Author Index

A

  • Abbasi, Mahdi Sequential Forward Feature Selection for Intrusion Detection System, Using Ant Colony Algorithm [Volume 6, Issue 2, 2018, Pages 49-63]
  • Abdollahi Azgomi, Mohammad Malware Propagation Modeling Considering Software Diversity Approach in Weighted Scale-Free Network [Volume 6, Issue 3, 2018, Pages 131-140]
  • Abedi, Ali Asghar Enhancing Vector Tracking Accuracy of GPS in Weak Signal Condition Based on Adaptive Strong Tracking Kalman Filter​ [Volume 6, Issue 3, 2018, Pages 1-12]
  • Ahmadian, Mortaza Blind Estimation of Number of Users in TDMA Networks Using Redundancy of Adaptive Channel Coding [Volume 6, Issue 2, 2018, Pages 11-20]
  • Akbari, Davood Providing a Method for the Optimal Detection of Software Testing Paths Using Meta-Algorithms [Volume 6, Issue 4, 2019, Pages 13-22]
  • Akramizadeh, Ali A Decision-Making Model in a Cyber Conflicts Acted Upon Vulnerability, Based on Game Theoretic Analysis [Volume 6, Issue 2, 2018, Pages 21-28]
  • Amiri, Rouhollah Relating the Detection Rate, Capacity and the Cost of Steganography by Steganographer Modeling [Volume 6, Issue 3, 2018, Pages 81-94]
  • Anar Farhad, Milad Enhancing Vector Tracking Accuracy of GPS in Weak Signal Condition Based on Adaptive Strong Tracking Kalman Filter​ [Volume 6, Issue 3, 2018, Pages 1-12]
  • Asgharpour Haji Kazem, Ali Bayesian Networks Based Trust Model in Social Networks [Volume 6, Issue 2, 2018, Pages 29-38]

B

  • Bagheri, Masoud A Decision-Making Model in a Cyber Conflicts Acted Upon Vulnerability, Based on Game Theoretic Analysis [Volume 6, Issue 2, 2018, Pages 21-28]
  • Baloochian, Saeed Modelling and Solving the Location Problem of Fire Launching Sites [Volume 6, Issue 3, 2018, Pages 45-57]
  • Baypour, Hamideh A Hash-Based Multi-Use Multi-Stage Secret Sharing Scheme with General Access Structure [Volume 6, Issue 3, 2018, Pages 107-115]
  • Bazdar, Gholamreza Introduction of the Entropy-Based Method for Finding Influential Nodes in Information Dissemination on Online Social Networks [Volume 6, Issue 2, 2018, Pages 1-10]
  • Bejani, Sadegh Sequential Forward Feature Selection for Intrusion Detection System, Using Ant Colony Algorithm [Volume 6, Issue 2, 2018, Pages 49-63]
  • Bejani, Sadeq Providing a Method for the Optimal Detection of Software Testing Paths Using Meta-Algorithms [Volume 6, Issue 4, 2019, Pages 13-22]

C

  • Chaman Motlaq, Abolfazl Design and Implementation of a Physically Unclonable Function on FPGA [Volume 6, Issue 4, 2019, Pages 23-32]
  • Cheraghi Chaleshtari, Abbas Some New Bounds on the Information Ratio of the Cartesian Product of Some Classes of Graphs [Volume 6, Issue 4, 2019, Pages 135-142]

D

  • Dadashtabar Ahmadi, Koroosh Detection of advanced Cyber Attacks, Using Behavior Modeling Based on Natural Language Processing [Volume 6, Issue 3, 2018, Pages 141-151]
  • Dadashtabar Ahmadi, Koroosh Projection of Cyber Attacks using Damage Estimation and Combination of Attacker’s Capability and Opportunity based on Transferable Belief Model [Volume 6, Issue 4, 2019, Pages 1-12]
  • Dehghan Menshadi, Ali A New And Efficient Method of Mass Masking and its Resistance Assessment to Power Analysis [Volume 6, Issue 2, 2018, Pages 123-134]
  • Dehqan Menshadi, Ali Design and Implementation of a Physically Unclonable Function on FPGA [Volume 6, Issue 4, 2019, Pages 23-32]

