Author Index

A

  • Abdolmaleki, Behzad Weaknesses of SPRS Authentication Protocol and Present a Developed Protocol for RFID Systems [Volume 3, Issue 3, 2020, Pages 39-48]
  • Abdolrazzagh Nejad, Majid Phishing Website Detection for e-Banking by Inclined Planes Optimization Algorithm [Volume 3, Issue 1, 2020, Pages 29-39]
  • Aghaei Kheirabadi, Masoumeh A new approach in identifying malware with memory image analysis [Volume 3, Issue 1, 2020, Pages 1-14]
  • Ahmadian Yazdi, Hamed Blind Frequency Offset Estimation using Adaptive Algorithms in Non-Coherent OFDM Systems [Volume 3, Issue 4, 2020, Pages 61-70]
  • Amirkhani, Zahra Increasing the Accuracy of Locating in Wireless Communication Systems Based on Neural Networks [Volume 3, Issue 3, 2020, Pages 31-38]
  • Azmi, Reza Botnet Detection for Peer to Peer Networks [Volume 3, Issue 4, 2020, Pages 43-60]

B

  • Bagheri, Karim Weaknesses of SPRS Authentication Protocol and Present a Developed Protocol for RFID Systems [Volume 3, Issue 3, 2020, Pages 39-48]
  • Bagheri, Masoud Design the Model of CSRF Attack Tree for Immunization the Web Application in Development Process [Volume 3, Issue 1, 2020, Pages 41-52]
  • Barmashoori, Mostafa An Improved Authentication Scheme with Conditional Privacy Preserving in VANETs [Volume 3, Issue 2, 2020, Pages 1-12]

D

  • Dadashtabar Ahmadi, Kourosh Projection of Muli Stage Cyber Attack Based on Belief Model and Fuzzy Inference [Volume 3, Issue 2, 2020, Pages 13-28]

E

  • Etezadifar, Pouria Quality enhancement of received video using secondary channel encoding in Joint Source and Channel Coding (JSCC) [Volume 3, Issue 2, 2020, Pages 29-48]

F

  • Farasi, Hassan Quality enhancement of received video using secondary channel encoding in Joint Source and Channel Coding (JSCC) [Volume 3, Issue 2, 2020, Pages 29-48]
  • Farshchi, Seyed Mohammad Reza A new approach in identifying malware with memory image analysis [Volume 3, Issue 1, 2020, Pages 1-14]

G

  • Ghardeshi, Mahmoud An Improved Authentication Scheme with Conditional Privacy Preserving in VANETs [Volume 3, Issue 2, 2020, Pages 1-12]
  • Golestani, Ali Enhancing Communication Security in Cellular Communications Networks by using Interference Alignment Technique [Volume 3, Issue 2, 2020, Pages 49-60]
  • Golestani, Ali Blind Frequency Offset Estimation using Adaptive Algorithms in Non-Coherent OFDM Systems [Volume 3, Issue 4, 2020, Pages 61-70]

H

  • Habibi Bastami, Ali Enhancing Communication Security in Cellular Communications Networks by using Interference Alignment Technique [Volume 3, Issue 2, 2020, Pages 49-60]
  • Hadi, Mohammad Sequential Decoding Algorithms of Convolutional Codes: Implementation, Improvement and Comparison [Volume 3, Issue 2, 2020, Pages 61-73]
  • Hadi, Mohammad Optimum Parameter Selection for Rainbow Table TMTO Attack Considering Breaking Time and Using Sequential and Index Search Methods [Volume 3, Issue 3, 2020, Pages 49-57]
  • Hasani Ahanghar, Mohammad Reza TNAC: A Novel Trust Negotiation Based Access Control Model Using XACML Architecture [Volume 3, Issue 1, 2020, Pages 53-67]

J

  • Jamali Fard, Amineh Web-based Military Management Systems Security Using Combination of One-class Classifiers [Volume 3, Issue 3, 2020, Pages 19-30]

K

  • Kakaei, Hamid Reza An Optimized Unsupervised Feature Selection Algorithm [Volume 3, Issue 3, 2020, Pages 1-7]
  • Karimi, Ali TNAC: A Novel Trust Negotiation Based Access Control Model Using XACML Architecture [Volume 3, Issue 1, 2020, Pages 53-67]
  • Kheiri, Ali Design the Model of CSRF Attack Tree for Immunization the Web Application in Development Process [Volume 3, Issue 1, 2020, Pages 41-52]

L

  • Langhari, Nafiseh Phishing Website Detection for e-Banking by Inclined Planes Optimization Algorithm [Volume 3, Issue 1, 2020, Pages 29-39]

