Kalantari.Reza
A Survey on Computer Security Patterns and Proposing a New Perspective
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Kalantari.Reza
computer security models and proposing a new perspective: A review paper
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Keramati.Mohammad Ali
Anomaly and Intrusion Detection Through Data Mining and Feature Selection using PSO Algorithm
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Keramati.Mohammad Ali
Anomaly and Intrusion Detection through Datamining and Feature Selection using PSO Algorithm
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Keyhanipour.Amir Hosein
Survey on the Applications of the Graph Theory in the Information Retrieval
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Keyhanipour.Amir Hosein
Survey on the Applications of the Graph Theory in the Information Retrieval
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Khansari.Mohammad
Explanation of Standardization Role in the Proposed Solutions for Privacy Protection in Health Data
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Khansari.Mohammad
Explanation the role of standardization in the proposed solutions for privacy protection in health data
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Khosrozadeh.Ali
Community Detection in Bipartite Networks Using HellRank Centrality Measure
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]
Khosrozadeh.Ali
Community Detection in Bipartite Networks Using HellRank Centrality Measure
[
Vol.16,
Issue
59
,
60
- Spring - SummerYear
1403]