F

  • Farhadi, Majid Non-Performance of Pearson Correlation Coefficient for Evaluating Image Encryption Security [Volume 6, Issue 2, 2018, Pages 83-91]
  • Farhadi, Majid A Hash-Based Multi-Use Multi-Stage Secret Sharing Scheme with General Access Structure [Volume 6, Issue 3, 2018, Pages 107-115]
  • Farjami, Yaqoub An Anti-Spam Framework for Advertising Targeting Smart Mobile Devices on IoT [Volume 6, Issue 2, 2018, Pages 65-81]
  • Forooghy, Mahmoud A Decision-Making Model in a Cyber Conflicts Acted Upon Vulnerability, Based on Game Theoretic Analysis [Volume 6, Issue 2, 2018, Pages 21-28]

G

  • Ghaeini, Ahmad Modelling and Solving the Location Problem of Fire Launching Sites [Volume 6, Issue 3, 2018, Pages 59-64]
  • Ghasemi, Siroos An Effective Method to Detect Environment-Aware Malware Based on the Behavioral Distances Comparison [Volume 6, Issue 4, 2019, Pages 123-133]
  • Ghasemian, Javad Non-Performance of Pearson Correlation Coefficient for Evaluating Image Encryption Security [Volume 6, Issue 2, 2018, Pages 83-91]
  • Ghayoori Sales, Majid Introduction of the Entropy-Based Method for Finding Influential Nodes in Information Dissemination on Online Social Networks [Volume 6, Issue 2, 2018, Pages 1-10]
  • Gholami, Mohammad Some New Bounds on the Information Ratio of the Cartesian Product of Some Classes of Graphs [Volume 6, Issue 4, 2019, Pages 135-142]
  • Gholam Pour, Iman Relating the Detection Rate, Capacity and the Cost of Steganography by Steganographer Modeling [Volume 6, Issue 3, 2018, Pages 81-94]
  • Golsorkh Tabar Amiri, Mahdi A Mutual Anonymity Private Authentication Protocol to Use in Radio-Frequency Identification Systems [Volume 6, Issue 4, 2019, Pages 45-59]

H

  • Hashemi Nejad, Seyyed Mohammad The Design Process Reform of the Gama-ray Imaging System by using the Design Structure Matrix [Volume 6, Issue 3, 2018, Pages 95-106]
  • Hassani Ahanghar, Mohammad Reza Providing a Method for the Optimal Detection of Software Testing Paths Using Meta-Algorithms [Volume 6, Issue 4, 2019, Pages 13-22]
  • Heydari, Hassan Self-stabilizing Grundy Coloring Using Game Theory and Heuristics Ordering [Volume 6, Issue 2, 2018, Pages 39-48]
  • Hosseini, Soodeh Malware Propagation Modeling Considering Software Diversity Approach in Weighted Scale-Free Network [Volume 6, Issue 3, 2018, Pages 131-140]
  • Hosseinian Barzi, Seyyed Hatef Hierarchical Fuzzy Identity-Based Encryption [Volume 6, Issue 3, 2018, Pages 35-44]
  • Hossein Nejad, Vahid Bayesian Networks Based Trust Model in Social Networks [Volume 6, Issue 2, 2018, Pages 29-38]

I

  • Izadi Pour, Ahmad Modelling and Solving the Location Problem of Fire Launching Sites [Volume 6, Issue 3, 2018, Pages 45-57]

J

  • Jafari, Majid Projection of Cyber Attacks using Damage Estimation and Combination of Attacker’s Capability and Opportunity based on Transferable Belief Model [Volume 6, Issue 4, 2019, Pages 1-12]
  • Jafari Navimi Pour, Nima Hybrid Method for Detecting Trustworthy Cloud Service Providers using Analytical Hierarchical Process and Neural Network [Volume 6, Issue 4, 2019, Pages 105-122]
  • Jafar Pour, Zahra Improving Intrusion Detection System Using a New Feature Selection Technique [Volume 6, Issue 4, 2019, Pages 143-152]

K

  • Karimi, Mohammad Joint Spectrum Sensing and Power Allocation for Multiband Cognitive Radio Networks Using Probabilistic Spectrum Access [Volume 6, Issue 3, 2018, Pages 117-130]
  • Kaveh, Masoud Covert and Secure Underwater Acoustic Communication using Merkle Hash Tree and Dolphin Whistle [Volume 6, Issue 2, 2018, Pages 135-146]
  • Kazemi, Hamed The Design Process Reform of the Gama-ray Imaging System by using the Design Structure Matrix [Volume 6, Issue 3, 2018, Pages 95-106]
  • Keshavarzi, Behbod Modelling and Solving the Location Problem of Fire Launching Sites [Volume 6, Issue 3, 2018, Pages 59-64]
  • Keyvanshokooh, Reza An Integrated Algorithm for Optimal Detection of Weak Radar Targets Masked by the Sidelobes of a Strong Target [Volume 6, Issue 4, 2019, Pages 91-104]
  • Khanzadeh, Mohammad Hossein Target Tracking Algorithm in Wireless Sensor Networks with Optimum Power Consumption Using Quantized Observation [Volume 6, Issue 2, 2018, Pages 109-121]
  • Kheirkhah, Marjan Detection of advanced Cyber Attacks, Using Behavior Modeling Based on Natural Language Processing [Volume 6, Issue 3, 2018, Pages 141-151]
  • Khoshrooy, Hadi A New Method For Gradual Detection of Environmental Conditions and Resources Required by Smart Malware [Volume 6, Issue 4, 2019, Pages 33-44]

