A
-
Abdolmaleki, Behzad
Weaknesses of SPRS Authentication Protocol and Present a Developed Protocol for RFID Systems [Volume 3, Issue 3, 2020, Pages 39-48]
-
Abdolrazzagh Nejad, Majid
Phishing Website Detection for e-Banking by Inclined Planes Optimization Algorithm [Volume 3, Issue 1, 2020, Pages 29-39]
-
Aghaei Kheirabadi, Masoumeh
A new approach in identifying malware with memory image analysis [Volume 3, Issue 1, 2020, Pages 1-14]
-
Ahmadian Yazdi, Hamed
Blind Frequency Offset Estimation using Adaptive Algorithms in Non-Coherent OFDM Systems [Volume 3, Issue 4, 2020, Pages 61-70]
-
Amirkhani, Zahra
Increasing the Accuracy of Locating in Wireless Communication Systems Based on Neural Networks [Volume 3, Issue 3, 2020, Pages 31-38]
-
Azmi, Reza
Botnet Detection for Peer to Peer Networks [Volume 3, Issue 4, 2020, Pages 43-60]
B
-
Bagheri, Karim
Weaknesses of SPRS Authentication Protocol and Present a Developed Protocol for RFID Systems [Volume 3, Issue 3, 2020, Pages 39-48]
-
Bagheri, Masoud
Design the Model of CSRF Attack Tree for Immunization the Web Application in Development Process [Volume 3, Issue 1, 2020, Pages 41-52]
-
Barmashoori, Mostafa
An Improved Authentication Scheme with Conditional Privacy Preserving in VANETs [Volume 3, Issue 2, 2020, Pages 1-12]
D
-
Dadashtabar Ahmadi, Kourosh
Projection of Muli Stage Cyber Attack Based on Belief Model and Fuzzy Inference [Volume 3, Issue 2, 2020, Pages 13-28]
E
-
Etezadifar, Pouria
Quality enhancement of received video using secondary channel encoding in Joint Source and Channel Coding (JSCC) [Volume 3, Issue 2, 2020, Pages 29-48]
F
-
Farasi, Hassan
Quality enhancement of received video using secondary channel encoding in Joint Source and Channel Coding (JSCC) [Volume 3, Issue 2, 2020, Pages 29-48]
-
Farshchi, Seyed Mohammad Reza
A new approach in identifying malware with memory image analysis [Volume 3, Issue 1, 2020, Pages 1-14]
G
-
Ghardeshi, Mahmoud
An Improved Authentication Scheme with Conditional Privacy Preserving in VANETs [Volume 3, Issue 2, 2020, Pages 1-12]
-
Golestani, Ali
Enhancing Communication Security in Cellular Communications Networks by using Interference Alignment Technique [Volume 3, Issue 2, 2020, Pages 49-60]
-
Golestani, Ali
Blind Frequency Offset Estimation using Adaptive Algorithms in Non-Coherent OFDM Systems [Volume 3, Issue 4, 2020, Pages 61-70]
H
-
Habibi Bastami, Ali
Enhancing Communication Security in Cellular Communications Networks by using Interference Alignment Technique [Volume 3, Issue 2, 2020, Pages 49-60]
-
Hadi, Mohammad
Sequential Decoding Algorithms of Convolutional Codes: Implementation, Improvement and Comparison [Volume 3, Issue 2, 2020, Pages 61-73]
-
Hadi, Mohammad
Optimum Parameter Selection for Rainbow Table TMTO Attack Considering Breaking Time and Using Sequential and Index Search Methods [Volume 3, Issue 3, 2020, Pages 49-57]
-
Hasani Ahanghar, Mohammad Reza
TNAC: A Novel Trust Negotiation Based Access Control Model Using XACML Architecture [Volume 3, Issue 1, 2020, Pages 53-67]
J
-
Jamali Fard, Amineh
Web-based Military Management Systems Security Using Combination of One-class Classifiers [Volume 3, Issue 3, 2020, Pages 19-30]
K
-
Kakaei, Hamid Reza
An Optimized Unsupervised Feature Selection Algorithm [Volume 3, Issue 3, 2020, Pages 1-7]
-
Karimi, Ali
TNAC: A Novel Trust Negotiation Based Access Control Model Using XACML Architecture [Volume 3, Issue 1, 2020, Pages 53-67]
-
Kheiri, Ali
Design the Model of CSRF Attack Tree for Immunization the Web Application in Development Process [Volume 3, Issue 1, 2020, Pages 41-52]
L
-
Langhari, Nafiseh
Phishing Website Detection for e-Banking by Inclined Planes Optimization Algorithm [Volume 3, Issue 1, 2020, Pages 29-39]
M
-
Madani, Mohammad Hossein
Increasing the Accuracy of Locating in Wireless Communication Systems Based on Neural Networks [Volume 3, Issue 3, 2020, Pages 31-38]
-
Mahamedpour, Kamal
Enhancing Communication Security in Cellular Communications Networks by using Interference Alignment Technique [Volume 3, Issue 2, 2020, Pages 49-60]
-
Mahamedpour, Kamal
Blind Frequency Offset Estimation using Adaptive Algorithms in Non-Coherent OFDM Systems [Volume 3, Issue 4, 2020, Pages 61-70]
-
Majidi, Mohammad Hassan
A New Method for Detection of Discrete Data Transmitted over Non-Linear Dynamic Wireless Channels [Volume 3, Issue 2, 2020, Pages 75-85]
-
Mardani, Mohammad
Weaknesses of SPRS Authentication Protocol and Present a Developed Protocol for RFID Systems [Volume 3, Issue 3, 2020, Pages 39-48]
-
Mirqadri, Abdolrasool
