Author Index

A

  • Abadi, M. Trajectory Database Release with Differential Privacy Guarantee [Volume 9, Issue 1, 2021, Pages 29-42]
  • Abbasi, M. Reducing Interference Effect on GPS Navigation System Using Evolutionary Notch Filter [Volume 8, Issue 4, 2021, Pages 95-106]
  • Abbasi, Mahdi Sequential Forward Feature Selection for Intrusion Detection System, Using Ant Colony Algorithm [Volume 6, Issue 2, 2018, Pages 49-63]
  • Abbasi, Mahdi Speeding up the execution-time of Crystals-Kyber PQC Algorithm on FPGA [Volume 10, Issue 4, 2023, Pages 101-110]
  • Abbasi, Z. Multipartite Integral Circulant Graphs [Volume 8, Issue 3, 2020, Pages 167-170]
  • Abdoli, Hatam Speeding up the execution-time of Crystals-Kyber PQC Algorithm on FPGA [Volume 10, Issue 4, 2023, Pages 101-110]
  • Abdolkarimi, E. S. Improving INS/GPS Integration with Artificial Intelligence during GPS Outage [Volume 9, Issue 2, 2021, Pages 143-157]
  • Abdollahi, H. Introducing an OFDM-CDMA Hybrid Algorithm Based on the Multiple Access Technique to Improve Indoor Visible Light Communication Link [Volume 8, Issue 3, 2020, Pages 131-137]
  • Abdollahi, Rohollah The New Algorithm for The Blind Extraction of The Radio Frequency Fingerprint Using the Specific Features of High-Power Amplifier and Local Oscillator [Volume 11, Issue 1, 2023, Pages 57-65]
  • Abdollahi Azgomi, M. A Software System for Large-Scale Simulation of Malware Propagation in Computer Networks [Volume 7, Issue 2, 2019, Pages 53-67]
  • Abdollahi Azgomi, mohammad a conceptual model for computational evaluation of influence operations in online social networks [Volume 11, Issue 4, 2024, Pages 1-17]
  • Abdollahi Azgomi, Mohammad Malware Propagation Modeling Considering Software Diversity Approach in Weighted Scale-Free Network [Volume 6, Issue 3, 2018, Pages 131-140]
  • Abdollahi Azgomi, Mohammad A Trust Evaluation Model for Cloud Computing Using Bayesian Network [Volume 10, Issue 4, 2023, Pages 53-61]
  • Abdollahi Azgomi, Mohammad A Dynamic Metaheuristic Algorithm for Influence Maximization in Social Networks [Volume 11, Issue 2, 2023, Pages 57-69]
  • Abdolmaleki, Behzad Weaknesses of SPRS Authentication Protocol and Present a Developed Protocol for RFID Systems [Volume 3, Issue 3, 2020, Pages 39-48]
  • Abdolrazzagh Nejad, Majid Phishing Website Detection for e-Banking by Inclined Planes Optimization Algorithm [Volume 3, Issue 1, 2020, Pages 29-39]
  • Abedi, Ali Asghar Enhancing Vector Tracking Accuracy of GPS in Weak Signal Condition Based on Adaptive Strong Tracking Kalman Filter​ [Volume 6, Issue 3, 2018, Pages 1-12]
  • Aboei Mehrizi, M. Improvement of Rotational Cryptanalysis of Shabal and Cubehash Hash Functions [Volume 9, Issue 1, 2021, Pages 91-100]
  • Abrishamifar, A. Design and Simulation of a LORAN Signal Generator for LPS Transmitter Using Class I Amplifier [Volume 8, Issue 2, 2020, Pages 25-33]
  • Adibnia, F. Collusive Fraud Classification in Network of Online Auction Using Similarity Measure in Collective Classification [Volume 7, Issue 1, 2019, Pages 95-103]
  • Adibnia, F. Secure and confidential workflow scheduling in hybrid cloud using improved particle swarm optimization algorithm [Volume 7, Issue 4, 2020, Pages 131-145]
  • Adib Nia, Fazlollah A new approach for static detection of security vulnerabilities in web applications [Volume 2, Issue 4, 2020, Pages 65-74]
  • Afifi, A. Design and Simulation of a LORAN Signal Generator for LPS Transmitter Using Class I Amplifier [Volume 8, Issue 2, 2020, Pages 25-33]
  • Afifi, A. Reliability Analysis of Open-Loop Switching Loran Signal Generator Using Omoe Indicator [Volume 8, Issue 2, 2020, Pages 83-93]
  • Aghaei, Mohammad Reza Performance Analysis of Hybrid FSO/RF Systems Using the ℳ Distribution and Markov Function [Volume 10, Issue 2, 2022, Pages 1-10]
  • Aghaei Kheirabadi, Masoumeh A new approach in identifying malware with memory image analysis [Volume 3, Issue 1, 2020, Pages 1-14]
  • Aghanis, A. Generalized Version of the BB84 QKD Protocol with n Polarization Bases and Unequal Probabilities [Volume 9, Issue 1, 2021, Pages 125-136]
  • Aghazadeh, T. Design and Simulation of a LORAN Signal Generator for LPS Transmitter Using Class I Amplifier [Volume 8, Issue 2, 2020, Pages 25-33]
  • Ahmadian, Mortaza Blind Estimation of Number of Users in TDMA Networks Using Redundancy of Adaptive Channel Coding [Volume 6, Issue 2, 2018, Pages 11-20]
  • Ahmadian Yazdi, H. Introducing an Optimal Modulation Constellation, Resistant to Atmospheric Turbulence [Volume 8, Issue 2, 2020, Pages 115-124]
  • Ahmadian Yazdi, Hamed Blind Frequency Offset Estimation using Adaptive Algorithms in Non-Coherent OFDM Systems [Volume 3, Issue 4, 2020, Pages 61-70]
  • Ahrari, M. J. A Fault Tolerant Task Scheduling Method for Optimal use of Resources in Cloud Computing Environment [Volume 8, Issue 2, 2020, Pages 95-103]
  • Akbari, Davood Providing a Method for the Optimal Detection of Software Testing Paths Using Meta-Algorithms [Volume 6, Issue 4, 2019, Pages 13-22]
  • Akbari, H. The Distributed Denial of Service Attacks Situation Awareness Based on The Prediction of Battle Scene Using Dempster-Shefer Evidences Theories and Bayesian Rules [Volume 7, Issue 1, 2019, Pages 77-94]
  • Akbari, H. Improvement in the Ransomwares Detection Method With New API Calls Features [Volume 8, Issue 4, 2021, Pages 107-118]
  • Akbarian, Hassan Robust Steganography Algorithm Text in the Image Using A Spread Spectrum Method [Volume 2, Issue 3, 2020, Pages 77-83]
  • Akhaei, M. A. Steganography on raw video based on proper detection and compromise between the parameters of transparency, resistance and capacity [Volume 8, Issue 1, 2020, Pages 51-65]
  • Akhlaghi, S. Joint Optimization of User Association, Subchannel Allocation and Power Allocation in OFDMA Heterogeneous Networks [Volume 8, Issue 3, 2020, Pages 117-129]
  • Akhlaqi, Sroush A New Metric for Estimation the User Position in the Multi User OFDMA Networks [Volume 2, Issue 3, 2020, Pages 1-11]
  • Akramizade, A. Deterrence Model in Cyberspace Based on Bayesian Belief Attack Graph by using Risk Creating Payoff Function [Volume 7, Issue 1, 2019, Pages 25-38]
  • Akramizadeh, Ali A Decision-Making Model in a Cyber Conflicts Acted Upon Vulnerability, Based on Game Theoretic Analysis [Volume 6, Issue 2, 2018, Pages 21-28]
  • Alaei, M. A Heuristic Data Diffusion and Gathering Scheme Using Virtual Line for Wireless Sensor Networks with Mobile Sink [Volume 9, Issue 2, 2021, Pages 195-207]
  • Alamdari, Mohammad Saeid Applying weighted smoothed norm in sparse representation classification for face recognition [Volume 11, Issue 3, 2024, Pages 57-65]
  • Alavi, S. M. Coherent Acoustic source DOA estimation by nested array based on sparse solution [Volume 8, Issue 1, 2020, Pages 79-88]
  • Alemi, H. A New Method for Blind Recognition of the Initial State of Synchronous Scramblers When Located after the Channel Encoder [Volume 9, Issue 1, 2021, Pages 19-27]
  • Alidoust Nia, Mehran Designing Anonymous Communication System by Lattice-Based Cryptography [Volume 2, Issue 3, 2020, Pages 13-22]
  • Alikhani, S. Finite Frame as Code: Some Characterizations for Error Correction Codes and Three Algorithms for Troubleshooting in Data Transfer [Volume 7, Issue 2, 2019, Pages 1-12]
  • Alimohammady, H. A Novel Algorithm for Radar Jamming Resource Allocation [Volume 7, Issue 3, 2019, Pages 53-70]
  • Alizadeh, Habib Detection of Interfering Signals and Estimation of Their Carrier Frequency in CNC Satellite Communications using Cyclic Spectrum Density [Volume 11, Issue 2, 2023, Pages 91-101]
  • Alizadeh, J. Upper Bounds for the Probability of Differential Characteristics of Five Block Cipher Constructions Functions [Volume 8, Issue 4, 2021, Pages 129-137]
  • Alizadeh, J. Improvement of Rotational Cryptanalysis of Shabal and Cubehash Hash Functions [Volume 9, Issue 1, 2021, Pages 91-100]
  • Amanipour, V. Detection of Median Filtering Manipulation in Compressed Images [Volume 7, Issue 3, 2019, Pages 121-129]
  • Amin, A. R. Reliability Analysis of Open-Loop Switching Loran Signal Generator Using Omoe Indicator [Volume 8, Issue 2, 2020, Pages 83-93]
  • Amin davar, Hamid reza The New Algorithm for The Blind Extraction of The Radio Frequency Fingerprint Using the Specific Features of High-Power Amplifier and Local Oscillator [Volume 11, Issue 1, 2023, Pages 57-65]
  • Amini Rad, Roya Improving the Quality of Millimeter Wave Images by Fusion with Visible Images [Volume 9, Issue 4, 2022, Pages 77-86]
  • Amin-Tahmasbi, H. Effects of Cyber Threats in IT Projects Using the Fuzzy Cognitive Mapping Approach [Volume 7, Issue 2, 2019, Pages 41-51]
  • Amiri, H. Coherent Acoustic source DOA estimation by nested array based on sparse solution [Volume 8, Issue 1, 2020, Pages 79-88]
  • Amiri, Rouhollah Relating the Detection Rate, Capacity and the Cost of Steganography by Steganographer Modeling [Volume 6, Issue 3, 2018, Pages 81-94]
  • Amirkhani, Abdollah The Semantic Segmentation of Autonomous Vehicles Images with the Teacher-Student Technique [Volume 9, Issue 4, 2022, Pages 1-19]
  • Amirkhani, Abdollah Detection of Slippery Road Conditions using the Road CCTV Images based on the Convolutional Neural Networks and Transfer Learning [Volume 10, Issue 2, 2022, Pages 105-116]
  • Amirkhani, Zahra Increasing the Accuracy of Locating in Wireless Communication Systems Based on Neural Networks [Volume 3, Issue 3, 2020, Pages 31-38]
  • Anarfarhad, Milad Evaluation and proof of routing algorithm in Tor anonymity network [Volume 11, Issue 3, 2024, Pages 15-24]
  • Anar Farhad, Milad Enhancing Vector Tracking Accuracy of GPS in Weak Signal Condition Based on Adaptive Strong Tracking Kalman Filter​ [Volume 6, Issue 3, 2018, Pages 1-12]
  • Aref, Mohammad Reza A New (t,n) Designated Verifier Threshold Proxy Signature Scheme in the Standard Model [Volume 2, Issue 1, 2020, Pages 25-35]
  • Aref, M. R. Information Theoretic Secret Key Agreement Based on Localization [Volume 8, Issue 2, 2020, Pages 35-49]
  • Arefi Nejad, S. M. A New Scheduling Algorithm to Reduce Computation Time in Hadoop Environment [Volume 8, Issue 2, 2020, Pages 51-59]
  • Asadi, M. P2P Botnet Detection Using Deep Learning Method [Volume 8, Issue 2, 2020, Pages 1-14]
  • Asadi, M. Comparison of Supervised Machine Learning Algorithms in Detection of Botnets Domain Generation Algorithms [Volume 8, Issue 4, 2021, Pages 17-29]
  • Asadi, M. Detecting of Botnets’ Malicious Domains with Deep Autoencoder Neural Network [Volume 9, Issue 1, 2021, Pages 61-74]
  • Asadzadeh, A. Coherent Acoustic source DOA estimation by nested array based on sparse solution [Volume 8, Issue 1, 2020, Pages 79-88]
  • Asgarirad, M. R. A Techno-Economic Model of Sustainable Communication Infrastructure in the Smart City; using WDM-PON FTTx [Volume 9, Issue 1, 2021, Pages 149-156]
  • Asgari Tabatabaee, Seyyed Mohammad Javad Improving security of wireless telecommunication networks based on covert communication in presence of a controlled noise using multiple beamforming [Volume 10, Issue 1, 2022, Pages 11-19]
  • Asgari Tabatabaei, S. M. The Analysis and Design of Secure Wireless Networks in the Presence of Users with Different Security Needs Based on Covert Communication and Secure Transmission of Information Theory in the Presence of a Friendly Jammer [Volume 9, Issue 4, 2022, Pages 67-76]
  • Asgharpour Haji Kazem, Ali Bayesian Networks Based Trust Model in Social Networks [Volume 6, Issue 2, 2018, Pages 29-38]
  • Asghar pour Salkuyeh, Mostafa Optimization of Site Topologies and Delay Extraction in Radar Emitter Location [Volume 2, Issue 2, 2020, Pages 41-51]
  • Ashoorian, Mohsen Fast Detection of Vehicle Type and Position in Images Based on Deep Neural Network [Volume 10, Issue 2, 2022, Pages 117-127]
  • Ataee, M. A. Frequency Spectrum Sensing by Multi-Stage Adaptive Optimization Algorithm with the Efficient Non-Cooperative Technique in Cognitive radios with hardware implementation [Volume 8, Issue 3, 2020, Pages 39-51]
  • Ataei Khabbaz, H. Network Intrusion Detection using a combination of artificial neural networks in a hierarchical manner [Volume 8, Issue 1, 2020, Pages 89-99]
  • Aynehband, Meghdad Presentation of a model for feasibility assessment of implementing the IoT social network projects using the existing public social networks as the infrastructure [Volume 10, Issue 1, 2022, Pages 73-84]
  • Azarang, Fatemeh Improving security of wireless telecommunication networks based on covert communication in presence of a controlled noise using multiple beamforming [Volume 10, Issue 1, 2022, Pages 11-19]
  • Azizi, M. Design secure two party protocol based on expanded cut and choose bilateral oblivious transfer [Volume 9, Issue 3, 2021, Pages 21-37]
  • Azmi, Reza Botnet Detection for Peer to Peer Networks [Volume 3, Issue 4, 2020, Pages 43-60]

