A
-
Abbasi, Mahdi
Sequential Forward Feature Selection for Intrusion Detection System, Using Ant Colony Algorithm [Volume 6, Issue 2, 2018, Pages 49-63]
-
Abdollahi Azgomi, Mohammad
Malware Propagation Modeling Considering Software Diversity Approach in Weighted Scale-Free Network [Volume 6, Issue 3, 2018, Pages 131-140]
-
Abedi, Ali Asghar
Enhancing Vector Tracking Accuracy of GPS in Weak Signal
Condition Based on Adaptive Strong Tracking Kalman Filter [Volume 6, Issue 3, 2018, Pages 1-12]
-
Ahmadian, Mortaza
Blind Estimation of Number of Users in TDMA Networks Using Redundancy of Adaptive Channel Coding [Volume 6, Issue 2, 2018, Pages 11-20]
-
Akbari, Davood
Providing a Method for the Optimal Detection of Software Testing Paths Using Meta-Algorithms [Volume 6, Issue 4, 2019, Pages 13-22]
-
Akramizadeh, Ali
A Decision-Making Model in a Cyber Conflicts Acted Upon Vulnerability, Based on Game Theoretic Analysis [Volume 6, Issue 2, 2018, Pages 21-28]
-
Amiri, Rouhollah
Relating the Detection Rate, Capacity and the Cost of Steganography by Steganographer Modeling [Volume 6, Issue 3, 2018, Pages 81-94]
-
Anar Farhad, Milad
Enhancing Vector Tracking Accuracy of GPS in Weak Signal
Condition Based on Adaptive Strong Tracking Kalman Filter [Volume 6, Issue 3, 2018, Pages 1-12]
-
Asgharpour Haji Kazem, Ali
Bayesian Networks Based Trust Model in Social Networks [Volume 6, Issue 2, 2018, Pages 29-38]
B
-
Bagheri, Masoud
A Decision-Making Model in a Cyber Conflicts Acted Upon Vulnerability, Based on Game Theoretic Analysis [Volume 6, Issue 2, 2018, Pages 21-28]
-
Baloochian, Saeed
Modelling and Solving the Location Problem of Fire Launching Sites [Volume 6, Issue 3, 2018, Pages 45-57]
-
Baypour, Hamideh
A Hash-Based Multi-Use Multi-Stage Secret Sharing Scheme with General Access Structure [Volume 6, Issue 3, 2018, Pages 107-115]
-
Bazdar, Gholamreza
Introduction of the Entropy-Based Method for Finding Influential Nodes in Information Dissemination on Online Social Networks [Volume 6, Issue 2, 2018, Pages 1-10]
-
Bejani, Sadegh
Sequential Forward Feature Selection for Intrusion Detection System, Using Ant Colony Algorithm [Volume 6, Issue 2, 2018, Pages 49-63]
-
Bejani, Sadeq
Providing a Method for the Optimal Detection of Software Testing Paths Using Meta-Algorithms [Volume 6, Issue 4, 2019, Pages 13-22]
C
-
Chaman Motlaq, Abolfazl
Design and Implementation of a Physically Unclonable Function on FPGA [Volume 6, Issue 4, 2019, Pages 23-32]
-
Cheraghi Chaleshtari, Abbas
Some New Bounds on the Information Ratio of the Cartesian Product of Some Classes of Graphs [Volume 6, Issue 4, 2019, Pages 135-142]
D
-
Dadashtabar Ahmadi, Koroosh
Detection of advanced Cyber Attacks, Using Behavior Modeling Based on Natural Language Processing [Volume 6, Issue 3, 2018, Pages 141-151]
-
Dadashtabar Ahmadi, Koroosh
Projection of Cyber Attacks using Damage Estimation and Combination of Attacker’s Capability and Opportunity based on Transferable Belief Model [Volume 6, Issue 4, 2019, Pages 1-12]
-
Dehghan Menshadi, Ali
A New And Efficient Method of Mass Masking and its Resistance Assessment to Power Analysis [Volume 6, Issue 2, 2018, Pages 123-134]
-
Dehqan Menshadi, Ali
Design and Implementation of a Physically Unclonable Function on FPGA [Volume 6, Issue 4, 2019, Pages 23-32]
F
-
Farhadi, Majid
Non-Performance of Pearson Correlation Coefficient for Evaluating Image Encryption Security [Volume 6, Issue 2, 2018, Pages 83-91]
-
Farhadi, Majid
A Hash-Based Multi-Use Multi-Stage Secret Sharing Scheme with General Access Structure [Volume 6, Issue 3, 2018, Pages 107-115]
-
Farjami, Yaqoub
