Author Index

A

  • Abdollahi Azgomi, Mohammad a computational model to evaluate the agent of influence operations in online social networks [Volume 12, Issue 1, 2024, Pages 89-107]
  • Abdollahi Azgomi, Mohammad Formal Analysis of Security Vulnerabilities in OLSR Routing Protocol Using SPAN Tool [Volume 12, Issue 3, 2024, Pages 61-71]
  • Abedi, Omid Sink mobility management in mobile sensor networks for cluster-heads load balancing [Volume 12, Issue 2, 2024, Pages 53-66]
  • Abedi, Omid Designing a Reactive Routing Protocol for Optimizing Channel Switching in Communication Networks [Volume 12, Issue 4, 2025, Pages 1-12]
  • Alaei, Mohammad A Method for Energy and Delay Aware Routing in Wireless Multimedia Sensor Networks [Volume 12, Issue 3, 2024, Pages 49-59]
  • Alaei, Nasrin Host-based Anomaly Malware Detection Using Deep Learning [Volume 12, Issue 4, 2025]
  • Alamdari, Mohammad Saeid Introducing an efficient method to identify the noise pattern of helicopters based on the area feature vector and weighted sparse representation classification [Volume 12, Issue 1, 2024, Pages 33-42]
  • Arezumand, Hamid Localization of ground emitters using LEO satellites in LER scenario based on combined TDOA-FDOA method [Volume 12, Issue 2, 2024, Pages 115-123]
  • Asadpour, Milad Violent behavior detection in surveillance cameras using convolutional and memory neural networks [Volume 12, Issue 4, 2025]
  • Azmi, Paeize Covert communication in the presence of untrusted relay [Volume 12, Issue 2, 2024, Pages 1-14]

B

  • Behnam, Mohammad Taghi Detection of DNS based botnets using traffic analysis in IoT [Volume 12, Issue 3, 2024, Pages 1-13]
  • Bonyadi, Bahman Localization of ground emitters using LEO satellites in LER scenario based on combined TDOA-FDOA method [Volume 12, Issue 2, 2024, Pages 115-123]

C

  • Chamanmotlagh,, A Investigating the effect of pointing error for FSO link and evaluating its performance in the face of atmospheric phenomena [Volume 12, Issue 4, 2025]

D

  • Dadashtabar Ahmadi, Kourosh DEKF-Driven Few-Shot Class Imbalance Learning to Enhance Cyber Attack Detection [Volume 12, Issue 3, 2024, Pages 119-137]
  • Davoudi, Mahdi Introducing a decoy-state version of the high-dimensional polarization-phase (PoP) quantum key distribution protocol and explaining its implementation [Volume 12, Issue 2, 2024, Pages 99-107]
  • Dolat Khah, Ahmad Violent behavior detection in surveillance cameras using convolutional and memory neural networks [Volume 12, Issue 4, 2025]

E

  • Ebrahimi, kowsar Investigating the Impact of Environmental Data Changes on the Lifetime of Wireless Sensor Network [Volume 12, Issue 3, 2024, Pages 15-22]
  • Ebrahimi Kiasari, Mohammad Ebrahim Survey and analysis of several secret sharing schemes based on interepulation methods [Volume 12, Issue 1, 2024, Pages 11-20]
  • Esfahani, Mahdi Evaluation of Side-Channel Attacks for Different Types of Processors Vulnerabilities [Volume 12, Issue 3, 2024, Pages 101-118]

F

  • Fatemi, Masoud Introducing an efficient method to identify the noise pattern of helicopters based on the area feature vector and weighted sparse representation classification [Volume 12, Issue 1, 2024, Pages 33-42]
  • Forouzesh, Moslem Covert communication in the presence of untrusted relay [Volume 12, Issue 2, 2024, Pages 1-14]

G

  • Ganjalikhan Hakemi, MOHAMMAD Image encryption using face biometric and metaheuristic algorithm over blockchain system [Volume 12, Issue 2, 2024, Pages 67-83]
  • Ghafouri Vayghan, Robabeh Improving the Geo-LU routing algorithm by considering the lifetime of links in selecting the next hop toward the destination in VANETs [Volume 12, Issue 2, 2024, Pages 41-52]
  • GhannadanZadeh, Ahmad Evaluation of Side-Channel Attacks for Different Types of Processors Vulnerabilities [Volume 12, Issue 3, 2024, Pages 101-118]
  • Ghazvini, Mahdieh Sink mobility management in mobile sensor networks for cluster-heads load balancing [Volume 12, Issue 2, 2024, Pages 53-66]
  • Ghazvini, Mahdieh Designing a Reactive Routing Protocol for Optimizing Channel Switching in Communication Networks [Volume 12, Issue 4, 2025, Pages 1-12]
  • Ghezel Ayagh, Mohammad Hossein Investigating the effect of pointing error for FSO link and evaluating its performance in the face of atmospheric phenomena [Volume 12, Issue 4, 2025]
  • Ghoveh Nodoushan, Azam Improving the speed of the intrusion detection system performance by reducing the data volume using kernel-based DBSCAN [Volume 12, Issue 4, 2025]