M

  • Madadi, Eghbal A New And Efficient Method of Mass Masking and its Resistance Assessment to Power Analysis [Volume 6, Issue 2, 2018, Pages 123-134]
  • Madadi, Eqbal Design and Implementation of a Physically Unclonable Function on FPGA [Volume 6, Issue 4, 2019, Pages 23-32]
  • Maleki, Hossein Hierarchical Fuzzy Identity-Based Encryption [Volume 6, Issue 3, 2018, Pages 35-44]
  • Masoumi, Masoud A New And Efficient Method of Mass Masking and its Resistance Assessment to Power Analysis [Volume 6, Issue 2, 2018, Pages 123-134]
  • Masoumi, Masoud Design and Implementation of a Physically Unclonable Function on FPGA [Volume 6, Issue 4, 2019, Pages 23-32]
  • Matinfar, Ahmad Reza Detect Web Denial of Service Attacks Using Entropy and Support Vector Machine Algorithm [Volume 6, Issue 4, 2019, Pages 79-89]
  • Moazedi, Maryam GPS Spoofing Mitigation using Adaptive Estimator in Tracking Loop [Volume 6, Issue 3, 2018, Pages 65-80]
  • Mortazavi, Reza A Hash-Based Multi-Use Multi-Stage Secret Sharing Scheme with General Access Structure [Volume 6, Issue 3, 2018, Pages 107-115]
  • Mousavi, Seyyed Mohammad Reza GPS Spoofing Mitigation using Adaptive Estimator in Tracking Loop [Volume 6, Issue 3, 2018, Pages 65-80]
  • Mousavi Mirkalaei, Seyyed Mohammadreza Covert and Secure Underwater Acoustic Communication using Merkle Hash Tree and Dolphin Whistle [Volume 6, Issue 2, 2018, Pages 135-146]
  • Mousavi Mirkalaei, Seyyed Mohammad Reza Enhancing Vector Tracking Accuracy of GPS in Weak Signal Condition Based on Adaptive Strong Tracking Kalman Filter​ [Volume 6, Issue 3, 2018, Pages 1-12]

N

  • Naseri, Ali Target Tracking Algorithm in Wireless Sensor Networks with Optimum Power Consumption Using Quantized Observation [Volume 6, Issue 2, 2018, Pages 109-121]
  • Nasrpooya, Zahra GPS Spoofing Mitigation using Adaptive Estimator in Tracking Loop [Volume 6, Issue 3, 2018, Pages 65-80]
  • Nejatian, Samad Detection of Unknown Malicious Network Streams using Ensemble Learning [Volume 6, Issue 2, 2018, Pages 93-108]

O

  • Okhovvat, Majid An Integrated Algorithm for Optimal Detection of Weak Radar Targets Masked by the Sidelobes of a Strong Target [Volume 6, Issue 4, 2019, Pages 91-104]
  • Omidvar, Roohullah Detection of Unknown Malicious Network Streams using Ensemble Learning [Volume 6, Issue 2, 2018, Pages 93-108]

P

  • Parsa, Saeed A New Method For Gradual Detection of Environmental Conditions and Resources Required by Smart Malware [Volume 6, Issue 4, 2019, Pages 33-44]
  • Parsa, Saeed An Effective Method to Detect Environment-Aware Malware Based on the Behavioral Distances Comparison [Volume 6, Issue 4, 2019, Pages 123-133]
  • Parvin, Hamid Detection of Unknown Malicious Network Streams using Ensemble Learning [Volume 6, Issue 2, 2018, Pages 93-108]
  • Parvin, Hamid Improving Intrusion Detection System Using a New Feature Selection Technique [Volume 6, Issue 4, 2019, Pages 143-152]
  • Peymankar, Mahboobeh Modelling and Solving the Location Problem of Fire Launching Sites [Volume 6, Issue 3, 2018, Pages 45-57]
  • Pournaghi, Seyyed Mortaza An Anti-Spam Framework for Advertising Targeting Smart Mobile Devices on IoT [Volume 6, Issue 2, 2018, Pages 65-81]

