A
-
Abbasi, M.
Reducing Interference Effect on GPS Navigation System Using Evolutionary Notch Filter [Volume 8, Issue 4, 2021, Pages 95-106]
-
Abbasi, Z.
Multipartite Integral Circulant Graphs [Volume 8, Issue 3, 2020, Pages 167-170]
-
Abdollahi, H.
Introducing an OFDM-CDMA Hybrid Algorithm Based on the Multiple Access Technique to Improve Indoor Visible Light Communication Link [Volume 8, Issue 3, 2020, Pages 131-137]
-
Abrishamifar, A.
Design and Simulation of a LORAN Signal Generator for LPS Transmitter Using Class I Amplifier [Volume 8, Issue 2, 2020, Pages 25-33]
-
Afifi, A.
Design and Simulation of a LORAN Signal Generator for LPS Transmitter Using Class I Amplifier [Volume 8, Issue 2, 2020, Pages 25-33]
-
Afifi, A.
Reliability Analysis of Open-Loop Switching Loran Signal Generator Using Omoe Indicator [Volume 8, Issue 2, 2020, Pages 83-93]
-
Aghazadeh, T.
Design and Simulation of a LORAN Signal Generator for LPS Transmitter Using Class I Amplifier [Volume 8, Issue 2, 2020, Pages 25-33]
-
Ahmadian Yazdi, H.
Introducing an Optimal Modulation Constellation, Resistant to Atmospheric Turbulence [Volume 8, Issue 2, 2020, Pages 115-124]
-
Ahrari, M. J.
A Fault Tolerant Task Scheduling Method for Optimal use of Resources in Cloud Computing Environment [Volume 8, Issue 2, 2020, Pages 95-103]
-
Akbari, H.
Improvement in the Ransomwares Detection Method With New API
Calls Features [Volume 8, Issue 4, 2021, Pages 107-118]
-
Akhaei, M. A.
Steganography on raw video based on proper detection and compromise between the parameters of transparency, resistance and capacity [Volume 8, Issue 1, 2020, Pages 51-65]
-
Akhlaghi, S.
Joint Optimization of User Association, Subchannel Allocation and Power Allocation in OFDMA Heterogeneous Networks [Volume 8, Issue 3, 2020, Pages 117-129]
-
Alavi, S. M.
Coherent Acoustic source DOA estimation by nested array based on sparse solution [Volume 8, Issue 1, 2020, Pages 79-88]
-
Alizadeh, J.
Upper Bounds for the Probability of Differential Characteristics of Five Block Cipher
Constructions Functions [Volume 8, Issue 4, 2021, Pages 129-137]
-
Amin, A. R.
Reliability Analysis of Open-Loop Switching Loran Signal Generator Using Omoe Indicator [Volume 8, Issue 2, 2020, Pages 83-93]
-
Amiri, H.
Coherent Acoustic source DOA estimation by nested array based on sparse solution [Volume 8, Issue 1, 2020, Pages 79-88]
-
Aref, M. R.
Information Theoretic Secret Key Agreement Based on Localization [Volume 8, Issue 2, 2020, Pages 35-49]
-
Arefi Nejad, S. M.
A New Scheduling Algorithm to Reduce Computation Time in Hadoop Environment [Volume 8, Issue 2, 2020, Pages 51-59]
-
Asadi, M.
P2P Botnet Detection Using Deep Learning Method [Volume 8, Issue 2, 2020, Pages 1-14]
-
Asadi, M.
Comparison of Supervised Machine Learning Algorithms in Detection of Botnets Domain Generation Algorithms [Volume 8, Issue 4, 2021, Pages 17-29]
-
Asadzadeh, A.
Coherent Acoustic source DOA estimation by nested array based on sparse solution [Volume 8, Issue 1, 2020, Pages 79-88]
-
Ataee, M. A.
Frequency Spectrum Sensing by Multi-Stage Adaptive Optimization Algorithm with the Efficient Non-Cooperative Technique in Cognitive radios with hardware implementation [Volume 8, Issue 3, 2020, Pages 39-51]
-
Ataei Khabbaz, H.