H

  • Hadian Dehkordi, Massoud Enhancing secret sharing security: A cheating detection approach based on inverse polynomial coefficients [Volume 12, Issue 2, 2024, Pages 109-114]
  • Hasani Ahangar, Mohammad A Deep Neural Network-Based Information Retrieval Method for Complex Question-Answering Systems [Volume 12, Issue 1, 2024, Pages 1-11]
  • Hashempour, Raheb Violent behavior detection in surveillance cameras using convolutional and memory neural networks [Volume 12, Issue 4, 2025]
  • Hassani, Hamid Proposing framework for comparative evaluation of information security risk assessment methods (Case of study: Iranian Research Institute for Information Science and Technology (IranDoc)) [Volume 12, Issue 2, 2024, Pages 27-39]
  • Hassanzadeh, Mohammadreza Malware Classification Based On Visualizing Binary Content of Samples [Volume 12, Issue 3, 2024, Pages 35-47]
  • Havasi, Ali Enhancing secret sharing security: A cheating detection approach based on inverse polynomial coefficients [Volume 12, Issue 2, 2024, Pages 109-114]
  • Hoseini, Seyyedhasan The role of employee information security awareness in preventing social engineering Attacks [Case example: Tehran Municipality employees] [Volume 12, Issue 3, 2024, Pages 25-34]
  • Hosseini, Hossein Classification of nodes in citation graphs using graph neural networks [Volume 12, Issue 1, 2024, Pages 123-133]

J

  • Jalaei, Reza Detection of DNS based botnets using traffic analysis in IoT [Volume 12, Issue 3, 2024, Pages 1-13]
  • Javadzade, Mohammad Ali Classification of nodes in citation graphs using graph neural networks [Volume 12, Issue 1, 2024, Pages 123-133]
  • Jouyban, Morteza Improving the Security of Cyber Networks Based on Community Detection Using Spectral Clustering Algorithm [Volume 12, Issue 1, 2024, Pages 77-87]

K

  • Karimi, Ali Improving code smell detection accuracy based on gray wolf algorithm and majority voting [Volume 12, Issue 1, 2024, Pages 109-122]
  • Karimi, Ali A method for software fault prediction with combination of chaos theory and herd horse optimization algorithm [Volume 12, Issue 4, 2025]
  • Keshavarzi, Mohammadreza A Novel Secret Key Generation Scheme in the Presence of an Untrusted Relay [Volume 12, Issue 3, 2024, Pages 73-84]
  • Keyvanrad, Mohammad Ali DEKF-Driven Few-Shot Class Imbalance Learning to Enhance Cyber Attack Detection [Volume 12, Issue 3, 2024, Pages 119-137]
  • Khazai, Esmail Malware Classification Based On Visualizing Binary Content of Samples [Volume 12, Issue 3, 2024, Pages 35-47]
  • Khedmatgozar, Hamid Reza Proposing framework for comparative evaluation of information security risk assessment methods (Case of study: Iranian Research Institute for Information Science and Technology (IranDoc)) [Volume 12, Issue 2, 2024, Pages 27-39]
  • Kheyrandish, Mohammad A Robust Quantum Audio Watermarking Using Synergy of Echo Hiding and Least Significant Bit Technique [Volume 12, Issue 1, 2024, Pages 59-76]
  • Khodadadi, Hamidreza Investigating the effect of pointing error for FSO link and evaluating its performance in the face of atmospheric phenomena [Volume 12, Issue 4, 2025]
  • Khodadai, Hamidreza Localization of ground emitters using LEO satellites in LER scenario based on combined TDOA-FDOA method [Volume 12, Issue 2, 2024, Pages 115-123]
  • Khosravi Farsani, MohammadReza Improving code smell detection accuracy based on gray wolf algorithm and majority voting [Volume 12, Issue 1, 2024, Pages 109-122]
  • Khosravi Farsani, MohammadReza A method for software fault prediction with combination of chaos theory and herd horse optimization algorithm [Volume 12, Issue 4, 2025]
  • Khouzestani, Leyla Assessment of Desirability of Information Security and Cyber Network Indices in Ports with Emphasis on Passive Defense (Case Study: Imam Khomeini Port Complex) [Volume 12, Issue 4, 2025]
  • Koulivand, Khalil Futuristic analysis of the components of the model for cyber threats in the Islamic Republic of Iran Army [Volume 12, Issue 4, 2025]
  • Kuhestani, Ali A Novel Secret Key Generation Scheme in the Presence of an Untrusted Relay [Volume 12, Issue 3, 2024, Pages 73-84]

L

  • Lotfi nekoo, Mohammad Hossein Improving the Geo-LU routing algorithm by considering the lifetime of links in selecting the next hop toward the destination in VANETs [Volume 12, Issue 2, 2024, Pages 41-52]

