A
-
Abdollahi Azgomi, M.
A Software System for Large-Scale Simulation of Malware Propagation
in Computer Networks [Volume 7, Issue 2, 2019, Pages 53-67]
-
Adibnia, F.
Collusive Fraud Classification in Network of Online Auction Using Similarity Measure in Collective Classification [Volume 7, Issue 1, 2019, Pages 95-103]
-
Adibnia, F.
Secure and confidential workflow scheduling in hybrid cloud using improved particle swarm optimization algorithm [Volume 7, Issue 4, 2020, Pages 131-145]
-
Akbari, H.
The Distributed Denial of Service Attacks Situation Awareness Based on The Prediction of Battle Scene Using Dempster-Shefer Evidences Theories and Bayesian Rules [Volume 7, Issue 1, 2019, Pages 77-94]
-
Akramizade, A.
Deterrence Model in Cyberspace Based on Bayesian Belief Attack Graph by using Risk Creating Payoff Function [Volume 7, Issue 1, 2019, Pages 25-38]
-
Alikhani, S.
Finite Frame as Code: Some Characterizations for Error Correction Codes and Three Algorithms for Troubleshooting in Data Transfer [Volume 7, Issue 2, 2019, Pages 1-12]
-
Alimohammady, H.
A Novel Algorithm for Radar Jamming Resource Allocation [Volume 7, Issue 3, 2019, Pages 53-70]
-
Amanipour, V.
Detection of Median Filtering Manipulation in Compressed Images [Volume 7, Issue 3, 2019, Pages 121-129]
-
Amin-Tahmasbi, H.
Effects of Cyber Threats in IT Projects Using the Fuzzy Cognitive Mapping Approach [Volume 7, Issue 2, 2019, Pages 41-51]
B
-
Babaei, M.
The Presentation of a Model for Analyzing the Behavior of the Enemy Using Hidden Markov Models Based on Electronic Warfare Observations in Complex War Scenes [Volume 7, Issue 1, 2019, Pages 113-128]
-
Bagheri, H.
Side Channel Analysis of International Data Encryption Algorithm (IDEA) [Volume 7, Issue 4, 2020, Pages 51-57]
-
Bakhtiyari, K.
Structural Analysis based on Integral Characteristic of a Reduced Round Block Cipher with Making an Improvement [Volume 7, Issue 3, 2019, Pages 1-8]
-
Bayat-Sarmadi, S.
Side-Channel Attack Resistance Approaches Through Dynamic Differential Logic [Volume 7, Issue 3, 2019, Pages 93-104]
-
Borumand Saied, A.
Structure of code-based hypergraphs and their application in wireless sensor networks [Volume 7, Issue 4, 2020, Pages 17-26]
D
-
Dadfarnia, M.
Collusive Fraud Classification in Network of Online Auction Using Similarity Measure in Collective Classification [Volume 7, Issue 1, 2019, Pages 95-103]
-
Davoudi Darareh, M.
A New Approach for Estimating the Rate of Emission in Quantum Bit Exchange Systems Using Binomial Distribution [Volume 7, Issue 1, 2019, Pages 105-112]
-
Dehgan, A.
A Practical Template Attack Against the Implementation of the Advanced Encryption Standard on ARM Processor [Volume 7, Issue 1, 2019, Pages 39-48]
-
Dehghan, A.
Design and Production of Hardware Authentication Code Using Physically Unclonable Functions and a Random Number Generator on FPGA [Volume 7, Issue 4, 2020, Pages 37-50]
-
Dehghani, H.
Intra-pulse Modulation Recognition Using Time-Frequency Features Based on Modified-B Distribution [Volume 7, Issue 1, 2019, Pages 129-138]
-
Dehghani, M.
Modeling of cyber-attacks obfuscation based on the attack analogous to the technique of insertion attacks [Volume 7, Issue 4, 2020, Pages 91-103]
-
Doostari, M. A.
