Author Index

A

  • Abbasi, M. Reducing Interference Effect on GPS Navigation System Using Evolutionary Notch Filter [Volume 8, Issue 4, 2021, Pages 95-106]
  • Abbasi, Z. Multipartite Integral Circulant Graphs [Volume 8, Issue 3, 2020, Pages 167-170]
  • Abdollahi, H. Introducing an OFDM-CDMA Hybrid Algorithm Based on the Multiple Access Technique to Improve Indoor Visible Light Communication Link [Volume 8, Issue 3, 2020, Pages 131-137]
  • Abrishamifar, A. Design and Simulation of a LORAN Signal Generator for LPS Transmitter Using Class I Amplifier [Volume 8, Issue 2, 2020, Pages 25-33]
  • Afifi, A. Design and Simulation of a LORAN Signal Generator for LPS Transmitter Using Class I Amplifier [Volume 8, Issue 2, 2020, Pages 25-33]
  • Afifi, A. Reliability Analysis of Open-Loop Switching Loran Signal Generator Using Omoe Indicator [Volume 8, Issue 2, 2020, Pages 83-93]
  • Aghazadeh, T. Design and Simulation of a LORAN Signal Generator for LPS Transmitter Using Class I Amplifier [Volume 8, Issue 2, 2020, Pages 25-33]
  • Ahmadian Yazdi, H. Introducing an Optimal Modulation Constellation, Resistant to Atmospheric Turbulence [Volume 8, Issue 2, 2020, Pages 115-124]
  • Ahrari, M. J. A Fault Tolerant Task Scheduling Method for Optimal use of Resources in Cloud Computing Environment [Volume 8, Issue 2, 2020, Pages 95-103]
  • Akbari, H. Improvement in the Ransomwares Detection Method With New API Calls Features [Volume 8, Issue 4, 2021, Pages 107-118]
  • Akhaei, M. A. Steganography on raw video based on proper detection and compromise between the parameters of transparency, resistance and capacity [Volume 8, Issue 1, 2020, Pages 51-65]
  • Akhlaghi, S. Joint Optimization of User Association, Subchannel Allocation and Power Allocation in OFDMA Heterogeneous Networks [Volume 8, Issue 3, 2020, Pages 117-129]
  • Alavi, S. M. Coherent Acoustic source DOA estimation by nested array based on sparse solution [Volume 8, Issue 1, 2020, Pages 79-88]
  • Alizadeh, J. Upper Bounds for the Probability of Differential Characteristics of Five Block Cipher Constructions Functions [Volume 8, Issue 4, 2021, Pages 129-137]
  • Amin, A. R. Reliability Analysis of Open-Loop Switching Loran Signal Generator Using Omoe Indicator [Volume 8, Issue 2, 2020, Pages 83-93]
  • Amiri, H. Coherent Acoustic source DOA estimation by nested array based on sparse solution [Volume 8, Issue 1, 2020, Pages 79-88]
  • Aref, M. R. Information Theoretic Secret Key Agreement Based on Localization [Volume 8, Issue 2, 2020, Pages 35-49]
  • Arefi Nejad, S. M. A New Scheduling Algorithm to Reduce Computation Time in Hadoop Environment [Volume 8, Issue 2, 2020, Pages 51-59]
  • Asadi, M. P2P Botnet Detection Using Deep Learning Method [Volume 8, Issue 2, 2020, Pages 1-14]
  • Asadi, M. Comparison of Supervised Machine Learning Algorithms in Detection of Botnets Domain Generation Algorithms [Volume 8, Issue 4, 2021, Pages 17-29]
  • Asadzadeh, A. Coherent Acoustic source DOA estimation by nested array based on sparse solution [Volume 8, Issue 1, 2020, Pages 79-88]
  • Ataee, M. A. Frequency Spectrum Sensing by Multi-Stage Adaptive Optimization Algorithm with the Efficient Non-Cooperative Technique in Cognitive radios with hardware implementation [Volume 8, Issue 3, 2020, Pages 39-51]
  • Ataei Khabbaz, H. Network Intrusion Detection using a combination of artificial neural networks in a hierarchical manner [Volume 8, Issue 1, 2020, Pages 89-99]