B

  • Babaei, M. The Presentation of a Model for Analyzing the Behavior of the Enemy Using Hidden Markov Models Based on Electronic Warfare Observations in Complex War Scenes [Volume 7, Issue 1, 2019, Pages 113-128]
  • Babaei, Morteza Detection of Interfering Signals and Estimation of Their Carrier Frequency in CNC Satellite Communications using Cyclic Spectrum Density [Volume 11, Issue 2, 2023, Pages 91-101]
  • Babaei, Morteza Semi-Blind Separation of Multiple Synchronous Wideband Frequency Hopping Signals Using a Band-Limited Receiver and Space-Time- Frequency Distributions [Volume 11, Issue 4, 2024]
  • Baei, Pooya The Analysis and Design of Secure Wireless Networks in the Presence of Users with Different Security Needs Based on Covert Communication and Secure Transmission of Information Theory in the Presence of a Friendly Jammer [Volume 9, Issue 4, 2022, Pages 67-76]
  • Baei, Pooya Security of UAV Relay Networks based on Covert Communication in the Presence of an Eavesdropping UAV [Volume 11, Issue 2, 2023, Pages 45-56]
  • Bagheri, F. Malicious Domain Detection using DNS Records [Volume 9, Issue 3, 2021, Pages 83-97]
  • Bagheri, H. Side Channel Analysis of International Data Encryption Algorithm (IDEA) [Volume 7, Issue 4, 2020, Pages 51-57]
  • Bagheri, Karim Weaknesses of SPRS Authentication Protocol and Present a Developed Protocol for RFID Systems [Volume 3, Issue 3, 2020, Pages 39-48]
  • Bagheri, M. Automatic XSS Exploit Generation Using Grammatical Evolution [Volume 9, Issue 2, 2021, Pages 101-119]
  • Bagheri, Masood Evaluating Deep Learning Models for Test Data Generation In File Based Fuzzers [Volume 10, Issue 2, 2022, Pages 57-73]
  • Bagheri, Masoud Design the Model of CSRF Attack Tree for Immunization the Web Application in Development Process [Volume 3, Issue 1, 2020, Pages 41-52]
  • Bagheri, Masoud A Decision-Making Model in a Cyber Conflicts Acted Upon Vulnerability, Based on Game Theoretic Analysis [Volume 6, Issue 2, 2018, Pages 21-28]
  • Bahramgiri, H. Introduction of An Anti-Collision Protocol in RFID Systems [Volume 8, Issue 4, 2021, Pages 119-128]
  • Bahramgiri, Hossein A New Hybrid Approach for Traffic Identification and Classification in Wireless Networks [Volume 10, Issue 2, 2022, Pages 31-41]
  • Bahramian, Mohsen A New Metric for Estimation the User Position in the Multi User OFDMA Networks [Volume 2, Issue 3, 2020, Pages 1-11]
  • Bakhshesh, Davood k-Adjacency Domination in Graphs [Volume 9, Issue 3, 2021, Pages 125-131]
  • Bakhshesh, Davood A Greedy Algorithm for Constructing Region-Fault Tolerant Geometric Spanners [Volume 10, Issue 4, 2023, Pages 75-80]
  • Bakhtiyari, K. Structural Analysis based on Integral Characteristic of a Reduced Round Block Cipher with Making an Improvement [Volume 7, Issue 3, 2019, Pages 1-8]
  • Balochian, S. Modelling and optimal solving of dependent sensor-weapon/threat assignment and scheduling problem by a metaheuristic algorithm based on GRASP [Volume 8, Issue 1, 2020, Pages 35-50]
  • Baloochian, Saeed Modelling and Solving the Location Problem of Fire Launching Sites [Volume 6, Issue 3, 2018, Pages 45-57]
  • Banihashemi, S. M. Presentation and Performance Evaluation of an Efficient Algorithm for a Distributed Controller in SDN [Volume 9, Issue 1, 2021, Pages 175-183]
  • Banitalebi dehkordi, A. Distributed Denial of Service Attacks Detection in Software Defined Networks [Volume 9, Issue 1, 2021, Pages 43-59]
  • Barari, Mortaza A new architecture for impact projection of cyber-attacks based on high level information fusion in cyber command and control [Volume 2, Issue 4, 2020, Pages 1-14]
  • Baratian, Maryam Physical Layer Security with the Aid of Compressive Sensing in the Presence of Non-Ideal Relays by Removing the Effect of Hardware Impairments by Providing an Iterative Method [Volume 11, Issue 4, 2024]
  • Barekatain, B. Transparent and Robust Audio Watermarking Using Synergy LU Decomposition and the Fibonacci Sequence in GBT-DCT-DWT Transforms [Volume 9, Issue 1, 2021, Pages 101-113]
  • Barmashoori, Mostafa An Improved Authentication Scheme with Conditional Privacy Preserving in VANETs [Volume 3, Issue 2, 2020, Pages 1-12]
  • Barzegar, Majid Identify the Factors Affecting the Culture and Awareness of Cyber Security Using Theme Analysis [Volume 11, Issue 1, 2023, Pages 67-80]
  • Bastami, E. Identifying Influential Nodes in Social Networks by Integrating the Centrality Method and Node Activity [Volume 8, Issue 3, 2020, Pages 1-11]
  • Bastami, Esmaeil A model for feature selection in software fault prediction based on memetic algorithm and fuzzy logic [Volume 9, Issue 3, 2021, Pages 143-163]
  • Bastami, Esmaeil Feature selection using a combination of Genetic-Whale-Ant colony algorithms for software fault prediction by machine learning [Volume 10, Issue 1, 2022, Pages 33-45]
  • Bastami, Esmaeil A Malware Classification Method Using visualization and Word Embedding Features [Volume 11, Issue 1, 2023, Pages 1-13]
  • Bastami, Sajad Motion-encoded Gravitational Search Algorithm for moving target search using UAVs [Volume 10, Issue 4, 2023, Pages 63-73]
  • Bayat, M. A Novel and Secure Model for Sharing Protected Health Record (PHR) Based on Blockchain and Attribute Based Encryption [Volume 8, Issue 1, 2020, Pages 101-124]
  • Bayat, M. A secure three factor authentication scheme for wireless healthcare sensor networks based on elliptic curve [Volume 8, Issue 1, 2020, Pages 147-167]
  • Bayat, M. Introducing an OFDM-CDMA Hybrid Algorithm Based on the Multiple Access Technique to Improve Indoor Visible Light Communication Link [Volume 8, Issue 3, 2020, Pages 131-137]
  • Bayat, M. Design a Blockchain based Electronic Payment with Users’ Anonymity [Volume 9, Issue 2, 2021, Pages 85-100]
  • Bayat, meysam Interference Mitigation in Cognitive Radio Communication Systems Based on the Wavelet Transform [Volume 9, Issue 4, 2022, Pages 55-66]
  • Bayat, Meysam A Combined Improved Algorithm to Estimating The delay of Sky waves In Loran c Receiver [Volume 2, Issue 4, 2020, Pages 55-63]
  • Bayat-Sarmadi, S. Side-Channel Attack Resistance Approaches Through Dynamic Differential Logic [Volume 7, Issue 3, 2019, Pages 93-104]
  • Baypour, Hamideh A Hash-Based Multi-Use Multi-Stage Secret Sharing Scheme with General Access Structure [Volume 6, Issue 3, 2018, Pages 107-115]
  • Bazdar, Gholamreza Introduction of the Entropy-Based Method for Finding Influential Nodes in Information Dissemination on Online Social Networks [Volume 6, Issue 2, 2018, Pages 1-10]
  • Bazooband, Maryam A New Hybrid Approach for Traffic Identification and Classification in Wireless Networks [Volume 10, Issue 2, 2022, Pages 31-41]
  • Beheshti Atashgah, Mohammad A New (t,n) Designated Verifier Threshold Proxy Signature Scheme in the Standard Model [Volume 2, Issue 1, 2020, Pages 25-35]
  • Beikpoori, M. S. Development of the Concept of Deterrence Theory in the Country's Cyberspace Based on Upstream Documents and Available Approaches [Volume 8, Issue 4, 2021, Pages 161-173]
  • Bejani, Sadegh Sequential Forward Feature Selection for Intrusion Detection System, Using Ant Colony Algorithm [Volume 6, Issue 2, 2018, Pages 49-63]
  • Bejani, Sadegh A novel way to identify effective test-case in software testing [Volume 11, Issue 2, 2023, Pages 103-116]
  • Bejani, Sadeq Providing a Method for the Optimal Detection of Software Testing Paths Using Meta-Algorithms [Volume 6, Issue 4, 2019, Pages 13-22]
  • Bigdeli, Hamid An Optimized Compound Deep Neural Network Integrating With Feature Selection for Intrusion Detection System in Cyber Attacks [Volume 10, Issue 4, 2023, Pages 41-51]
  • Binesh Marvasti, Mohammadreza Providing an Improved Unmanned Aerial Vehicle Detection System to Increase Detection speed Using Deep Learning [Volume 11, Issue 1, 2023, Pages 81-96]
  • Bohlooli, A. An Accelerated Method for Rules Anomaly Detection in Software Defined Networks [Volume 8, Issue 4, 2021, Pages 31-39]
  • Borumand Saied, A. Structure of code-based hypergraphs and their application in wireless sensor networks [Volume 7, Issue 4, 2020, Pages 17-26]

C

  • Chaharlang, J. Proposing a New and Comprehensive Method for Quantum Representation of Digital Audio Signals [Volume 8, Issue 4, 2021, Pages 139-152]
  • Chamanmotlagh, Abolfazl Performance Analysis of Hybrid FSO/RF Systems Using the ℳ Distribution and Markov Function [Volume 10, Issue 2, 2022, Pages 1-10]
  • Chaman Motlaq, Abolfazl Simulation the modify FSM , in autotracking systems to Stabilization secure links of free space optical communications [Volume 2, Issue 1, 2020, Pages 61-69]
  • Chaman Motlaq, Abolfazl Design and Implementation of a Physically Unclonable Function on FPGA [Volume 6, Issue 4, 2019, Pages 23-32]
  • Charoghchi, Sara A novel lossless color secret image sharing based on homogeneous linear recursion [Volume 10, Issue 3, 2023, Pages 107-118]
  • Cheraghi Chaleshtari, Abbas Some New Bounds on the Information Ratio of the Cartesian Product of Some Classes of Graphs [Volume 6, Issue 4, 2019, Pages 135-142]

D

  • Dadashtabar Ahmadi, Koroosh Detection of advanced Cyber Attacks, Using Behavior Modeling Based on Natural Language Processing [Volume 6, Issue 3, 2018, Pages 141-151]
  • Dadashtabar Ahmadi, Koroosh Projection of Cyber Attacks using Damage Estimation and Combination of Attacker’s Capability and Opportunity based on Transferable Belief Model [Volume 6, Issue 4, 2019, Pages 1-12]
  • Dadashtabar Ahmadi, Kourosh Projection of Muli Stage Cyber Attack Based on Belief Model and Fuzzy Inference [Volume 3, Issue 2, 2020, Pages 13-28]
  • Dadashtabar Ahmadi, Kourosh The Presentation of an Active Cyber Defense Model for Application in Cyber Deception Technology [Volume 9, Issue 4, 2022, Pages 125-140]
  • Dadashtabar Ahmadi, Kourosh A cooperative and independent deception system in the active cyber defense system [Volume 10, Issue 2, 2022, Pages 129-142]
  • Dadashtabar Ahmadi, Kourosh Improve the detection of dangerous objects in x-ray images in security and military inspections using image processing approaches [Volume 10, Issue 4, 2023, Pages 81-89]
  • Dadashtabar Ahmadi, Kourosh Improving the performance of the convolutional neural network using incremental weight loss function to deal with class imbalanced data [Volume 11, Issue 4, 2024, Pages 19-34]
  • Dadash Tabar Ahmadi, Koroush A new architecture for impact projection of cyber-attacks based on high level information fusion in cyber command and control [Volume 2, Issue 4, 2020, Pages 1-14]
  • Dadfarnia, M. Collusive Fraud Classification in Network of Online Auction Using Similarity Measure in Collective Classification [Volume 7, Issue 1, 2019, Pages 95-103]
  • Davoudi Darareh, M. A New Approach for Estimating the Rate of Emission in Quantum Bit Exchange‏ ‎Systems ‎Using Binomial Distribution [Volume 7, Issue 1, 2019, Pages 105-112]
  • Dehgan, A. A Practical Template Attack Against the Implementation of the Advanced Encryption Standard on ARM Processor [Volume 7, Issue 1, 2019, Pages 39-48]
  • Dehghan, A. Design and Production of Hardware Authentication Code Using Physically Unclonable Functions and a Random Number Generator on FPGA [Volume 7, Issue 4, 2020, Pages 37-50]
  • Dehghani, H. Intra-pulse Modulation Recognition Using Time-Frequency Features Based on Modified-B Distribution [Volume 7, Issue 1, 2019, Pages 129-138]
  • Dehghani, Hamid سیی [Volume 1, Issue 1, 1392]
  • Dehghani, M. Modeling of cyber-attacks obfuscation based on the attack analogous to the technique of insertion attacks [Volume 7, Issue 4, 2020, Pages 91-103]
  • Dehghani, M. Modeling of cyber-attacks obfuscation, based on alteration technique of attack [Volume 8, Issue 1, 2020, Pages 67-77]
  • Dehghanian, Y. Fuzzy Keyword Search Scheme on an Encrypted Database in Cloud Computing Using Word Clustering [Volume 8, Issue 3, 2020, Pages 151-165]
  • Dehghan Menshadi, Ali A New And Efficient Method of Mass Masking and its Resistance Assessment to Power Analysis [Volume 6, Issue 2, 2018, Pages 123-134]
  • Dehqani, Mahdi Simulation and Evaluation of Jitter and Packet Loss Noises Influence on Covert Timing Channel Performance [Volume 2, Issue 3, 2020, Pages 35-49]
  • Dehqan Menshadi, Ali Design and Implementation of a Physically Unclonable Function on FPGA [Volume 6, Issue 4, 2019, Pages 23-32]
  • Deldar, F. Trajectory Database Release with Differential Privacy Guarantee [Volume 9, Issue 1, 2021, Pages 29-42]
  • Deypir, Mahmood Developing an Improved Method for Malware Attack Detection in Cloud Computing using Ensemble Learning [Volume 10, Issue 4, 2023, Pages 33-39]
  • Deypir, Mahmood Presenting A Method Based on Nearest Neighbors and Hamming Distance in Order to Identify Malicious Applications [Volume 11, Issue 2, 2023, Pages 81-90]
  • Doostari, M. A. A Scheme for Improvement of Security and Privacy in Mobile Health Systems by Using SIM Card [Volume 7, Issue 1, 2019, Pages 11-24]
  • Doustimotlagh, N. Generalized Version of the BB84 QKD Protocol with n Polarization Bases and Unequal Probabilities [Volume 9, Issue 1, 2021, Pages 125-136]
  • Doustimotlagh, S. N. A New Mechanism for Enhancing the Security of Military Internet of Things by Using Quantum and Classic Cryptography [Volume 9, Issue 2, 2021, Pages 29-49]

E

  • Ebrahimi, A. Improving INS/GPS Integration with Artificial Intelligence during GPS Outage [Volume 9, Issue 2, 2021, Pages 143-157]
  • Ebrahimi Atani, Reza Designing Anonymous Communication System by Lattice-Based Cryptography [Volume 2, Issue 3, 2020, Pages 13-22]
  • Ebrahimi Atani, Reza Utilizing Port-Knocking as first defensive layer at defense-in-depth strategies using hybrid of the Internet Control Message Protocol features, Internet Addresses and Tunneling [Volume 2, Issue 4, 2020, Pages 25-40]
  • Ebrahimi Dishabi, Mohammad Reza A Trust Evaluation Model for Cloud Computing Using Bayesian Network [Volume 10, Issue 4, 2023, Pages 53-61]
  • Ebrahimi Dishabi, Mohammad Reza A Dynamic Metaheuristic Algorithm for Influence Maximization in Social Networks [Volume 11, Issue 2, 2023, Pages 57-69]
  • Ebrahimi Moghaddam, M. Offline text-Independent Persian handwriting Forgery Detection using Texture Analysis [Volume 7, Issue 3, 2019, Pages 37-52]
  • Ebrahimi Sookht Abanani, Ali Interference Mitigation in Cognitive Radio Communication Systems Based on the Wavelet Transform [Volume 9, Issue 4, 2022, Pages 55-66]
  • Ehtesham Rasi, Reza A framework for assessing cyber security and privacy threats and investigating their impact on smart city performance [Volume 10, Issue 3, 2023, Pages 77-91]
  • Eizadi, Seyed Kamiar A novel architecture for database outsourcing in cloud computing with regard to data life cycle [Volume 2, Issue 4, 2020, Pages 41-54]
  • Emami, Hossein Fast Detection of Vehicle Type and Position in Images Based on Deep Neural Network [Volume 10, Issue 2, 2022, Pages 117-127]
  • Emrani Zarandi, A. A new analytical model for enhancing performance of cognitive radio user’s transmissions in the internet of things [Volume 9, Issue 3, 2021, Pages 73-82]
  • Emrani Zarandi, Azadeh Alsadat The residue number system component design based on OneHot coding [Volume 10, Issue 1, 2022, Pages 119-133]
  • Entezari, R. Inverse Synthetic Aperture Radar (ISAR) Imaging of Targets with Non-Uniform Motion and Constant Acceleration based on Compressed Sensing [Volume 9, Issue 2, 2021, Pages 51-62]
  • Erfani, S. H. An Improved Method for Graph Data Anonymization with Emphasis on Preserving the Average Path length [Volume 7, Issue 2, 2019, Pages 25-32]
  • Esfahani, R. Steganography on raw video based on proper detection and compromise between the parameters of transparency, resistance and capacity [Volume 8, Issue 1, 2020, Pages 51-65]
  • Eshraghi Nia, Mohammad A model for feature selection in software fault prediction based on memetic algorithm and fuzzy logic [Volume 9, Issue 3, 2021, Pages 143-163]
  • Eslami, Z. Security Analysis and Improvement of an Intelligent Transportation System based on Certificateless Aggregate Signature [Volume 8, Issue 1, 2020, Pages 25-33]
  • Etezadifar, Pouria Quality enhancement of received video using secondary channel encoding in Joint Source and Channel Coding (JSCC) [Volume 3, Issue 2, 2020, Pages 29-48]
  • Ezzatneshan, A. Providing a new solution to botnet detection in a Markov chain-based network [Volume 9, Issue 3, 2021, Pages 59-71]