An Anti-Spam Framework for Advertising Targeting Smart Mobile Devices on IoT [Volume 6, Issue 2, 2018, Pages 65-81]
-
Forooghy, Mahmoud
A Decision-Making Model in a Cyber Conflicts Acted Upon Vulnerability, Based on Game Theoretic Analysis [Volume 6, Issue 2, 2018, Pages 21-28]
G
-
Ghaeini, Ahmad
Modelling and Solving the Location Problem of Fire Launching Sites [Volume 6, Issue 3, 2018, Pages 59-64]
-
Ghasemi, Siroos
An Effective Method to Detect Environment-Aware Malware Based on the Behavioral Distances Comparison [Volume 6, Issue 4, 2019, Pages 123-133]
-
Ghasemian, Javad
Non-Performance of Pearson Correlation Coefficient for Evaluating Image Encryption Security [Volume 6, Issue 2, 2018, Pages 83-91]
-
Ghayoori Sales, Majid
Introduction of the Entropy-Based Method for Finding Influential Nodes in Information Dissemination on Online Social Networks [Volume 6, Issue 2, 2018, Pages 1-10]
-
Gholami, Mohammad
Some New Bounds on the Information Ratio of the Cartesian Product of Some Classes of Graphs [Volume 6, Issue 4, 2019, Pages 135-142]
-
Gholam Pour, Iman
Relating the Detection Rate, Capacity and the Cost of Steganography by Steganographer Modeling [Volume 6, Issue 3, 2018, Pages 81-94]
-
Golsorkh Tabar Amiri, Mahdi
A Mutual Anonymity Private Authentication Protocol to Use in Radio-Frequency Identification Systems [Volume 6, Issue 4, 2019, Pages 45-59]
H
-
Hashemi Nejad, Seyyed Mohammad
The Design Process Reform of the Gama-ray Imaging System by using the Design Structure Matrix [Volume 6, Issue 3, 2018, Pages 95-106]
-
Hassani Ahanghar, Mohammad Reza
Providing a Method for the Optimal Detection of Software Testing Paths Using Meta-Algorithms [Volume 6, Issue 4, 2019, Pages 13-22]
-
Heydari, Hassan
Self-stabilizing Grundy Coloring Using Game Theory and Heuristics Ordering [Volume 6, Issue 2, 2018, Pages 39-48]
-
Hosseini, Soodeh
Malware Propagation Modeling Considering Software Diversity Approach in Weighted Scale-Free Network [Volume 6, Issue 3, 2018, Pages 131-140]
-
Hosseinian Barzi, Seyyed Hatef
Hierarchical Fuzzy Identity-Based Encryption [Volume 6, Issue 3, 2018, Pages 35-44]
-
Hossein Nejad, Vahid
Bayesian Networks Based Trust Model in Social Networks [Volume 6, Issue 2, 2018, Pages 29-38]
I
-
Izadi Pour, Ahmad
Modelling and Solving the Location Problem of Fire Launching Sites [Volume 6, Issue 3, 2018, Pages 45-57]
J
-
Jafari, Majid
Projection of Cyber Attacks using Damage Estimation and Combination of Attacker’s Capability and Opportunity based on Transferable Belief Model [Volume 6, Issue 4, 2019, Pages 1-12]
-
Jafari Navimi Pour, Nima
Hybrid Method for Detecting Trustworthy Cloud Service Providers using Analytical Hierarchical Process and Neural Network [Volume 6, Issue 4, 2019, Pages 105-122]
-
Jafar Pour, Zahra
Improving Intrusion Detection System Using a New Feature Selection Technique [Volume 6, Issue 4, 2019, Pages 143-152]
K
-
Karimi, Mohammad
Joint Spectrum Sensing and Power Allocation for Multiband Cognitive Radio Networks Using Probabilistic Spectrum Access [Volume 6, Issue 3, 2018, Pages 117-130]
-
Kaveh, Masoud
Covert and Secure Underwater Acoustic Communication using Merkle Hash Tree and Dolphin Whistle [Volume 6, Issue 2, 2018, Pages 135-146]
-
Kazemi, Hamed
The Design Process Reform of the Gama-ray Imaging System by using the Design Structure Matrix [Volume 6, Issue 3, 2018, Pages 95-106]
-
Keshavarzi, Behbod
Modelling and Solving the Location Problem of Fire Launching Sites [Volume 6, Issue 3, 2018, Pages 59-64]
-
Keyvanshokooh, Reza
An Integrated Algorithm for Optimal Detection of Weak Radar Targets Masked by the Sidelobes of a Strong Target [Volume 6, Issue 4, 2019, Pages 91-104]
