•  English
    • Persian
    • English
  •   Login
  • Ferdowsi University of Mashhad
  • |
  • Information Center and Central Library
    • Persian
    • English
  • Home
  • Source Types
    • Journal Paper
    • Ebook
    • Conference Paper
    • Standard
    • Protocol
    • Thesis
  • Use Help
Search 
  •   FUM Digital Library
  • Search
  •   FUM Digital Library
  • Search
  • All Fields
  • Title
  • Author
  • Year
  • Publisher
  • Subject
  • Publication Title
  • ISSN
  • DOI
  • ISBN
Advanced Search
JavaScript is disabled for your browser. Some features of this site may not work without it.

Search

Show Advanced FiltersHide Advanced Filters

Filters

Use filters to refine the search results.

Now showing items 1-10 of 12

    • Relevance
    • Title Asc
    • Title Desc
    • Year Asc
    • Year Desc
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
  • Export
    • CSV
    • RIS
    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100

    Network Forensics: An Analysis of Techniques, Tools, and Trends 

    Type: Journal Paper
    Author : Hunt, Ray; Zeadally, Sherali
    Publisher: IEEE
    Year: 2012
    Request PDF

    Design and Performance Analysis of a Virtual Ring Architecture for Smart Grid Privacy 

    Type: Journal Paper
    Author : Badra, M.; Zeadally, Sherali
    Publisher: IEEE
    Year: 2014

    Cyberwar: The What, When, Why, and How [Commentary] 

    Type: Journal Paper
    Author : Zeadally, Sherali; Flowers, Angelyn
    Publisher: IEEE
    Year: 2014

    Multiple Account Identity Deception Detection in Social Media Using Nonverbal Behavior 

    Type: Journal Paper
    Author : Tsikerdekis, Michail; Zeadally, Sherali
    Publisher: IEEE
    Year: 2014

    Secure Mobile Payment Systems 

    Type: Journal Paper
    Author : Jesus Tellez Isaac; Zeadally Sherali
    Year: 2014
    Request PDF

    [Computer Communications and Networks] Next-Generation Wireless Technologies || Vehicular Ad-hoc Networks (VANETs): Architecture, Protocols and Applications 

    Type: Journal Paper
    Author : Chilamkurti, Naveen; Zeadally, Sherali; Chaouchi, Hakima
    Year: 2013
    Request PDF

    [Computer Communications and Networks] Next-Generation Wireless Technologies || Energy Efficient Routing in Wireless Sensor Networks 

    Type: Journal Paper
    Author : Chilamkurti, Naveen; Zeadally, Sherali; Chaouchi, Hakima
    Year: 2013
    Request PDF

    [Computer Communications and Networks] Next-Generation Wireless Technologies || Security in Emerging 4G Networks 

    Type: Journal Paper
    Author : Chilamkurti, Naveen; Zeadally, Sherali; Chaouchi, Hakima
    Year: 2013
    Request PDF

    Analyzing the security of Windows 7 and Linux for cloud computing 

    Type: Journal Paper
    Author : Salah, Khaled; Alcaraz Calero, Jose M.; Bernabé, Jorge Bernal; Marín Perez, Juan M.; Zeadally, Sherali
    Publisher: Elsevier Science
    Year: 2012
    Request PDF

    Using Cloud Computing to Implement a Security Overlay Network 

    Type: Journal Paper
    Author : Salah, Khaled; Alcaraz Calero, Jose Maria; Zeadally, Sherali; Almulla, Sameera; ZAaabi, Mohammed
    Publisher: IEEE
    Year: 2012
    Request PDF
    • 1
    • 2

    Author

    ... View More

    Publisher

    Year

    Keywords

    ... View More

    Type

    Language (ISO)

    Content Type

    Publication Title

    • About Us
    نرم افزار کتابخانه دیجیتال "دی اسپیس" فارسی شده توسط یابش برای کتابخانه های ایرانی | تماس با یابش
    DSpace software copyright © 2019-2022  DuraSpace