F

  • Faghihniya, M. J. Kavosh: Offering an Analysis Method and the Impact of Normal Network Traffic on Selection and Extraction Based on the Minkowski Distance [Volume 9, Issue 1, 2021, Pages 137-147]
  • Fakhredanesh, Mohammad Improving the performance of the convolutional neural network using incremental weight loss function to deal with class imbalanced data [Volume 11, Issue 4, 2024, Pages 19-34]
  • FALSAFI, SEPAHDAR Improvement of Security in Wireless Communication Networks with Directional Modulation and Artificial Noise [Volume 10, Issue 4, 2023, Pages 11-18]
  • Farasi, Hassan Quality enhancement of received video using secondary channel encoding in Joint Source and Channel Coding (JSCC) [Volume 3, Issue 2, 2020, Pages 29-48]
  • Farhadi, Majid Non-Performance of Pearson Correlation Coefficient for Evaluating Image Encryption Security [Volume 6, Issue 2, 2018, Pages 83-91]
  • Farhadi, Majid A Hash-Based Multi-Use Multi-Stage Secret Sharing Scheme with General Access Structure [Volume 6, Issue 3, 2018, Pages 107-115]
  • Farjami, Y. A Novel and Secure Model for Sharing Protected Health Record (PHR) Based on Blockchain and Attribute Based Encryption [Volume 8, Issue 1, 2020, Pages 101-124]
  • Farjami, Yaqoub An Anti-Spam Framework for Advertising Targeting Smart Mobile Devices on IoT [Volume 6, Issue 2, 2018, Pages 65-81]
  • Farshchi, Seyed Mohammad Reza Implementing a Novel Malware Detection System in Virtual Machines [Volume 2, Issue 3, 2020, Pages 23-33]
  • Farshchi, Seyed Mohammad Reza A new approach in identifying malware with memory image analysis [Volume 3, Issue 1, 2020, Pages 1-14]
  • Farshi, Mohammad A Greedy Algorithm for Constructing Region-Fault Tolerant Geometric Spanners [Volume 10, Issue 4, 2023, Pages 75-80]
  • Fateh, Mansoor Malicious Domain Detection using DNS Records [Volume 9, Issue 3, 2021, Pages 83-97]
  • Fatehi, Mohammad The Study and Analysis of Hardware Impairments Effects with Multiple Eavesdroppers in Internet of Things Network [Volume 10, Issue 3, 2023, Pages 119-126]
  • Fatemi, Masoud Applying weighted smoothed norm in sparse representation classification for face recognition [Volume 11, Issue 3, 2024, Pages 57-65]
  • Fattahalhosseini, Seyed Hossein Performance analysis of adaptive modulation and coding methods in the wireless telecommunication channels [Volume 10, Issue 1, 2022, Pages 99-108]
  • Feyzi, Majid Simulation the modify FSM , in autotracking systems to Stabilization secure links of free space optical communications [Volume 2, Issue 1, 2020, Pages 61-69]
  • Forooghy, Mahmoud A Decision-Making Model in a Cyber Conflicts Acted Upon Vulnerability, Based on Game Theoretic Analysis [Volume 6, Issue 2, 2018, Pages 21-28]
  • Forouzanmehr, M. Joint Optimization of User Association, Subchannel Allocation and Power Allocation in OFDMA Heterogeneous Networks [Volume 8, Issue 3, 2020, Pages 117-129]
  • Fouladian, Majid Performance Analysis of Hybrid FSO/RF Systems Using the ℳ Distribution and Markov Function [Volume 10, Issue 2, 2022, Pages 1-10]

G

  • Gaeini, A. Upper Bounds for the Probability of Differential Characteristics of Five Block Cipher Constructions Functions [Volume 8, Issue 4, 2021, Pages 129-137]
  • Gafori, A. An Improved Method of Incident Detection due to Cyber Attacks [Volume 7, Issue 4, 2020, Pages 105-116]
  • Gardeshi, Mahmoud A New (t,n) Designated Verifier Threshold Proxy Signature Scheme in the Standard Model [Volume 2, Issue 1, 2020, Pages 25-35]
  • Ghaderi Piraghum, S. Anomaly Detection in Dynamic Social Networks Based on Behavioral Measurements [Volume 9, Issue 1, 2021, Pages 115-123]
  • Ghaeini, Ahmad Modelling and Solving the Location Problem of Fire Launching Sites [Volume 6, Issue 3, 2018, Pages 59-64]
  • Ghaemi, R. Providing a new solution to botnet detection in a Markov chain-based network [Volume 9, Issue 3, 2021, Pages 59-71]
  • Ghaemmaghami, S. Detection of Median Filtering Manipulation in Compressed Images [Volume 7, Issue 3, 2019, Pages 121-129]
  • Ghafari, Mohammad Speeding up the execution-time of Crystals-Kyber PQC Algorithm on FPGA [Volume 10, Issue 4, 2023, Pages 101-110]
  • Ghafari, R. Security-aware Task Scheduling Algorithm based on Multi Adaptive Learning and PSO Technique [Volume 9, Issue 2, 2021, Pages 159-178]
  • Ghaffari, Ali Energy-aware routing in wireless sensor networks using MLP and simulated annealing algorithms [Volume 9, Issue 3, 2021, Pages 133-142]
  • Ghafori, A. A Fault Tolerant Task Scheduling Method for Optimal use of Resources in Cloud Computing Environment [Volume 8, Issue 2, 2020, Pages 95-103]
  • Ghafouri, A. Performance Improvement of the ODMRP Protocol using Analysis of the Received Signal Strength Level [Volume 7, Issue 3, 2019, Pages 21-26]
  • Ghanavati Nasab, Maryam Mobile botnets detection using deep learning techniques [Volume 11, Issue 2, 2023, Pages 31-43]
  • Ghanbari Maman, E. Offline text-Independent Persian handwriting Forgery Detection using Texture Analysis [Volume 7, Issue 3, 2019, Pages 37-52]
  • Ghand Tavakoli, E. A Software System for Large-Scale Simulation of Malware Propagation in Computer Networks [Volume 7, Issue 2, 2019, Pages 53-67]
  • Ghardeshi, Mahmoud An Improved Authentication Scheme with Conditional Privacy Preserving in VANETs [Volume 3, Issue 2, 2020, Pages 1-12]
  • Ghasemi, S. A. Performance Improvement of the ODMRP Protocol using Analysis of the Received Signal Strength Level [Volume 7, Issue 3, 2019, Pages 21-26]
  • Ghasemi, Siroos An Effective Method to Detect Environment-Aware Malware Based on the Behavioral Distances Comparison [Volume 6, Issue 4, 2019, Pages 123-133]
  • Ghasemian, Fahimeh Mobile botnets detection using deep learning techniques [Volume 11, Issue 2, 2023, Pages 31-43]
  • Ghasemian, Javad Non-Performance of Pearson Correlation Coefficient for Evaluating Image Encryption Security [Volume 6, Issue 2, 2018, Pages 83-91]
  • Ghasemzadeh, M. The relationship of software vulnerabilities and workarounds [Volume 8, Issue 2, 2020, Pages 75-81]
  • Ghasemzadeh, M. Enhancing E-Security by Inserting a Watermark Using the Combination of Genetic Algorithm and Tabu Search [Volume 8, Issue 3, 2020, Pages 25-37]
  • Ghavami, Behnam An Approach to Dependability Enhancement of Cache Memories [Volume 10, Issue 1, 2022, Pages 1-10]
  • Ghayoori, Majid A Framework for Evaluating Malware and Countermeasures with an Analytical Approach based on the Game Theory Case Study: Actors' Actions Based on Environmental Evidence [Volume 10, Issue 1, 2022, Pages 47-71]
  • Ghayoori, Majid The Improvement of the GMCR Model Based on Statistical Analysis of the Game’ Graph (Case Study: Malwares and Countermeasures Actions Based on Detection-Independent and Deductive Evidence) [Volume 9, Issue 4, 2022, Pages 99-123]
  • Ghayoori sales, M. Fuzzy Keyword Search Scheme on an Encrypted Database in Cloud Computing Using Word Clustering [Volume 8, Issue 3, 2020, Pages 151-165]
  • Ghayoori Sales, Majid Introduction of the Entropy-Based Method for Finding Influential Nodes in Information Dissemination on Online Social Networks [Volume 6, Issue 2, 2018, Pages 1-10]
  • Ghazi maghrebi, S. A New Method for Blind Recognition of the Initial State of Synchronous Scramblers When Located after the Channel Encoder [Volume 9, Issue 1, 2021, Pages 19-27]
  • Ghazvini, M. Enhance Media Access Control in IEEE 802.15.4 Based Smart Grids using Swarm Intelligence Algorithms [Volume 7, Issue 3, 2019, Pages 9-20]
  • Ghazvini, Mahdieh An Approach to Dependability Enhancement of Cache Memories [Volume 10, Issue 1, 2022, Pages 1-10]
  • Ghazvini, Mahdieh Mobile botnets detection using deep learning techniques [Volume 11, Issue 2, 2023, Pages 31-43]
  • Ghezel Ayagh, M. H. Reliability Analysis of Open-Loop Switching Loran Signal Generator Using Omoe Indicator [Volume 8, Issue 2, 2020, Pages 83-93]
  • Ghezel Ayagh, Mohammad Hossein Sensing and detecting changes due to displacement, pressure, or dynamic vibration in an optical fiber, based on fiber Specklegram [Volume 11, Issue 3, 2024, Pages 89-99]
  • Ghobaei, M. Resource Elasticity Management using Fuzzy Controller Based on Threshold Changes in the Cloud Computing Environment [Volume 8, Issue 3, 2020, Pages 63-81]
  • Gholami, Mahdi The Impact of Security Mechanisms on Software Vulnerabilities [Volume 2, Issue 1, 2020, Pages 49-60]
  • Gholami, Mohammad Some New Bounds on the Information Ratio of the Cartesian Product of Some Classes of Graphs [Volume 6, Issue 4, 2019, Pages 135-142]
  • Gholam Pour, Iman Relating the Detection Rate, Capacity and the Cost of Steganography by Steganographer Modeling [Volume 6, Issue 3, 2018, Pages 81-94]
  • Ghorbani Saber, R. Modelling and optimal solving of dependent sensor-weapon/threat assignment and scheduling problem by a metaheuristic algorithm based on GRASP [Volume 8, Issue 1, 2020, Pages 35-50]
  • Ghorban Zadeh, S. Design secure two party protocol based on expanded cut and choose bilateral oblivious transfer [Volume 9, Issue 3, 2021, Pages 21-37]
  • Giyahban, Mohammad Amin Detection of Slippery Road Conditions using the Road CCTV Images based on the Convolutional Neural Networks and Transfer Learning [Volume 10, Issue 2, 2022, Pages 105-116]
  • Golestani, Ali Enhancing Communication Security in Cellular Communications Networks by using Interference Alignment Technique [Volume 3, Issue 2, 2020, Pages 49-60]
  • Golestani, Ali Blind Frequency Offset Estimation using Adaptive Algorithms in Non-Coherent OFDM Systems [Volume 3, Issue 4, 2020, Pages 61-70]
  • Golestani, Ali Performance analysis of adaptive modulation and coding methods in the wireless telecommunication channels [Volume 10, Issue 1, 2022, Pages 99-108]
  • Golshahi, F. An Improved New Link Prediction Method in Social Multilplex Networks Based on the Gravitational Search Algorithm [Volume 8, Issue 2, 2020, Pages 15-24]
  • Golsorkh Tabar Amiri, Mahdi A Mutual Anonymity Private Authentication Protocol to Use in Radio-Frequency Identification Systems [Volume 6, Issue 4, 2019, Pages 45-59]
  • Gorgin, Saeid Presentation of a model for feasibility assessment of implementing the IoT social network projects using the existing public social networks as the infrastructure [Volume 10, Issue 1, 2022, Pages 73-84]

H

  • Haamian, N. A secure three factor authentication scheme for wireless healthcare sensor networks based on elliptic curve [Volume 8, Issue 1, 2020, Pages 147-167]
  • Habibi Bastami, Ali Enhancing Communication Security in Cellular Communications Networks by using Interference Alignment Technique [Volume 3, Issue 2, 2020, Pages 49-60]
  • Hadi, Mohammad Sequential Decoding Algorithms of Convolutional Codes: Implementation, Improvement and Comparison [Volume 3, Issue 2, 2020, Pages 61-73]
  • Hadi, Mohammad Optimum Parameter Selection for Rainbow Table TMTO Attack Considering Breaking Time and Using Sequential and Index Search Methods [Volume 3, Issue 3, 2020, Pages 49-57]
  • Hadian Dehkordi, M. Two Verifiable Multi-Secret Sharing Schemes: A Linear Scheme with Standard Security and A Lattice-Based Scheme [Volume 8, Issue 3, 2020, Pages 101-115]
  • Haefi, Z. A secure three factor authentication scheme for wireless healthcare sensor networks based on elliptic curve [Volume 8, Issue 1, 2020, Pages 147-167]
  • Hajigholamreza, Mina Investigation of the Semantic Similarity of Persian Sentences Using Vector Space Adaptation And Deep Learning [Volume 10, Issue 2, 2022, Pages 43-56]
  • Hajipoor, O. Automatic Keyword Extraction from Persian short Text Using word2vec [Volume 8, Issue 2, 2020, Pages 105-114]
  • Hajipoor, omid Automatic Persian Text Generation Using Rule-Based Models and Word Embedding [Volume 9, Issue 4, 2022, Pages 43-54]
  • Hamian, N. Design a Blockchain based Electronic Payment with Users’ Anonymity [Volume 9, Issue 2, 2021, Pages 85-100]
  • Hamidi, H. R. Web Covert Timing Channel Detection based on Entropy [Volume 8, Issue 3, 2020, Pages 13-23]
  • Hamidi, M. Structure of code-based hypergraphs and their application in wireless sensor networks [Volume 7, Issue 4, 2020, Pages 17-26]
  • HasaniAhangar, M. R. An Improved Method of Incident Detection due to Cyber Attacks [Volume 7, Issue 4, 2020, Pages 105-116]
  • Hasani Ahangar, MohammadReza Security of UAV Relay Networks based on Covert Communication in the Presence of an Eavesdropping UAV [Volume 11, Issue 2, 2023, Pages 45-56]
  • Hasani Ahangar, M. R. Detecting Botnets with Timing-Based Covert Command and Control Channels [Volume 7, Issue 4, 2020, Pages 1-15]
  • Hasani Ahangar, M. R. Providing an Agent-Based Architecture for Semantic Mining From Large-Scale Data in Distributed Environments [Volume 8, Issue 3, 2020, Pages 83-99]
  • Hasani Ahangar, M. R. Radar data processing using a combination of principal component analysis methods and self-organizing and digitized neural networks of the learning vector [Volume 9, Issue 2, 2021, Pages 1-7]
  • Hasani Ahangar, M. R. Providing an Ontology-Based Method for Exploring the Association Rules in Multi-Agent Distributed Environments [Volume 9, Issue 1, 2021, Pages 1-17]
  • Hasani Ahanghar, Mohammad Reza TNAC: A Novel Trust Negotiation Based Access Control Model Using XACML Architecture [Volume 3, Issue 1, 2020, Pages 53-67]
  • Hasani Ahnagar, M. R. Performance Improvement of the ODMRP Protocol using Analysis of the Received Signal Strength Level [Volume 7, Issue 3, 2019, Pages 21-26]
  • Hashemi, S. M. Joint Optimization of User Association, Subchannel Allocation and Power Allocation in OFDMA Heterogeneous Networks [Volume 8, Issue 3, 2020, Pages 117-129]
  • Hashemi Gholpayghani, َAlireza Rumor Detection on Social Networks Based on the Degree Distribution Analysis in Step-by-Step Propagation Subgraphs [Volume 10, Issue 3, 2023, Pages 93-105]
  • Hashemi Nejad, Seyyed Mohammad The Design Process Reform of the Gama-ray Imaging System by using the Design Structure Matrix [Volume 6, Issue 3, 2018, Pages 95-106]
  • Hassani Ahangar, M. R. A Fault Tolerant Task Scheduling Method for Optimal use of Resources in Cloud Computing Environment [Volume 8, Issue 2, 2020, Pages 95-103]
  • Hassani Ahanghar, Mohammad Reza Providing a Method for the Optimal Detection of Software Testing Paths Using Meta-Algorithms [Volume 6, Issue 4, 2019, Pages 13-22]
  • Hassani Karbasi, Amir Designing Anonymous Communication System by Lattice-Based Cryptography [Volume 2, Issue 3, 2020, Pages 13-22]
  • Hassan Nataj Solhdar, Mohammad Investigation of a new ensemble method of intrusion detection system on different data sets [Volume 10, Issue 3, 2023, Pages 43-57]
  • HassanNia, M. H. An Improved Method of Incident Detection due to Cyber Attacks [Volume 7, Issue 4, 2020, Pages 105-116]
  • Hatefi, Z. Design a Blockchain based Electronic Payment with Users’ Anonymity [Volume 9, Issue 2, 2021, Pages 85-100]
  • Hemmati Asiabaraki, M. Effects of Cyber Threats in IT Projects Using the Fuzzy Cognitive Mapping Approach [Volume 7, Issue 2, 2019, Pages 41-51]
  • Hemmatyar, Ali Mohammad Afshin Performance Analysis of Hybrid FSO/RF Systems Using the ℳ Distribution and Markov Function [Volume 10, Issue 2, 2022, Pages 1-10]
  • Hesabi, Mohsen Developing an Improved Method for Malware Attack Detection in Cloud Computing using Ensemble Learning [Volume 10, Issue 4, 2023, Pages 33-39]
  • Heydari, Hassan Self-stabilizing Grundy Coloring Using Game Theory and Heuristics Ordering [Volume 6, Issue 2, 2018, Pages 39-48]
  • Heydari, Sedigheh Identify the Factors Affecting the Culture and Awareness of Cyber Security Using Theme Analysis [Volume 11, Issue 1, 2023, Pages 67-80]
  • Hooshmand, Reza Interference Mitigation in Cognitive Radio Communication Systems Based on the Wavelet Transform [Volume 9, Issue 4, 2022, Pages 55-66]
  • Hooshmandasl, M. R. Generating Tree Decomposition of Graphs with Imperialist Competitive Algorithm for Use in Secret Sharing Scheme [Volume 7, Issue 3, 2019, Pages 105-111]
  • Hoseini, M. A New Method for Image Steganography Using Discrete Wavelet Transforms [Volume 7, Issue 4, 2020, Pages 79-89]
  • Hoseini, Seyyedhasan Investigating The Effect of Social Engineering Techniques on Employees Vulnerability (Case study: Tehran Municipality Employees) [Volume 11, Issue 1, 2023, Pages 31-46]
  • Hosseeinini Andargoli, S. M. Robust Adaptive Beamforming Against Interferer’s Direction Of Arrival Estimation Error [Volume 7, Issue 3, 2019, Pages 27-36]
  • Hosseini, S. SCEIRS information dissemination model based on rumor spreading in complex networks [Volume 9, Issue 2, 2021, Pages 121-134]
  • Hosseini, Seyed Nasrollah Detection and Separation of Analog and Digital Modulation with SCF function, high-Order moments and dimension reduction of modulation [Volume 2, Issue 2, 2020, Pages 33-39]
  • Hosseini, S. M. A New Approach for Estimating the Rate of Emission in Quantum Bit Exchange‏ ‎Systems ‎Using Binomial Distribution [Volume 7, Issue 1, 2019, Pages 105-112]
  • Hosseini, Soodeh Malware Propagation Modeling Considering Software Diversity Approach in Weighted Scale-Free Network [Volume 6, Issue 3, 2018, Pages 131-140]
  • Hosseinian Barzi, Seyyed Hatef Hierarchical Fuzzy Identity-Based Encryption [Volume 6, Issue 3, 2018, Pages 35-44]
  • Hossein Nejad, Vahid Bayesian Networks Based Trust Model in Social Networks [Volume 6, Issue 2, 2018, Pages 29-38]
  • Hosseinnezhad, Mihan A Trust Evaluation Model for Cloud Computing Using Bayesian Network [Volume 10, Issue 4, 2023, Pages 53-61]
  • Hosseinzadeh, Mehdi Presentation of a model for feasibility assessment of implementing the IoT social network projects using the existing public social networks as the infrastructure [Volume 10, Issue 1, 2022, Pages 73-84]
  • Huseini, M. A Distributed Approach to Community Detection in Large Social Networks Based on Label Propagation [Volume 8, Issue 4, 2021, Pages 1-15]

