Author Index

A

  • Abdollahi Azgomi, M. A Software System for Large-Scale Simulation of Malware Propagation in Computer Networks [Volume 7, Issue 2, 2019, Pages 53-67]
  • Adibnia, F. Collusive Fraud Classification in Network of Online Auction Using Similarity Measure in Collective Classification [Volume 7, Issue 1, 2019, Pages 95-103]
  • Adibnia, F. Secure and confidential workflow scheduling in hybrid cloud using improved particle swarm optimization algorithm [Volume 7, Issue 4, 2020, Pages 131-145]
  • Akbari, H. The Distributed Denial of Service Attacks Situation Awareness Based on The Prediction of Battle Scene Using Dempster-Shefer Evidences Theories and Bayesian Rules [Volume 7, Issue 1, 2019, Pages 77-94]
  • Akramizade, A. Deterrence Model in Cyberspace Based on Bayesian Belief Attack Graph by using Risk Creating Payoff Function [Volume 7, Issue 1, 2019, Pages 25-38]
  • Alikhani, S. Finite Frame as Code: Some Characterizations for Error Correction Codes and Three Algorithms for Troubleshooting in Data Transfer [Volume 7, Issue 2, 2019, Pages 1-12]
  • Alimohammady, H. A Novel Algorithm for Radar Jamming Resource Allocation [Volume 7, Issue 3, 2019, Pages 53-70]
  • Amanipour, V. Detection of Median Filtering Manipulation in Compressed Images [Volume 7, Issue 3, 2019, Pages 121-129]
  • Amin-Tahmasbi, H. Effects of Cyber Threats in IT Projects Using the Fuzzy Cognitive Mapping Approach [Volume 7, Issue 2, 2019, Pages 41-51]

B

  • Babaei, M. The Presentation of a Model for Analyzing the Behavior of the Enemy Using Hidden Markov Models Based on Electronic Warfare Observations in Complex War Scenes [Volume 7, Issue 1, 2019, Pages 113-128]
  • Bagheri, H. Side Channel Analysis of International Data Encryption Algorithm (IDEA) [Volume 7, Issue 4, 2020, Pages 51-57]
  • Bakhtiyari, K. Structural Analysis based on Integral Characteristic of a Reduced Round Block Cipher with Making an Improvement [Volume 7, Issue 3, 2019, Pages 1-8]
  • Bayat-Sarmadi, S. Side-Channel Attack Resistance Approaches Through Dynamic Differential Logic [Volume 7, Issue 3, 2019, Pages 93-104]
  • Borumand Saied, A. Structure of code-based hypergraphs and their application in wireless sensor networks [Volume 7, Issue 4, 2020, Pages 17-26]

D

  • Dadfarnia, M. Collusive Fraud Classification in Network of Online Auction Using Similarity Measure in Collective Classification [Volume 7, Issue 1, 2019, Pages 95-103]
  • Davoudi Darareh, M. A New Approach for Estimating the Rate of Emission in Quantum Bit Exchange‏ ‎Systems ‎Using Binomial Distribution [Volume 7, Issue 1, 2019, Pages 105-112]
  • Dehgan, A. A Practical Template Attack Against the Implementation of the Advanced Encryption Standard on ARM Processor [Volume 7, Issue 1, 2019, Pages 39-48]
  • Dehghan, A. Design and Production of Hardware Authentication Code Using Physically Unclonable Functions and a Random Number Generator on FPGA [Volume 7, Issue 4, 2020, Pages 37-50]
  • Dehghani, H. Intra-pulse Modulation Recognition Using Time-Frequency Features Based on Modified-B Distribution [Volume 7, Issue 1, 2019, Pages 129-138]
  • Dehghani, M. Modeling of cyber-attacks obfuscation based on the attack analogous to the technique of insertion attacks [Volume 7, Issue 4, 2020, Pages 91-103]
  • Doostari, M. A. A Scheme for Improvement of Security and Privacy in Mobile Health Systems by Using SIM Card [Volume 7, Issue 1, 2019, Pages 11-24]