Network Intrusion Detection using a combination of artificial neural networks in a hierarchical manner [Volume 8, Issue 1, 2020, Pages 89-99]
B
-
Bahramgiri, H.
Introduction of An Anti-Collision Protocol in RFID Systems [Volume 8, Issue 4, 2021, Pages 119-128]
-
Balochian, S.
Modelling and optimal solving of dependent sensor-weapon/threat assignment and scheduling problem by a metaheuristic algorithm based on GRASP [Volume 8, Issue 1, 2020, Pages 35-50]
-
Bastami, E.
Identifying Influential Nodes in Social Networks by Integrating the Centrality Method and Node Activity [Volume 8, Issue 3, 2020, Pages 1-11]
-
Bayat, M.
A Novel and Secure Model for Sharing Protected Health Record (PHR) Based on Blockchain and Attribute Based Encryption [Volume 8, Issue 1, 2020, Pages 101-124]
-
Bayat, M.
A secure three factor authentication scheme for wireless
healthcare sensor networks based on elliptic curve [Volume 8, Issue 1, 2020, Pages 147-167]
-
Bayat, M.
Introducing an OFDM-CDMA Hybrid Algorithm Based on the Multiple Access Technique to Improve Indoor Visible Light Communication Link [Volume 8, Issue 3, 2020, Pages 131-137]
-
Beikpoori, M. S.
Development of the Concept of Deterrence Theory in the Country's Cyberspace
Based on Upstream Documents and Available Approaches [Volume 8, Issue 4, 2021, Pages 161-173]
-
Bohlooli, A.
An Accelerated Method for Rules Anomaly Detection in Software Defined Networks [Volume 8, Issue 4, 2021, Pages 31-39]
C
-
Chaharlang, J.
Proposing a New and Comprehensive Method for Quantum Representation of Digital Audio Signals [Volume 8, Issue 4, 2021, Pages 139-152]
D
-
Dehghani, M.
Modeling of cyber-attacks obfuscation, based on alteration technique of attack [Volume 8, Issue 1, 2020, Pages 67-77]
-
Dehghanian, Y.
Fuzzy Keyword Search Scheme on an Encrypted Database in Cloud Computing Using Word Clustering [Volume 8, Issue 3, 2020, Pages 151-165]
E
-
Esfahani, R.
Steganography on raw video based on proper detection and compromise between the parameters of transparency, resistance and capacity [Volume 8, Issue 1, 2020, Pages 51-65]
-
Eslami, Z.
Security Analysis and Improvement of an Intelligent Transportation System based on Certificateless Aggregate Signature [Volume 8, Issue 1, 2020, Pages 25-33]
F
-
Farjami, Y.
A Novel and Secure Model for Sharing Protected Health Record (PHR) Based on Blockchain and Attribute Based Encryption [Volume 8, Issue 1, 2020, Pages 101-124]
-
Forouzanmehr, M.
Joint Optimization of User Association, Subchannel Allocation and Power Allocation in OFDMA Heterogeneous Networks [Volume 8, Issue 3, 2020, Pages 117-129]
G
-
Gaeini, A.
Upper Bounds for the Probability of Differential Characteristics of Five Block Cipher
Constructions Functions [Volume 8, Issue 4, 2021, Pages 129-137]
-
Ghafori, A.
A Fault Tolerant Task Scheduling Method for Optimal use of Resources in Cloud Computing Environment [Volume 8, Issue 2, 2020, Pages 95-103]
-
Ghasemzadeh, M.
The relationship of software vulnerabilities and workarounds [Volume 8, Issue 2, 2020, Pages 75-81]
-
Ghasemzadeh, M.
Enhancing E-Security by Inserting a Watermark Using the Combination of Genetic Algorithm and Tabu Search [Volume 8, Issue 3, 2020, Pages 25-37]
-
Ghayoori sales, M.
Fuzzy Keyword Search Scheme on an Encrypted Database in Cloud Computing Using Word Clustering [Volume 8, Issue 3, 2020, Pages 151-165]
-
Ghezel Ayagh, M. H.
Reliability Analysis of Open-Loop Switching Loran Signal Generator Using Omoe Indicator [Volume 8, Issue 2, 2020, Pages 83-93]
-
Ghobaei, M.