I

  • Irajimoghaddam, Mohammadreza Feature selection using a combination of Genetic-Whale-Ant colony algorithms for software fault prediction by machine learning [Volume 10, Issue 1, 2022, Pages 33-45]
  • Izadipour, A. Modelling and optimal solving of dependent sensor-weapon/threat assignment and scheduling problem by a metaheuristic algorithm based on GRASP [Volume 8, Issue 1, 2020, Pages 35-50]
  • Izadi Pour, Ahmad Modelling and Solving the Location Problem of Fire Launching Sites [Volume 6, Issue 3, 2018, Pages 45-57]

J

  • Jabbari Lotf, Jalil A Dynamic Metaheuristic Algorithm for Influence Maximization in Social Networks [Volume 11, Issue 2, 2023, Pages 57-69]
  • Jabraeil Jamali, M. A. Comparison of Supervised Machine Learning Algorithms in Detection of Botnets Domain Generation Algorithms [Volume 8, Issue 4, 2021, Pages 17-29]
  • Jabreil Jamali, M. A. P2P Botnet Detection Using Deep Learning Method [Volume 8, Issue 2, 2020, Pages 1-14]
  • Jafari, Majid Projection of Cyber Attacks using Damage Estimation and Combination of Attacker’s Capability and Opportunity based on Transferable Belief Model [Volume 6, Issue 4, 2019, Pages 1-12]
  • Jafari navimipour, N. Optimal Placement of Cameras to Maximize Visual Coverage using Genetic Algorithm and Harmony Search [Volume 7, Issue 1, 2019, Pages 49-61]
  • Jafari Navimi Pour, Nima Hybrid Method for Detecting Trustworthy Cloud Service Providers using Analytical Hierarchical Process and Neural Network [Volume 6, Issue 4, 2019, Pages 105-122]
  • Jafar Pour, Zahra Improving Intrusion Detection System Using a New Feature Selection Technique [Volume 6, Issue 4, 2019, Pages 143-152]
  • Jahanshiri, Javad The Study and Analysis of Hardware Impairments Effects with Multiple Eavesdroppers in Internet of Things Network [Volume 10, Issue 3, 2023, Pages 119-126]
  • Jalaei, R. Detecting Botnets with Timing-Based Covert Command and Control Channels [Volume 7, Issue 4, 2020, Pages 1-15]
  • Jalaei, R. Kavosh: Offering an Analysis Method and the Impact of Normal Network Traffic on Selection and Extraction Based on the Minkowski Distance [Volume 9, Issue 1, 2021, Pages 137-147]
  • Jalali Farahani, G. R. Development of the Concept of Deterrence Theory in the Country's Cyberspace Based on Upstream Documents and Available Approaches [Volume 8, Issue 4, 2021, Pages 161-173]
  • Jalayi, Reza Kashef: A Two-step detector of Windows-based Malicious executable files [Volume 10, Issue 2, 2022, Pages 143-156]
  • Jamali Fard, Amineh Web-based Military Management Systems Security Using Combination of One-class Classifiers [Volume 3, Issue 3, 2020, Pages 19-30]
  • Jamshidian, Gh. Upper Bounds for the Probability of Differential Characteristics of Five Block Cipher Constructions Functions [Volume 8, Issue 4, 2021, Pages 129-137]
  • Janalizadeh, S. Using Generalized Entropy Approach for Blind Estimation of the Length of Spreading Sequences in Code Division Multiple Access Systems [Volume 8, Issue 3, 2020, Pages 53-61]
  • Janbaz, S. A New Approach for Estimating the Rate of Emission in Quantum Bit Exchange‏ ‎Systems ‎Using Binomial Distribution [Volume 7, Issue 1, 2019, Pages 105-112]
  • Janghorbani, Amin Guilty Knowledge Test by Chaotic Processing of Electroencephalogram Signals Based on Fuzzy Recurrence Plot [Volume 10, Issue 2, 2022, Pages 87-104]
  • Javadzade, M. A. A Trust Model Based on Swarm Intelligence Algorithms in WSNs [Volume 7, Issue 1, 2019, Pages 1-10]
  • Javadzadeh, Mohammadali Kashef: A Two-step detector of Windows-based Malicious executable files [Volume 10, Issue 2, 2022, Pages 143-156]
  • Javaheri, Danial A Secure Environment for Behavioral Malware Analysis [Volume 2, Issue 3, 2020, Pages 65-76]
  • Javaheri, H. R. Improvement in the Ransomwares Detection Method With New API Calls Features [Volume 8, Issue 4, 2021, Pages 107-118]
  • Javanshiri, H. Finite Frame as Code: Some Characterizations for Error Correction Codes and Three Algorithms for Troubleshooting in Data Transfer [Volume 7, Issue 2, 2019, Pages 1-12]
  • Jozpiri, R. Designing Systolic Array for SL0 Algorithm Implementation [Volume 7, Issue 4, 2020, Pages 59-65]

K

  • Kabiri, Rahman Optimization of Site Topologies and Delay Extraction in Radar Emitter Location [Volume 2, Issue 2, 2020, Pages 41-51]
  • Kakaei, Hamid Reza An Optimized Unsupervised Feature Selection Algorithm [Volume 3, Issue 3, 2020, Pages 1-7]
  • Kamari, M. A. Improving the Security in Cellular Communications Networks with adding Artificial Noise by method Non-Orthogonal Resource Allocation Techniques [Volume 9, Issue 2, 2021, Pages 135-142]
  • Kamel Tabbakh Farizani, Seyed Reza Providing a new solution to botnet detection in a Markov chain-based network [Volume 9, Issue 3, 2021, Pages 59-71]
  • Kangaavari, M. R. Providing an Ontology-Based Method for Exploring the Association Rules in Multi-Agent Distributed Environments [Volume 9, Issue 1, 2021, Pages 1-17]
  • Kangavari, M. R. Providing an Agent-Based Architecture for Semantic Mining From Large-Scale Data in Distributed Environments [Volume 8, Issue 3, 2020, Pages 83-99]
  • Kangavari, M. R. Classification of High Dimensional Imbalanced Dataset via Game Theory-based Generative Adversarial Networks [Volume 9, Issue 2, 2021, Pages 63-74]
  • Karami, M. Providing a behavioral malware detection system based on the function of hardware counters using a neural network optimized with a dragonfly algorithm [Volume 9, Issue 2, 2021, Pages 9-16]
  • Kargari, M. Deterrence Model in Cyberspace Based on Bayesian Belief Attack Graph by using Risk Creating Payoff Function [Volume 7, Issue 1, 2019, Pages 25-38]
  • Karimi, A. A Trust Model Based on Swarm Intelligence Algorithms in WSNs [Volume 7, Issue 1, 2019, Pages 1-10]
  • Karimi, A. Identifying Influential Nodes in Social Networks by Integrating the Centrality Method and Node Activity [Volume 8, Issue 3, 2020, Pages 1-11]
  • Karimi, Ali TNAC: A Novel Trust Negotiation Based Access Control Model Using XACML Architecture [Volume 3, Issue 1, 2020, Pages 53-67]
  • Karimi, Ali Feature selection using a combination of Genetic-Whale-Ant colony algorithms for software fault prediction by machine learning [Volume 10, Issue 1, 2022, Pages 33-45]
  • Karimi, Ali A method to prediction of software system’s code smells using neural network [Volume 11, Issue 3, 2024, Pages 67-76]
  • Karimi, M. Optimal Placement of Cameras to Maximize Visual Coverage using Genetic Algorithm and Harmony Search [Volume 7, Issue 1, 2019, Pages 49-61]
  • Karimi, M. Performance Analysis of Free Space Optical Communication Links under M-PAM and M-PSK Modulations using Adaptive Power and Modulation Techniques [Volume 7, Issue 1, 2019, Pages 63-75]
  • Karimi, M. Coherent Acoustic source DOA estimation by nested array based on sparse solution [Volume 8, Issue 1, 2020, Pages 79-88]
  • Karimi, Mohammad Joint Spectrum Sensing and Power Allocation for Multiband Cognitive Radio Networks Using Probabilistic Spectrum Access [Volume 6, Issue 3, 2018, Pages 117-130]
  • Karimpour, Ali Developing a Threat-Tolerability Bilateral Concept within a Differential Game for the Analysis of the Insider/Adversary Behavior in Operational environment [Volume 11, Issue 2, 2023, Pages 15-29]
  • Karsaz, A. High Maneuvering Target Tracking Based on Augmented State Method using Adaptive Unscented Kalman Filter [Volume 7, Issue 2, 2019, Pages 93-108]
  • Kaveh, Masoud Covert and Secure Underwater Acoustic Communication using Merkle Hash Tree and Dolphin Whistle [Volume 6, Issue 2, 2018, Pages 135-146]
  • Kayvan Shokooh, Reza The New Algorithm for The Blind Extraction of The Radio Frequency Fingerprint Using the Specific Features of High-Power Amplifier and Local Oscillator [Volume 11, Issue 1, 2023, Pages 57-65]
  • Kazemi, Elham Presenting a new sentiment analysis method based on multi-objective Archimedes optimization algorithm and machine learning [Volume 11, Issue 4, 2024]
  • Kazemi, Hamed The Design Process Reform of the Gama-ray Imaging System by using the Design Structure Matrix [Volume 6, Issue 3, 2018, Pages 95-106]
  • Kazemi, M. H. A secure three factor authentication scheme for wireless healthcare sensor networks based on elliptic curve [Volume 8, Issue 1, 2020, Pages 147-167]
  • Kazeminia, M. Wireless Target Localization Using Median Weighted Least Square Error Metric in the Presence of Non-Line of Sight Signals [Volume 8, Issue 2, 2020, Pages 125-133]
  • Kazempour, N. Information Theoretic Secret Key Agreement Based on Localization [Volume 8, Issue 2, 2020, Pages 35-49]
  • Keramati, M. A Security Model Based Approach for Dynamic Risk Assessment of Multi-Step Attacks in Computer Networks [Volume 9, Issue 1, 2021, Pages 157-173]
  • Kermani, Ali Optimization of Site Topologies and Delay Extraction in Radar Emitter Location [Volume 2, Issue 2, 2020, Pages 41-51]
  • Keshavarzi, Behbod Modelling and Solving the Location Problem of Fire Launching Sites [Volume 6, Issue 3, 2018, Pages 59-64]
  • Keshavarzi, Parviz A Malware Classification Method Using visualization and Word Embedding Features [Volume 11, Issue 1, 2023, Pages 1-13]
  • Keyvanshokooh, Reza An Integrated Algorithm for Optimal Detection of Weak Radar Targets Masked by the Sidelobes of a Strong Target [Volume 6, Issue 4, 2019, Pages 91-104]
  • Khadem, B. Structural Analysis based on Integral Characteristic of a Reduced Round Block Cipher with Making an Improvement [Volume 7, Issue 3, 2019, Pages 1-8]
  • Khaleqi Bizaki, Hossein Blind symbol Rate estimation in multipath channels [Volume 10, Issue 3, 2023, Pages 59-66]
  • Khalili Tirandaz, Amir Hossein Security Evaluation of Mutual Random Phase Injection Scheme for Secret Key Generation over Static Point-to-Point Communications [Volume 10, Issue 2, 2022, Pages 19-30]
  • Khalilpoor, J. Wireless Target Localization Using Median Weighted Least Square Error Metric in the Presence of Non-Line of Sight Signals [Volume 8, Issue 2, 2020, Pages 125-133]
  • Khandani, R. The Distributed Denial of Service Attacks Situation Awareness Based on The Prediction of Battle Scene Using Dempster-Shefer Evidences Theories and Bayesian Rules [Volume 7, Issue 1, 2019, Pages 77-94]
  • Khanzadeh, Mohammad Hossein Target Tracking Algorithm in Wireless Sensor Networks with Optimum Power Consumption Using Quantized Observation [Volume 6, Issue 2, 2018, Pages 109-121]
  • Kharazi, M. Improving Payload Attribution Techniques in Computer Network Criminology with Time based Hierarchical Bloom Filter [Volume 7, Issue 3, 2019, Pages 71-81]
  • Kheirabadi, M. Providing a new solution to botnet detection in a Markov chain-based network [Volume 9, Issue 3, 2021, Pages 59-71]
  • Kheiri, Ali Design the Model of CSRF Attack Tree for Immunization the Web Application in Development Process [Volume 3, Issue 1, 2020, Pages 41-52]
  • Kheirkhah, Marjan Detection of advanced Cyber Attacks, Using Behavior Modeling Based on Natural Language Processing [Volume 6, Issue 3, 2018, Pages 141-151]
  • Kheyrandish, M. Speech Steganalysis of Least Significant Bits Based on the Percentage of Equal Adjacent Samples [Volume 9, Issue 1, 2021, Pages 75-90]
  • Kheyrandish, Mohammad Steganalysis of Quantum Audio Signal using Quantum Support Vector Machine Algorithm [Volume 11, Issue 3, 2024, Pages 1-14]
  • Khodabakhshi, Mohammad Bagher Guilty Knowledge Test by Chaotic Processing of Electroencephalogram Signals Based on Fuzzy Recurrence Plot [Volume 10, Issue 2, 2022, Pages 87-104]
  • Khodadadi, Hamid Reza Performance analysis of adaptive modulation and coding methods in the wireless telecommunication channels [Volume 10, Issue 1, 2022, Pages 99-108]
  • Khodadadi, Hamid Reza Improvement of Security in Wireless Communication Networks with Directional Modulation and Artificial Noise [Volume 10, Issue 4, 2023, Pages 11-18]
  • Khodadadi, H. R. Frequency Spectrum Sensing by Multi-Stage Adaptive Optimization Algorithm with the Efficient Non-Cooperative Technique in Cognitive radios with hardware implementation [Volume 8, Issue 3, 2020, Pages 39-51]
  • Khodadadi, H. R. Improving the Security in Cellular Communications Networks with adding Artificial Noise by method Non-Orthogonal Resource Allocation Techniques [Volume 9, Issue 2, 2021, Pages 135-142]
  • Khorasani, Y. Increasing Insertion Capacity and Resistance in Image Steganography Based on Mapping and Bits Reduction [Volume 7, Issue 2, 2019, Pages 33-39]
  • Khorrami, A. Reliability Analysis of Open-Loop Switching Loran Signal Generator Using Omoe Indicator [Volume 8, Issue 2, 2020, Pages 83-93]
  • Khoshrooy, Hadi A New Method For Gradual Detection of Environmental Conditions and Resources Required by Smart Malware [Volume 6, Issue 4, 2019, Pages 33-44]
  • Khosh Sefat, Abolfazl A novel architecture for database outsourcing in cloud computing with regard to data life cycle [Volume 2, Issue 4, 2020, Pages 41-54]
  • Khosravi, A. A Trust Model Based on Swarm Intelligence Algorithms in WSNs [Volume 7, Issue 1, 2019, Pages 1-10]
  • Khosravi, Maryam Rumor Detection on Social Networks Based on the Degree Distribution Analysis in Step-by-Step Propagation Subgraphs [Volume 10, Issue 3, 2023, Pages 93-105]
  • Khosravi, M. J. A Trust Model Based on Swarm Intelligence Algorithms in WSNs [Volume 7, Issue 1, 2019, Pages 1-10]
  • Khosravian, Amir The Semantic Segmentation of Autonomous Vehicles Images with the Teacher-Student Technique [Volume 9, Issue 4, 2022, Pages 1-19]
  • Kiamary, N. Two Verifiable Multi-Secret Sharing Schemes: A Linear Scheme with Standard Security and A Lattice-Based Scheme [Volume 8, Issue 3, 2020, Pages 101-115]
  • Kiani, R. An Accelerated Method for Rules Anomaly Detection in Software Defined Networks [Volume 8, Issue 4, 2021, Pages 31-39]
  • Kuhestani, کوهستانی Security Evaluation of Mutual Random Phase Injection Scheme for Secret Key Generation over Static Point-to-Point Communications [Volume 10, Issue 2, 2022, Pages 19-30]
  • Kuhestani, کوهستانی Physical Layer Security with the Aid of Compressive Sensing in the Presence of Non-Ideal Relays by Removing the Effect of Hardware Impairments by Providing an Iterative Method [Volume 11, Issue 4, 2024]