A Scheme for Improvement of Security and Privacy in Mobile Health Systems by Using SIM Card [Volume 7, Issue 1, 2019, Pages 11-24]
E
-
Ebrahimi Moghaddam, M.
Offline text-Independent Persian handwriting Forgery Detection using Texture Analysis [Volume 7, Issue 3, 2019, Pages 37-52]
-
Erfani, S. H.
An Improved Method for Graph Data Anonymization with Emphasis on Preserving the Average Path length [Volume 7, Issue 2, 2019, Pages 25-32]
G
-
Gafori, A.
An Improved Method of Incident Detection due to Cyber Attacks [Volume 7, Issue 4, 2020, Pages 105-116]
-
Ghaemmaghami, S.
Detection of Median Filtering Manipulation in Compressed Images [Volume 7, Issue 3, 2019, Pages 121-129]
-
Ghafouri, A.
Performance Improvement of the ODMRP Protocol using Analysis of the Received Signal Strength Level [Volume 7, Issue 3, 2019, Pages 21-26]
-
Ghanbari Maman, E.
Offline text-Independent Persian handwriting Forgery Detection using Texture Analysis [Volume 7, Issue 3, 2019, Pages 37-52]
-
Ghand Tavakoli, E.
A Software System for Large-Scale Simulation of Malware Propagation
in Computer Networks [Volume 7, Issue 2, 2019, Pages 53-67]
-
Ghasemi, S. A.
Performance Improvement of the ODMRP Protocol using Analysis of the Received Signal Strength Level [Volume 7, Issue 3, 2019, Pages 21-26]
-
Ghazvini, M.
Enhance Media Access Control in IEEE 802.15.4 Based Smart Grids using Swarm Intelligence Algorithms [Volume 7, Issue 3, 2019, Pages 9-20]
H
-
Hamidi, M.
Structure of code-based hypergraphs and their application in wireless sensor networks [Volume 7, Issue 4, 2020, Pages 17-26]
-
HasaniAhangar, M. R.
An Improved Method of Incident Detection due to Cyber Attacks [Volume 7, Issue 4, 2020, Pages 105-116]
-
Hasani Ahangar, M. R.
Detecting Botnets with Timing-Based Covert Command and Control Channels [Volume 7, Issue 4, 2020, Pages 1-15]
-
Hasani Ahnagar, M. R.
Performance Improvement of the ODMRP Protocol using Analysis of the Received Signal Strength Level [Volume 7, Issue 3, 2019, Pages 21-26]
-
HassanNia, M. H.
An Improved Method of Incident Detection due to Cyber Attacks [Volume 7, Issue 4, 2020, Pages 105-116]
-
Hemmati Asiabaraki, M.
Effects of Cyber Threats in IT Projects Using the Fuzzy Cognitive Mapping Approach [Volume 7, Issue 2, 2019, Pages 41-51]
-
Hooshmandasl, M. R.
Generating Tree Decomposition of Graphs with Imperialist Competitive Algorithm for Use in Secret Sharing Scheme [Volume 7, Issue 3, 2019, Pages 105-111]
-
Hoseini, M.
A New Method for Image Steganography Using Discrete Wavelet Transforms [Volume 7, Issue 4, 2020, Pages 79-89]
-
Hosseeinini Andargoli, S. M.
Robust Adaptive Beamforming Against Interferer’s Direction Of Arrival Estimation Error [Volume 7, Issue 3, 2019, Pages 27-36]
-
Hosseini, S. M.
A New Approach for Estimating the Rate of Emission in Quantum Bit Exchange Systems Using Binomial Distribution [Volume 7, Issue 1, 2019, Pages 105-112]
J
-
Jafari navimipour, N.
Optimal Placement of Cameras to Maximize Visual Coverage using Genetic Algorithm and Harmony Search [Volume 7, Issue 1, 2019, Pages 49-61]
-
Jalaei, R.
Detecting Botnets with Timing-Based Covert Command and Control Channels [Volume 7, Issue 4, 2020, Pages 1-15]
-
Janbaz, S.