E

  • Ebrahimi Moghaddam, M. Offline text-Independent Persian handwriting Forgery Detection using Texture Analysis [Volume 7, Issue 3, 2019, Pages 37-52]
  • Erfani, S. H. An Improved Method for Graph Data Anonymization with Emphasis on Preserving the Average Path length [Volume 7, Issue 2, 2019, Pages 25-32]

G

  • Gafori, A. An Improved Method of Incident Detection due to Cyber Attacks [Volume 7, Issue 4, 2020, Pages 105-116]
  • Ghaemmaghami, S. Detection of Median Filtering Manipulation in Compressed Images [Volume 7, Issue 3, 2019, Pages 121-129]
  • Ghafouri, A. Performance Improvement of the ODMRP Protocol using Analysis of the Received Signal Strength Level [Volume 7, Issue 3, 2019, Pages 21-26]
  • Ghanbari Maman, E. Offline text-Independent Persian handwriting Forgery Detection using Texture Analysis [Volume 7, Issue 3, 2019, Pages 37-52]
  • Ghand Tavakoli, E. A Software System for Large-Scale Simulation of Malware Propagation in Computer Networks [Volume 7, Issue 2, 2019, Pages 53-67]
  • Ghasemi, S. A. Performance Improvement of the ODMRP Protocol using Analysis of the Received Signal Strength Level [Volume 7, Issue 3, 2019, Pages 21-26]
  • Ghazvini, M. Enhance Media Access Control in IEEE 802.15.4 Based Smart Grids using Swarm Intelligence Algorithms [Volume 7, Issue 3, 2019, Pages 9-20]

H

  • Hamidi, M. Structure of code-based hypergraphs and their application in wireless sensor networks [Volume 7, Issue 4, 2020, Pages 17-26]
  • HasaniAhangar, M. R. An Improved Method of Incident Detection due to Cyber Attacks [Volume 7, Issue 4, 2020, Pages 105-116]
  • Hasani Ahangar, M. R. Detecting Botnets with Timing-Based Covert Command and Control Channels [Volume 7, Issue 4, 2020, Pages 1-15]
  • Hasani Ahnagar, M. R. Performance Improvement of the ODMRP Protocol using Analysis of the Received Signal Strength Level [Volume 7, Issue 3, 2019, Pages 21-26]
  • HassanNia, M. H. An Improved Method of Incident Detection due to Cyber Attacks [Volume 7, Issue 4, 2020, Pages 105-116]
  • Hemmati Asiabaraki, M. Effects of Cyber Threats in IT Projects Using the Fuzzy Cognitive Mapping Approach [Volume 7, Issue 2, 2019, Pages 41-51]
  • Hooshmandasl, M. R. Generating Tree Decomposition of Graphs with Imperialist Competitive Algorithm for Use in Secret Sharing Scheme [Volume 7, Issue 3, 2019, Pages 105-111]
  • Hoseini, M. A New Method for Image Steganography Using Discrete Wavelet Transforms [Volume 7, Issue 4, 2020, Pages 79-89]
  • Hosseeinini Andargoli, S. M. Robust Adaptive Beamforming Against Interferer’s Direction Of Arrival Estimation Error [Volume 7, Issue 3, 2019, Pages 27-36]
  • Hosseini, S. M. A New Approach for Estimating the Rate of Emission in Quantum Bit Exchange‏ ‎Systems ‎Using Binomial Distribution [Volume 7, Issue 1, 2019, Pages 105-112]