Resource Elasticity Management using Fuzzy Controller Based on Threshold Changes in the Cloud Computing Environment [Volume 8, Issue 3, 2020, Pages 63-81]
-
Ghorbani Saber, R.
Modelling and optimal solving of dependent sensor-weapon/threat assignment and scheduling problem by a metaheuristic algorithm based on GRASP [Volume 8, Issue 1, 2020, Pages 35-50]
-
Golshahi, F.
An Improved New Link Prediction Method in Social Multilplex Networks Based on the Gravitational Search Algorithm [Volume 8, Issue 2, 2020, Pages 15-24]
H
-
Haamian, N.
A secure three factor authentication scheme for wireless
healthcare sensor networks based on elliptic curve [Volume 8, Issue 1, 2020, Pages 147-167]
-
Hadian Dehkordi, M.
Two Verifiable Multi-Secret Sharing Schemes: A Linear Scheme with Standard Security and A Lattice-Based Scheme [Volume 8, Issue 3, 2020, Pages 101-115]
-
Haefi, Z.
A secure three factor authentication scheme for wireless
healthcare sensor networks based on elliptic curve [Volume 8, Issue 1, 2020, Pages 147-167]
-
Hajipoor, O.
Automatic Keyword Extraction from Persian short Text Using word2vec [Volume 8, Issue 2, 2020, Pages 105-114]
-
Hamidi, H. R.
Web Covert Timing Channel Detection based on Entropy [Volume 8, Issue 3, 2020, Pages 13-23]
-
Hasani Ahangar, M. R.
Providing an Agent-Based Architecture for Semantic Mining From Large-Scale Data in Distributed Environments [Volume 8, Issue 3, 2020, Pages 83-99]
-
Hashemi, S. M.
Joint Optimization of User Association, Subchannel Allocation and Power Allocation in OFDMA Heterogeneous Networks [Volume 8, Issue 3, 2020, Pages 117-129]
-
Hassani Ahangar, M. R.
A Fault Tolerant Task Scheduling Method for Optimal use of Resources in Cloud Computing Environment [Volume 8, Issue 2, 2020, Pages 95-103]
-
Huseini, M.
A Distributed Approach to Community Detection in Large Social Networks Based on Label Propagation [Volume 8, Issue 4, 2021, Pages 1-15]
I
-
Izadipour, A.
Modelling and optimal solving of dependent sensor-weapon/threat assignment and scheduling problem by a metaheuristic algorithm based on GRASP [Volume 8, Issue 1, 2020, Pages 35-50]
J
-
Jabraeil Jamali, M. A.
Comparison of Supervised Machine Learning Algorithms in Detection of Botnets Domain Generation Algorithms [Volume 8, Issue 4, 2021, Pages 17-29]
-
Jabreil Jamali, M. A.
P2P Botnet Detection Using Deep Learning Method [Volume 8, Issue 2, 2020, Pages 1-14]
-
Jalali Farahani, G. R.
Development of the Concept of Deterrence Theory in the Country's Cyberspace
Based on Upstream Documents and Available Approaches [Volume 8, Issue 4, 2021, Pages 161-173]
-
Jamshidian, Gh.
Upper Bounds for the Probability of Differential Characteristics of Five Block Cipher
Constructions Functions [Volume 8, Issue 4, 2021, Pages 129-137]
-
Janalizadeh, S.
Using Generalized Entropy Approach for Blind Estimation of the Length of Spreading Sequences in Code Division Multiple Access Systems [Volume 8, Issue 3, 2020, Pages 53-61]
-
Javaheri, H. R.
Improvement in the Ransomwares Detection Method With New API
Calls Features [Volume 8, Issue 4, 2021, Pages 107-118]
K
-
Kangavari, M. R.
Providing an Agent-Based Architecture for Semantic Mining From Large-Scale Data in Distributed Environments [Volume 8, Issue 3, 2020, Pages 83-99]
-
Karimi, A.
Identifying Influential Nodes in Social Networks by Integrating the Centrality Method and Node Activity [Volume 8, Issue 3, 2020, Pages 1-11]
-
Karimi, M.