A New Approach for Estimating the Rate of Emission in Quantum Bit Exchange Systems Using Binomial Distribution [Volume 7, Issue 1, 2019, Pages 105-112]
-
Javadzade, M. A.
A Trust Model Based on Swarm Intelligence Algorithms in WSNs [Volume 7, Issue 1, 2019, Pages 1-10]
-
Javanshiri, H.
Finite Frame as Code: Some Characterizations for Error Correction Codes and Three Algorithms for Troubleshooting in Data Transfer [Volume 7, Issue 2, 2019, Pages 1-12]
-
Jozpiri, R.
Designing Systolic Array for SL0 Algorithm Implementation [Volume 7, Issue 4, 2020, Pages 59-65]
K
-
Kargari, M.
Deterrence Model in Cyberspace Based on Bayesian Belief Attack Graph by using Risk Creating Payoff Function [Volume 7, Issue 1, 2019, Pages 25-38]
-
Karimi, A.
A Trust Model Based on Swarm Intelligence Algorithms in WSNs [Volume 7, Issue 1, 2019, Pages 1-10]
-
Karimi, M.
Optimal Placement of Cameras to Maximize Visual Coverage using Genetic Algorithm and Harmony Search [Volume 7, Issue 1, 2019, Pages 49-61]
-
Karimi, M.
Performance Analysis of Free Space Optical Communication Links under M-PAM and M-PSK Modulations using Adaptive Power and Modulation Techniques [Volume 7, Issue 1, 2019, Pages 63-75]
-
Karsaz, A.
High Maneuvering Target Tracking Based on Augmented State Method using Adaptive Unscented Kalman Filter [Volume 7, Issue 2, 2019, Pages 93-108]
-
Khadem, B.
Structural Analysis based on Integral Characteristic of a Reduced Round Block Cipher with Making an Improvement [Volume 7, Issue 3, 2019, Pages 1-8]
-
Khandani, R.
The Distributed Denial of Service Attacks Situation Awareness Based on The Prediction of Battle Scene Using Dempster-Shefer Evidences Theories and Bayesian Rules [Volume 7, Issue 1, 2019, Pages 77-94]
-
Kharazi, M.
Improving Payload Attribution Techniques in Computer Network Criminology with Time based Hierarchical Bloom Filter [Volume 7, Issue 3, 2019, Pages 71-81]
-
Khorasani, Y.
Increasing Insertion Capacity and Resistance in Image Steganography Based on Mapping and Bits Reduction [Volume 7, Issue 2, 2019, Pages 33-39]
-
Khosravi, A.
A Trust Model Based on Swarm Intelligence Algorithms in WSNs [Volume 7, Issue 1, 2019, Pages 1-10]
-
Khosravi, M. J.
A Trust Model Based on Swarm Intelligence Algorithms in WSNs [Volume 7, Issue 1, 2019, Pages 1-10]
L
-
Lashgarian, H. R.
Evaluation of Network-Based Operation Criteria Based on DEMATEL Method [Volume 7, Issue 1, 2019, Pages 139-153]
-
Lashkarian, H.
The Presentation of a Model for Analyzing the Behavior of the Enemy Using Hidden Markov Models Based on Electronic Warfare Observations in Complex War Scenes [Volume 7, Issue 1, 2019, Pages 113-128]
-
Lashkarian, H. R.
The Course of Action Selection Model in Network Centric Operation [Volume 7, Issue 2, 2019, Pages 133-155]
M
-
Madadi, E.
Design and Production of Hardware Authentication Code Using Physically Unclonable Functions and a Random Number Generator on FPGA [Volume 7, Issue 4, 2020, Pages 37-50]
-
Maddadi, B.
Analyzing Security Challenges of LTE Networks, Obstacles and Opportunities of Network Localization
Based on the Standard Platform [Volume 7, Issue 2, 2019, Pages 121-132]
-
Malaei, A.
Deterrence Model in Cyberspace Based on Bayesian Belief Attack Graph by using Risk Creating Payoff Function [Volume 7, Issue 1, 2019, Pages 25-38]
-
Masoumi, M.
