A new architecture for impact projection of cyber-attacks based on high level information fusion in cyber command and control

Volume 2, Issue 4, September 2020, Pages 1-14

Koroush Dadash Tabar Ahmadi; Ali Jabbar Rashidi; Mortaza Barari


An Improved Authentication Scheme with Conditional Privacy Preserving in VANETs

Volume 3, Issue 2, January 2020, Pages 1-12

Seyed Mortaza Pour Naghi; Mostafa Barmashoori; Mahmoud Ghardeshi


An Efficient Visual Multi-Secret Sharing Scheme

Volume 3, Issue 4, April 2020, Pages 1-9

Abdolrasoul Mirqadri; Fereshteh Sheikh


Introduction of the Entropy-Based Method for Finding Influential Nodes in Information Dissemination on Online Social Networks

Volume 6, Issue 2, July 2018, Pages 1-10

Majid Ghayoori Sales; Gholamreza Bazdar; Abolfazl Sarkardeh


Enhancing Vector Tracking Accuracy of GPS in Weak Signal Condition Based on Adaptive Strong Tracking Kalman Filter​

Volume 6, Issue 3, November 2018, Pages 1-12

Milad Anar Farhad; Seyyed Mohammad Reza Mousavi Mirkalaei; Ali Asghar Abedi


A Trust Model Based on Swarm Intelligence Algorithms in WSNs

Volume 7, Issue 1, July 2019, Pages 1-10

A. Khosravi; A. Karimi; M. A. Javadzade; M. J. Khosravi


Automatic Test Data Generation in File Format Fuzzers

Volume 8, Issue 1, June 2020, Pages 1-16

M. Z.akeri Nasrabadi; S. Parsa


Detecting Botnets with Timing-Based Covert Command and Control Channels

Volume 7, Issue 4, March 2020, Pages 1-15

R. Jalaei; M. R. Hasani Ahangar


P2P Botnet Detection Using Deep Learning Method

Volume 8, Issue 2, June 2020, Pages 1-14

M. Asadi; S. Parsa; M. A. Jabreil Jamali; V. Majidnezhad


Identifying Influential Nodes in Social Networks by Integrating the Centrality Method and Node Activity

Volume 8, Issue 3, November 2020, Pages 1-11

A. Karimi; E. Bastami; M. Nemati; M. Saleh Esfehani


Providing an Ontology-Based Method for Exploring the Association Rules in Multi-Agent Distributed Environments

Volume 9, Issue 1, April 2021, Pages 1-17

H. Saberi; M. R. Kangaavari; M. R. Hasani Ahangar


The Semantic Segmentation of Autonomous Vehicles Images with the Teacher-Student Technique

Volume 9, Issue 4, February 2022, Pages 1-19

Amir Khosravian; Masoud Masih-Tehrani; Abdollah Amirkhani


An Approach to Dependability Enhancement of Cache Memories

Volume 10, Issue 1, May 2022, Pages 1-10

Mahdieh Ghazvini; mohammadjavad shahnavazi; Behnam Ghavami


Steganalysis of Quantum Audio Signal using Quantum Support Vector Machine Algorithm

Volume 11, Issue 3, January 2024, Pages 1-14

Sanaz Norouzi Larki; Mohammad Mosleh; Mohammad Kheyrandish


a conceptual model for computational evaluation of influence operations in online social networks

Volume 11, Issue 4, March 2024, Pages 1-16

gholamreza bazdar; mohammad Abdollahi Azgomi


A Scheme for Improvement of Security and Privacy in Mobile Health Systems by Using SIM Card

Volume 7, Issue 1, July 2019, Pages 11-24

M. Mayabi Joghal; M. A. Doostari


ثبیب

Volume 1, Issue 2, January 2020


بلبلبل

Volume 2, Issue 1, September 2020


A New Metric for Estimation the User Position in the Multi User OFDMA Networks

Volume 2, Issue 3, February 2020, Pages 1-11

Mohsen Bahramian; Sroush Akhlaqi; Mahdi Mollazadeh Golmahalleh


A new approach in identifying malware with memory image analysis

Volume 3, Issue 1, November 2020, Pages 1-14

Masoumeh Aghaei Kheirabadi; Seyed Mohammad Reza Farshchi; Hossein Shirazi