Q

  • Qasemi Gol, Mohammad A Foresight Framework for Intrusion Response Systems in Computer Networks [Volume 6, Issue 3, 2018, Pages 13-34]

R

  • Rad, Farhad Improving Intrusion Detection System Using a New Feature Selection Technique [Volume 6, Issue 4, 2019, Pages 143-152]
  • Raeis Danaei, Meysam Target Tracking Algorithm in Wireless Sensor Networks with Optimum Power Consumption Using Quantized Observation [Volume 6, Issue 2, 2018, Pages 109-121]
  • Ranjbar, Mohammad Modelling and Solving the Location Problem of Fire Launching Sites [Volume 6, Issue 3, 2018, Pages 45-57]
  • Rashidi, Ali Jabbar Detection of advanced Cyber Attacks, Using Behavior Modeling Based on Natural Language Processing [Volume 6, Issue 3, 2018, Pages 141-151]
  • Rashidi, Ali Jabbar Projection of Cyber Attacks using Damage Estimation and Combination of Attacker’s Capability and Opportunity based on Transferable Belief Model [Volume 6, Issue 4, 2019, Pages 1-12]
  • Rezaei, Vahideh Detection of Unknown Malicious Network Streams using Ensemble Learning [Volume 6, Issue 2, 2018, Pages 93-108]

S

  • Sabzehparvar, Hossein Non-Performance of Pearson Correlation Coefficient for Evaluating Image Encryption Security [Volume 6, Issue 2, 2018, Pages 83-91]
  • Sadough, Seyyed Mohammad Sajjad Joint Spectrum Sensing and Power Allocation for Multiband Cognitive Radio Networks Using Probabilistic Spectrum Access [Volume 6, Issue 3, 2018, Pages 117-130]
  • Sadr, Ali GPS Spoofing Mitigation using Adaptive Estimator in Tracking Loop [Volume 6, Issue 3, 2018, Pages 65-80]
  • Saei Moghaddam, Sobhan A New And Efficient Method of Mass Masking and its Resistance Assessment to Power Analysis [Volume 6, Issue 2, 2018, Pages 123-134]
  • Sarkardeh, Abolfazl Introduction of the Entropy-Based Method for Finding Influential Nodes in Information Dissemination on Online Social Networks [Volume 6, Issue 2, 2018, Pages 1-10]
  • Sepahvand, Mortaza Target Tracking Algorithm in Wireless Sensor Networks with Optimum Power Consumption Using Quantized Observation [Volume 6, Issue 2, 2018, Pages 109-121]
  • Seyedin, Seyyed Ali Reza Target Threat Assessment using Rule-Based Joint Fuzzy and Probabilistic Networks [Volume 6, Issue 4, 2019, Pages 61-78]

T

  • Tabaghchi Milan, Sara Hybrid Method for Detecting Trustworthy Cloud Service Providers using Analytical Hierarchical Process and Neural Network [Volume 6, Issue 4, 2019, Pages 105-122]
  • Tabatabaei Feizabad, Seyyed Ali Modelling and Solving the Location Problem of Fire Launching Sites [Volume 6, Issue 3, 2018, Pages 59-64]
  • Taheri, Seyyed Mahmoud Self-stabilizing Grundy Coloring Using Game Theory and Heuristics Ordering [Volume 6, Issue 2, 2018, Pages 39-48]
  • Taleqani Zadeh, Kobra A Mutual Anonymity Private Authentication Protocol to Use in Radio-Frequency Identification Systems [Volume 6, Issue 4, 2019, Pages 45-59]
  • Teimouri, Ebrahim The Design Process Reform of the Gama-ray Imaging System by using the Design Structure Matrix [Volume 6, Issue 3, 2018, Pages 95-106]
  • Teymouri, Mahdi Blind Estimation of Number of Users in TDMA Networks Using Redundancy of Adaptive Channel Coding [Volume 6, Issue 2, 2018, Pages 11-20]

Y

  • Yadegari, Vahid Detect Web Denial of Service Attacks Using Entropy and Support Vector Machine Algorithm [Volume 6, Issue 4, 2019, Pages 79-89]
  • Yadeghari, Mohsen Target Threat Assessment using Rule-Based Joint Fuzzy and Probabilistic Networks [Volume 6, Issue 4, 2019, Pages 61-78]
  • Yasrebi, Milad Detection of Unknown Malicious Network Streams using Ensemble Learning [Volume 6, Issue 2, 2018, Pages 93-108]