J

  • Jafari navimipour, N. Optimal Placement of Cameras to Maximize Visual Coverage using Genetic Algorithm and Harmony Search [Volume 7, Issue 1, 2019, Pages 49-61]
  • Jalaei, R. Detecting Botnets with Timing-Based Covert Command and Control Channels [Volume 7, Issue 4, 2020, Pages 1-15]
  • Janbaz, S. A New Approach for Estimating the Rate of Emission in Quantum Bit Exchange‏ ‎Systems ‎Using Binomial Distribution [Volume 7, Issue 1, 2019, Pages 105-112]
  • Javadzade, M. A. A Trust Model Based on Swarm Intelligence Algorithms in WSNs [Volume 7, Issue 1, 2019, Pages 1-10]
  • Javanshiri, H. Finite Frame as Code: Some Characterizations for Error Correction Codes and Three Algorithms for Troubleshooting in Data Transfer [Volume 7, Issue 2, 2019, Pages 1-12]
  • Jozpiri, R. Designing Systolic Array for SL0 Algorithm Implementation [Volume 7, Issue 4, 2020, Pages 59-65]

K

  • Kargari, M. Deterrence Model in Cyberspace Based on Bayesian Belief Attack Graph by using Risk Creating Payoff Function [Volume 7, Issue 1, 2019, Pages 25-38]
  • Karimi, A. A Trust Model Based on Swarm Intelligence Algorithms in WSNs [Volume 7, Issue 1, 2019, Pages 1-10]
  • Karimi, M. Optimal Placement of Cameras to Maximize Visual Coverage using Genetic Algorithm and Harmony Search [Volume 7, Issue 1, 2019, Pages 49-61]
  • Karimi, M. Performance Analysis of Free Space Optical Communication Links under M-PAM and M-PSK Modulations using Adaptive Power and Modulation Techniques [Volume 7, Issue 1, 2019, Pages 63-75]
  • Karsaz, A. High Maneuvering Target Tracking Based on Augmented State Method using Adaptive Unscented Kalman Filter [Volume 7, Issue 2, 2019, Pages 93-108]
  • Khadem, B. Structural Analysis based on Integral Characteristic of a Reduced Round Block Cipher with Making an Improvement [Volume 7, Issue 3, 2019, Pages 1-8]
  • Khandani, R. The Distributed Denial of Service Attacks Situation Awareness Based on The Prediction of Battle Scene Using Dempster-Shefer Evidences Theories and Bayesian Rules [Volume 7, Issue 1, 2019, Pages 77-94]
  • Kharazi, M. Improving Payload Attribution Techniques in Computer Network Criminology with Time based Hierarchical Bloom Filter [Volume 7, Issue 3, 2019, Pages 71-81]
  • Khorasani, Y. Increasing Insertion Capacity and Resistance in Image Steganography Based on Mapping and Bits Reduction [Volume 7, Issue 2, 2019, Pages 33-39]
  • Khosravi, A. A Trust Model Based on Swarm Intelligence Algorithms in WSNs [Volume 7, Issue 1, 2019, Pages 1-10]
  • Khosravi, M. J. A Trust Model Based on Swarm Intelligence Algorithms in WSNs [Volume 7, Issue 1, 2019, Pages 1-10]

L

  • Lashgarian, H. R. Evaluation of Network-Based Operation Criteria Based on DEMATEL Method [Volume 7, Issue 1, 2019, Pages 139-153]
  • Lashkarian, H. The Presentation of a Model for Analyzing the Behavior of the Enemy Using Hidden Markov Models Based on Electronic Warfare Observations in Complex War Scenes [Volume 7, Issue 1, 2019, Pages 113-128]
  • Lashkarian, H. R. The Course of Action Selection Model in Network Centric Operation [Volume 7, Issue 2, 2019, Pages 133-155]

