A
-
Abdollahi Azgomi, Mohammad
a computational model to evaluate the agent of influence operations in online social networks [Volume 12, Issue 1, 2024, Pages 89-107]
-
Abdollahi Azgomi, Mohammad
Formal Analysis of Security Vulnerabilities in OLSR Routing Protocol Using SPAN Tool [Volume 12, Issue 3, 2024, Pages 61-71]
-
Abedi, Omid
Sink mobility management in mobile sensor networks for
cluster-heads load balancing [Volume 12, Issue 2, 2024, Pages 53-66]
-
Abedi, Omid
Designing a Reactive Routing Protocol for Optimizing Channel Switching in Communication Networks [Volume 12, Issue 4, 2025, Pages 1-12]
-
Alaei, Mohammad
A Method for Energy and Delay Aware Routing in Wireless Multimedia Sensor Networks [Volume 12, Issue 3, 2024, Pages 49-59]
-
Alaei, Nasrin
Host-based Anomaly Malware Detection Using Deep Learning [Volume 12, Issue 4, 2025]
-
Alamdari, Mohammad Saeid
Introducing an efficient method to identify the noise pattern of helicopters based on the area feature vector and weighted sparse representation classification [Volume 12, Issue 1, 2024, Pages 33-42]
-
Arezumand, Hamid
Localization of ground emitters using LEO satellites in LER scenario based on combined TDOA-FDOA method [Volume 12, Issue 2, 2024, Pages 115-123]
-
Asadpour, Milad
Violent behavior detection in surveillance cameras using convolutional and memory neural networks [Volume 12, Issue 4, 2025]
-
Azmi, Paeize
Covert communication in the presence of untrusted relay [Volume 12, Issue 2, 2024, Pages 1-14]
B
-
Behnam, Mohammad Taghi
Detection of DNS based botnets using traffic analysis in IoT [Volume 12, Issue 3, 2024, Pages 1-13]
-
Bonyadi, Bahman
Localization of ground emitters using LEO satellites in LER scenario based on combined TDOA-FDOA method [Volume 12, Issue 2, 2024, Pages 115-123]
C
-
Chamanmotlagh,, A
Investigating the effect of pointing error for FSO link and evaluating its performance in the face of atmospheric phenomena [Volume 12, Issue 4, 2025]
D
-
Dadashtabar Ahmadi, Kourosh
DEKF-Driven Few-Shot Class Imbalance Learning to Enhance Cyber Attack Detection [Volume 12, Issue 3, 2024, Pages 119-137]
-
Davoudi, Mahdi
Introducing a decoy-state version of the high-dimensional
polarization-phase (PoP) quantum key distribution protocol and
explaining its implementation [Volume 12, Issue 2, 2024, Pages 99-107]
-
Dolat Khah, Ahmad
Violent behavior detection in surveillance cameras using convolutional and memory neural networks [Volume 12, Issue 4, 2025]
E
-
Ebrahimi, kowsar
Investigating the Impact of Environmental Data Changes on the Lifetime of Wireless Sensor Network [Volume 12, Issue 3, 2024, Pages 15-22]
-
Ebrahimi Kiasari, Mohammad Ebrahim
Survey and analysis of several secret sharing schemes based on interepulation methods [Volume 12, Issue 1, 2024, Pages 11-20]
-
Esfahani, Mahdi
Evaluation of Side-Channel Attacks for Different Types of Processors Vulnerabilities [Volume 12, Issue 3, 2024, Pages 101-118]
F
-
Fatemi, Masoud
Introducing an efficient method to identify the noise pattern of helicopters based on the area feature vector and weighted sparse representation classification [Volume 12, Issue 1, 2024, Pages 33-42]
-
Forouzesh, Moslem
Covert communication in the presence of untrusted relay [Volume 12, Issue 2, 2024, Pages 1-14]
G
-
Ganjalikhan Hakemi, MOHAMMAD
