A
-
Adib Nia, Fazlollah
A new approach for static detection of security vulnerabilities in web applications [Volume 2, Issue 4, 2020, Pages 65-74]
-
Akbarian, Hassan
Robust Steganography Algorithm Text in the Image Using A Spread Spectrum Method [Volume 2, Issue 3, 2020, Pages 77-83]
-
Akhlaqi, Sroush
A New Metric for Estimation the User Position in the Multi User OFDMA Networks [Volume 2, Issue 3, 2020, Pages 1-11]
-
Alidoust Nia, Mehran
Designing Anonymous Communication System by Lattice-Based Cryptography [Volume 2, Issue 3, 2020, Pages 13-22]
-
Aref, Mohammad Reza
A New (t,n) Designated Verifier Threshold Proxy Signature Scheme in the Standard Model [Volume 2, Issue 1, 2020, Pages 25-35]
-
Asghar pour Salkuyeh, Mostafa
Optimization of Site Topologies and Delay Extraction in Radar Emitter Location [Volume 2, Issue 2, 2020, Pages 41-51]
B
-
Bahramian, Mohsen
A New Metric for Estimation the User Position in the Multi User OFDMA Networks [Volume 2, Issue 3, 2020, Pages 1-11]
-
Barari, Mortaza
A new architecture for impact projection of cyber-attacks based on high level information fusion in cyber command and control [Volume 2, Issue 4, 2020, Pages 1-14]
-
Bayat, Meysam
A Combined Improved Algorithm to Estimating The delay of Sky waves In Loran c Receiver [Volume 2, Issue 4, 2020, Pages 55-63]
-
Beheshti Atashgah, Mohammad
A New (t,n) Designated Verifier Threshold Proxy Signature Scheme in the Standard Model [Volume 2, Issue 1, 2020, Pages 25-35]
C
-
Chaman Motlaq, Abolfazl
Simulation the modify FSM , in autotracking systems to Stabilization secure links of free space optical communications [Volume 2, Issue 1, 2020, Pages 61-69]
D
-
Dadash Tabar Ahmadi, Koroush
A new architecture for impact projection of cyber-attacks based on high level information fusion in cyber command and control [Volume 2, Issue 4, 2020, Pages 1-14]
-
Dehqani, Mahdi
Simulation and Evaluation of Jitter and Packet Loss Noises Influence on Covert Timing Channel Performance [Volume 2, Issue 3, 2020, Pages 35-49]
E
-
Ebrahimi Atani, Reza
Designing Anonymous Communication System by Lattice-Based Cryptography [Volume 2, Issue 3, 2020, Pages 13-22]
-
Ebrahimi Atani, Reza
Utilizing Port-Knocking as first defensive layer at defense-in-depth strategies using hybrid of the Internet Control Message Protocol features, Internet Addresses and Tunneling [Volume 2, Issue 4, 2020, Pages 25-40]
-
Eizadi, Seyed Kamiar
A novel architecture for database outsourcing in cloud computing with regard to data life cycle [Volume 2, Issue 4, 2020, Pages 41-54]
F
-
Farshchi, Seyed Mohammad Reza
Implementing a Novel Malware Detection System in Virtual Machines [Volume 2, Issue 3, 2020, Pages 23-33]
-
Feyzi, Majid
Simulation the modify FSM , in autotracking systems to Stabilization secure links of free space optical communications [Volume 2, Issue 1, 2020, Pages 61-69]
G
-
Gardeshi, Mahmoud
A New (t,n) Designated Verifier Threshold Proxy Signature Scheme in the Standard Model [Volume 2, Issue 1, 2020, Pages 25-35]
-
Gholami, Mahdi
The Impact of Security Mechanisms on Software Vulnerabilities [Volume 2, Issue 1, 2020, Pages 49-60]
H
-
Hassani Karbasi, Amir
Designing Anonymous Communication System by Lattice-Based Cryptography [Volume 2, Issue 3, 2020, Pages 13-22]
-
Hosseini, Seyed Nasrollah
Detection and Separation of Analog and Digital Modulation with SCF function, high-Order moments and dimension reduction of modulation [Volume 2, Issue 2, 2020, Pages 33-39]
J
-
Javaheri, Danial
A Secure Environment for Behavioral Malware Analysis [Volume 2, Issue 3, 2020, Pages 65-76]
K
-
Kabiri, Rahman
Optimization of Site Topologies and Delay Extraction in Radar Emitter Location [Volume 2, Issue 2, 2020, Pages 41-51]
-
Kermani, Ali
Optimization of Site Topologies and Delay Extraction in Radar Emitter Location [Volume 2, Issue 2, 2020, Pages 41-51]
-
Khosh Sefat, Abolfazl