A Practical Template Attack Against the Implementation of the Advanced Encryption Standard on ARM Processor [Volume 7, Issue 1, 2019, Pages 39-48]
-
Masoumi, M.
Design and Production of Hardware Authentication Code Using Physically Unclonable Functions and a Random Number Generator on FPGA [Volume 7, Issue 4, 2020, Pages 37-50]
-
Mayabi Joghal, M.
A Scheme for Improvement of Security and Privacy in Mobile Health Systems by Using SIM Card [Volume 7, Issue 1, 2019, Pages 11-24]
-
Mazaheri, H.
Finite Frame as Code: Some Characterizations for Error Correction Codes and Three Algorithms for Troubleshooting in Data Transfer [Volume 7, Issue 2, 2019, Pages 1-12]
-
Mazloum, J.
Increasing Insertion Capacity and Resistance in Image Steganography Based on Mapping and Bits Reduction [Volume 7, Issue 2, 2019, Pages 33-39]
-
Mehravaran, M.
Secure and confidential workflow scheduling in hybrid cloud using improved particle swarm optimization algorithm [Volume 7, Issue 4, 2020, Pages 131-145]
-
Mehrdad, A.
Analysis of Impossible Differential on LowMC Block Cipher [Volume 7, Issue 2, 2019, Pages 69-79]
-
Minaei, B.
Smart Detection of Covert Worms in Computer Networks [Volume 7, Issue 4, 2020, Pages 67-77]
-
Mirghadri, A.
Side Channel Analysis of International Data Encryption Algorithm (IDEA) [Volume 7, Issue 4, 2020, Pages 51-57]
-
Mirzaei, K.
Evaluation of Network-Based Operation Criteria Based on DEMATEL Method [Volume 7, Issue 1, 2019, Pages 139-153]
-
Mirzaei, K.
The Course of Action Selection Model in Network Centric Operation [Volume 7, Issue 2, 2019, Pages 133-155]
-
Mohajeri, J.
A new attack on Jakobsson Hybrid Mix-Net [Volume 7, Issue 3, 2019, Pages 113-119]
-
Molaei Kaboodan, S. V.
High Maneuvering Target Tracking Based on Augmented State Method using Adaptive Unscented Kalman Filter [Volume 7, Issue 2, 2019, Pages 93-108]
-
Mollazadeh Golmahale, M.
The Course of Action Selection Model in Network Centric Operation [Volume 7, Issue 2, 2019, Pages 133-155]
-
Mollazadeh Golmahalle, M.
Evaluation of Network-Based Operation Criteria Based on DEMATEL Method [Volume 7, Issue 1, 2019, Pages 139-153]
-
Mortazavi, R.
An Improved Method for Graph Data Anonymization with Emphasis on Preserving the Average Path length [Volume 7, Issue 2, 2019, Pages 25-32]
-
Mortazavi, S. A.
A new attack on Jakobsson Hybrid Mix-Net [Volume 7, Issue 3, 2019, Pages 113-119]
-
Mosavi, M. R.
Three-Dimensional Angles Measurement using IME based on MEMS Technology by Adaptive Kalman Filter [Volume 7, Issue 2, 2019, Pages 81-91]
-
Mowlavi, O.
Performance Analysis of Free Space Optical Communication Links under M-PAM and M-PSK Modulations using Adaptive Power and Modulation Techniques [Volume 7, Issue 1, 2019, Pages 63-75]
N
-
Naseri, A.
Designing Systolic Array for SL0 Algorithm Implementation [Volume 7, Issue 4, 2020, Pages 59-65]
-
Nasiri, M.
Smart Detection of Covert Worms in Computer Networks [Volume 7, Issue 4, 2020, Pages 67-77]
-
Nezhadshahbodaghi, M.
Three-Dimensional Angles Measurement using IME based on MEMS Technology by Adaptive Kalman Filter [Volume 7, Issue 2, 2019, Pages 81-91]
P
-
Pajoohan, M. R.