Image encryption using face biometric and metaheuristic algorithm over blockchain system [Volume 12, Issue 2, 2024, Pages 67-83]
-
Ghafouri Vayghan, Robabeh
Improving the Geo-LU routing algorithm by considering the lifetime of links in selecting the next hop toward the destination in VANETs [Volume 12, Issue 2, 2024, Pages 41-52]
-
GhannadanZadeh, Ahmad
Evaluation of Side-Channel Attacks for Different Types of Processors Vulnerabilities [Volume 12, Issue 3, 2024, Pages 101-118]
-
Ghazvini, Mahdieh
Sink mobility management in mobile sensor networks for
cluster-heads load balancing [Volume 12, Issue 2, 2024, Pages 53-66]
-
Ghazvini, Mahdieh
Designing a Reactive Routing Protocol for Optimizing Channel Switching in Communication Networks [Volume 12, Issue 4, 2025, Pages 1-12]
-
Ghezel Ayagh, Mohammad Hossein
Investigating the effect of pointing error for FSO link and evaluating its performance in the face of atmospheric phenomena [Volume 12, Issue 4, 2025]
-
Ghoveh Nodoushan, Azam
Improving the speed of the intrusion detection system performance by reducing the data volume using kernel-based DBSCAN [Volume 12, Issue 4, 2025]
H
-
Hadian Dehkordi, Massoud
Enhancing secret sharing security: A cheating detection approach based on inverse polynomial coefficients [Volume 12, Issue 2, 2024, Pages 109-114]
-
Hasani Ahangar, Mohammad
A Deep Neural Network-Based Information Retrieval Method for Complex Question-Answering Systems [Volume 12, Issue 1, 2024, Pages 1-11]
-
Hashempour, Raheb
Violent behavior detection in surveillance cameras using convolutional and memory neural networks [Volume 12, Issue 4, 2025]
-
Hassani, Hamid
Proposing framework for comparative evaluation of information security risk assessment methods
(Case of study: Iranian Research Institute for Information Science and Technology (IranDoc)) [Volume 12, Issue 2, 2024, Pages 27-39]
-
Hassanzadeh, Mohammadreza
Malware Classification Based On Visualizing Binary Content of Samples [Volume 12, Issue 3, 2024, Pages 35-47]
-
Havasi, Ali
Enhancing secret sharing security: A cheating detection approach based on inverse polynomial coefficients [Volume 12, Issue 2, 2024, Pages 109-114]
-
Hoseini, Seyyedhasan
The role of employee information security awareness in preventing social engineering Attacks
[Case example: Tehran Municipality employees] [Volume 12, Issue 3, 2024, Pages 25-34]
-
Hosseini, Hossein
Classification of nodes in citation graphs using graph neural networks [Volume 12, Issue 1, 2024, Pages 123-133]
J
-
Jalaei, Reza
Detection of DNS based botnets using traffic analysis in IoT [Volume 12, Issue 3, 2024, Pages 1-13]
-
Javadzade, Mohammad Ali
Classification of nodes in citation graphs using graph neural networks [Volume 12, Issue 1, 2024, Pages 123-133]
-
Jouyban, Morteza
Improving the Security of Cyber Networks Based on Community Detection Using Spectral Clustering Algorithm [Volume 12, Issue 1, 2024, Pages 77-87]
K
-
Karimi, Ali
Improving code smell detection accuracy based on gray wolf algorithm and majority voting [Volume 12, Issue 1, 2024, Pages 109-122]
-
Karimi, Ali
A method for software fault prediction with combination of chaos theory and herd horse optimization algorithm [Volume 12, Issue 4, 2025]
-
Keshavarzi, Mohammadreza
A Novel Secret Key Generation Scheme in the Presence of an Untrusted Relay [Volume 12, Issue 3, 2024, Pages 73-84]
