Rimag

Rimag

  • About Rimag
  • Services
    • List of Authors
    • For Authors
    • Editor-in-Chief
    • For Editor-in-Chief
    • reviewer
    • For Reviewers
  • List of Journals
  • Order
  • Contact Us
  • Home
  • About Rimag
  • Contact Us
  • Register
  • Log in
  • Order
Advanced
  • Home
  • Attack
    • List of Articles Attack

      • Open Access Article
        • Abstract Page
        • Full-Text

        1 - Design of An intrusion detection system with new architecture for malware attacks on flash disks
        Soheil Afraz
      • Open Access Article
        • Abstract Page
        • Full-Text

        2 - modified division and replication of data in cloud for optimal performace and security (MDROPS)
        hossein hassanpour
      • Open Access Article
        • Abstract Page
        • Full-Text

        3 - Identifying Cloned Profiles on Online Social Networks by Identifying Nodes in Overlapping Communities and User Interactions
        Zahra Hamzehzadeh
      • Open Access Article
        • Abstract Page
        • Full-Text

        4 - Cyber Threats Foresight Against Iran Based on Attack Vector
        mahdi omrani masoud shafiee siavash khorsandi
      • Open Access Article
        • Abstract Page
        • Full-Text

        5 - Defense against SYN Flooding Attacks: A Scheduling Approach
        Shahram Jamali Gholam Shaker
        10.7508/jist.2014.01.007
      • Open Access Article
        • Abstract Page
        • Full-Text

        6 - SIP Vulnerability Scan Framework
        Mitra Alidoosti Hassan Asgharian Ahmad akbari
        10.7508/jist.2014.04.003
      • Open Access Article
        • Abstract Page
        • Full-Text

        7 - Security Analysis of Scalar Costa Scheme Against Known Message Attack in DCT-Domain Image Watermarking
        Reza Samadi Seyed Alireza  Seyedin
        10.7508/jist.2014.04.006
      • Open Access Article
        • Abstract Page
        • Full-Text

        8 - Modeling the Inter-arrival Time of Packets in Network Traffic and Anomaly Detection Using the Zipf’s Law
        Ali Naghash Asadi Mohammad  Abdollahi Azgomi
        10.7508/jist.2018.02.003
      • Open Access Article
        • Abstract Page
        • Full-Text

        9 - Stability Analysis of Networked Control Systems under Denial of Service Attacks using Switching System Theory
        Mohammad SayadHaghighi Faezeh Farivar
      • Open Access Article
        • Abstract Page
        • Full-Text

        10 - Analyzing Weighted Attack Graphs Using Genetic Algorithms
        M. Abadi Saeed Jalili
      • Open Access Article
        • Abstract Page
        • Full-Text

        11 - The Effects of SIP Register Flood Attack and Detection by Using Kullback–Leibler Distance
        S. R. Chogan M. Fathy M. Ramezani
      • Open Access Article
        • Abstract Page
        • Full-Text

        12 - Identifying Primary User Emulation Attacks in Cognitive Radio Network Based on Bayesian Nonparametric Bayesian
        K. Akbari J. Abouei
      • Open Access Article
        • Abstract Page
        • Full-Text

        13 - A Lightweight Intrusion Detection System Based on Two-Level Trust for Wireless Sensor Networks
        M. sadeghizade O. R. Marouzi
      • Open Access Article
        • Abstract Page
        • Full-Text

        14 - An On-Chip Detection Mechanism to Detect Scan-Based Attack in Crypto-Chips
        F. Jamali Zavareh H. Beitollahi
      • Open Access Article
        • Abstract Page
        • Full-Text

        15 - SAHAR: An Architecture to Strengthen the Control Plane of the Software-Defined Network Against Denial of Service Attacks
        mehran shetabi Ahmad Akbari
      • Open Access Article
        • Abstract Page
        • Full-Text

        16 - Detection and Mitigation of a Combined Cyber Attack on Automatic Generation Control
        Tina Hajiabdollah H. Seifi Hamed Delkhosh
      • Open Access Article
        • Abstract Page
        • Full-Text

        17 - Robust Planning of False Data Injection Attack on Electricity Markets in Smart Grids
        Hamed Badrsimaei R. Hooshmand Soghra  Nobakhtian
      • Open Access Article
        • Abstract Page
        • Full-Text

        18 - Proposing a Detection and Mitigation Approach for DDoS Attacks on SDN-Based IoT Networks
        fatemeh MotieShirazi Seyedakbar Mostafavi
      • Open Access Article
        • Abstract Page
        • Full-Text

        19 - computer security models and proposing a new perspective: A review paper
        Hadi sadjadi Reza Kalantari
      • Open Access Article
        • Abstract Page
        • Full-Text

        20 - Fake Websites Detection Improvement Using Multi-Layer Artificial Neural Network Classifier with Ant Lion Optimizer Algorithm
        Farhang Padidaran Moghaddam Mahshid Sadeghi B.
      • Open Access Article
        • Abstract Page
        • Full-Text

        21 - A Survey on Computer Security Patterns and Proposing a New Perspective
        Hadi sadjadi Reza Kalantari

Rimag


Rimag is an integrated platform to accomplish all scientific journal requirements such as submission, evaluation, reviewing, editing, DOI assignment and publishing in the web.

Links


  • Regional Information Center for Science and Technology
  • RICeST Journal Finder
  • Reference Generator
  • Islamic World Citation Office
  • ISC Journal Performance Indicator
  • ISC Master Journals List
  • Relevant Journals of the Ministry of Science, Research and Technology
  • Iranian Journals IndexedIn ISI

Related Centers


  • Office of the Supreme Leader
  • Presidential Institution
  • Ministry of Science, Research and Technology
  • Ministry of Health and Medical Education
  • Community Communication Center (SAMS)

Technical Support


  • Phone : +98 21 88910048
  • Email : rimag@ricest.ac.ir

Official pages



  • Home Page
  • Site Map
  • Ricest
  • Contact Us
  • Home
  • Site Map
  • Regional Science and Technology Information Center
  • Contact Us

The rights to this website are owned by the Raimag Press Management System.
Copyright © 2017-2025

Home| Login| About Rimag| Contact Us|
[فارسی] [العربية] [fa] [ar]
  • Ricest
  • Login
  • email