Coherent Acoustic source DOA estimation by nested array based on sparse solution [Volume 8, Issue 1, 2020, Pages 79-88]
-
Kazemi, M. H.
A secure three factor authentication scheme for wireless
healthcare sensor networks based on elliptic curve [Volume 8, Issue 1, 2020, Pages 147-167]
-
Kazeminia, M.
Wireless Target Localization Using Median Weighted Least Square Error Metric in the Presence of Non-Line of Sight Signals [Volume 8, Issue 2, 2020, Pages 125-133]
-
Kazempour, N.
Information Theoretic Secret Key Agreement Based on Localization [Volume 8, Issue 2, 2020, Pages 35-49]
-
Khalilpoor, J.
Wireless Target Localization Using Median Weighted Least Square Error Metric in the Presence of Non-Line of Sight Signals [Volume 8, Issue 2, 2020, Pages 125-133]
-
Khodadadi, H. R.
Frequency Spectrum Sensing by Multi-Stage Adaptive Optimization Algorithm with the Efficient Non-Cooperative Technique in Cognitive radios with hardware implementation [Volume 8, Issue 3, 2020, Pages 39-51]
-
Khorrami, A.
Reliability Analysis of Open-Loop Switching Loran Signal Generator Using Omoe Indicator [Volume 8, Issue 2, 2020, Pages 83-93]
-
Kiamary, N.
Two Verifiable Multi-Secret Sharing Schemes: A Linear Scheme with Standard Security and A Lattice-Based Scheme [Volume 8, Issue 3, 2020, Pages 101-115]
-
Kiani, R.
An Accelerated Method for Rules Anomaly Detection in Software Defined Networks [Volume 8, Issue 4, 2021, Pages 31-39]
L
-
Latif, A. M.
Enhancing E-Security by Inserting a Watermark Using the Combination of Genetic Algorithm and Tabu Search [Volume 8, Issue 3, 2020, Pages 25-37]
M
-
Mahabadi, A.
Hybrid Anomaly detection method using community detection in graph and feature selection [Volume 8, Issue 1, 2020, Pages 17-24]
-
Mahabadi, Aminollah
A Distributed Approach to Community Detection in Large Social Networks Based on Label Propagation [Volume 8, Issue 4, 2021, Pages 1-15]
-
Majidnezhad, V.
P2P Botnet Detection Using Deep Learning Method [Volume 8, Issue 2, 2020, Pages 1-14]
-
Majidnezhad, V.
Comparison of Supervised Machine Learning Algorithms in Detection of Botnets Domain Generation Algorithms [Volume 8, Issue 4, 2021, Pages 17-29]
-
Maroosi, A.
Network Intrusion Detection using a combination of artificial neural networks in a hierarchical manner [Volume 8, Issue 1, 2020, Pages 89-99]
-
Mashhadi, S.
Two Verifiable Multi-Secret Sharing Schemes: A Linear Scheme with Standard Security and A Lattice-Based Scheme [Volume 8, Issue 3, 2020, Pages 101-115]
-
Masoumi, S. M.
Reducing Interference Effect on GPS Navigation System Using Evolutionary Notch Filter [Volume 8, Issue 4, 2021, Pages 95-106]
-
Meraji, V.
Introducing a new timing attack on the ARM processor and its practical implementation on the Raspberrypi3 board [Volume 8, Issue 1, 2020, Pages 125-132]
-
Mirghadri, A.
Modeling of Obfuscated Multi- Stage cyber Attacks [Volume 8, Issue 2, 2020, Pages 61-73]
-
Mirghadri, A.
Upper Bounds for the Probability of Differential Characteristics of Five Block Cipher
Constructions Functions [Volume 8, Issue 4, 2021, Pages 129-137]
-
Mirjalily, Gh.
Energy-Harvesting Aware Multi-Hop Routing in Wireless Sensor Networks for Defense Applications [Volume 8, Issue 4, 2021, Pages 63-73]
-
Mirmohseni, M.
Information Theoretic Secret Key Agreement Based on Localization [Volume 8, Issue 2, 2020, Pages 35-49]
-
Mirzaee, M.
