Rimag

Rimag

  • About Rimag
  • Services
    • List of Authors
    • For Authors
    • Editor-in-Chief
    • For Editor-in-Chief
    • reviewer
    • For Reviewers
  • List of Journals
  • Order
  • Contact Us
  • Home
  • About Rimag
  • Contact Us
  • Register
  • Log in
  • Order
Advanced
  • Home
  • attack
    • List of Articles attack

      • Open Access Article
        • Abstract Page
        • Full-Text

        1 - Design of An intrusion detection system with new architecture for malware attacks on flash disks
        Soheil Afraz
      • Open Access Article
        • Abstract Page
        • Full-Text

        2 - modified division and replication of data in cloud for optimal performace and security (MDROPS)
        hossein hassanpour
      • Open Access Article
        • Abstract Page
        • Full-Text

        3 - Identifying Cloned Profiles on Online Social Networks by Identifying Nodes in Overlapping Communities and User Interactions
        Zahra Hamzehzadeh
      • Open Access Article
        • Abstract Page
        • Full-Text

        4 - Cyber Threats Foresight Against Iran Based on Attack Vector
        mahdi omrani masoud shafiee siavash khorsandi
      • Open Access Article
        • Abstract Page
        • Full-Text

        5 - Defense against SYN Flooding Attacks: A Scheduling Approach
        Shahram Jamali Gholam Shaker
        10.7508/jist.2014.01.007
      • Open Access Article
        • Abstract Page
        • Full-Text

        6 - SIP Vulnerability Scan Framework
        Mitra Alidoosti Hassan Asgharian Ahmad akbari
        10.7508/jist.2014.04.003
      • Open Access Article
        • Abstract Page
        • Full-Text

        7 - Security Analysis of Scalar Costa Scheme Against Known Message Attack in DCT-Domain Image Watermarking
        Reza Samadi Seyed Alireza  Seyedin
        10.7508/jist.2014.04.006
      • Open Access Article
        • Abstract Page
        • Full-Text

        8 - Modeling the Inter-arrival Time of Packets in Network Traffic and Anomaly Detection Using the Zipf’s Law
        Ali Naghash Asadi Mohammad  Abdollahi Azgomi
        10.7508/jist.2018.02.003
      • Open Access Article
        • Abstract Page
        • Full-Text

        9 - Stability Analysis of Networked Control Systems under Denial of Service Attacks using Switching System Theory
        Mohammad SayadHaghighi Faezeh Farivar
      • Open Access Article
        • Abstract Page
        • Full-Text

        10 - Analyzing Weighted Attack Graphs Using Genetic Algorithms
        M. Abadi Saeed Jalili
      • Open Access Article
        • Abstract Page
        • Full-Text

        11 - The Effects of SIP Register Flood Attack and Detection by Using Kullback–Leibler Distance
        S. R. Chogan M. Fathy M. Ramezani
      • Open Access Article
        • Abstract Page
        • Full-Text

        12 - Identifying Primary User Emulation Attacks in Cognitive Radio Network Based on Bayesian Nonparametric Bayesian
        K. Akbari J. Abouei
      • Open Access Article
        • Abstract Page
        • Full-Text

        13 - A Lightweight Intrusion Detection System Based on Two-Level Trust for Wireless Sensor Networks
        M. sadeghizade O. R. Marouzi
      • Open Access Article
        • Abstract Page
        • Full-Text

        14 - An On-Chip Detection Mechanism to Detect Scan-Based Attack in Crypto-Chips
        F. Jamali Zavareh H. Beitollahi
      • Open Access Article
        • Abstract Page
        • Full-Text

        15 - SAHAR: An Architecture to Strengthen the Control Plane of the Software-Defined Network Against Denial of Service Attacks
        mehran shetabi Ahmad Akbari
      • Open Access Article
        • Abstract Page
        • Full-Text

        16 - Detection and Mitigation of a Combined Cyber Attack on Automatic Generation Control
        Tina Hajiabdollah H. Seifi Hamed Delkhosh
      • Open Access Article
        • Abstract Page
        • Full-Text

        17 - Robust Planning of False Data Injection Attack on Electricity Markets in Smart Grids
        Hamed Badrsimaei R. Hooshmand Soghra  Nobakhtian
      • Open Access Article
        • Abstract Page
        • Full-Text

        18 - Proposing a Detection and Mitigation Approach for DDoS Attacks on SDN-Based IoT Networks
        fatemeh MotieShirazi Seyedakbar Mostafavi
      • Open Access Article
        • Abstract Page
        • Full-Text

        19 - computer security models and proposing a new perspective: A review paper
        Hadi sadjadi Reza Kalantari
      • Open Access Article
        • Abstract Page
        • Full-Text

        20 - Fake Websites Detection Improvement Using Multi-Layer Artificial Neural Network Classifier with Ant Lion Optimizer Algorithm
        Farhang Padidaran Moghaddam Mahshid Sadeghi B.
      • Open Access Article
        • Abstract Page
        • Full-Text

        21 - Detecting Distributed Denial of Service Attacks in Software-Defined Networks with a Deep Learning Approach
        Younes Mehdizadeh Mehdi Sadeghzadeh
      • Open Access Article
        • Abstract Page
        • Full-Text

        22 - A Survey on Computer Security Patterns and Proposing a New Perspective
        Hadi sadjadi Reza Kalantari
      • Open Access Article
        • Abstract Page
        • Full-Text

        23 - Designing a Hybrid Algorithm that Combines Deep Learning and PSO for Proactive Detection of Attacks in IoT Networks
        Zahra Bakhshali Alireza Pourebrahimi Ahmad Ebrahimi Nazanin  Pilevari
        10.61186/jist.48455.13.50.130

Rimag


Rimag is an integrated platform to accomplish all scientific journal requirements such as submission, evaluation, reviewing, editing, DOI assignment and publishing in the web.

Links


  • Regional Information Center for Science and Technology
  • RICeST Journal Finder
  • Reference Generator
  • Islamic World Citation Office
  • ISC Journal Performance Indicator
  • ISC Master Journals List
  • Relevant Journals of the Ministry of Science, Research and Technology
  • Iranian Journals IndexedIn ISI

Related Centers


  • Office of the Supreme Leader
  • Presidential Institution
  • Ministry of Science, Research and Technology
  • Ministry of Health and Medical Education
  • Community Communication Center (SAMS)

Technical Support


  • Phone : +98 21 88910048
  • Email : rimag.ricest@gmail.com

Official pages



  • Home Page
  • Site Map
  • Ricest
  • Contact Us
  • Home
  • Site Map
  • Regional Science and Technology Information Center
  • Contact Us

The rights to this website are owned by the Raimag Press Management System.
Copyright © 2017-2025

Home| Login| About Rimag| Contact Us|
[فارسی] [العربية] [fa] [ar]
  • Ricest
  • Login
  • email