L

  • Lak, Behzad dentifying Zero Day Android Daily through Neural Networks [Volume 11, Issue 3, 2024, Pages 49-55]
  • Langhari, Nafiseh Phishing Website Detection for e-Banking by Inclined Planes Optimization Algorithm [Volume 3, Issue 1, 2020, Pages 29-39]
  • Lashgarian, H. R. Evaluation of Network-Based Operation Criteria Based on DEMATEL Method [Volume 7, Issue 1, 2019, Pages 139-153]
  • Lashkarian, H. The Presentation of a Model for Analyzing the Behavior of the Enemy Using Hidden Markov Models Based on Electronic Warfare Observations in Complex War Scenes [Volume 7, Issue 1, 2019, Pages 113-128]
  • Lashkarian, H. R. The Course of Action Selection Model in Network Centric Operation [Volume 7, Issue 2, 2019, Pages 133-155]
  • Latif, A. M. Enhancing E-Security by Inserting a Watermark Using the Combination of Genetic Algorithm and Tabu Search [Volume 8, Issue 3, 2020, Pages 25-37]

M

  • Madadi, E. Design and Production of Hardware Authentication Code Using Physically Unclonable Functions and a Random Number Generator on FPGA [Volume 7, Issue 4, 2020, Pages 37-50]
  • Madadi, Eghbal A New And Efficient Method of Mass Masking and its Resistance Assessment to Power Analysis [Volume 6, Issue 2, 2018, Pages 123-134]
  • Madadi, Eqbal Design and Implementation of a Physically Unclonable Function on FPGA [Volume 6, Issue 4, 2019, Pages 23-32]
  • Madani, Mohammad Hossein A Combined Improved Algorithm to Estimating The delay of Sky waves In Loran c Receiver [Volume 2, Issue 4, 2020, Pages 55-63]
  • Madani, Mohammad Hossein Increasing the Accuracy of Locating in Wireless Communication Systems Based on Neural Networks [Volume 3, Issue 3, 2020, Pages 31-38]
  • Maddadi, B. Analyzing Security Challenges of LTE Networks, Obstacles and Opportunities of Network Localization Based on the Standard Platform [Volume 7, Issue 2, 2019, Pages 121-132]
  • Mahabadi, A. Hybrid Anomaly detection method using community detection in graph and feature selection [Volume 8, Issue 1, 2020, Pages 17-24]
  • Mahabadi, A. Concurrent Detection of Compact Anomalous Subgraphs in Large Social Networks [Volume 9, Issue 2, 2021, Pages 179-194]
  • Mahabadi, Aminollah A Distributed Approach to Community Detection in Large Social Networks Based on Label Propagation [Volume 8, Issue 4, 2021, Pages 1-15]
  • Mahabadi, Aminollah Real-time Topology-based Tracking of Microscopic Objects [Volume 9, Issue 3, 2021, Pages 1-20]
  • Mahamedpour, Kamal Enhancing Communication Security in Cellular Communications Networks by using Interference Alignment Technique [Volume 3, Issue 2, 2020, Pages 49-60]
  • Mahamedpour, Kamal Blind Frequency Offset Estimation using Adaptive Algorithms in Non-Coherent OFDM Systems [Volume 3, Issue 4, 2020, Pages 61-70]
  • Mahmoodi, Nasibeh Improving the performance of the convolutional neural network using incremental weight loss function to deal with class imbalanced data [Volume 11, Issue 4, 2024, Pages 19-34]
  • Mahmoudi, Reza Energy-aware routing in wireless sensor networks using MLP and simulated annealing algorithms [Volume 9, Issue 3, 2021, Pages 133-142]
  • Majidi, Mohammad Hassan A New Method for Detection of Discrete Data Transmitted over Non-Linear Dynamic Wireless Channels [Volume 3, Issue 2, 2020, Pages 75-85]
  • Majidnezhad, V. P2P Botnet Detection Using Deep Learning Method [Volume 8, Issue 2, 2020, Pages 1-14]
  • Majidnezhad, V. Comparison of Supervised Machine Learning Algorithms in Detection of Botnets Domain Generation Algorithms [Volume 8, Issue 4, 2021, Pages 17-29]
  • Malaei, A. Deterrence Model in Cyberspace Based on Bayesian Belief Attack Graph by using Risk Creating Payoff Function [Volume 7, Issue 1, 2019, Pages 25-38]
  • Maleki, Hossein Hierarchical Fuzzy Identity-Based Encryption [Volume 6, Issue 3, 2018, Pages 35-44]
  • Mansoorizadeh, M. Anomaly Detection in Dynamic Social Networks Based on Behavioral Measurements [Volume 9, Issue 1, 2021, Pages 115-123]
  • Mansouri, N. Security-aware Task Scheduling Algorithm based on Multi Adaptive Learning and PSO Technique [Volume 9, Issue 2, 2021, Pages 159-178]
  • Mardani, Mohammad Weaknesses of SPRS Authentication Protocol and Present a Developed Protocol for RFID Systems [Volume 3, Issue 3, 2020, Pages 39-48]
  • Maroosi, A. Network Intrusion Detection using a combination of artificial neural networks in a hierarchical manner [Volume 8, Issue 1, 2020, Pages 89-99]
  • Mashhadi, S. Two Verifiable Multi-Secret Sharing Schemes: A Linear Scheme with Standard Security and A Lattice-Based Scheme [Volume 8, Issue 3, 2020, Pages 101-115]
  • Mashhadi, Samaneh A novel lossless color secret image sharing based on homogeneous linear recursion [Volume 10, Issue 3, 2023, Pages 107-118]
  • Masih-Tehrani, Masoud The Semantic Segmentation of Autonomous Vehicles Images with the Teacher-Student Technique [Volume 9, Issue 4, 2022, Pages 1-19]
  • Masoumi, M. A Practical Template Attack Against the Implementation of the Advanced Encryption Standard on ARM Processor [Volume 7, Issue 1, 2019, Pages 39-48]
  • Masoumi, M. Design and Production of Hardware Authentication Code Using Physically Unclonable Functions and a Random Number Generator on FPGA [Volume 7, Issue 4, 2020, Pages 37-50]
  • Masoumi, Masoud A New And Efficient Method of Mass Masking and its Resistance Assessment to Power Analysis [Volume 6, Issue 2, 2018, Pages 123-134]
  • Masoumi, Masoud Design and Implementation of a Physically Unclonable Function on FPGA [Volume 6, Issue 4, 2019, Pages 23-32]
  • Masoumi, S. M. Reducing Interference Effect on GPS Navigation System Using Evolutionary Notch Filter [Volume 8, Issue 4, 2021, Pages 95-106]
  • Matinfar, Ahmadreza dentifying Zero Day Android Daily through Neural Networks [Volume 11, Issue 3, 2024, Pages 49-55]
  • Matinfar, Ahmad Reza Detect Web Denial of Service Attacks Using Entropy and Support Vector Machine Algorithm [Volume 6, Issue 4, 2019, Pages 79-89]
  • Mayabi Joghal, M. A Scheme for Improvement of Security and Privacy in Mobile Health Systems by Using SIM Card [Volume 7, Issue 1, 2019, Pages 11-24]
  • Mazaheri, H. Finite Frame as Code: Some Characterizations for Error Correction Codes and Three Algorithms for Troubleshooting in Data Transfer [Volume 7, Issue 2, 2019, Pages 1-12]
  • Mazloum, J. Increasing Insertion Capacity and Resistance in Image Steganography Based on Mapping and Bits Reduction [Volume 7, Issue 2, 2019, Pages 33-39]
  • Mazloum, Jalil An Optimized Compound Deep Neural Network Integrating With Feature Selection for Intrusion Detection System in Cyber Attacks [Volume 10, Issue 4, 2023, Pages 41-51]
  • Mehravaran, M. Secure and confidential workflow scheduling in hybrid cloud using improved particle swarm optimization algorithm [Volume 7, Issue 4, 2020, Pages 131-145]
  • Mehrdad, A. Analysis of Impossible Differential on LowMC Block Cipher [Volume 7, Issue 2, 2019, Pages 69-79]
  • Mehrpoya, M. R. Presentation and Performance Evaluation of an Efficient Algorithm for a Distributed Controller in SDN [Volume 9, Issue 1, 2021, Pages 175-183]
  • Meraji, V. Introducing a new timing attack on the ARM processor and its practical implementation on the Raspberrypi3 board [Volume 8, Issue 1, 2020, Pages 125-132]
  • Minaei, B. Smart Detection of Covert Worms in Computer Networks [Volume 7, Issue 4, 2020, Pages 67-77]
  • Mir, Masoomeh Energy Aware Routing in the Internet of Things using improved Grasshopper Metaheuristic Algorithm [Volume 11, Issue 1, 2023, Pages 15-29]
  • Mirabedini, Sh. Classification of High Dimensional Imbalanced Dataset via Game Theory-based Generative Adversarial Networks [Volume 9, Issue 2, 2021, Pages 63-74]
  • Mirghadri, A. Side Channel Analysis of International Data Encryption Algorithm (IDEA) [Volume 7, Issue 4, 2020, Pages 51-57]
  • Mirghadri, A. Modeling of Obfuscated Multi- Stage cyber Attacks [Volume 8, Issue 2, 2020, Pages 61-73]
  • Mirghadri, A. Upper Bounds for the Probability of Differential Characteristics of Five Block Cipher Constructions Functions [Volume 8, Issue 4, 2021, Pages 129-137]
  • Mirjalily, Gh. Energy-Harvesting Aware Multi-Hop Routing in Wireless Sensor Networks for Defense Applications [Volume 8, Issue 4, 2021, Pages 63-73]
  • Mirmohseni, M. Information Theoretic Secret Key Agreement Based on Localization [Volume 8, Issue 2, 2020, Pages 35-49]
  • Mirqadri, Abdolrasool A Fast Method for Computation of Scalar Multiplication of Elliptic Curve Suitable for Elliptic Curve Cryptography System [Volume 3, Issue 3, 2020, Pages 9-17]
  • Mirqadri, Abdolrasoul An Efficient Visual Multi-Secret Sharing Scheme [Volume 3, Issue 4, 2020, Pages 1-9]
  • Mirzaee, M. Hybrid Anomaly detection method using community detection in graph and feature selection [Volume 8, Issue 1, 2020, Pages 17-24]
  • Mirzaei, K. Evaluation of Network-Based Operation Criteria Based on DEMATEL Method [Volume 7, Issue 1, 2019, Pages 139-153]
  • Mirzaei, K. The Course of Action Selection Model in Network Centric Operation [Volume 7, Issue 2, 2019, Pages 133-155]
  • Mizanian, K. Distributed Anonymity Based On the Integrated Block Chain in Vehicular Ad Hoc Network [Volume 8, Issue 4, 2021, Pages 41-52]
  • Moazedi, M. Reducing Interference Effect on GPS Receiver by Using Multi-correlation Architecture [Volume 9, Issue 3, 2021, Pages 49-57]
  • Moazedi, Maryam Detection of Spoofing Attack Based on Multi-Layer Neural Network in Single-Frequency GPS Receivers [Volume 3, Issue 1, 2020, Pages 69-80]
  • Moazedi, Maryam GPS Spoofing Mitigation using Adaptive Estimator in Tracking Loop [Volume 6, Issue 3, 2018, Pages 65-80]
  • Modiri, Naser Secure and Fast Re-authentication Protocol to Support Extensive Movement of Users in IEEE 802.1X Wireless Networks [Volume 3, Issue 4, 2020, Pages 71-80]
  • Moeini Jahromi, Mohammad Optimum Parameter Selection for Rainbow Table TMTO Attack Considering Breaking Time and Using Sequential and Index Search Methods [Volume 3, Issue 3, 2020, Pages 49-57]
  • Moghaddasi, A. Automatic XSS Exploit Generation Using Grammatical Evolution [Volume 9, Issue 2, 2021, Pages 101-119]
  • Mohajeran, Seyed Ali The Study and Analysis of Hardware Impairments Effects with Multiple Eavesdroppers in Internet of Things Network [Volume 10, Issue 3, 2023, Pages 119-126]
  • Mohajeri, J. A new attack on Jakobsson Hybrid Mix-Net [Volume 7, Issue 3, 2019, Pages 113-119]
  • Mohammad Davoodi, Amir Hossein Identify the Factors Affecting the Culture and Awareness of Cyber Security Using Theme Analysis [Volume 11, Issue 1, 2023, Pages 67-80]
  • Mohammad Hasani Zade, B. Security-aware Task Scheduling Algorithm based on Multi Adaptive Learning and PSO Technique [Volume 9, Issue 2, 2021, Pages 159-178]
  • Mohammadi, Ali Secure and Fast Re-authentication Protocol to Support Extensive Movement of Users in IEEE 802.1X Wireless Networks [Volume 3, Issue 4, 2020, Pages 71-80]
  • Mohammadi, Mahmoud Optimal Design of Wireless Visible Light Communication Network with the Aim of Minimizing the Outage Probability at the Location of the Mobile Receiver [Volume 10, Issue 3, 2023, Pages 1-9]
  • Mohammadi, Sayed Mohammad Reza Investigation of the Semantic Similarity of Persian Sentences Using Vector Space Adaptation And Deep Learning [Volume 10, Issue 2, 2022, Pages 43-56]
  • Mohammadzadeh, Mohammad Reza Investigation of the Semantic Similarity of Persian Sentences Using Vector Space Adaptation And Deep Learning [Volume 10, Issue 2, 2022, Pages 43-56]
  • Mohammad Zadeh, J. Classification of High Dimensional Imbalanced Dataset via Game Theory-based Generative Adversarial Networks [Volume 9, Issue 2, 2021, Pages 63-74]
  • Mohsenzadeh, Ali A Fuzzy Trust Evaluation Model to Enhance Security of cloud System Entities with Petri Net [Volume 4, Issue 1, 2020, Pages 19-34]
  • Molaei Kaboodan, S. V. High Maneuvering Target Tracking Based on Augmented State Method using Adaptive Unscented Kalman Filter [Volume 7, Issue 2, 2019, Pages 93-108]
  • Mollazadeh, Mahdi An Optimized Unsupervised Feature Selection Algorithm [Volume 3, Issue 3, 2020, Pages 1-7]
  • Mollazadeh Golmahale, M. The Course of Action Selection Model in Network Centric Operation [Volume 7, Issue 2, 2019, Pages 133-155]
  • Mollazadeh Golmahalle, M. Evaluation of Network-Based Operation Criteria Based on DEMATEL Method [Volume 7, Issue 1, 2019, Pages 139-153]
  • Mollazadeh Golmahalleh, Mahdi A New Metric for Estimation the User Position in the Multi User OFDMA Networks [Volume 2, Issue 3, 2020, Pages 1-11]
  • Momeni, Amir Hossein Increasing the Accuracy of Locating in Wireless Communication Systems Based on Neural Networks [Volume 3, Issue 3, 2020, Pages 31-38]
  • Momeni Azandariani, Amir Hossein Online Collaborative Planning in Complex Environment [Volume 2, Issue 4, 2020, Pages 15-23]
  • Mortazavi, R. An Improved Method for Graph Data Anonymization with Emphasis on Preserving the Average Path length [Volume 7, Issue 2, 2019, Pages 25-32]
  • Mortazavi, Reza A Hash-Based Multi-Use Multi-Stage Secret Sharing Scheme with General Access Structure [Volume 6, Issue 3, 2018, Pages 107-115]
  • Mortazavi, S. A. A new attack on Jakobsson Hybrid Mix-Net [Volume 7, Issue 3, 2019, Pages 113-119]
  • Mosavi, Mohammad Reza Novel Spoofing Mitigation Method using Wavelet Transform Based on PSO Algorithm in the Acquisition Stage of GPS Receiver [Volume 10, Issue 4, 2023, Pages 19-31]
  • Mosavi, Mohammad Reza Reducing the Effects of Deception Attack on GPS Receivers of Phasor Measurement Units using Neural Networks [Volume 11, Issue 1, 2023, Pages 97-105]
  • Mosavi, M. R. Three-Dimensional Angles Measurement using IME based on MEMS Technology by Adaptive Kalman Filter [Volume 7, Issue 2, 2019, Pages 81-91]
  • Mosavi, M. R. Improving INS/GPS Integration with Artificial Intelligence during GPS Outage [Volume 9, Issue 2, 2021, Pages 143-157]
  • Mosavi, M. R. Reducing Interference Effect on GPS Receiver by Using Multi-correlation Architecture [Volume 9, Issue 3, 2021, Pages 49-57]
  • Mosleh, M. Proposing a New and Comprehensive Method for Quantum Representation of Digital Audio Signals [Volume 8, Issue 4, 2021, Pages 139-152]
  • Mosleh, M. Transparent and Robust Audio Watermarking Using Synergy LU Decomposition and the Fibonacci Sequence in GBT-DCT-DWT Transforms [Volume 9, Issue 1, 2021, Pages 101-113]
  • Mosleh, M. Transparent and Robust Audio Watermarking Using Synergy LU Decomposition and the Fibonacci Sequence in GBT-DCT-DWT Transforms [Volume 9, Issue 1, 2021, Pages 101-113]
  • Mosleh, M. Speech Steganalysis of Least Significant Bits Based on the Percentage of Equal Adjacent Samples [Volume 9, Issue 1, 2021, Pages 75-90]
  • Mosleh, M. Providing a behavioral malware detection system based on the function of hardware counters using a neural network optimized with a dragonfly algorithm [Volume 9, Issue 2, 2021, Pages 9-16]
  • Mosleh, Mohammad Steganalysis of Quantum Audio Signal using Quantum Support Vector Machine Algorithm [Volume 11, Issue 3, 2024, Pages 1-14]
  • Mostafavi, S. A. Distributed Anonymity Based On the Integrated Block Chain in Vehicular Ad Hoc Network [Volume 8, Issue 4, 2021, Pages 41-52]
  • Motedaien, Tahere Improving mobile mass monitoring in the IoT environment based on Chaotic Fog Algorithm [Volume 11, Issue 3, 2024, Pages 77-88]
  • Motedayen, Mohammadreza Semi-Blind Separation of Multiple Synchronous Wideband Frequency Hopping Signals Using a Band-Limited Receiver and Space-Time- Frequency Distributions [Volume 11, Issue 4, 2024]
  • Motmeni, Homayoon A Fuzzy Trust Evaluation Model to Enhance Security of cloud System Entities with Petri Net [Volume 4, Issue 1, 2020, Pages 19-34]
  • Mousavi, Seyed Mohammad Reza Detection of Spoofing Attack Based on Multi-Layer Neural Network in Single-Frequency GPS Receivers [Volume 3, Issue 1, 2020, Pages 69-80]
  • Mousavi, Seyed Mohammad Reza Defense Against Spoofing in GPS Receiver using Correlation and Least Mean Squares Method Based on Sign-Data Algorithm [Volume 3, Issue 4, 2020, Pages 11-22]
  • Mousavi, Seyed Mohammad Reza Sonar Dataset Classification using Multi-Layer Perceptron Neural Network Based on Dragonfly and Moth Algorithms [Volume 10, Issue 3, 2023, Pages 21-31]
  • Mousavi, Seyyed Mohammad Reza GPS Spoofing Mitigation using Adaptive Estimator in Tracking Loop [Volume 6, Issue 3, 2018, Pages 65-80]
  • Mousavi Mirkalaei, Seyyed Mohammadreza Covert and Secure Underwater Acoustic Communication using Merkle Hash Tree and Dolphin Whistle [Volume 6, Issue 2, 2018, Pages 135-146]
  • Mousavi Mirkalaei, Seyyed Mohammad Reza Enhancing Vector Tracking Accuracy of GPS in Weak Signal Condition Based on Adaptive Strong Tracking Kalman Filter​ [Volume 6, Issue 3, 2018, Pages 1-12]
  • Mousavipour, Seyed Farid Sonar Dataset Classification using Multi-Layer Perceptron Neural Network Based on Dragonfly and Moth Algorithms [Volume 10, Issue 3, 2023, Pages 21-31]
  • Mowlavi, O. Performance Analysis of Free Space Optical Communication Links under M-PAM and M-PSK Modulations using Adaptive Power and Modulation Techniques [Volume 7, Issue 1, 2019, Pages 63-75]

