A
-
Abdoli, Hatam
Reducing delay of InvBR-LWE PQC algorithm in limited-resources devices [Volume 13, Issue 1, 2025, Pages 131-143]
-
Abedi, Omid
A Two Level Architecture to increase Quality of Service in Vehicular Ad hoc Networks [Volume 13, Issue 1, 2025, Pages 1-15]
-
Arab Sorkhi, aboozar
Explanation of the Stratification Strategy of Various Threats in security and Cyber Defense of Knowledge-Based Organizations in the Country [Volume 13, Issue 1, 2025, Pages 95-116]
D
-
Daliri, A.
Providing a suitable method for estimating the millimeter wave channel using compact sensing [Volume 13, Issue 1, 2025, Pages 45-60]
F
-
Fathi Hafeshjani, kimars
Explanation of the Stratification Strategy of Various Threats in security and Cyber Defense of Knowledge-Based Organizations in the Country [Volume 13, Issue 1, 2025, Pages 95-116]
-
Fathi Nooran, Hanie
Analyzing the concept of cyber risk and its security coverage methods [Volume 13, Issue 1, 2025, Pages 29-43]
G
-
Ghazvini, Mahdieh
A Two Level Architecture to increase Quality of Service in Vehicular Ad hoc Networks [Volume 13, Issue 1, 2025, Pages 1-15]
-
Gholamnezhad, Pezhman
Detection of motorcycle helmets by traffic cameras in difficult situations using deep learning [Volume 13, Issue 1, 2025, Pages 83-94]
H
-
Hamzeh, Asma
Analyzing the concept of cyber risk and its security coverage methods [Volume 13, Issue 1, 2025, Pages 29-43]
K
-
Kalhor, Zahra
Analyzing the concept of cyber risk and its security coverage methods [Volume 13, Issue 1, 2025, Pages 29-43]
M
-
Mansoorizadeh, Muharram
Malware detection using federated learning and incremental learning [Volume 13, Issue 1, 2025, Pages 117-130]
-
Mehri Toonabi, Ali
Introducing a post-processing protocol for quantum key distribution (QKD) systems [Volume 13, Issue 1, 2025, Pages 61-72]
-
Mireh, Somayeh
Analyzing the concept of cyber risk and its security coverage methods [Volume 13, Issue 1, 2025, Pages 29-43]
-
Momeni, Samira
Introducing a post-processing protocol for quantum key distribution (QKD) systems [Volume 13, Issue 1, 2025, Pages 61-72]
R
-
RaeesDanaee, Meysam
Providing a suitable method for estimating the millimeter wave channel using compact sensing [Volume 13, Issue 1, 2025, Pages 45-60]
S
-
Shah Mansouri, Ashraf
Explanation of the Stratification Strategy of Various Threats in security and Cyber Defense of Knowledge-Based Organizations in the Country [Volume 13, Issue 1, 2025, Pages 95-116]
-
Shiri, Nader
Reducing delay of InvBR-LWE PQC algorithm in limited-resources devices [Volume 13, Issue 1, 2025, Pages 131-143]
-
Soleimani, H.
Providing a suitable method for estimating the millimeter wave channel using compact sensing [Volume 13, Issue 1, 2025, Pages 45-60]
-
Soleimanian Gharehchopogh, Farhad
An Improved Flow Direction Optimization Algorithm for Spam Email Detection [Volume 13, Issue 1, 2025, Pages 17-28]
T
-
Tayeb Masoud, Mahdi
Robust Physical Layer Security Using Frequency Diverse Array Directional Modulation [Volume 13, Issue 1, 2025, Pages 73-82]
Y
-
Yousef Sanati, Morteza
Malware detection using federated learning and incremental learning [Volume 13, Issue 1, 2025, Pages 117-130]
Your query does not match with any item