A Fast Method for Computation of Scalar Multiplication of Elliptic Curve Suitable for Elliptic Curve Cryptography System [Volume 3, Issue 3, 2020, Pages 9-17]
-
Mirqadri, Abdolrasoul
An Efficient Visual Multi-Secret Sharing Scheme [Volume 3, Issue 4, 2020, Pages 1-9]
-
Moazedi, Maryam
Detection of Spoofing Attack Based on Multi-Layer Neural Network in Single-Frequency GPS Receivers [Volume 3, Issue 1, 2020, Pages 69-80]
-
Modiri, Naser
Secure and Fast Re-authentication Protocol to Support Extensive Movement of Users in IEEE 802.1X Wireless Networks [Volume 3, Issue 4, 2020, Pages 71-80]
-
Moeini Jahromi, Mohammad
Optimum Parameter Selection for Rainbow Table TMTO Attack Considering Breaking Time and Using Sequential and Index Search Methods [Volume 3, Issue 3, 2020, Pages 49-57]
-
Mohammadi, Ali
Secure and Fast Re-authentication Protocol to Support Extensive Movement of Users in IEEE 802.1X Wireless Networks [Volume 3, Issue 4, 2020, Pages 71-80]
-
Mollazadeh, Mahdi
An Optimized Unsupervised Feature Selection Algorithm [Volume 3, Issue 3, 2020, Pages 1-7]
-
Momeni, Amir Hossein
Increasing the Accuracy of Locating in Wireless Communication Systems Based on Neural Networks [Volume 3, Issue 3, 2020, Pages 31-38]
-
Mousavi, Seyed Mohammad Reza
Detection of Spoofing Attack Based on Multi-Layer Neural Network in Single-Frequency GPS Receivers [Volume 3, Issue 1, 2020, Pages 69-80]
-
Mousavi, Seyed Mohammad Reza
Defense Against Spoofing in GPS Receiver using Correlation and Least Mean Squares Method Based on Sign-Data Algorithm [Volume 3, Issue 4, 2020, Pages 11-22]
N
-
Naseri, Ali
Quality enhancement of received video using secondary channel encoding in Joint Source and Channel Coding (JSCC) [Volume 3, Issue 2, 2020, Pages 29-48]
P
-
Pakravan, Mohammad Reza
Sequential Decoding Algorithms of Convolutional Codes: Implementation, Improvement and Comparison [Volume 3, Issue 2, 2020, Pages 61-73]
-
Pour Naghi, Seyed Mortaza
An Improved Authentication Scheme with Conditional Privacy Preserving in VANETs [Volume 3, Issue 2, 2020, Pages 1-12]
Q
-
Qoli Nejad, Maryam
Botnet Detection for Peer to Peer Networks [Volume 3, Issue 4, 2020, Pages 43-60]
R
-
Raeis Danaei, Meysam
On Improvement of Cardinalized Probability Hypothesis Density Filter Implementation by using Auxiliary Particle Filter [Volume 3, Issue 4, 2020, Pages 23-41]
-
Rahimi, Saeed
A Fast Method for Computation of Scalar Multiplication of Elliptic Curve Suitable for Elliptic Curve Cryptography System [Volume 3, Issue 3, 2020, Pages 9-17]
-
Rashidi, Ali Jabbar
Projection of Muli Stage Cyber Attack Based on Belief Model and Fuzzy Inference [Volume 3, Issue 2, 2020, Pages 13-28]
S
-
Saberi, Mohsen
Botnet Detection for Peer to Peer Networks [Volume 3, Issue 4, 2020, Pages 43-60]
-
Sadidpour, Saeideh Sadat
Increasing the Accuracy of Locating in Wireless Communication Systems Based on Neural Networks [Volume 3, Issue 3, 2020, Pages 31-38]
-
Sadooghi, Ali Reza
A New Method to Evaluate the Launch Pad Lightning Protection
System Performance by Using LPM in 3-D [Volume 3, Issue 1, 2020, Pages 15-27]
-
Saleh Esfahani, Mahmoud
TNAC: A Novel Trust Negotiation Based Access Control Model Using XACML Architecture [Volume 3, Issue 1, 2020, Pages 53-67]
-
Samsami Khodadad, Farid
Projection of Muli Stage Cyber Attack Based on Belief Model and Fuzzy Inference [Volume 3, Issue 2, 2020, Pages 13-28]
-
Shafiei, Ebrahim
Detection of Spoofing Attack Based on Multi-Layer Neural Network in Single-Frequency GPS Receivers [Volume 3, Issue 1, 2020, Pages 69-80]
-
Sheikh, Fereshteh
An Efficient Visual Multi-Secret Sharing Scheme [Volume 3, Issue 4, 2020, Pages 1-9]
-
Shirazi, Hossein
A new approach in identifying malware with memory image analysis [Volume 3, Issue 1, 2020, Pages 1-14]
-
Shirazi, Hossein
Web-based Military Management Systems Security Using Combination of One-class Classifiers [Volume 3, Issue 3, 2020, Pages 19-30]
-
Shokhmzan, Zahra
Defense Against Spoofing in GPS Receiver using Correlation and Least Mean Squares Method Based on Sign-Data Algorithm [Volume 3, Issue 4, 2020, Pages 11-22]
T
-
Teymour Pour, Babak
An Optimized Unsupervised Feature Selection Algorithm [Volume 3, Issue 3, 2020, Pages 1-7]
-
Tprabian, Omid
Blind Frequency Offset Estimation using Adaptive Algorithms in Non-Coherent OFDM Systems [Volume 3, Issue 4, 2020, Pages 61-70]
Y
-
Yahya Abadi, Mostafa
A New Method to Evaluate the Launch Pad Lightning Protection
System Performance by Using LPM in 3-D [Volume 3, Issue 1, 2020, Pages 15-27]
Your query does not match with any item