N

  • Nadinejad, A. A Heuristic Data Diffusion and Gathering Scheme Using Virtual Line for Wireless Sensor Networks with Mobile Sink [Volume 9, Issue 2, 2021, Pages 195-207]
  • Naqavi, Mahdi The Impact of Security Mechanisms on Software Vulnerabilities [Volume 2, Issue 1, 2020, Pages 49-60]
  • Naqian Fesharaki, Mahdi Online Collaborative Planning in Complex Environment [Volume 2, Issue 4, 2020, Pages 15-23]
  • Nasehi, Mojtaba Fast Detection of Vehicle Type and Position in Images Based on Deep Neural Network [Volume 10, Issue 2, 2022, Pages 117-127]
  • Naseri, A. Designing Systolic Array for SL0 Algorithm Implementation [Volume 7, Issue 4, 2020, Pages 59-65]
  • Naseri, A. Introducing an Optimal Modulation Constellation, Resistant to Atmospheric Turbulence [Volume 8, Issue 2, 2020, Pages 115-124]
  • Naseri, A. Presentation and Performance Evaluation of an Efficient Algorithm for a Distributed Controller in SDN [Volume 9, Issue 1, 2021, Pages 175-183]
  • Naseri, Ali Quality enhancement of received video using secondary channel encoding in Joint Source and Channel Coding (JSCC) [Volume 3, Issue 2, 2020, Pages 29-48]
  • Naseri, Ali Target Tracking Algorithm in Wireless Sensor Networks with Optimum Power Consumption Using Quantized Observation [Volume 6, Issue 2, 2018, Pages 109-121]
  • Naseri, Amir Providing a routing method in Internet of Things networks based on fuzzy logic and clustering For use in smart transportatio [Volume 11, Issue 4, 2024]
  • Nasiri, M. Smart Detection of Covert Worms in Computer Networks [Volume 7, Issue 4, 2020, Pages 67-77]
  • Nasrpooya, Zahra GPS Spoofing Mitigation using Adaptive Estimator in Tracking Loop [Volume 6, Issue 3, 2018, Pages 65-80]
  • Nasseralfoghara, M. Web Covert Timing Channel Detection based on Entropy [Volume 8, Issue 3, 2020, Pages 13-23]
  • Navidi, Hamidreza The IoT Resource Allocation Improvement in Fog Computing Using Non-Cooperative Game Theory [Volume 9, Issue 4, 2022, Pages 147-158]
  • Nazari, Mohammad Detection and Separation of Analog and Digital Modulation with SCF function, high-Order moments and dimension reduction of modulation [Volume 2, Issue 2, 2020, Pages 33-39]
  • Nejatian, Samad Detection of Unknown Malicious Network Streams using Ensemble Learning [Volume 6, Issue 2, 2018, Pages 93-108]
  • Nejati Jahromi, M. A Techno-Economic Model of Sustainable Communication Infrastructure in the Smart City; using WDM-PON FTTx [Volume 9, Issue 1, 2021, Pages 149-156]
  • Nemati, M. Identifying Influential Nodes in Social Networks by Integrating the Centrality Method and Node Activity [Volume 8, Issue 3, 2020, Pages 1-11]
  • Nezhadshahbodaghi, M. Three-Dimensional Angles Measurement using IME based on MEMS Technology by Adaptive Kalman Filter [Volume 7, Issue 2, 2019, Pages 81-91]
  • Nezhadshahbodaghi, M. Improving INS/GPS Integration with Artificial Intelligence during GPS Outage [Volume 9, Issue 2, 2021, Pages 143-157]
  • Noorani, Seyede Fatemeh The enhancement of online social network security by detecting and preventing fake accounts through machine learning [Volume 10, Issue 1, 2022, Pages 85-97]
  • Norouzi Larki, Sanaz Steganalysis of Quantum Audio Signal using Quantum Support Vector Machine Algorithm [Volume 11, Issue 3, 2024, Pages 1-14]
  • Norozi, Z. Steganography on raw video based on proper detection and compromise between the parameters of transparency, resistance and capacity [Volume 8, Issue 1, 2020, Pages 51-65]
  • Noushi Fard, Taqi The Impact of Security Mechanisms on Software Vulnerabilities [Volume 2, Issue 1, 2020, Pages 49-60]

O

  • Okhovvat, Majid An Integrated Algorithm for Optimal Detection of Weak Radar Targets Masked by the Sidelobes of a Strong Target [Volume 6, Issue 4, 2019, Pages 91-104]
  • Omidvar, Roohullah Detection of Unknown Malicious Network Streams using Ensemble Learning [Volume 6, Issue 2, 2018, Pages 93-108]
  • Ordokhani, Yadollah Cardinal Hermit functions and their application in solving the time-delay fractional optimal control problems [Volume 8, Issue 4, 2021, Pages 153-160]
  • Orouji, Niloofar Reducing the Effects of Deception Attack on GPS Receivers of Phasor Measurement Units using Neural Networks [Volume 11, Issue 1, 2023, Pages 97-105]

P

  • Pahlavsay, Behnaz Quasi-transversals in Latin squares and k-domination in graphs [Volume 10, Issue 3, 2023, Pages 67-75]
  • Pajoohan, M. R. Secure and confidential workflow scheduling in hybrid cloud using improved particle swarm optimization algorithm [Volume 7, Issue 4, 2020, Pages 131-145]
  • Pakize, S. R. A New Scheduling Algorithm to Reduce Computation Time in Hadoop Environment [Volume 8, Issue 2, 2020, Pages 51-59]
  • Pakniat, N. Security Analysis and Improvement of an Intelligent Transportation System based on Certificateless Aggregate Signature [Volume 8, Issue 1, 2020, Pages 25-33]
  • Pakravan, Mohammad Reza Sequential Decoding Algorithms of Convolutional Codes: Implementation, Improvement and Comparison [Volume 3, Issue 2, 2020, Pages 61-73]
  • Parhizgar, M. M. Prioritizing Obstacles to Industrial Control Systems Security Management Implementation, using Interpretive Structural Modeling (ISM) Approach [Volume 7, Issue 2, 2019, Pages 109-119]
  • Pariz, Naser Developing a Threat-Tolerability Bilateral Concept within a Differential Game for the Analysis of the Insider/Adversary Behavior in Operational environment [Volume 11, Issue 2, 2023, Pages 15-29]
  • Parsa, S. Automatic Test Data Generation in File Format Fuzzers [Volume 8, Issue 1, 2020, Pages 1-16]
  • Parsa, S. P2P Botnet Detection Using Deep Learning Method [Volume 8, Issue 2, 2020, Pages 1-14]
  • Parsa, S. Comparison of Supervised Machine Learning Algorithms in Detection of Botnets Domain Generation Algorithms [Volume 8, Issue 4, 2021, Pages 17-29]
  • Parsa, S. Detecting of Botnets’ Malicious Domains with Deep Autoencoder Neural Network [Volume 9, Issue 1, 2021, Pages 61-74]
  • Parsa, Saeed A Secure Environment for Behavioral Malware Analysis [Volume 2, Issue 3, 2020, Pages 65-76]
  • Parsa, Saeed A New Method For Gradual Detection of Environmental Conditions and Resources Required by Smart Malware [Volume 6, Issue 4, 2019, Pages 33-44]
  • Parsa, Saeed An Effective Method to Detect Environment-Aware Malware Based on the Behavioral Distances Comparison [Volume 6, Issue 4, 2019, Pages 123-133]
  • Parsa, Saeed Fault Proness Estimation of Software Modules Using Machine learning [Volume 11, Issue 4, 2024]
  • Parvin, Hamid Detection of Unknown Malicious Network Streams using Ensemble Learning [Volume 6, Issue 2, 2018, Pages 93-108]
  • Parvin, Hamid Improving Intrusion Detection System Using a New Feature Selection Technique [Volume 6, Issue 4, 2019, Pages 143-152]
  • Pashmforoush, S. A new analytical model for enhancing performance of cognitive radio user’s transmissions in the internet of things [Volume 9, Issue 3, 2021, Pages 73-82]
  • Peymankar, Mahboobeh Modelling and Solving the Location Problem of Fire Launching Sites [Volume 6, Issue 3, 2018, Pages 45-57]
  • P. Kazemi, Adel Quasi-transversals in Latin squares and k-domination in graphs [Volume 10, Issue 3, 2023, Pages 67-75]
  • Pooyan, F. Side-Channel Attack Resistance Approaches Through Dynamic Differential Logic [Volume 7, Issue 3, 2019, Pages 93-104]
  • Pournaghi, M. A secure three factor authentication scheme for wireless healthcare sensor networks based on elliptic curve [Volume 8, Issue 1, 2020, Pages 147-167]
  • Pournaghi, Seyyed Mortaza An Anti-Spam Framework for Advertising Targeting Smart Mobile Devices on IoT [Volume 6, Issue 2, 2018, Pages 65-81]
  • Pournaghi, S. M. A Novel and Secure Model for Sharing Protected Health Record (PHR) Based on Blockchain and Attribute Based Encryption [Volume 8, Issue 1, 2020, Pages 101-124]
  • Pour Naghi, Seyed Mortaza An Improved Authentication Scheme with Conditional Privacy Preserving in VANETs [Volume 3, Issue 2, 2020, Pages 1-12]
  • Pour Vahhab, Mehran Utilizing Port-Knocking as first defensive layer at defense-in-depth strategies using hybrid of the Internet Control Message Protocol features, Internet Addresses and Tunneling [Volume 2, Issue 4, 2020, Pages 25-40]

Q

  • Qaleh, Ali سیی [Volume 1, Issue 1, 1392]
  • Qasemi Gol, Mohammad A Foresight Framework for Intrusion Response Systems in Computer Networks [Volume 6, Issue 3, 2018, Pages 13-34]
  • Qesmati, Simin Spam Management in Social Networks by Content Rating [Volume 2, Issue 2, 2020, Pages 53-62]
  • Qoli Nejad, Maryam Botnet Detection for Peer to Peer Networks [Volume 3, Issue 4, 2020, Pages 43-60]