-
Keyvanrad, Mohammad Ali
DEKF-Driven Few-Shot Class Imbalance Learning to Enhance Cyber Attack Detection [Volume 12, Issue 3, 2024, Pages 119-137]
-
Khazai, Esmail
Malware Classification Based On Visualizing Binary Content of Samples [Volume 12, Issue 3, 2024, Pages 35-47]
-
Khedmatgozar, Hamid Reza
Proposing framework for comparative evaluation of information security risk assessment methods
(Case of study: Iranian Research Institute for Information Science and Technology (IranDoc)) [Volume 12, Issue 2, 2024, Pages 27-39]
-
Kheyrandish, Mohammad
A Robust Quantum Audio Watermarking Using Synergy of Echo Hiding and Least Significant Bit Technique [Volume 12, Issue 1, 2024, Pages 59-76]
-
Khodadadi, Hamidreza
Investigating the effect of pointing error for FSO link and evaluating its performance in the face of atmospheric phenomena [Volume 12, Issue 4, 2025]
-
Khodadai, Hamidreza
Localization of ground emitters using LEO satellites in LER scenario based on combined TDOA-FDOA method [Volume 12, Issue 2, 2024, Pages 115-123]
-
Khosravi Farsani, MohammadReza
Improving code smell detection accuracy based on gray wolf algorithm and majority voting [Volume 12, Issue 1, 2024, Pages 109-122]
-
Khosravi Farsani, MohammadReza
A method for software fault prediction with combination of chaos theory and herd horse optimization algorithm [Volume 12, Issue 4, 2025]
-
Khouzestani, Leyla
Assessment of Desirability of Information Security and Cyber Network Indices in Ports with Emphasis on Passive Defense (Case Study: Imam Khomeini Port Complex) [Volume 12, Issue 4, 2025]
-
Koulivand, Khalil
Futuristic analysis of the components of the model for cyber threats in the Islamic Republic of Iran Army [Volume 12, Issue 4, 2025]
-
Kuhestani, Ali
A Novel Secret Key Generation Scheme in the Presence of an Untrusted Relay [Volume 12, Issue 3, 2024, Pages 73-84]
L
-
Lotfi nekoo, Mohammad Hossein
Improving the Geo-LU routing algorithm by considering the lifetime of links in selecting the next hop toward the destination in VANETs [Volume 12, Issue 2, 2024, Pages 41-52]
M
-
Maroofnezhad, Abbas
Assessment of Desirability of Information Security and Cyber Network Indices in Ports with Emphasis on Passive Defense (Case Study: Imam Khomeini Port Complex) [Volume 12, Issue 4, 2025]
-
Mehri Toonabi, Ali
Introducing a decoy-state version of the high-dimensional
polarization-phase (PoP) quantum key distribution protocol and
explaining its implementation [Volume 12, Issue 2, 2024, Pages 99-107]
-
Mir Qadri, Abdul Rasool
Survey and analysis of several secret sharing schemes based on interepulation methods [Volume 12, Issue 1, 2024, Pages 11-20]
-
Mirzaee, Meysam
Classification of nodes in citation graphs using graph neural networks [Volume 12, Issue 1, 2024, Pages 123-133]
-
Moghaddasi, Ali
Evaluation of Side-Channel Attacks for Different Types of Processors Vulnerabilities [Volume 12, Issue 3, 2024, Pages 101-118]
-
Mollazadeh, Mahdi
Evaluation of Side-Channel Attacks for Different Types of Processors Vulnerabilities [Volume 12, Issue 3, 2024, Pages 101-118]
-
Moradi, fatemeh
Sink mobility management in mobile sensor networks for
cluster-heads load balancing [Volume 12, Issue 2, 2024, Pages 53-66]
-
Mosleh, Mohammad