Hybrid Anomaly detection method using community detection in graph and feature selection [Volume 8, Issue 1, 2020, Pages 17-24]
-
Mizanian, K.
Distributed Anonymity Based On the Integrated Block Chain in Vehicular Ad Hoc Network [Volume 8, Issue 4, 2021, Pages 41-52]
-
Mosleh, M.
Proposing a New and Comprehensive Method for Quantum Representation of Digital Audio Signals [Volume 8, Issue 4, 2021, Pages 139-152]
-
Mostafavi, S. A.
Distributed Anonymity Based On the Integrated Block Chain in Vehicular Ad Hoc Network [Volume 8, Issue 4, 2021, Pages 41-52]
N
-
Naseri, A.
Introducing an Optimal Modulation Constellation, Resistant to Atmospheric Turbulence [Volume 8, Issue 2, 2020, Pages 115-124]
-
Nasseralfoghara, M.
Web Covert Timing Channel Detection based on Entropy [Volume 8, Issue 3, 2020, Pages 13-23]
-
Nemati, M.
Identifying Influential Nodes in Social Networks by Integrating the Centrality Method and Node Activity [Volume 8, Issue 3, 2020, Pages 1-11]
-
Norozi, Z.
Steganography on raw video based on proper detection and compromise between the parameters of transparency, resistance and capacity [Volume 8, Issue 1, 2020, Pages 51-65]
O
-
Ordokhani, Yadollah
Cardinal Hermit functions and their application in solving the time-delay fractional optimal control problems [Volume 8, Issue 4, 2021, Pages 153-160]
P
-
Pakize, S. R.
A New Scheduling Algorithm to Reduce Computation Time in Hadoop Environment [Volume 8, Issue 2, 2020, Pages 51-59]
-
Pakniat, N.
Security Analysis and Improvement of an Intelligent Transportation System based on Certificateless Aggregate Signature [Volume 8, Issue 1, 2020, Pages 25-33]
-
Parsa, S.
Automatic Test Data Generation in File Format Fuzzers [Volume 8, Issue 1, 2020, Pages 1-16]
-
Parsa, S.
P2P Botnet Detection Using Deep Learning Method [Volume 8, Issue 2, 2020, Pages 1-14]
-
Parsa, S.
Comparison of Supervised Machine Learning Algorithms in Detection of Botnets Domain Generation Algorithms [Volume 8, Issue 4, 2021, Pages 17-29]
-
Pournaghi, M.
A secure three factor authentication scheme for wireless
healthcare sensor networks based on elliptic curve [Volume 8, Issue 1, 2020, Pages 147-167]
-
Pournaghi, S. M.
A Novel and Secure Model for Sharing Protected Health Record (PHR) Based on Blockchain and Attribute Based Encryption [Volume 8, Issue 1, 2020, Pages 101-124]
R
-
Rahimi, A.
Fuzzy Keyword Search Scheme on an Encrypted Database in Cloud Computing Using Word Clustering [Volume 8, Issue 3, 2020, Pages 151-165]
-
Ranjbar, J.
Wireless Target Localization Using Median Weighted Least Square Error Metric in the Presence of Non-Line of Sight Signals [Volume 8, Issue 2, 2020, Pages 125-133]
-
Ranjbar, M.
Modelling and optimal solving of dependent sensor-weapon/threat assignment and scheduling problem by a metaheuristic algorithm based on GRASP [Volume 8, Issue 1, 2020, Pages 35-50]
-
Rashidi, A. J.
Modeling of cyber-attacks obfuscation, based on alteration technique of attack [Volume 8, Issue 1, 2020, Pages 67-77]
-
Rasouli Heikalabad, S.
Design of Content-Addressable Memory in Quantum-Dot Cellular Automata [Volume 8, Issue 4, 2021, Pages 53-61]
-
Rasouli Heikalabad, S.
Proposing a New and Comprehensive Method for Quantum Representation of Digital Audio Signals [Volume 8, Issue 4, 2021, Pages 139-152]
-
Rezazadeh, F.