B

  • Bahramgiri, H. Introduction of An Anti-Collision Protocol in RFID Systems [Volume 8, Issue 4, 2021, Pages 119-128]
  • Balochian, S. Modelling and optimal solving of dependent sensor-weapon/threat assignment and scheduling problem by a metaheuristic algorithm based on GRASP [Volume 8, Issue 1, 2020, Pages 35-50]
  • Bastami, E. Identifying Influential Nodes in Social Networks by Integrating the Centrality Method and Node Activity [Volume 8, Issue 3, 2020, Pages 1-11]
  • Bayat, M. A Novel and Secure Model for Sharing Protected Health Record (PHR) Based on Blockchain and Attribute Based Encryption [Volume 8, Issue 1, 2020, Pages 101-124]
  • Bayat, M. A secure three factor authentication scheme for wireless healthcare sensor networks based on elliptic curve [Volume 8, Issue 1, 2020, Pages 147-167]
  • Bayat, M. Introducing an OFDM-CDMA Hybrid Algorithm Based on the Multiple Access Technique to Improve Indoor Visible Light Communication Link [Volume 8, Issue 3, 2020, Pages 131-137]
  • Beikpoori, M. S. Development of the Concept of Deterrence Theory in the Country's Cyberspace Based on Upstream Documents and Available Approaches [Volume 8, Issue 4, 2021, Pages 161-173]
  • Bohlooli, A. An Accelerated Method for Rules Anomaly Detection in Software Defined Networks [Volume 8, Issue 4, 2021, Pages 31-39]

C

  • Chaharlang, J. Proposing a New and Comprehensive Method for Quantum Representation of Digital Audio Signals [Volume 8, Issue 4, 2021, Pages 139-152]

D

  • Dehghani, M. Modeling of cyber-attacks obfuscation, based on alteration technique of attack [Volume 8, Issue 1, 2020, Pages 67-77]
  • Dehghanian, Y. Fuzzy Keyword Search Scheme on an Encrypted Database in Cloud Computing Using Word Clustering [Volume 8, Issue 3, 2020, Pages 151-165]

E

  • Esfahani, R. Steganography on raw video based on proper detection and compromise between the parameters of transparency, resistance and capacity [Volume 8, Issue 1, 2020, Pages 51-65]
  • Eslami, Z. Security Analysis and Improvement of an Intelligent Transportation System based on Certificateless Aggregate Signature [Volume 8, Issue 1, 2020, Pages 25-33]

F

  • Farjami, Y. A Novel and Secure Model for Sharing Protected Health Record (PHR) Based on Blockchain and Attribute Based Encryption [Volume 8, Issue 1, 2020, Pages 101-124]
  • Forouzanmehr, M. Joint Optimization of User Association, Subchannel Allocation and Power Allocation in OFDMA Heterogeneous Networks [Volume 8, Issue 3, 2020, Pages 117-129]

G

  • Gaeini, A. Upper Bounds for the Probability of Differential Characteristics of Five Block Cipher Constructions Functions [Volume 8, Issue 4, 2021, Pages 129-137]
  • Ghafori, A. A Fault Tolerant Task Scheduling Method for Optimal use of Resources in Cloud Computing Environment [Volume 8, Issue 2, 2020, Pages 95-103]
  • Ghasemzadeh, M. The relationship of software vulnerabilities and workarounds [Volume 8, Issue 2, 2020, Pages 75-81]
  • Ghasemzadeh, M. Enhancing E-Security by Inserting a Watermark Using the Combination of Genetic Algorithm and Tabu Search [Volume 8, Issue 3, 2020, Pages 25-37]
  • Ghayoori sales, M. Fuzzy Keyword Search Scheme on an Encrypted Database in Cloud Computing Using Word Clustering [Volume 8, Issue 3, 2020, Pages 151-165]
  • Ghezel Ayagh, M. H. Reliability Analysis of Open-Loop Switching Loran Signal Generator Using Omoe Indicator [Volume 8, Issue 2, 2020, Pages 83-93]
  • Ghobaei, M. Resource Elasticity Management using Fuzzy Controller Based on Threshold Changes in the Cloud Computing Environment [Volume 8, Issue 3, 2020, Pages 63-81]
  • Ghorbani Saber, R. Modelling and optimal solving of dependent sensor-weapon/threat assignment and scheduling problem by a metaheuristic algorithm based on GRASP [Volume 8, Issue 1, 2020, Pages 35-50]
  • Golshahi, F. An Improved New Link Prediction Method in Social Multilplex Networks Based on the Gravitational Search Algorithm [Volume 8, Issue 2, 2020, Pages 15-24]