M

  • Madadi, E. Design and Production of Hardware Authentication Code Using Physically Unclonable Functions and a Random Number Generator on FPGA [Volume 7, Issue 4, 2020, Pages 37-50]
  • Maddadi, B. Analyzing Security Challenges of LTE Networks, Obstacles and Opportunities of Network Localization Based on the Standard Platform [Volume 7, Issue 2, 2019, Pages 121-132]
  • Malaei, A. Deterrence Model in Cyberspace Based on Bayesian Belief Attack Graph by using Risk Creating Payoff Function [Volume 7, Issue 1, 2019, Pages 25-38]
  • Masoumi, M. A Practical Template Attack Against the Implementation of the Advanced Encryption Standard on ARM Processor [Volume 7, Issue 1, 2019, Pages 39-48]
  • Masoumi, M. Design and Production of Hardware Authentication Code Using Physically Unclonable Functions and a Random Number Generator on FPGA [Volume 7, Issue 4, 2020, Pages 37-50]
  • Mayabi Joghal, M. A Scheme for Improvement of Security and Privacy in Mobile Health Systems by Using SIM Card [Volume 7, Issue 1, 2019, Pages 11-24]
  • Mazaheri, H. Finite Frame as Code: Some Characterizations for Error Correction Codes and Three Algorithms for Troubleshooting in Data Transfer [Volume 7, Issue 2, 2019, Pages 1-12]
  • Mazloum, J. Increasing Insertion Capacity and Resistance in Image Steganography Based on Mapping and Bits Reduction [Volume 7, Issue 2, 2019, Pages 33-39]
  • Mehravaran, M. Secure and confidential workflow scheduling in hybrid cloud using improved particle swarm optimization algorithm [Volume 7, Issue 4, 2020, Pages 131-145]
  • Mehrdad, A. Analysis of Impossible Differential on LowMC Block Cipher [Volume 7, Issue 2, 2019, Pages 69-79]
  • Minaei, B. Smart Detection of Covert Worms in Computer Networks [Volume 7, Issue 4, 2020, Pages 67-77]
  • Mirghadri, A. Side Channel Analysis of International Data Encryption Algorithm (IDEA) [Volume 7, Issue 4, 2020, Pages 51-57]
  • Mirzaei, K. Evaluation of Network-Based Operation Criteria Based on DEMATEL Method [Volume 7, Issue 1, 2019, Pages 139-153]
  • Mirzaei, K. The Course of Action Selection Model in Network Centric Operation [Volume 7, Issue 2, 2019, Pages 133-155]
  • Mohajeri, J. A new attack on Jakobsson Hybrid Mix-Net [Volume 7, Issue 3, 2019, Pages 113-119]
  • Molaei Kaboodan, S. V. High Maneuvering Target Tracking Based on Augmented State Method using Adaptive Unscented Kalman Filter [Volume 7, Issue 2, 2019, Pages 93-108]
  • Mollazadeh Golmahale, M. The Course of Action Selection Model in Network Centric Operation [Volume 7, Issue 2, 2019, Pages 133-155]
  • Mollazadeh Golmahalle, M. Evaluation of Network-Based Operation Criteria Based on DEMATEL Method [Volume 7, Issue 1, 2019, Pages 139-153]
  • Mortazavi, R. An Improved Method for Graph Data Anonymization with Emphasis on Preserving the Average Path length [Volume 7, Issue 2, 2019, Pages 25-32]
  • Mortazavi, S. A. A new attack on Jakobsson Hybrid Mix-Net [Volume 7, Issue 3, 2019, Pages 113-119]
  • Mosavi, M. R. Three-Dimensional Angles Measurement using IME based on MEMS Technology by Adaptive Kalman Filter [Volume 7, Issue 2, 2019, Pages 81-91]
  • Mowlavi, O. Performance Analysis of Free Space Optical Communication Links under M-PAM and M-PSK Modulations using Adaptive Power and Modulation Techniques [Volume 7, Issue 1, 2019, Pages 63-75]

N

  • Naseri, A. Designing Systolic Array for SL0 Algorithm Implementation [Volume 7, Issue 4, 2020, Pages 59-65]
  • Nasiri, M. Smart Detection of Covert Worms in Computer Networks [Volume 7, Issue 4, 2020, Pages 67-77]
  • Nezhadshahbodaghi, M. Three-Dimensional Angles Measurement using IME based on MEMS Technology by Adaptive Kalman Filter [Volume 7, Issue 2, 2019, Pages 81-91]

