Author Index

A

  • Adib Nia, Fazlollah A new approach for static detection of security vulnerabilities in web applications [Volume 2, Issue 4, 2020, Pages 65-74]
  • Akbarian, Hassan Robust Steganography Algorithm Text in the Image Using A Spread Spectrum Method [Volume 2, Issue 3, 2020, Pages 77-83]
  • Akhlaqi, Sroush A New Metric for Estimation the User Position in the Multi User OFDMA Networks [Volume 2, Issue 3, 2020, Pages 1-11]
  • Alidoust Nia, Mehran Designing Anonymous Communication System by Lattice-Based Cryptography [Volume 2, Issue 3, 2020, Pages 13-22]
  • Aref, Mohammad Reza A New (t,n) Designated Verifier Threshold Proxy Signature Scheme in the Standard Model [Volume 2, Issue 1, 2020, Pages 25-35]
  • Asghar pour Salkuyeh, Mostafa Optimization of Site Topologies and Delay Extraction in Radar Emitter Location [Volume 2, Issue 2, 2020, Pages 41-51]

B

  • Bahramian, Mohsen A New Metric for Estimation the User Position in the Multi User OFDMA Networks [Volume 2, Issue 3, 2020, Pages 1-11]
  • Barari, Mortaza A new architecture for impact projection of cyber-attacks based on high level information fusion in cyber command and control [Volume 2, Issue 4, 2020, Pages 1-14]
  • Bayat, Meysam A Combined Improved Algorithm to Estimating The delay of Sky waves In Loran c Receiver [Volume 2, Issue 4, 2020, Pages 55-63]
  • Beheshti Atashgah, Mohammad A New (t,n) Designated Verifier Threshold Proxy Signature Scheme in the Standard Model [Volume 2, Issue 1, 2020, Pages 25-35]

C

  • Chaman Motlaq, Abolfazl Simulation the modify FSM , in autotracking systems to Stabilization secure links of free space optical communications [Volume 2, Issue 1, 2020, Pages 61-69]

D

  • Dadash Tabar Ahmadi, Koroush A new architecture for impact projection of cyber-attacks based on high level information fusion in cyber command and control [Volume 2, Issue 4, 2020, Pages 1-14]
  • Dehqani, Mahdi Simulation and Evaluation of Jitter and Packet Loss Noises Influence on Covert Timing Channel Performance [Volume 2, Issue 3, 2020, Pages 35-49]

E

  • Ebrahimi Atani, Reza Designing Anonymous Communication System by Lattice-Based Cryptography [Volume 2, Issue 3, 2020, Pages 13-22]
  • Ebrahimi Atani, Reza Utilizing Port-Knocking as first defensive layer at defense-in-depth strategies using hybrid of the Internet Control Message Protocol features, Internet Addresses and Tunneling [Volume 2, Issue 4, 2020, Pages 25-40]
  • Eizadi, Seyed Kamiar A novel architecture for database outsourcing in cloud computing with regard to data life cycle [Volume 2, Issue 4, 2020, Pages 41-54]

F

  • Farshchi, Seyed Mohammad Reza Implementing a Novel Malware Detection System in Virtual Machines [Volume 2, Issue 3, 2020, Pages 23-33]
  • Feyzi, Majid Simulation the modify FSM , in autotracking systems to Stabilization secure links of free space optical communications [Volume 2, Issue 1, 2020, Pages 61-69]

G

  • Gardeshi, Mahmoud A New (t,n) Designated Verifier Threshold Proxy Signature Scheme in the Standard Model [Volume 2, Issue 1, 2020, Pages 25-35]
  • Gholami, Mahdi The Impact of Security Mechanisms on Software Vulnerabilities [Volume 2, Issue 1, 2020, Pages 49-60]

H

  • Hassani Karbasi, Amir Designing Anonymous Communication System by Lattice-Based Cryptography [Volume 2, Issue 3, 2020, Pages 13-22]
  • Hosseini, Seyed Nasrollah Detection and Separation of Analog and Digital Modulation with SCF function, high-Order moments and dimension reduction of modulation [Volume 2, Issue 2, 2020, Pages 33-39]

J

  • Javaheri, Danial A Secure Environment for Behavioral Malware Analysis [Volume 2, Issue 3, 2020, Pages 65-76]