H

  • Haamian, N. A secure three factor authentication scheme for wireless healthcare sensor networks based on elliptic curve [Volume 8, Issue 1, 2020, Pages 147-167]
  • Hadian Dehkordi, M. Two Verifiable Multi-Secret Sharing Schemes: A Linear Scheme with Standard Security and A Lattice-Based Scheme [Volume 8, Issue 3, 2020, Pages 101-115]
  • Haefi, Z. A secure three factor authentication scheme for wireless healthcare sensor networks based on elliptic curve [Volume 8, Issue 1, 2020, Pages 147-167]
  • Hajipoor, O. Automatic Keyword Extraction from Persian short Text Using word2vec [Volume 8, Issue 2, 2020, Pages 105-114]
  • Hamidi, H. R. Web Covert Timing Channel Detection based on Entropy [Volume 8, Issue 3, 2020, Pages 13-23]
  • Hasani Ahangar, M. R. Providing an Agent-Based Architecture for Semantic Mining From Large-Scale Data in Distributed Environments [Volume 8, Issue 3, 2020, Pages 83-99]
  • Hashemi, S. M. Joint Optimization of User Association, Subchannel Allocation and Power Allocation in OFDMA Heterogeneous Networks [Volume 8, Issue 3, 2020, Pages 117-129]
  • Hassani Ahangar, M. R. A Fault Tolerant Task Scheduling Method for Optimal use of Resources in Cloud Computing Environment [Volume 8, Issue 2, 2020, Pages 95-103]
  • Huseini, M. A Distributed Approach to Community Detection in Large Social Networks Based on Label Propagation [Volume 8, Issue 4, 2021, Pages 1-15]

I

  • Izadipour, A. Modelling and optimal solving of dependent sensor-weapon/threat assignment and scheduling problem by a metaheuristic algorithm based on GRASP [Volume 8, Issue 1, 2020, Pages 35-50]

J

  • Jabraeil Jamali, M. A. Comparison of Supervised Machine Learning Algorithms in Detection of Botnets Domain Generation Algorithms [Volume 8, Issue 4, 2021, Pages 17-29]
  • Jabreil Jamali, M. A. P2P Botnet Detection Using Deep Learning Method [Volume 8, Issue 2, 2020, Pages 1-14]
  • Jalali Farahani, G. R. Development of the Concept of Deterrence Theory in the Country's Cyberspace Based on Upstream Documents and Available Approaches [Volume 8, Issue 4, 2021, Pages 161-173]
  • Jamshidian, Gh. Upper Bounds for the Probability of Differential Characteristics of Five Block Cipher Constructions Functions [Volume 8, Issue 4, 2021, Pages 129-137]
  • Janalizadeh, S. Using Generalized Entropy Approach for Blind Estimation of the Length of Spreading Sequences in Code Division Multiple Access Systems [Volume 8, Issue 3, 2020, Pages 53-61]
  • Javaheri, H. R. Improvement in the Ransomwares Detection Method With New API Calls Features [Volume 8, Issue 4, 2021, Pages 107-118]