R

  • Rad, Farhad Improving Intrusion Detection System Using a New Feature Selection Technique [Volume 6, Issue 4, 2019, Pages 143-152]
  • Raeis Danaei, Meysam On Improvement of Cardinalized Probability Hypothesis Density Filter Implementation by using Auxiliary Particle Filter [Volume 3, Issue 4, 2020, Pages 23-41]
  • Raeis Danaei, Meysam Target Tracking Algorithm in Wireless Sensor Networks with Optimum Power Consumption Using Quantized Observation [Volume 6, Issue 2, 2018, Pages 109-121]
  • Rafiei Korkvandi, Mojtaba A novel architecture for database outsourcing in cloud computing with regard to data life cycle [Volume 2, Issue 4, 2020, Pages 41-54]
  • Rahimi, A. Fuzzy Keyword Search Scheme on an Encrypted Database in Cloud Computing Using Word Clustering [Volume 8, Issue 3, 2020, Pages 151-165]
  • Rahimi, F. Guidance and distributed control of the networked UAVs [Volume 7, Issue 4, 2020, Pages 117-129]
  • Rahimi, Saeed A Fast Method for Computation of Scalar Multiplication of Elliptic Curve Suitable for Elliptic Curve Cryptography System [Volume 3, Issue 3, 2020, Pages 9-17]
  • Rahmanimanesh, Mohammad A Malware Classification Method Using visualization and Word Embedding Features [Volume 11, Issue 1, 2023, Pages 1-13]
  • Rahmanimanesh, Mohammad DDoS Attack Detection System Using Ensemble Method Classification and Active Learning Approach [Volume 11, Issue 3, 2024, Pages 101-118]
  • Rajaati Bavil Olyaei, M. Generating Tree Decomposition of Graphs with Imperialist Competitive Algorithm for Use in Secret Sharing Scheme [Volume 7, Issue 3, 2019, Pages 105-111]
  • Ranaei, H. Intra-pulse Modulation Recognition Using Time-Frequency Features Based on Modified-B Distribution [Volume 7, Issue 1, 2019, Pages 129-138]
  • Ranjbar, J. Wireless Target Localization Using Median Weighted Least Square Error Metric in the Presence of Non-Line of Sight Signals [Volume 8, Issue 2, 2020, Pages 125-133]
  • Ranjbar, M. Modelling and optimal solving of dependent sensor-weapon/threat assignment and scheduling problem by a metaheuristic algorithm based on GRASP [Volume 8, Issue 1, 2020, Pages 35-50]
  • Ranjbar, Mohammad Modelling and Solving the Location Problem of Fire Launching Sites [Volume 6, Issue 3, 2018, Pages 45-57]
  • Rashidi, A. J. A New Method for Image Steganography Using Discrete Wavelet Transforms [Volume 7, Issue 4, 2020, Pages 79-89]
  • Rashidi, A. J. Modeling of cyber-attacks obfuscation based on the attack analogous to the technique of insertion attacks [Volume 7, Issue 4, 2020, Pages 91-103]
  • Rashidi, A. J. Modeling of cyber-attacks obfuscation, based on alteration technique of attack [Volume 8, Issue 1, 2020, Pages 67-77]
  • Rashidi, A. J. Inverse Synthetic Aperture Radar (ISAR) Imaging of Targets with Non-Uniform Motion and Constant Acceleration based on Compressed Sensing [Volume 9, Issue 2, 2021, Pages 51-62]
  • Rashidi, Ali Jabbar A new architecture for impact projection of cyber-attacks based on high level information fusion in cyber command and control [Volume 2, Issue 4, 2020, Pages 1-14]
  • Rashidi, Ali Jabbar Projection of Muli Stage Cyber Attack Based on Belief Model and Fuzzy Inference [Volume 3, Issue 2, 2020, Pages 13-28]
  • Rashidi, Ali Jabbar Detection of advanced Cyber Attacks, Using Behavior Modeling Based on Natural Language Processing [Volume 6, Issue 3, 2018, Pages 141-151]
  • Rashidi, Ali Jabbar Projection of Cyber Attacks using Damage Estimation and Combination of Attacker’s Capability and Opportunity based on Transferable Belief Model [Volume 6, Issue 4, 2019, Pages 1-12]
  • Rasouli Heikalabad, S. Design of Content-Addressable Memory in Quantum-Dot Cellular Automata [Volume 8, Issue 4, 2021, Pages 53-61]
  • Rasouli Heikalabad, S. Proposing a New and Comprehensive Method for Quantum Representation of Digital Audio Signals [Volume 8, Issue 4, 2021, Pages 139-152]
  • Razavi, Sakineh Guilty Knowledge Test by Chaotic Processing of Electroencephalogram Signals Based on Fuzzy Recurrence Plot [Volume 10, Issue 2, 2022, Pages 87-104]
  • Razavi, Seyed Mohammad Javad A Combined Improved Algorithm to Estimating The delay of Sky waves In Loran c Receiver [Volume 2, Issue 4, 2020, Pages 55-63]
  • Razmjoei, N. A New Method for Image Steganography Using Discrete Wavelet Transforms [Volume 7, Issue 3, 2019, Pages 83-91]
  • Rezaee, Mohsen Semi-Blind Separation of Multiple Synchronous Wideband Frequency Hopping Signals Using a Band-Limited Receiver and Space-Time- Frequency Distributions [Volume 11, Issue 4, 2024]
  • Rezaei, A. Enhance Media Access Control in IEEE 802.15.4 Based Smart Grids using Swarm Intelligence Algorithms [Volume 7, Issue 3, 2019, Pages 9-20]
  • Rezaei, A. Structure of code-based hypergraphs and their application in wireless sensor networks [Volume 7, Issue 4, 2020, Pages 17-26]
  • Rezaei, Vahideh Detection of Unknown Malicious Network Streams using Ensemble Learning [Volume 6, Issue 2, 2018, Pages 93-108]
  • Rezaei Khair Abadi, M. Identification of STBC-OFDM Signals by Second-Order Cyclostationarity Method [Volume 7, Issue 4, 2020, Pages 27-36]
  • Rezaei Kheir Abadi, Mohsen Detection of Interfering Signals and Estimation of Their Carrier Frequency in CNC Satellite Communications using Cyclic Spectrum Density [Volume 11, Issue 2, 2023, Pages 91-101]
  • Rezakhani, A. The Presentation of a Hybrid Anomaly Detection Model Using Inverse Weight Clustering and Machine Learning in Cloud Environments [Volume 9, Issue 4, 2022, Pages 21-29]
  • Rezazadeh, F. Distributed Anonymity Based On the Integrated Block Chain in Vehicular Ad Hoc Network [Volume 8, Issue 4, 2021, Pages 41-52]
  • Rezvani, M. Malicious Domain Detection using DNS Records [Volume 9, Issue 3, 2021, Pages 83-97]

S

  • Saadati, Mojtaba Simulation and Evaluation of Jitter and Packet Loss Noises Influence on Covert Timing Channel Performance [Volume 2, Issue 3, 2020, Pages 35-49]
  • Saadatmand, M. Identification of STBC-OFDM Signals by Second-Order Cyclostationarity Method [Volume 7, Issue 4, 2020, Pages 27-36]
  • Sabbah, Farideh The residue number system component design based on OneHot coding [Volume 10, Issue 1, 2022, Pages 119-133]
  • Saberi, H. Providing an Ontology-Based Method for Exploring the Association Rules in Multi-Agent Distributed Environments [Volume 9, Issue 1, 2021, Pages 1-17]
  • Saberi, M. Analyzing Security Challenges of LTE Networks, Obstacles and Opportunities of Network Localization Based on the Standard Platform [Volume 7, Issue 2, 2019, Pages 121-132]
  • Saberi, Mohsen Botnet Detection for Peer to Peer Networks [Volume 3, Issue 4, 2020, Pages 43-60]
  • Sabetian, M. Intra-pulse Modulation Recognition Using Time-Frequency Features Based on Modified-B Distribution [Volume 7, Issue 1, 2019, Pages 129-138]
  • Sabzehparvar, Hossein Non-Performance of Pearson Correlation Coefficient for Evaluating Image Encryption Security [Volume 6, Issue 2, 2018, Pages 83-91]
  • Sadati, Saeideh Online Collaborative Planning in Complex Environment [Volume 2, Issue 4, 2020, Pages 15-23]
  • Sadeghi, M. Improving INS/GPS Integration with Artificial Intelligence during GPS Outage [Volume 9, Issue 2, 2021, Pages 143-157]
  • Sadeghzadeh, Mehdi Presenting a new sentiment analysis method based on multi-objective Archimedes optimization algorithm and machine learning [Volume 11, Issue 4, 2024]
  • Sadeqi Yakhdani, Maedeh A new approach for static detection of security vulnerabilities in web applications [Volume 2, Issue 4, 2020, Pages 65-74]
  • Sadidpour, Saeedeh Sadat Automatic Persian Text Generation Using Rule-Based Models and Word Embedding [Volume 9, Issue 4, 2022, Pages 43-54]
  • Sadidpour, Saeedeh Sadat Investigation of the Semantic Similarity of Persian Sentences Using Vector Space Adaptation And Deep Learning [Volume 10, Issue 2, 2022, Pages 43-56]
  • Sadidpour, Saeideh Sadat Increasing the Accuracy of Locating in Wireless Communication Systems Based on Neural Networks [Volume 3, Issue 3, 2020, Pages 31-38]
  • Sadidpour, S. S. Automatic Keyword Extraction from Persian short Text Using word2vec [Volume 8, Issue 2, 2020, Pages 105-114]
  • Sadid Pour, Saeideh Sadat An Approach Based on Semantic Similarity in Persian Query-Based Summarization [Volume 2, Issue 3, 2020, Pages 51-63]
  • Sadooghi, Ali Reza A New Method to Evaluate the Launch Pad Lightning Protection System Performance by Using LPM in 3-D [Volume 3, Issue 1, 2020, Pages 15-27]
  • Sadough, Seyed Mohammad Sajad Optimal Design of Wireless Visible Light Communication Network with the Aim of Minimizing the Outage Probability at the Location of the Mobile Receiver [Volume 10, Issue 3, 2023, Pages 1-9]
  • Sadough, Seyyed Mohammad Sajjad Joint Spectrum Sensing and Power Allocation for Multiband Cognitive Radio Networks Using Probabilistic Spectrum Access [Volume 6, Issue 3, 2018, Pages 117-130]
  • Sadough, S. M. S. Performance Analysis of Free Space Optical Communication Links under M-PAM and M-PSK Modulations using Adaptive Power and Modulation Techniques [Volume 7, Issue 1, 2019, Pages 63-75]
  • Sadr, Ali GPS Spoofing Mitigation using Adaptive Estimator in Tracking Loop [Volume 6, Issue 3, 2018, Pages 65-80]
  • Sadughi, S. Optimal Design of Low-power High-resolution Unity-STF S-MASH Sigma Delta Modulator for Telecommunication Applications [Volume 7, Issue 2, 2019, Pages 13-24]
  • Saei Moghaddam, Sobhan A New And Efficient Method of Mass Masking and its Resistance Assessment to Power Analysis [Volume 6, Issue 2, 2018, Pages 123-134]
  • Safaei, Ali Asghar Syntax and Semantic Analysis for SQL-Injection Attacks [Volume 2, Issue 1, 2020, Pages 83-97]
  • Safakish Hamedani, G. Multipartite Integral Circulant Graphs [Volume 8, Issue 3, 2020, Pages 167-170]
  • Safavi, S. M. The Distributed Denial of Service Attacks Situation Awareness Based on The Prediction of Battle Scene Using Dempster-Shefer Evidences Theories and Bayesian Rules [Volume 7, Issue 1, 2019, Pages 77-94]
  • Sahlani, Hossein Analysis of exchange market disruptors using graph-based social network analysis [Volume 11, Issue 1, 2023, Pages 107-116]
  • Sakhaei-nia, M. PIVATool- a fast and precise tool for analysis and detection of PendingIntent vulnerabilities [Volume 9, Issue 2, 2021, Pages 75-83]
  • Sakhaei-nia, M. Anomaly Detection in Dynamic Social Networks Based on Behavioral Measurements [Volume 9, Issue 1, 2021, Pages 115-123]
  • Saleh Esfahani, Mahmoud Simulation and Evaluation of Jitter and Packet Loss Noises Influence on Covert Timing Channel Performance [Volume 2, Issue 3, 2020, Pages 35-49]
  • Saleh Esfahani, Mahmoud TNAC: A Novel Trust Negotiation Based Access Control Model Using XACML Architecture [Volume 3, Issue 1, 2020, Pages 53-67]
  • Saleh Esfehani, M. Identifying Influential Nodes in Social Networks by Integrating the Centrality Method and Node Activity [Volume 8, Issue 3, 2020, Pages 1-11]
  • Salimzadeh, F. Design of Content-Addressable Memory in Quantum-Dot Cellular Automata [Volume 8, Issue 4, 2021, Pages 53-61]
  • Salmasizadeh, M. A new attack on Jakobsson Hybrid Mix-Net [Volume 7, Issue 3, 2019, Pages 113-119]
  • Samadi, R. Introducing an OFDM-CDMA Hybrid Algorithm Based on the Multiple Access Technique to Improve Indoor Visible Light Communication Link [Volume 8, Issue 3, 2020, Pages 131-137]
  • Samareh Hashemi, S. A. Structure of code-based hypergraphs and their application in wireless sensor networks [Volume 7, Issue 4, 2020, Pages 17-26]
  • Samsami Khodadad, F. Using Generalized Entropy Approach for Blind Estimation of the Length of Spreading Sequences in Code Division Multiple Access Systems [Volume 8, Issue 3, 2020, Pages 53-61]
  • Samsami Khodadad, Farid Projection of Muli Stage Cyber Attack Based on Belief Model and Fuzzy Inference [Volume 3, Issue 2, 2020, Pages 13-28]
  • Samsami Khodadad, Farid The Analysis and Design of Secure Wireless Networks in the Presence of Users with Different Security Needs Based on Covert Communication and Secure Transmission of Information Theory in the Presence of a Friendly Jammer [Volume 9, Issue 4, 2022, Pages 67-76]
  • Samsami Khodadad, Farid Improving security of wireless telecommunication networks based on covert communication in presence of a controlled noise using multiple beamforming [Volume 10, Issue 1, 2022, Pages 11-19]
  • Samsami Khodadad, Farid Security of UAV Relay Networks based on Covert Communication in the Presence of an Eavesdropping UAV [Volume 11, Issue 2, 2023, Pages 45-56]
  • Samsami Khodadad, Farid A new method for data transmission in shallow water channel based on offset multi-carrier filter bank [Volume 11, Issue 3, 2024, Pages 25-34]
  • Samsami Khodadad, Farshid Detection and Separation of Analog and Digital Modulation with SCF function, high-Order moments and dimension reduction of modulation [Volume 2, Issue 2, 2020, Pages 33-39]
  • Sanaei, Mohammad Reza A framework for assessing cyber security and privacy threats and investigating their impact on smart city performance [Volume 10, Issue 3, 2023, Pages 77-91]
  • Saram, Mahdi Aqa A new approach for static detection of security vulnerabilities in web applications [Volume 2, Issue 4, 2020, Pages 65-74]
  • Sarijloo, Mohammad Optimization of Site Topologies and Delay Extraction in Radar Emitter Location [Volume 2, Issue 2, 2020, Pages 41-51]
  • Sarkardeh, Abolfazl Introduction of the Entropy-Based Method for Finding Influential Nodes in Information Dissemination on Online Social Networks [Volume 6, Issue 2, 2018, Pages 1-10]
  • Sarram, M. A. Distributed Anonymity Based On the Integrated Block Chain in Vehicular Ad Hoc Network [Volume 8, Issue 4, 2021, Pages 41-52]
  • Sarvazimi, A. PIVATool- a fast and precise tool for analysis and detection of PendingIntent vulnerabilities [Volume 9, Issue 2, 2021, Pages 75-83]
  • Sasan, z. Improving Payload Attribution Techniques in Computer Network Criminology with Time based Hierarchical Bloom Filter [Volume 7, Issue 3, 2019, Pages 71-81]
  • Seddighi, Nazila A framework for assessing cyber security and privacy threats and investigating their impact on smart city performance [Volume 10, Issue 3, 2023, Pages 77-91]
  • Sepahvand, Mortaza Target Tracking Algorithm in Wireless Sensor Networks with Optimum Power Consumption Using Quantized Observation [Volume 6, Issue 2, 2018, Pages 109-121]
  • Sepehrian, Zahra An Approach Based on Semantic Similarity in Persian Query-Based Summarization [Volume 2, Issue 3, 2020, Pages 51-63]
  • Sepehrzadeh, Hamed A method for quantitative evaluation of security risk in cyber-physical systems [Volume 11, Issue 2, 2023, Pages 71-80]
  • Setayeshi, S. Transparent and Robust Audio Watermarking Using Synergy LU Decomposition and the Fibonacci Sequence in GBT-DCT-DWT Transforms [Volume 9, Issue 1, 2021, Pages 101-113]
  • Seyedin, Seyyed Ali Reza Target Threat Assessment using Rule-Based Joint Fuzzy and Probabilistic Networks [Volume 6, Issue 4, 2019, Pages 61-78]
  • Shafiei, Ebrahim Detection of Spoofing Attack Based on Multi-Layer Neural Network in Single-Frequency GPS Receivers [Volume 3, Issue 1, 2020, Pages 69-80]
  • Shaghaghi, E. Improvement in the Ransomwares Detection Method With New API Calls Features [Volume 8, Issue 4, 2021, Pages 107-118]
  • Shah Hosseini, M. Concurrent Detection of Compact Anomalous Subgraphs in Large Social Networks [Volume 9, Issue 2, 2021, Pages 179-194]
  • Shahidinejad, A. Resource Elasticity Management using Fuzzy Controller Based on Threshold Changes in the Cloud Computing Environment [Volume 8, Issue 3, 2020, Pages 63-81]
  • Shahidinejad, A. Detection and Prevention of SQL Injection Attacks at Runtime Using Decision Tree Classification [Volume 8, Issue 4, 2021, Pages 75-93]
  • Shahidinejad, A. A Mutual Authentication Protocol for IoT Users in Cloud Environment [Volume 9, Issue 2, 2021, Pages 17-28]
  • Shahrezaee, Mohsen Fixing Security Defects of Video Authentication Systems with Face Recognition, Based on 3D Structure and Shape Evaluation [Volume 9, Issue 4, 2022, Pages 141-145]
  • Shahrezaei, M. A New Method for Image Steganography Using Discrete Wavelet Transforms [Volume 7, Issue 3, 2019, Pages 83-91]
  • Shahriari, M. Analyzing Security Challenges of LTE Networks, Obstacles and Opportunities of Network Localization Based on the Standard Platform [Volume 7, Issue 2, 2019, Pages 121-132]
  • Shamalizade Baei, M. A. Designing a combinatorial Image Steganography algorithm based on game theory [Volume 8, Issue 1, 2020, Pages 133-145]
  • Sharifkhani, M. Optimal Design of Low-power High-resolution Unity-STF S-MASH Sigma Delta Modulator for Telecommunication Applications [Volume 7, Issue 2, 2019, Pages 13-24]
  • Shayesteh far, M. Increasing Insertion Capacity and Resistance in Image Steganography Based on Mapping and Bits Reduction [Volume 7, Issue 2, 2019, Pages 33-39]
  • Sheikh, Fereshteh An Efficient Visual Multi-Secret Sharing Scheme [Volume 3, Issue 4, 2020, Pages 1-9]
  • Sheikhmohammadi, H. R. The Course of Action Selection Model in Network Centric Operation [Volume 7, Issue 2, 2019, Pages 133-155]
  • Sheikhmohammadi, M. Deterrence Model in Cyberspace Based on Bayesian Belief Attack Graph by using Risk Creating Payoff Function [Volume 7, Issue 1, 2019, Pages 25-38]
  • Sheikhmohammadi, M. The Presentation of a Model for Analyzing the Behavior of the Enemy Using Hidden Markov Models Based on Electronic Warfare Observations in Complex War Scenes [Volume 7, Issue 1, 2019, Pages 113-128]
  • Sheikhmohammadi, M. Evaluation of Network-Based Operation Criteria Based on DEMATEL Method [Volume 7, Issue 1, 2019, Pages 139-153]
  • Shirazi, Hassan An Approach Based on Semantic Similarity in Persian Query-Based Summarization [Volume 2, Issue 3, 2020, Pages 51-63]
  • Shirazi, Hossein Implementing a Novel Malware Detection System in Virtual Machines [Volume 2, Issue 3, 2020, Pages 23-33]
  • Shirazi, Hossein A new approach in identifying malware with memory image analysis [Volume 3, Issue 1, 2020, Pages 1-14]
  • Shirazi, Hossein Web-based Military Management Systems Security Using Combination of One-class Classifiers [Volume 3, Issue 3, 2020, Pages 19-30]
  • Shirazi, Hossein Rumor Detection on Social Networks Based on the Degree Distribution Analysis in Step-by-Step Propagation Subgraphs [Volume 10, Issue 3, 2023, Pages 93-105]
  • Shirazi, Hossein Improving the performance of the convolutional neural network using incremental weight loss function to deal with class imbalanced data [Volume 11, Issue 4, 2024, Pages 19-34]
  • Shiri Ahmadabadi, M. E. The Presentation of a Hybrid Anomaly Detection Model Using Inverse Weight Clustering and Machine Learning in Cloud Environments [Volume 9, Issue 4, 2022, Pages 21-29]
  • Shojaeefard, Mohammad H Detection of Slippery Road Conditions using the Road CCTV Images based on the Convolutional Neural Networks and Transfer Learning [Volume 10, Issue 2, 2022, Pages 105-116]
  • Shojaee yas, H. Kavosh: Offering an Analysis Method and the Impact of Normal Network Traffic on Selection and Extraction Based on the Minkowski Distance [Volume 9, Issue 1, 2021, Pages 137-147]
  • Shokhmzan, Zahra Defense Against Spoofing in GPS Receiver using Correlation and Least Mean Squares Method Based on Sign-Data Algorithm [Volume 3, Issue 4, 2020, Pages 11-22]
  • Shokoohi, Maryam Distributed Solving of Weapon Target Assignment Problem using Learning Automata [Volume 11, Issue 1, 2023, Pages 47-55]
  • Shoshian, K. Modeling of Obfuscated Multi- Stage cyber Attacks [Volume 8, Issue 2, 2020, Pages 61-73]
  • Shoushian, K. Modeling of cyber-attacks obfuscation based on the attack analogous to the technique of insertion attacks [Volume 7, Issue 4, 2020, Pages 91-103]
  • Shoushian, K. Modeling of cyber-attacks obfuscation, based on alteration technique of attack [Volume 8, Issue 1, 2020, Pages 67-77]
  • Sobhani, S. A New Method for Image Steganography Using Discrete Wavelet Transforms [Volume 7, Issue 4, 2020, Pages 79-89]
  • Soleimani, H. Analysis of Impossible Differential on LowMC Block Cipher [Volume 7, Issue 2, 2019, Pages 69-79]
  • Soleimani Majd, Reza Novel Spoofing Mitigation Method using Wavelet Transform Based on PSO Algorithm in the Acquisition Stage of GPS Receiver [Volume 10, Issue 4, 2023, Pages 19-31]
  • Soleimany, H. Introducing a new timing attack on the ARM processor and its practical implementation on the Raspberrypi3 board [Volume 8, Issue 1, 2020, Pages 125-132]
  • Soltanaghaie, M. R. Distributed Denial of Service Attacks Detection in Software Defined Networks [Volume 9, Issue 1, 2021, Pages 43-59]
  • Soltaninia, Vahidreza Security of UAV Relay Networks based on Covert Communication in the Presence of an Eavesdropping UAV [Volume 11, Issue 2, 2023, Pages 45-56]
  • Soltanizadeh, Hadi A Malware Classification Method Using visualization and Word Embedding Features [Volume 11, Issue 1, 2023, Pages 1-13]