K

  • Kabiri, Rahman Optimization of Site Topologies and Delay Extraction in Radar Emitter Location [Volume 2, Issue 2, 2020, Pages 41-51]
  • Kermani, Ali Optimization of Site Topologies and Delay Extraction in Radar Emitter Location [Volume 2, Issue 2, 2020, Pages 41-51]
  • Khosh Sefat, Abolfazl A novel architecture for database outsourcing in cloud computing with regard to data life cycle [Volume 2, Issue 4, 2020, Pages 41-54]

M

N

  • Naqavi, Mahdi The Impact of Security Mechanisms on Software Vulnerabilities [Volume 2, Issue 1, 2020, Pages 49-60]
  • Naqian Fesharaki, Mahdi Online Collaborative Planning in Complex Environment [Volume 2, Issue 4, 2020, Pages 15-23]
  • Nazari, Mohammad Detection and Separation of Analog and Digital Modulation with SCF function, high-Order moments and dimension reduction of modulation [Volume 2, Issue 2, 2020, Pages 33-39]
  • Noushi Fard, Taqi The Impact of Security Mechanisms on Software Vulnerabilities [Volume 2, Issue 1, 2020, Pages 49-60]

P

  • Parsa, Saeed A Secure Environment for Behavioral Malware Analysis [Volume 2, Issue 3, 2020, Pages 65-76]
  • Pour Vahhab, Mehran Utilizing Port-Knocking as first defensive layer at defense-in-depth strategies using hybrid of the Internet Control Message Protocol features, Internet Addresses and Tunneling [Volume 2, Issue 4, 2020, Pages 25-40]

Q

  • Qesmati, Simin Spam Management in Social Networks by Content Rating [Volume 2, Issue 2, 2020, Pages 53-62]

R

  • Rafiei Korkvandi, Mojtaba A novel architecture for database outsourcing in cloud computing with regard to data life cycle [Volume 2, Issue 4, 2020, Pages 41-54]
  • Rashidi, Ali Jabbar A new architecture for impact projection of cyber-attacks based on high level information fusion in cyber command and control [Volume 2, Issue 4, 2020, Pages 1-14]
  • Razavi, Seyed Mohammad Javad A Combined Improved Algorithm to Estimating The delay of Sky waves In Loran c Receiver [Volume 2, Issue 4, 2020, Pages 55-63]

S

  • Saadati, Mojtaba Simulation and Evaluation of Jitter and Packet Loss Noises Influence on Covert Timing Channel Performance [Volume 2, Issue 3, 2020, Pages 35-49]
  • Sadati, Saeideh Online Collaborative Planning in Complex Environment [Volume 2, Issue 4, 2020, Pages 15-23]
  • Sadeqi Yakhdani, Maedeh A new approach for static detection of security vulnerabilities in web applications [Volume 2, Issue 4, 2020, Pages 65-74]
  • Sadid Pour, Saeideh Sadat An Approach Based on Semantic Similarity in Persian Query-Based Summarization [Volume 2, Issue 3, 2020, Pages 51-63]
  • Safaei, Ali Asghar Syntax and Semantic Analysis for SQL-Injection Attacks [Volume 2, Issue 1, 2020, Pages 83-97]
  • Saleh Esfahani, Mahmoud Simulation and Evaluation of Jitter and Packet Loss Noises Influence on Covert Timing Channel Performance [Volume 2, Issue 3, 2020, Pages 35-49]
  • Samsami Khodadad, Farshid Detection and Separation of Analog and Digital Modulation with SCF function, high-Order moments and dimension reduction of modulation [Volume 2, Issue 2, 2020, Pages 33-39]
  • Saram, Mahdi Aqa A new approach for static detection of security vulnerabilities in web applications [Volume 2, Issue 4, 2020, Pages 65-74]
  • Sarijloo, Mohammad Optimization of Site Topologies and Delay Extraction in Radar Emitter Location [Volume 2, Issue 2, 2020, Pages 41-51]
  • Sepehrian, Zahra An Approach Based on Semantic Similarity in Persian Query-Based Summarization [Volume 2, Issue 3, 2020, Pages 51-63]
  • Shirazi, Hassan An Approach Based on Semantic Similarity in Persian Query-Based Summarization [Volume 2, Issue 3, 2020, Pages 51-63]
  • Shirazi, Hossein Implementing a Novel Malware Detection System in Virtual Machines [Volume 2, Issue 3, 2020, Pages 23-33]

T

  • Tajali Pour, Bahareh Syntax and Semantic Analysis for SQL-Injection Attacks [Volume 2, Issue 1, 2020, Pages 83-97]