K

  • Kangavari, M. R. Providing an Agent-Based Architecture for Semantic Mining From Large-Scale Data in Distributed Environments [Volume 8, Issue 3, 2020, Pages 83-99]
  • Karimi, A. Identifying Influential Nodes in Social Networks by Integrating the Centrality Method and Node Activity [Volume 8, Issue 3, 2020, Pages 1-11]
  • Karimi, M. Coherent Acoustic source DOA estimation by nested array based on sparse solution [Volume 8, Issue 1, 2020, Pages 79-88]
  • Kazemi, M. H. A secure three factor authentication scheme for wireless healthcare sensor networks based on elliptic curve [Volume 8, Issue 1, 2020, Pages 147-167]
  • Kazeminia, M. Wireless Target Localization Using Median Weighted Least Square Error Metric in the Presence of Non-Line of Sight Signals [Volume 8, Issue 2, 2020, Pages 125-133]
  • Kazempour, N. Information Theoretic Secret Key Agreement Based on Localization [Volume 8, Issue 2, 2020, Pages 35-49]
  • Khalilpoor, J. Wireless Target Localization Using Median Weighted Least Square Error Metric in the Presence of Non-Line of Sight Signals [Volume 8, Issue 2, 2020, Pages 125-133]
  • Khodadadi, H. R. Frequency Spectrum Sensing by Multi-Stage Adaptive Optimization Algorithm with the Efficient Non-Cooperative Technique in Cognitive radios with hardware implementation [Volume 8, Issue 3, 2020, Pages 39-51]
  • Khorrami, A. Reliability Analysis of Open-Loop Switching Loran Signal Generator Using Omoe Indicator [Volume 8, Issue 2, 2020, Pages 83-93]
  • Kiamary, N. Two Verifiable Multi-Secret Sharing Schemes: A Linear Scheme with Standard Security and A Lattice-Based Scheme [Volume 8, Issue 3, 2020, Pages 101-115]
  • Kiani, R. An Accelerated Method for Rules Anomaly Detection in Software Defined Networks [Volume 8, Issue 4, 2021, Pages 31-39]

L

  • Latif, A. M. Enhancing E-Security by Inserting a Watermark Using the Combination of Genetic Algorithm and Tabu Search [Volume 8, Issue 3, 2020, Pages 25-37]

M

  • Mahabadi, A. Hybrid Anomaly detection method using community detection in graph and feature selection [Volume 8, Issue 1, 2020, Pages 17-24]
  • Mahabadi, Aminollah A Distributed Approach to Community Detection in Large Social Networks Based on Label Propagation [Volume 8, Issue 4, 2021, Pages 1-15]
  • Majidnezhad, V. P2P Botnet Detection Using Deep Learning Method [Volume 8, Issue 2, 2020, Pages 1-14]
  • Majidnezhad, V. Comparison of Supervised Machine Learning Algorithms in Detection of Botnets Domain Generation Algorithms [Volume 8, Issue 4, 2021, Pages 17-29]
  • Maroosi, A. Network Intrusion Detection using a combination of artificial neural networks in a hierarchical manner [Volume 8, Issue 1, 2020, Pages 89-99]
  • Mashhadi, S. Two Verifiable Multi-Secret Sharing Schemes: A Linear Scheme with Standard Security and A Lattice-Based Scheme [Volume 8, Issue 3, 2020, Pages 101-115]
  • Masoumi, S. M. Reducing Interference Effect on GPS Navigation System Using Evolutionary Notch Filter [Volume 8, Issue 4, 2021, Pages 95-106]
  • Meraji, V. Introducing a new timing attack on the ARM processor and its practical implementation on the Raspberrypi3 board [Volume 8, Issue 1, 2020, Pages 125-132]
  • Mirghadri, A. Modeling of Obfuscated Multi- Stage cyber Attacks [Volume 8, Issue 2, 2020, Pages 61-73]
  • Mirghadri, A. Upper Bounds for the Probability of Differential Characteristics of Five Block Cipher Constructions Functions [Volume 8, Issue 4, 2021, Pages 129-137]
  • Mirjalily, Gh. Energy-Harvesting Aware Multi-Hop Routing in Wireless Sensor Networks for Defense Applications [Volume 8, Issue 4, 2021, Pages 63-73]
  • Mirmohseni, M. Information Theoretic Secret Key Agreement Based on Localization [Volume 8, Issue 2, 2020, Pages 35-49]
  • Mirzaee, M. Hybrid Anomaly detection method using community detection in graph and feature selection [Volume 8, Issue 1, 2020, Pages 17-24]
  • Mizanian, K. Distributed Anonymity Based On the Integrated Block Chain in Vehicular Ad Hoc Network [Volume 8, Issue 4, 2021, Pages 41-52]
  • Mosleh, M. Proposing a New and Comprehensive Method for Quantum Representation of Digital Audio Signals [Volume 8, