password; Security; Authentication; Multi-server; Biometric; ProVerif;
Keywords: امنیت ; Wireless sensor network; Security; Key predistribution; Polynomial-based key predistribution;
Keywords: امنیت ; Malware detection; Android; Security; Conformal Prediction; Class imbalance; Unbiased predictions; Confidence measures; Confidence guarantees; Random forests;
Keywords: امنیت ; IoT; Security; Identity; Embedded; Cloud computing; Smart home;
Keywords: امنیت ; Online social network; Security; Trustworthiness; Signaling theory; Crowd computing;
Keywords: امنیت ; Automotive; Application; Platform; Security; Privacy; Literature study;
Keywords: امنیت ; Smart grid communication; Security; Privacy; Attacks and countermeasures;
Keywords: امنیت ; Deception; Model-driven; Security;
Keywords: امنیت ; Off-grid system; Reliability; Security; Cost; Index; System dynamics;
Keywords: امنیت ; ICTD; Data collection; Security;
Keywords: امنیت ; Image steganography; Spatial domain steganography; Adaptive steganography; Data hiding; Security; Digital spatial domain;
Keywords: امنیت ; Spatially offset Raman spectroscopy; Non-invasive; Security; Bone; Art; Food; Cancer; Glucose; Temperature; SERS;
Keywords: امنیت ; False command injection; False data injection; Successive attack; Cyber-physical system; Security;
Keywords: امنیت ; Personal health records; Regulation; Privacy; Security;
Keywords: امنیت ; Security; Credential privacy; Mutual authentication; IoT; Smart city;
Keywords: امنیت ; Consumer genomic data; Internet of Living Things; Sequencing sensors; IoT; Cloud; Watermark; Protection; Security;
Keywords: امنیت ; Privacy-preserving classification; Fully homomorphic encryption; Applied cryptography; Security;
Keywords: امنیت ; Dependency graph; Dynamic taint analysis; Malware; Security; System call;
Keywords: امنیت ; Terrorism; Trade; Security; F12; F13;