Secure and confidential workflow scheduling in hybrid cloud using improved particle swarm optimization algorithm [Volume 7, Issue 4, 2020, Pages 131-145]
-
Parhizgar, M. M.
Prioritizing Obstacles to Industrial Control Systems Security Management Implementation, using Interpretive Structural Modeling (ISM) Approach [Volume 7, Issue 2, 2019, Pages 109-119]
-
Pooyan, F.
Side-Channel Attack Resistance Approaches Through Dynamic Differential Logic [Volume 7, Issue 3, 2019, Pages 93-104]
R
-
Rahimi, F.
Guidance and distributed control of the networked UAVs [Volume 7, Issue 4, 2020, Pages 117-129]
-
Rajaati Bavil Olyaei, M.
Generating Tree Decomposition of Graphs with Imperialist Competitive Algorithm for Use in Secret Sharing Scheme [Volume 7, Issue 3, 2019, Pages 105-111]
-
Ranaei, H.
Intra-pulse Modulation Recognition Using Time-Frequency Features Based on Modified-B Distribution [Volume 7, Issue 1, 2019, Pages 129-138]
-
Rashidi, A. J.
A New Method for Image Steganography Using Discrete Wavelet Transforms [Volume 7, Issue 4, 2020, Pages 79-89]
-
Rashidi, A. J.
Modeling of cyber-attacks obfuscation based on the attack analogous to the technique of insertion attacks [Volume 7, Issue 4, 2020, Pages 91-103]
-
Razmjoei, N.
A New Method for Image Steganography Using Discrete Wavelet Transforms [Volume 7, Issue 3, 2019, Pages 83-91]
-
Rezaei, A.
Enhance Media Access Control in IEEE 802.15.4 Based Smart Grids using Swarm Intelligence Algorithms [Volume 7, Issue 3, 2019, Pages 9-20]
-
Rezaei, A.
Structure of code-based hypergraphs and their application in wireless sensor networks [Volume 7, Issue 4, 2020, Pages 17-26]
-
Rezaei Khair Abadi, M.
Identification of STBC-OFDM Signals by Second-Order Cyclostationarity Method [Volume 7, Issue 4, 2020, Pages 27-36]
S
-
Saadatmand, M.
Identification of STBC-OFDM Signals by Second-Order Cyclostationarity Method [Volume 7, Issue 4, 2020, Pages 27-36]
-
Saberi, M.
Analyzing Security Challenges of LTE Networks, Obstacles and Opportunities of Network Localization
Based on the Standard Platform [Volume 7, Issue 2, 2019, Pages 121-132]
-
Sabetian, M.
Intra-pulse Modulation Recognition Using Time-Frequency Features Based on Modified-B Distribution [Volume 7, Issue 1, 2019, Pages 129-138]
-
Sadough, S. M. S.
Performance Analysis of Free Space Optical Communication Links under M-PAM and M-PSK Modulations using Adaptive Power and Modulation Techniques [Volume 7, Issue 1, 2019, Pages 63-75]
-
Sadughi, S.
Optimal Design of Low-power High-resolution Unity-STF S-MASH Sigma Delta Modulator for Telecommunication Applications [Volume 7, Issue 2, 2019, Pages 13-24]
-
Safavi, S. M.
The Distributed Denial of Service Attacks Situation Awareness Based on The Prediction of Battle Scene Using Dempster-Shefer Evidences Theories and Bayesian Rules [Volume 7, Issue 1, 2019, Pages 77-94]
-
Salmasizadeh, M.
A new attack on Jakobsson Hybrid Mix-Net [Volume 7, Issue 3, 2019, Pages 113-119]
-
Samareh Hashemi, S. A.
Structure of code-based hypergraphs and their application in wireless sensor networks [Volume 7, Issue 4, 2020, Pages 17-26]
-
Sasan, z.
Improving Payload Attribution Techniques in Computer Network Criminology with Time based Hierarchical Bloom Filter [Volume 7, Issue 3, 2019, Pages 71-81]
-
Shahrezaei, M.