Distributed Anonymity Based On the Integrated Block Chain in Vehicular Ad Hoc Network [Volume 8, Issue 4, 2021, Pages 41-52]
S
-
Sadidpour, S. S.
Automatic Keyword Extraction from Persian short Text Using word2vec [Volume 8, Issue 2, 2020, Pages 105-114]
-
Safakish Hamedani, G.
Multipartite Integral Circulant Graphs [Volume 8, Issue 3, 2020, Pages 167-170]
-
Saleh Esfehani, M.
Identifying Influential Nodes in Social Networks by Integrating the Centrality Method and Node Activity [Volume 8, Issue 3, 2020, Pages 1-11]
-
Salimzadeh, F.
Design of Content-Addressable Memory in Quantum-Dot Cellular Automata [Volume 8, Issue 4, 2021, Pages 53-61]
-
Samadi, R.
Introducing an OFDM-CDMA Hybrid Algorithm Based on the Multiple Access Technique to Improve Indoor Visible Light Communication Link [Volume 8, Issue 3, 2020, Pages 131-137]
-
Samsami Khodadad, F.
Using Generalized Entropy Approach for Blind Estimation of the Length of Spreading Sequences in Code Division Multiple Access Systems [Volume 8, Issue 3, 2020, Pages 53-61]
-
Sarram, M. A.
Distributed Anonymity Based On the Integrated Block Chain in Vehicular Ad Hoc Network [Volume 8, Issue 4, 2021, Pages 41-52]
-
Shaghaghi, E.
Improvement in the Ransomwares Detection Method With New API
Calls Features [Volume 8, Issue 4, 2021, Pages 107-118]
-
Shahidinejad, A.
Resource Elasticity Management using Fuzzy Controller Based on Threshold Changes in the Cloud Computing Environment [Volume 8, Issue 3, 2020, Pages 63-81]
-
Shahidinejad, A.
Detection and Prevention of SQL Injection Attacks at Runtime Using Decision Tree Classification [Volume 8, Issue 4, 2021, Pages 75-93]
-
Shamalizade Baei, M. A.
Designing a combinatorial Image Steganography algorithm based on game theory [Volume 8, Issue 1, 2020, Pages 133-145]
-
Shoshian, K.
Modeling of Obfuscated Multi- Stage cyber Attacks [Volume 8, Issue 2, 2020, Pages 61-73]
-
Shoushian, K.
Modeling of cyber-attacks obfuscation, based on alteration technique of attack [Volume 8, Issue 1, 2020, Pages 67-77]
-
Soleimany, H.
Introducing a new timing attack on the ARM processor and its practical implementation on the Raspberrypi3 board [Volume 8, Issue 1, 2020, Pages 125-132]
T
-
Torabi, M.
Resource Elasticity Management using Fuzzy Controller Based on Threshold Changes in the Cloud Computing Environment [Volume 8, Issue 3, 2020, Pages 63-81]
-
Torabi, M.
Detection and Prevention of SQL Injection Attacks at Runtime Using Decision Tree Classification [Volume 8, Issue 4, 2021, Pages 75-93]
-
Toroghi Haghighat, A.
An Improved New Link Prediction Method in Social Multilplex Networks Based on the Gravitational Search Algorithm [Volume 8, Issue 2, 2020, Pages 15-24]
Y
-
Yosefi, F. S.
Cardinal Hermit functions and their application in solving the time-delay fractional optimal control problems [Volume 8, Issue 4, 2021, Pages 153-160]
Z
-
Zabbah, E.
Network Intrusion Detection using a combination of artificial neural networks in a hierarchical manner [Volume 8, Issue 1, 2020, Pages 89-99]
-
Z.akeri Nasrabadi, M.
Automatic Test Data Generation in File Format Fuzzers [Volume 8, Issue 1, 2020, Pages 1-16]
-
Zarei Zefreh, E.
An Image Encryption Algorithm Based on the Sn Permutation Group and Chaotic Functions [Volume 8, Issue 3, 2020, Pages 139-150]
-
Zeynali, B.
Introduction of An Anti-Collision Protocol in RFID Systems [Volume 8, Issue 4, 2021, Pages 119-128]
Your query does not match with any item