-
Khanzadeh, Mohammad Hossein
Target Tracking Algorithm in Wireless Sensor Networks with Optimum Power Consumption Using Quantized Observation [Volume 6, Issue 2, 2018, Pages 109-121]
-
Kheirkhah, Marjan
Detection of advanced Cyber Attacks, Using Behavior Modeling Based on Natural Language Processing [Volume 6, Issue 3, 2018, Pages 141-151]
-
Khoshrooy, Hadi
A New Method For Gradual Detection of Environmental Conditions and Resources Required by Smart Malware [Volume 6, Issue 4, 2019, Pages 33-44]
M
-
Madadi, Eghbal
A New And Efficient Method of Mass Masking and its Resistance Assessment to Power Analysis [Volume 6, Issue 2, 2018, Pages 123-134]
-
Madadi, Eqbal
Design and Implementation of a Physically Unclonable Function on FPGA [Volume 6, Issue 4, 2019, Pages 23-32]
-
Maleki, Hossein
Hierarchical Fuzzy Identity-Based Encryption [Volume 6, Issue 3, 2018, Pages 35-44]
-
Masoumi, Masoud
A New And Efficient Method of Mass Masking and its Resistance Assessment to Power Analysis [Volume 6, Issue 2, 2018, Pages 123-134]
-
Masoumi, Masoud
Design and Implementation of a Physically Unclonable Function on FPGA [Volume 6, Issue 4, 2019, Pages 23-32]
-
Matinfar, Ahmad Reza
Detect Web Denial of Service Attacks Using Entropy and Support Vector Machine Algorithm [Volume 6, Issue 4, 2019, Pages 79-89]
-
Moazedi, Maryam
GPS Spoofing Mitigation using Adaptive Estimator in Tracking Loop [Volume 6, Issue 3, 2018, Pages 65-80]
-
Mortazavi, Reza
A Hash-Based Multi-Use Multi-Stage Secret Sharing Scheme with General Access Structure [Volume 6, Issue 3, 2018, Pages 107-115]
-
Mousavi, Seyyed Mohammad Reza
GPS Spoofing Mitigation using Adaptive Estimator in Tracking Loop [Volume 6, Issue 3, 2018, Pages 65-80]
-
Mousavi Mirkalaei, Seyyed Mohammadreza
Covert and Secure Underwater Acoustic Communication using Merkle Hash Tree and Dolphin Whistle [Volume 6, Issue 2, 2018, Pages 135-146]
-
Mousavi Mirkalaei, Seyyed Mohammad Reza
Enhancing Vector Tracking Accuracy of GPS in Weak Signal
Condition Based on Adaptive Strong Tracking Kalman Filter [Volume 6, Issue 3, 2018, Pages 1-12]
N
-
Naseri, Ali
Target Tracking Algorithm in Wireless Sensor Networks with Optimum Power Consumption Using Quantized Observation [Volume 6, Issue 2, 2018, Pages 109-121]
-
Nasrpooya, Zahra
GPS Spoofing Mitigation using Adaptive Estimator in Tracking Loop [Volume 6, Issue 3, 2018, Pages 65-80]
-
Nejatian, Samad
Detection of Unknown Malicious Network Streams using Ensemble Learning [Volume 6, Issue 2, 2018, Pages 93-108]
O
-
Okhovvat, Majid
An Integrated Algorithm for Optimal Detection of Weak Radar Targets Masked by the Sidelobes of a Strong Target [Volume 6, Issue 4, 2019, Pages 91-104]
-
Omidvar, Roohullah
Detection of Unknown Malicious Network Streams using Ensemble Learning [Volume 6, Issue 2, 2018, Pages 93-108]
P
-
Parsa, Saeed
A New Method For Gradual Detection of Environmental Conditions and Resources Required by Smart Malware [Volume 6, Issue 4, 2019, Pages 33-44]
-
Parsa, Saeed
An Effective Method to Detect Environment-Aware Malware Based on the Behavioral Distances Comparison [Volume 6, Issue 4, 2019, Pages 123-133]
-
Parvin, Hamid
Detection of Unknown Malicious Network Streams using Ensemble Learning [Volume 6, Issue 2, 2018, Pages 93-108]
-
Parvin, Hamid
Improving Intrusion Detection System Using a New Feature Selection Technique [Volume 6, Issue 4, 2019, Pages 143-152]
-
Peymankar, Mahboobeh
Modelling and Solving the Location Problem of Fire Launching Sites [Volume 6, Issue 3, 2018, Pages 45-57]
-
Pournaghi, Seyyed Mortaza
An Anti-Spam Framework for Advertising Targeting Smart Mobile Devices on IoT [Volume 6, Issue 2, 2018, Pages 65-81]