P

  • Pajoohan, M. R. Secure and confidential workflow scheduling in hybrid cloud using improved particle swarm optimization algorithm [Volume 7, Issue 4, 2020, Pages 131-145]
  • Parhizgar, M. M. Prioritizing Obstacles to Industrial Control Systems Security Management Implementation, using Interpretive Structural Modeling (ISM) Approach [Volume 7, Issue 2, 2019, Pages 109-119]
  • Pooyan, F. Side-Channel Attack Resistance Approaches Through Dynamic Differential Logic [Volume 7, Issue 3, 2019, Pages 93-104]

R

  • Rahimi, F. Guidance and distributed control of the networked UAVs [Volume 7, Issue 4, 2020, Pages 117-129]
  • Rajaati Bavil Olyaei, M. Generating Tree Decomposition of Graphs with Imperialist Competitive Algorithm for Use in Secret Sharing Scheme [Volume 7, Issue 3, 2019, Pages 105-111]
  • Ranaei, H. Intra-pulse Modulation Recognition Using Time-Frequency Features Based on Modified-B Distribution [Volume 7, Issue 1, 2019, Pages 129-138]
  • Rashidi, A. J. A New Method for Image Steganography Using Discrete Wavelet Transforms [Volume 7, Issue 4, 2020, Pages 79-89]
  • Rashidi, A. J. Modeling of cyber-attacks obfuscation based on the attack analogous to the technique of insertion attacks [Volume 7, Issue 4, 2020, Pages 91-103]
  • Razmjoei, N. A New Method for Image Steganography Using Discrete Wavelet Transforms [Volume 7, Issue 3, 2019, Pages 83-91]
  • Rezaei, A. Enhance Media Access Control in IEEE 802.15.4 Based Smart Grids using Swarm Intelligence Algorithms [Volume 7, Issue 3, 2019, Pages 9-20]
  • Rezaei, A. Structure of code-based hypergraphs and their application in wireless sensor networks [Volume 7, Issue 4, 2020, Pages 17-26]
  • Rezaei Khair Abadi, M. Identification of STBC-OFDM Signals by Second-Order Cyclostationarity Method [Volume 7, Issue 4, 2020, Pages 27-36]