A Robust Quantum Audio Watermarking Using Synergy of Echo Hiding and Least Significant Bit Technique [Volume 12, Issue 1, 2024, Pages 59-76]
N
-
Naderi, Hassan
A Deep Neural Network-Based Information Retrieval Method for Complex Question-Answering Systems [Volume 12, Issue 1, 2024, Pages 1-11]
-
Naghash Asadi, Ali
Formal Analysis of Security Vulnerabilities in OLSR Routing Protocol Using SPAN Tool [Volume 12, Issue 3, 2024, Pages 61-71]
-
Nasiri, Mahdi
Improved implementation of image processing algorithm with HLS software for use in optical seeker [Volume 12, Issue 4, 2025, Pages 13-19]
P
-
Pakniat, Nasrollah
Survey and analysis of several secret sharing schemes based on interepulation methods [Volume 12, Issue 1, 2024, Pages 11-20]
R
-
Rayat Parvar, Hossein
A hybrid model based on CNN-LSTM for speech emotion reognition [Volume 12, Issue 4, 2025, Pages 21-25]
-
Rostami, MOHAMMADJAVAD
Image encryption using face biometric and metaheuristic algorithm over blockchain system [Volume 12, Issue 2, 2024, Pages 67-83]
S
-
Saleh, Fatat
DEKF-Driven Few-Shot Class Imbalance Learning to Enhance Cyber Attack Detection [Volume 12, Issue 3, 2024, Pages 119-137]
-
Sepehri, Mohammad
Futuristic analysis of the components of the model for cyber threats in the Islamic Republic of Iran Army [Volume 12, Issue 4, 2025]
-
Shahrezaei, Mohsen
Introducing an efficient method to identify the noise pattern of helicopters based on the area feature vector and weighted sparse representation classification [Volume 12, Issue 1, 2024, Pages 33-42]
-
Shahzadeh Fazeli, Seyed Abolfazl
Improving the speed of the intrusion detection system performance by reducing the data volume using kernel-based DBSCAN [Volume 12, Issue 4, 2025]
-
Soleimani, Hossein
Targeted Group Jamming Against Radar Systems [Volume 12, Issue 3, 2024, Pages 85-100]
-
Soleimani, Mohamamd
Targeted Group Jamming Against Radar Systems [Volume 12, Issue 3, 2024, Pages 85-100]
T
-
Tajari Siahmarzkooh, Aliakbar
Smart Home Intrusion Detection Model based on Principal
Component Analysis and Random Forest Classification [Volume 12, Issue 2, 2024, Pages 15-25]
-
Tajoddin, Asghar
Host-based Anomaly Malware Detection Using Deep Learning [Volume 12, Issue 4, 2025]
V
-
Velayatipour, Masoumeh
A Robust Quantum Audio Watermarking Using Synergy of Echo Hiding and Least Significant Bit Technique [Volume 12, Issue 1, 2024, Pages 59-76]
Y
-
Yari, MohammadReza
Covert communication in the presence of untrusted relay [Volume 12, Issue 2, 2024, Pages 1-14]
-
Yazdanpanah, Fahimeh
A Method for Energy and Delay Aware Routing in Wireless Multimedia Sensor Networks [Volume 12, Issue 3, 2024, Pages 49-59]
-
Yoosefi Nejad, Mohsen
A Robust Quantum Audio Watermarking Using Synergy of Echo Hiding and Least Significant Bit Technique [Volume 12, Issue 1, 2024, Pages 59-76]
-
Yousofvand, Mahdi
Improved implementation of image processing algorithm with HLS software for use in optical seeker [Volume 12, Issue 4, 2025, Pages 13-19]
Z
-
Zarepour-Ahmadabadi, Jamal
Investigating the Impact of Environmental Data Changes on the Lifetime of Wireless Sensor Network [Volume 12, Issue 3, 2024, Pages 15-22]
-
Zarepour-Ahmadabadi, Jamal
Improving the speed of the intrusion detection system performance by reducing the data volume using kernel-based DBSCAN [Volume 12, Issue 4, 2025]
Your query does not match with any item