Author Index

A

  • Abdoli, Hatam Reducing delay of InvBR-LWE PQC algorithm in limited-resources devices [Volume 13, Issue 1, 2025, Pages 131-143]
  • Abedi, Omid A Two Level Architecture to increase Quality of Service in Vehicular Ad hoc Networks [Volume 13, Issue 1, 2025, Pages 1-15]
  • Arab Sorkhi, aboozar Explanation of the Stratification Strategy of Various Threats in security and Cyber Defense of Knowledge-Based Organizations in the Country [Volume 13, Issue 1, 2025, Pages 95-116]

D

  • Daliri, A. Providing a suitable method for estimating the millimeter wave channel using compact sensing [Volume 13, Issue 1, 2025, Pages 45-60]

F

  • Fathi Hafeshjani, kimars Explanation of the Stratification Strategy of Various Threats in security and Cyber Defense of Knowledge-Based Organizations in the Country [Volume 13, Issue 1, 2025, Pages 95-116]
  • Fathi Nooran, Hanie Analyzing the concept of cyber risk and its security coverage methods [Volume 13, Issue 1, 2025, Pages 29-43]

G

  • Ghazvini, Mahdieh A Two Level Architecture to increase Quality of Service in Vehicular Ad hoc Networks [Volume 13, Issue 1, 2025, Pages 1-15]
  • Gholamnezhad, Pezhman Detection of motorcycle helmets by traffic cameras in difficult situations using deep learning [Volume 13, Issue 1, 2025, Pages 83-94]

H

  • Hamzeh, Asma Analyzing the concept of cyber risk and its security coverage methods [Volume 13, Issue 1, 2025, Pages 29-43]

K

  • Kalhor, Zahra Analyzing the concept of cyber risk and its security coverage methods [Volume 13, Issue 1, 2025, Pages 29-43]

M

  • Mansoorizadeh, Muharram Malware detection using federated learning and incremental learning [Volume 13, Issue 1, 2025, Pages 117-130]
  • Mehri Toonabi, Ali Introducing a post-processing protocol for quantum key distribution (QKD) systems [Volume 13, Issue 1, 2025, Pages 61-72]
  • Mireh, Somayeh Analyzing the concept of cyber risk and its security coverage methods [Volume 13, Issue 1, 2025, Pages 29-43]
  • Momeni, Samira Introducing a post-processing protocol for quantum key distribution (QKD) systems [Volume 13, Issue 1, 2025, Pages 61-72]

R

  • RaeesDanaee, Meysam Providing a suitable method for estimating the millimeter wave channel using compact sensing [Volume 13, Issue 1, 2025, Pages 45-60]

S

  • Shah Mansouri, Ashraf Explanation of the Stratification Strategy of Various Threats in security and Cyber Defense of Knowledge-Based Organizations in the Country [Volume 13, Issue 1, 2025, Pages 95-116]
  • Shiri, Nader Reducing delay of InvBR-LWE PQC algorithm in limited-resources devices [Volume 13, Issue 1, 2025, Pages 131-143]
  • Soleimani, H. Providing a suitable method for estimating the millimeter wave channel using compact sensing [Volume 13, Issue 1, 2025, Pages 45-60]
  • Soleimanian Gharehchopogh, Farhad An Improved Flow Direction Optimization Algorithm for Spam Email Detection [Volume 13, Issue 1, 2025, Pages 17-28]

T

  • Tayeb Masoud, Mahdi Robust Physical Layer Security Using Frequency Diverse Array Directional Modulation [Volume 13, Issue 1, 2025, Pages 73-82]

Y

  • Yousef Sanati, Morteza Malware detection using federated learning and incremental learning [Volume 13, Issue 1, 2025, Pages 117-130]