A New Method for Image Steganography Using Discrete Wavelet Transforms [Volume 7, Issue 3, 2019, Pages 83-91]
-
Shahriari, M.
Analyzing Security Challenges of LTE Networks, Obstacles and Opportunities of Network Localization
Based on the Standard Platform [Volume 7, Issue 2, 2019, Pages 121-132]
-
Sharifkhani, M.
Optimal Design of Low-power High-resolution Unity-STF S-MASH Sigma Delta Modulator for Telecommunication Applications [Volume 7, Issue 2, 2019, Pages 13-24]
-
Shayesteh far, M.
Increasing Insertion Capacity and Resistance in Image Steganography Based on Mapping and Bits Reduction [Volume 7, Issue 2, 2019, Pages 33-39]
-
Sheikhmohammadi, H. R.
The Course of Action Selection Model in Network Centric Operation [Volume 7, Issue 2, 2019, Pages 133-155]
-
Sheikhmohammadi, M.
Deterrence Model in Cyberspace Based on Bayesian Belief Attack Graph by using Risk Creating Payoff Function [Volume 7, Issue 1, 2019, Pages 25-38]
-
Sheikhmohammadi, M.
The Presentation of a Model for Analyzing the Behavior of the Enemy Using Hidden Markov Models Based on Electronic Warfare Observations in Complex War Scenes [Volume 7, Issue 1, 2019, Pages 113-128]
-
Sheikhmohammadi, M.
Evaluation of Network-Based Operation Criteria Based on DEMATEL Method [Volume 7, Issue 1, 2019, Pages 139-153]
-
Shoushian, K.
Modeling of cyber-attacks obfuscation based on the attack analogous to the technique of insertion attacks [Volume 7, Issue 4, 2020, Pages 91-103]
-
Sobhani, S.
A New Method for Image Steganography Using Discrete Wavelet Transforms [Volume 7, Issue 4, 2020, Pages 79-89]
-
Soleimani, H.
Analysis of Impossible Differential on LowMC Block Cipher [Volume 7, Issue 2, 2019, Pages 69-79]
T
-
Tabatabavakily, V.
A Novel Algorithm for Radar Jamming Resource Allocation [Volume 7, Issue 3, 2019, Pages 53-70]
-
Taghizadeh, M.
Optimal Design of Low-power High-resolution Unity-STF S-MASH Sigma Delta Modulator for Telecommunication Applications [Volume 7, Issue 2, 2019, Pages 13-24]
-
Tajaddod, A.
Structural Analysis based on Integral Characteristic of a Reduced Round Block Cipher with Making an Improvement [Volume 7, Issue 3, 2019, Pages 1-8]
-
Tajfar, A. H.
Prioritizing Obstacles to Industrial Control Systems Security Management Implementation, using Interpretive Structural Modeling (ISM) Approach [Volume 7, Issue 2, 2019, Pages 109-119]
-
Tarasi Boroujeni, S. A.
Prioritizing Obstacles to Industrial Control Systems Security Management Implementation, using Interpretive Structural Modeling (ISM) Approach [Volume 7, Issue 2, 2019, Pages 109-119]
V
-
Vafa, S.
A Practical Template Attack Against the Implementation of the Advanced Encryption Standard on ARM Processor [Volume 7, Issue 1, 2019, Pages 39-48]
-
Veysi, M.
Guidance and distributed control of the networked UAVs [Volume 7, Issue 4, 2020, Pages 117-129]
Z
-
Zabihi, H.
Robust Adaptive Beamforming Against Interferer’s Direction Of Arrival Estimation Error [Volume 7, Issue 3, 2019, Pages 27-36]
-
Zabihi, M.
Smart Detection of Covert Worms in Computer Networks [Volume 7, Issue 4, 2020, Pages 67-77]
-
Zaghian, A.
A New Approach for Estimating the Rate of Emission in Quantum Bit Exchange Systems Using Binomial Distribution [Volume 7, Issue 1, 2019, Pages 105-112]
Your query does not match with any item