M

  • Madani, Mohammad Hossein Increasing the Accuracy of Locating in Wireless Communication Systems Based on Neural Networks [Volume 3, Issue 3, 2020, Pages 31-38]
  • Mahamedpour, Kamal Enhancing Communication Security in Cellular Communications Networks by using Interference Alignment Technique [Volume 3, Issue 2, 2020, Pages 49-60]
  • Mahamedpour, Kamal Blind Frequency Offset Estimation using Adaptive Algorithms in Non-Coherent OFDM Systems [Volume 3, Issue 4, 2020, Pages 61-70]
  • Majidi, Mohammad Hassan A New Method for Detection of Discrete Data Transmitted over Non-Linear Dynamic Wireless Channels [Volume 3, Issue 2, 2020, Pages 75-85]
  • Mardani, Mohammad Weaknesses of SPRS Authentication Protocol and Present a Developed Protocol for RFID Systems [Volume 3, Issue 3, 2020, Pages 39-48]
  • Mirqadri, Abdolrasool A Fast Method for Computation of Scalar Multiplication of Elliptic Curve Suitable for Elliptic Curve Cryptography System [Volume 3, Issue 3, 2020, Pages 9-17]
  • Mirqadri, Abdolrasoul An Efficient Visual Multi-Secret Sharing Scheme [Volume 3, Issue 4, 2020, Pages 1-9]
  • Moazedi, Maryam Detection of Spoofing Attack Based on Multi-Layer Neural Network in Single-Frequency GPS Receivers [Volume 3, Issue 1, 2020, Pages 69-80]
  • Modiri, Naser Secure and Fast Re-authentication Protocol to Support Extensive Movement of Users in IEEE 802.1X Wireless Networks [Volume 3, Issue 4, 2020, Pages 71-80]
  • Moeini Jahromi, Mohammad Optimum Parameter Selection for Rainbow Table TMTO Attack Considering Breaking Time and Using Sequential and Index Search Methods [Volume 3, Issue 3, 2020, Pages 49-57]
  • Mohammadi, Ali Secure and Fast Re-authentication Protocol to Support Extensive Movement of Users in IEEE 802.1X Wireless Networks [Volume 3, Issue 4, 2020, Pages 71-80]
  • Mollazadeh, Mahdi An Optimized Unsupervised Feature Selection Algorithm [Volume 3, Issue 3, 2020, Pages 1-7]
  • Momeni, Amir Hossein Increasing the Accuracy of Locating in Wireless Communication Systems Based on Neural Networks [Volume 3, Issue 3, 2020, Pages 31-38]
  • Mousavi, Seyed Mohammad Reza Detection of Spoofing Attack Based on Multi-Layer Neural Network in Single-Frequency GPS Receivers [Volume 3, Issue 1, 2020, Pages 69-80]
  • Mousavi, Seyed Mohammad Reza Defense Against Spoofing in GPS Receiver using Correlation and Least Mean Squares Method Based on Sign-Data Algorithm [Volume 3, Issue 4, 2020, Pages 11-22]

N

  • Naseri, Ali Quality enhancement of received video using secondary channel encoding in Joint Source and Channel Coding (JSCC) [Volume 3, Issue 2, 2020, Pages 29-48]

P

  • Pakravan, Mohammad Reza Sequential Decoding Algorithms of Convolutional Codes: Implementation, Improvement and Comparison [Volume 3, Issue 2, 2020, Pages 61-73]
  • Pour Naghi, Seyed Mortaza An Improved Authentication Scheme with Conditional Privacy Preserving in VANETs [Volume 3, Issue 2, 2020, Pages 1-12]

Q

  • Qoli Nejad, Maryam Botnet Detection for Peer to Peer Networks [Volume 3, Issue 4, 2020, Pages 43-60]

R

  • Raeis Danaei, Meysam On Improvement of Cardinalized Probability Hypothesis Density Filter Implementation by using Auxiliary Particle Filter [Volume 3, Issue 4, 2020, Pages 23-41]
  • Rahimi, Saeed A Fast Method for Computation of Scalar Multiplication of Elliptic Curve Suitable for Elliptic Curve Cryptography System [Volume 3, Issue 3, 2020, Pages 9-17]
  • Rashidi, Ali Jabbar Projection of Muli Stage Cyber Attack Based on Belief Model and Fuzzy Inference [Volume 3, Issue 2, 2020, Pages 13-28]

S

  • Saberi, Mohsen Botnet Detection for Peer to Peer Networks [Volume 3, Issue 4, 2020, Pages 43-60]
  • Sadidpour, Saeideh Sadat Increasing the Accuracy of Locating in Wireless Communication Systems Based on Neural Networks [Volume 3, Issue 3, 2020, Pages 31-38]
  • Sadooghi, Ali Reza A New Method to Evaluate the Launch Pad Lightning Protection System Performance by Using LPM in 3-D [Volume 3, Issue 1, 2020, Pages 15-27]
  • Saleh Esfahani, Mahmoud TNAC: A Novel Trust Negotiation Based Access Control Model Using XACML Architecture [Volume 3, Issue 1, 2020, Pages 53-67]
  • Samsami Khodadad, Farid Projection of Muli Stage Cyber Attack Based on Belief Model and Fuzzy Inference [Volume 3, Issue 2, 2020, Pages 13-28]
  • Shafiei, Ebrahim Detection of Spoofing Attack Based on Multi-Layer Neural Network in Single-Frequency GPS Receivers [Volume 3, Issue 1, 2020, Pages 69-80]
  • Sheikh, Fereshteh An Efficient Visual Multi-Secret Sharing Scheme [Volume 3, Issue 4, 2020, Pages 1-9]
  • Shirazi, Hossein A new approach in identifying malware with memory image analysis [Volume 3, Issue 1, 2020, Pages 1-14]
  • Shirazi, Hossein Web-based Military Management Systems Security Using Combination of One-class Classifiers [Volume 3, Issue 3, 2020, Pages 19-30]
  • Shokhmzan, Zahra Defense Against Spoofing in GPS Receiver using Correlation and Least Mean Squares Method Based on Sign-Data Algorithm [Volume 3, Issue 4, 2020, Pages 11-22]

T

  • Teymour Pour, Babak An Optimized Unsupervised Feature Selection Algorithm [Volume 3, Issue 3, 2020, Pages 1-7]
  • Tprabian, Omid Blind Frequency Offset Estimation using Adaptive Algorithms in Non-Coherent OFDM Systems [Volume 3, Issue 4, 2020, Pages 61-70]

Y

  • Yahya Abadi, Mostafa A New Method to Evaluate the Launch Pad Lightning Protection System Performance by Using LPM in 3-D [Volume 3, Issue 1, 2020, Pages 15-27]