Q
-
Qasemi Gol, Mohammad
A Foresight Framework for Intrusion Response Systems in Computer Networks [Volume 6, Issue 3, 2018, Pages 13-34]
R
-
Rad, Farhad
Improving Intrusion Detection System Using a New Feature Selection Technique [Volume 6, Issue 4, 2019, Pages 143-152]
-
Raeis Danaei, Meysam
Target Tracking Algorithm in Wireless Sensor Networks with Optimum Power Consumption Using Quantized Observation [Volume 6, Issue 2, 2018, Pages 109-121]
-
Ranjbar, Mohammad
Modelling and Solving the Location Problem of Fire Launching Sites [Volume 6, Issue 3, 2018, Pages 45-57]
-
Rashidi, Ali Jabbar
Detection of advanced Cyber Attacks, Using Behavior Modeling Based on Natural Language Processing [Volume 6, Issue 3, 2018, Pages 141-151]
-
Rashidi, Ali Jabbar
Projection of Cyber Attacks using Damage Estimation and Combination of Attacker’s Capability and Opportunity based on Transferable Belief Model [Volume 6, Issue 4, 2019, Pages 1-12]
-
Rezaei, Vahideh
Detection of Unknown Malicious Network Streams using Ensemble Learning [Volume 6, Issue 2, 2018, Pages 93-108]
S
-
Sabzehparvar, Hossein
Non-Performance of Pearson Correlation Coefficient for Evaluating Image Encryption Security [Volume 6, Issue 2, 2018, Pages 83-91]
-
Sadough, Seyyed Mohammad Sajjad
Joint Spectrum Sensing and Power Allocation for Multiband Cognitive Radio Networks Using Probabilistic Spectrum Access [Volume 6, Issue 3, 2018, Pages 117-130]
-
Sadr, Ali
GPS Spoofing Mitigation using Adaptive Estimator in Tracking Loop [Volume 6, Issue 3, 2018, Pages 65-80]
-
Saei Moghaddam, Sobhan
A New And Efficient Method of Mass Masking and its Resistance Assessment to Power Analysis [Volume 6, Issue 2, 2018, Pages 123-134]
-
Sarkardeh, Abolfazl
Introduction of the Entropy-Based Method for Finding Influential Nodes in Information Dissemination on Online Social Networks [Volume 6, Issue 2, 2018, Pages 1-10]
-
Sepahvand, Mortaza
Target Tracking Algorithm in Wireless Sensor Networks with Optimum Power Consumption Using Quantized Observation [Volume 6, Issue 2, 2018, Pages 109-121]
-
Seyedin, Seyyed Ali Reza
Target Threat Assessment using Rule-Based Joint Fuzzy and Probabilistic Networks [Volume 6, Issue 4, 2019, Pages 61-78]
T
-
Tabaghchi Milan, Sara
Hybrid Method for Detecting Trustworthy Cloud Service Providers using Analytical Hierarchical Process and Neural Network [Volume 6, Issue 4, 2019, Pages 105-122]
-
Tabatabaei Feizabad, Seyyed Ali
Modelling and Solving the Location Problem of Fire Launching Sites [Volume 6, Issue 3, 2018, Pages 59-64]
-
Taheri, Seyyed Mahmoud
Self-stabilizing Grundy Coloring Using Game Theory and Heuristics Ordering [Volume 6, Issue 2, 2018, Pages 39-48]
-
Taleqani Zadeh, Kobra
A Mutual Anonymity Private Authentication Protocol to Use in Radio-Frequency Identification Systems [Volume 6, Issue 4, 2019, Pages 45-59]
-
Teimouri, Ebrahim
The Design Process Reform of the Gama-ray Imaging System by using the Design Structure Matrix [Volume 6, Issue 3, 2018, Pages 95-106]
-
Teymouri, Mahdi
Blind Estimation of Number of Users in TDMA Networks Using Redundancy of Adaptive Channel Coding [Volume 6, Issue 2, 2018, Pages 11-20]
Y
-
Yadegari, Vahid
Detect Web Denial of Service Attacks Using Entropy and Support Vector Machine Algorithm [Volume 6, Issue 4, 2019, Pages 79-89]
-
Yadeghari, Mohsen
Target Threat Assessment using Rule-Based Joint Fuzzy and Probabilistic Networks [Volume 6, Issue 4, 2019, Pages 61-78]
-
Yasrebi, Milad
Detection of Unknown Malicious Network Streams using Ensemble Learning [Volume 6, Issue 2, 2018, Pages 93-108]
Your query does not match with any item