A novel architecture for database outsourcing in cloud computing with regard to data life cycle [Volume 2, Issue 4, 2020, Pages 41-54]
M
-
Madani, Mohammad Hossein
A Combined Improved Algorithm to Estimating The delay of Sky waves In Loran c Receiver [Volume 2, Issue 4, 2020, Pages 55-63]
-
Mollazadeh Golmahalleh, Mahdi
A New Metric for Estimation the User Position in the Multi User OFDMA Networks [Volume 2, Issue 3, 2020, Pages 1-11]
-
Momeni Azandariani, Amir Hossein
Online Collaborative Planning in Complex Environment [Volume 2, Issue 4, 2020, Pages 15-23]
N
-
Naqavi, Mahdi
The Impact of Security Mechanisms on Software Vulnerabilities [Volume 2, Issue 1, 2020, Pages 49-60]
-
Naqian Fesharaki, Mahdi
Online Collaborative Planning in Complex Environment [Volume 2, Issue 4, 2020, Pages 15-23]
-
Nazari, Mohammad
Detection and Separation of Analog and Digital Modulation with SCF function, high-Order moments and dimension reduction of modulation [Volume 2, Issue 2, 2020, Pages 33-39]
-
Noushi Fard, Taqi
The Impact of Security Mechanisms on Software Vulnerabilities [Volume 2, Issue 1, 2020, Pages 49-60]
P
-
Parsa, Saeed
A Secure Environment for Behavioral Malware Analysis [Volume 2, Issue 3, 2020, Pages 65-76]
-
Pour Vahhab, Mehran
Utilizing Port-Knocking as first defensive layer at defense-in-depth strategies using hybrid of the Internet Control Message Protocol features, Internet Addresses and Tunneling [Volume 2, Issue 4, 2020, Pages 25-40]
Q
-
Qesmati, Simin
Spam Management in Social Networks by Content Rating [Volume 2, Issue 2, 2020, Pages 53-62]
R
-
Rafiei Korkvandi, Mojtaba
A novel architecture for database outsourcing in cloud computing with regard to data life cycle [Volume 2, Issue 4, 2020, Pages 41-54]
-
Rashidi, Ali Jabbar
A new architecture for impact projection of cyber-attacks based on high level information fusion in cyber command and control [Volume 2, Issue 4, 2020, Pages 1-14]
-
Razavi, Seyed Mohammad Javad
A Combined Improved Algorithm to Estimating The delay of Sky waves In Loran c Receiver [Volume 2, Issue 4, 2020, Pages 55-63]
S
-
Saadati, Mojtaba
Simulation and Evaluation of Jitter and Packet Loss Noises Influence on Covert Timing Channel Performance [Volume 2, Issue 3, 2020, Pages 35-49]
-
Sadati, Saeideh
Online Collaborative Planning in Complex Environment [Volume 2, Issue 4, 2020, Pages 15-23]
-
Sadeqi Yakhdani, Maedeh
A new approach for static detection of security vulnerabilities in web applications [Volume 2, Issue 4, 2020, Pages 65-74]
-
Sadid Pour, Saeideh Sadat
An Approach Based on Semantic Similarity in Persian Query-Based Summarization [Volume 2, Issue 3, 2020, Pages 51-63]
-
Safaei, Ali Asghar
Syntax and Semantic Analysis for SQL-Injection Attacks [Volume 2, Issue 1, 2020, Pages 83-97]
-
Saleh Esfahani, Mahmoud
Simulation and Evaluation of Jitter and Packet Loss Noises Influence on Covert Timing Channel Performance [Volume 2, Issue 3, 2020, Pages 35-49]
-
Samsami Khodadad, Farshid
Detection and Separation of Analog and Digital Modulation with SCF function, high-Order moments and dimension reduction of modulation [Volume 2, Issue 2, 2020, Pages 33-39]
-
Saram, Mahdi Aqa
A new approach for static detection of security vulnerabilities in web applications [Volume 2, Issue 4, 2020, Pages 65-74]
-
Sarijloo, Mohammad
Optimization of Site Topologies and Delay Extraction in Radar Emitter Location [Volume 2, Issue 2, 2020, Pages 41-51]
-
Sepehrian, Zahra
An Approach Based on Semantic Similarity in Persian Query-Based Summarization [Volume 2, Issue 3, 2020, Pages 51-63]
-
Shirazi, Hassan
An Approach Based on Semantic Similarity in Persian Query-Based Summarization [Volume 2, Issue 3, 2020, Pages 51-63]
-
Shirazi, Hossein
Implementing a Novel Malware Detection System in Virtual Machines [Volume 2, Issue 3, 2020, Pages 23-33]
T
-
Tajali Pour, Bahareh
Syntax and Semantic Analysis for SQL-Injection Attacks [Volume 2, Issue 1, 2020, Pages 83-97]
Your query does not match with any item