M

  • Maroofnezhad, Abbas Assessment of Desirability of Information Security and Cyber Network Indices in Ports with Emphasis on Passive Defense (Case Study: Imam Khomeini Port Complex) [Volume 12, Issue 4, 2025]
  • Mehri Toonabi, Ali Introducing a decoy-state version of the high-dimensional polarization-phase (PoP) quantum key distribution protocol and explaining its implementation [Volume 12, Issue 2, 2024, Pages 99-107]
  • Mir Qadri, Abdul Rasool Survey and analysis of several secret sharing schemes based on interepulation methods [Volume 12, Issue 1, 2024, Pages 11-20]
  • Mirzaee, Meysam Classification of nodes in citation graphs using graph neural networks [Volume 12, Issue 1, 2024, Pages 123-133]
  • Moghaddasi, Ali Evaluation of Side-Channel Attacks for Different Types of Processors Vulnerabilities [Volume 12, Issue 3, 2024, Pages 101-118]
  • Mollazadeh, Mahdi Evaluation of Side-Channel Attacks for Different Types of Processors Vulnerabilities [Volume 12, Issue 3, 2024, Pages 101-118]
  • Moradi, fatemeh Sink mobility management in mobile sensor networks for cluster-heads load balancing [Volume 12, Issue 2, 2024, Pages 53-66]
  • Mosleh, Mohammad A Robust Quantum Audio Watermarking Using Synergy of Echo Hiding and Least Significant Bit Technique [Volume 12, Issue 1, 2024, Pages 59-76]

N

  • Naderi, Hassan A Deep Neural Network-Based Information Retrieval Method for Complex Question-Answering Systems [Volume 12, Issue 1, 2024, Pages 1-11]
  • Naghash Asadi, Ali Formal Analysis of Security Vulnerabilities in OLSR Routing Protocol Using SPAN Tool [Volume 12, Issue 3, 2024, Pages 61-71]
  • Nasiri, Mahdi Improved implementation of image processing algorithm with HLS software for use in optical seeker [Volume 12, Issue 4, 2025, Pages 13-19]

P

  • Pakniat, Nasrollah Survey and analysis of several secret sharing schemes based on interepulation methods [Volume 12, Issue 1, 2024, Pages 11-20]

R

  • Rayat Parvar, Hossein A hybrid model based on CNN-LSTM for speech emotion reognition [Volume 12, Issue 4, 2025, Pages 21-25]
  • Rostami, MOHAMMADJAVAD Image encryption using face biometric and metaheuristic algorithm over blockchain system [Volume 12, Issue 2, 2024, Pages 67-83]

S

  • Saleh, Fatat DEKF-Driven Few-Shot Class Imbalance Learning to Enhance Cyber Attack Detection [Volume 12, Issue 3, 2024, Pages 119-137]
  • Sepehri, Mohammad Futuristic analysis of the components of the model for cyber threats in the Islamic Republic of Iran Army [Volume 12, Issue 4, 2025]
  • Shahrezaei, Mohsen Introducing an efficient method to identify the noise pattern of helicopters based on the area feature vector and weighted sparse representation classification [Volume 12, Issue 1, 2024, Pages 33-42]
  • Shahzadeh Fazeli, Seyed Abolfazl Improving the speed of the intrusion detection system performance by reducing the data volume using kernel-based DBSCAN [Volume 12, Issue 4, 2025]
  • Soleimani, Hossein Targeted Group Jamming Against Radar Systems [Volume 12, Issue 3, 2024, Pages 85-100]
  • Soleimani, Mohamamd Targeted Group Jamming Against Radar Systems [Volume 12, Issue 3, 2024, Pages 85-100]

T

  • Tajari Siahmarzkooh, Aliakbar Smart Home Intrusion Detection Model based on Principal Component Analysis and Random Forest Classification [Volume 12, Issue 2, 2024, Pages 15-25]
  • Tajoddin, Asghar Host-based Anomaly Malware Detection Using Deep Learning [Volume 12, Issue 4, 2025]

V

  • Velayatipour, Masoumeh A Robust Quantum Audio Watermarking Using Synergy of Echo Hiding and Least Significant Bit Technique [Volume 12, Issue 1, 2024, Pages 59-76]

Y

  • Yari, MohammadReza Covert communication in the presence of untrusted relay [Volume 12, Issue 2, 2024, Pages 1-14]
  • Yazdanpanah, Fahimeh A Method for Energy and Delay Aware Routing in Wireless Multimedia Sensor Networks [Volume 12, Issue 3, 2024, Pages 49-59]
  • Yoosefi Nejad, Mohsen A Robust Quantum Audio Watermarking Using Synergy of Echo Hiding and Least Significant Bit Technique [Volume 12, Issue 1, 2024, Pages 59-76]
  • Yousofvand, Mahdi Improved implementation of image processing algorithm with HLS software for use in optical seeker [Volume 12, Issue 4, 2025, Pages 13-19]

Z

  • Zarepour-Ahmadabadi, Jamal Investigating the Impact of Environmental Data Changes on the Lifetime of Wireless Sensor Network [Volume 12, Issue 3, 2024, Pages 15-22]
  • Zarepour-Ahmadabadi, Jamal Improving the speed of the intrusion detection system performance by reducing the data volume using kernel-based DBSCAN [Volume 12, Issue 4, 2025]