T

  • Tabaghchi Milan, Sara Hybrid Method for Detecting Trustworthy Cloud Service Providers using Analytical Hierarchical Process and Neural Network [Volume 6, Issue 4, 2019, Pages 105-122]
  • Tabatabaei Feizabad, Seyyed Ali Modelling and Solving the Location Problem of Fire Launching Sites [Volume 6, Issue 3, 2018, Pages 59-64]
  • Tabatabavakily, V. A Novel Algorithm for Radar Jamming Resource Allocation [Volume 7, Issue 3, 2019, Pages 53-70]
  • Taei zadeh, Ali Presenting a new sentiment analysis method based on multi-objective Archimedes optimization algorithm and machine learning [Volume 11, Issue 4, 2024]
  • Taghavi, Mohammad Taghi Evaluating Deep Learning Models for Test Data Generation In File Based Fuzzers [Volume 10, Issue 2, 2022, Pages 57-73]
  • Taghizadeh, M. Optimal Design of Low-power High-resolution Unity-STF S-MASH Sigma Delta Modulator for Telecommunication Applications [Volume 7, Issue 2, 2019, Pages 13-24]
  • Tahanian, Esmaeel Malicious Domain Detection using DNS Records [Volume 9, Issue 3, 2021, Pages 83-97]
  • Taheri, Seyyed Mahmoud Self-stabilizing Grundy Coloring Using Game Theory and Heuristics Ordering [Volume 6, Issue 2, 2018, Pages 39-48]
  • Tajaddod, A. Structural Analysis based on Integral Characteristic of a Reduced Round Block Cipher with Making an Improvement [Volume 7, Issue 3, 2019, Pages 1-8]
  • Tajali Pour, Bahareh Syntax and Semantic Analysis for SQL-Injection Attacks [Volume 2, Issue 1, 2020, Pages 83-97]
  • Tajari Siahmarzkooh, Aliakbar Intrusion Detection in Computer Networks using Decision Tree and Feature Reduction [Volume 9, Issue 3, 2021, Pages 99-108]
  • Tajfar, A. H. Prioritizing Obstacles to Industrial Control Systems Security Management Implementation, using Interpretive Structural Modeling (ISM) Approach [Volume 7, Issue 2, 2019, Pages 109-119]
  • Talati, S. Radar data processing using a combination of principal component analysis methods and self-organizing and digitized neural networks of the learning vector [Volume 9, Issue 2, 2021, Pages 1-7]
  • Talati, saeed Security of UAV Relay Networks based on Covert Communication in the Presence of an Eavesdropping UAV [Volume 11, Issue 2, 2023, Pages 45-56]
  • Talebpour Ardakani, Mohsen Sensing and detecting changes due to displacement, pressure, or dynamic vibration in an optical fiber, based on fiber Specklegram [Volume 11, Issue 3, 2024, Pages 89-99]
  • Taleqani Zadeh, Kobra A Mutual Anonymity Private Authentication Protocol to Use in Radio-Frequency Identification Systems [Volume 6, Issue 4, 2019, Pages 45-59]
  • Tanha, Jafar A model for Multi-Class Intrusion Detection Using the Dragonfly Feature Selection by Learning on the KDD-CUP99 Dataset [Volume 10, Issue 3, 2023, Pages 33-42]
  • Tarasi Boroujeni, S. A. Prioritizing Obstacles to Industrial Control Systems Security Management Implementation, using Interpretive Structural Modeling (ISM) Approach [Volume 7, Issue 2, 2019, Pages 109-119]
  • Tavasoli, Afsaneh Reducing the Effects of Deception Attack on GPS Receivers of Phasor Measurement Units using Neural Networks [Volume 11, Issue 1, 2023, Pages 97-105]
  • Teimouri, Ebrahim The Design Process Reform of the Gama-ray Imaging System by using the Design Structure Matrix [Volume 6, Issue 3, 2018, Pages 95-106]
  • Teimouri, M. Prediction of Plaintext in GSM Network using SDCCH Logical Channel [Volume 9, Issue 3, 2021, Pages 39-47]
  • Teymouri, Mahdi Blind Estimation of Number of Users in TDMA Networks Using Redundancy of Adaptive Channel Coding [Volume 6, Issue 2, 2018, Pages 11-20]
  • Teymour Pour, Babak An Optimized Unsupervised Feature Selection Algorithm [Volume 3, Issue 3, 2020, Pages 1-7]
  • Tohidi, S. Reducing Interference Effect on GPS Receiver by Using Multi-correlation Architecture [Volume 9, Issue 3, 2021, Pages 49-57]
  • Tohidi, S. Novel Spoofing Mitigation Method using Wavelet Transform Based on PSO Algorithm in the Acquisition Stage of GPS Receiver [Volume 10, Issue 4, 2023, Pages 19-31]
  • Torabi, M. Resource Elasticity Management using Fuzzy Controller Based on Threshold Changes in the Cloud Computing Environment [Volume 8, Issue 3, 2020, Pages 63-81]
  • Torabi, M. Detection and Prevention of SQL Injection Attacks at Runtime Using Decision Tree Classification [Volume 8, Issue 4, 2021, Pages 75-93]
  • Toroghi Haghighat, A. An Improved New Link Prediction Method in Social Multilplex Networks Based on the Gravitational Search Algorithm [Volume 8, Issue 2, 2020, Pages 15-24]
  • Tprabian, Omid Blind Frequency Offset Estimation using Adaptive Algorithms in Non-Coherent OFDM Systems [Volume 3, Issue 4, 2020, Pages 61-70]

V

  • Vafa, S. A Practical Template Attack Against the Implementation of the Advanced Encryption Standard on ARM Processor [Volume 7, Issue 1, 2019, Pages 39-48]
  • Veysi, M. Guidance and distributed control of the networked UAVs [Volume 7, Issue 4, 2020, Pages 117-129]
  • Vosoughi, V. Detecting of Botnets’ Malicious Domains with Deep Autoencoder Neural Network [Volume 9, Issue 1, 2021, Pages 61-74]

Y

  • Yadegari, Vahid Detect Web Denial of Service Attacks Using Entropy and Support Vector Machine Algorithm [Volume 6, Issue 4, 2019, Pages 79-89]
  • Yadegari, Vahid dentifying Zero Day Android Daily through Neural Networks [Volume 11, Issue 3, 2024, Pages 49-55]
  • Yadeghari, Mohsen Target Threat Assessment using Rule-Based Joint Fuzzy and Probabilistic Networks [Volume 6, Issue 4, 2019, Pages 61-78]
  • Yaghoobi, Mahdi Energy Aware Routing in the Internet of Things using improved Grasshopper Metaheuristic Algorithm [Volume 11, Issue 1, 2023, Pages 15-29]
  • Yaghoobi, Mahdi Improving mobile mass monitoring in the IoT environment based on Chaotic Fog Algorithm [Volume 11, Issue 3, 2024, Pages 77-88]
  • Yahya Abadi, Mostafa A New Method to Evaluate the Launch Pad Lightning Protection System Performance by Using LPM in 3-D [Volume 3, Issue 1, 2020, Pages 15-27]
  • Yasrebi, Milad Detection of Unknown Malicious Network Streams using Ensemble Learning [Volume 6, Issue 2, 2018, Pages 93-108]
  • Yazdanpanah, S. Speech Steganalysis of Least Significant Bits Based on the Percentage of Equal Adjacent Samples [Volume 9, Issue 1, 2021, Pages 75-90]
  • Yosefi, F. S. Cardinal Hermit functions and their application in solving the time-delay fractional optimal control problems [Volume 8, Issue 4, 2021, Pages 153-160]

Z

  • Zabbah, E. Network Intrusion Detection using a combination of artificial neural networks in a hierarchical manner [Volume 8, Issue 1, 2020, Pages 89-99]
  • Zabihi, H. Robust Adaptive Beamforming Against Interferer’s Direction Of Arrival Estimation Error [Volume 7, Issue 3, 2019, Pages 27-36]
  • Zabihi, M. Smart Detection of Covert Worms in Computer Networks [Volume 7, Issue 4, 2020, Pages 67-77]
  • Zaghian, A. A New Approach for Estimating the Rate of Emission in Quantum Bit Exchange‏ ‎Systems ‎Using Binomial Distribution [Volume 7, Issue 1, 2019, Pages 105-112]
  • Z.akeri Nasrabadi, M. Automatic Test Data Generation in File Format Fuzzers [Volume 8, Issue 1, 2020, Pages 1-16]
  • Zamani Boroujeni, F. Distributed Denial of Service Attacks Detection in Software Defined Networks [Volume 9, Issue 1, 2021, Pages 43-59]
  • Zandvakili, A. SCEIRS information dissemination model based on rumor spreading in complex networks [Volume 9, Issue 2, 2021, Pages 121-134]
  • Zarei Zefreh, E. An Image Encryption Algorithm Based on the Sn Permutation Group and Chaotic Functions [Volume 8, Issue 3, 2020, Pages 139-150]
  • Zarrabi, Houman Presentation of a model for feasibility assessment of implementing the IoT social network projects using the existing public social networks as the infrastructure [Volume 10, Issue 1, 2022, Pages 73-84]
  • Zeynali, B. Introduction of An Anti-Collision Protocol in RFID Systems [Volume 8, Issue 4, 2021, Pages 119-128]