S

  • Saadatmand, M. Identification of STBC-OFDM Signals by Second-Order Cyclostationarity Method [Volume 7, Issue 4, 2020, Pages 27-36]
  • Saberi, M. Analyzing Security Challenges of LTE Networks, Obstacles and Opportunities of Network Localization Based on the Standard Platform [Volume 7, Issue 2, 2019, Pages 121-132]
  • Sabetian, M. Intra-pulse Modulation Recognition Using Time-Frequency Features Based on Modified-B Distribution [Volume 7, Issue 1, 2019, Pages 129-138]
  • Sadough, S. M. S. Performance Analysis of Free Space Optical Communication Links under M-PAM and M-PSK Modulations using Adaptive Power and Modulation Techniques [Volume 7, Issue 1, 2019, Pages 63-75]
  • Sadughi, S. Optimal Design of Low-power High-resolution Unity-STF S-MASH Sigma Delta Modulator for Telecommunication Applications [Volume 7, Issue 2, 2019, Pages 13-24]
  • Safavi, S. M. The Distributed Denial of Service Attacks Situation Awareness Based on The Prediction of Battle Scene Using Dempster-Shefer Evidences Theories and Bayesian Rules [Volume 7, Issue 1, 2019, Pages 77-94]
  • Salmasizadeh, M. A new attack on Jakobsson Hybrid Mix-Net [Volume 7, Issue 3, 2019, Pages 113-119]
  • Samareh Hashemi, S. A. Structure of code-based hypergraphs and their application in wireless sensor networks [Volume 7, Issue 4, 2020, Pages 17-26]
  • Sasan, z. Improving Payload Attribution Techniques in Computer Network Criminology with Time based Hierarchical Bloom Filter [Volume 7, Issue 3, 2019, Pages 71-81]
  • Shahrezaei, M. A New Method for Image Steganography Using Discrete Wavelet Transforms [Volume 7, Issue 3, 2019, Pages 83-91]
  • Shahriari, M. Analyzing Security Challenges of LTE Networks, Obstacles and Opportunities of Network Localization Based on the Standard Platform [Volume 7, Issue 2, 2019, Pages 121-132]
  • Sharifkhani, M. Optimal Design of Low-power High-resolution Unity-STF S-MASH Sigma Delta Modulator for Telecommunication Applications [Volume 7, Issue 2, 2019, Pages 13-24]
  • Shayesteh far, M. Increasing Insertion Capacity and Resistance in Image Steganography Based on Mapping and Bits Reduction [Volume 7, Issue 2, 2019, Pages 33-39]
  • Sheikhmohammadi, H. R. The Course of Action Selection Model in Network Centric Operation [Volume 7, Issue 2, 2019, Pages 133-155]
  • Sheikhmohammadi, M. Deterrence Model in Cyberspace Based on Bayesian Belief Attack Graph by using Risk Creating Payoff Function [Volume 7, Issue 1, 2019, Pages 25-38]
  • Sheikhmohammadi, M. The Presentation of a Model for Analyzing the Behavior of the Enemy Using Hidden Markov Models Based on Electronic Warfare Observations in Complex War Scenes [Volume 7, Issue 1, 2019, Pages 113-128]
  • Sheikhmohammadi, M. Evaluation of Network-Based Operation Criteria Based on DEMATEL Method [Volume 7, Issue 1, 2019, Pages 139-153]
  • Shoushian, K. Modeling of cyber-attacks obfuscation based on the attack analogous to the technique of insertion attacks [Volume 7, Issue 4, 2020, Pages 91-103]
  • Sobhani, S. A New Method for Image Steganography Using Discrete Wavelet Transforms [Volume 7, Issue 4, 2020, Pages 79-89]
  • Soleimani, H. Analysis of Impossible Differential on LowMC Block Cipher [Volume 7, Issue 2, 2019, Pages 69-79]

T

  • Tabatabavakily, V. A Novel Algorithm for Radar Jamming Resource Allocation [Volume 7, Issue 3, 2019, Pages 53-70]
  • Taghizadeh, M. Optimal Design of Low-power High-resolution Unity-STF S-MASH Sigma Delta Modulator for Telecommunication Applications [Volume 7, Issue 2, 2019, Pages 13-24]
  • Tajaddod, A. Structural Analysis based on Integral Characteristic of a Reduced Round Block Cipher with Making an Improvement [Volume 7, Issue 3, 2019, Pages 1-8]
  • Tajfar, A. H. Prioritizing Obstacles to Industrial Control Systems Security Management Implementation, using Interpretive Structural Modeling (ISM) Approach [Volume 7, Issue 2, 2019, Pages 109-119]
  • Tarasi Boroujeni, S. A. Prioritizing Obstacles to Industrial Control Systems Security Management Implementation, using Interpretive Structural Modeling (ISM) Approach [Volume 7, Issue 2, 2019, Pages 109-119]

V

  • Vafa, S. A Practical Template Attack Against the Implementation of the Advanced Encryption Standard on ARM Processor [Volume 7, Issue 1, 2019, Pages 39-48]
  • Veysi, M. Guidance and distributed control of the networked UAVs [Volume 7, Issue 4, 2020, Pages 117-129]

Z

  • Zabihi, H. Robust Adaptive Beamforming Against Interferer’s Direction Of Arrival Estimation Error [Volume 7, Issue 3, 2019, Pages 27-36]
  • Zabihi, M. Smart Detection of Covert Worms in Computer Networks [Volume 7, Issue 4, 2020, Pages 67-77]
  • Zaghian, A. A New Approach for Estimating the Rate of Emission in Quantum Bit Exchange‏ ‎Systems ‎Using Binomial Distribution [Volume 7, Issue 1, 2019, Pages 105-112]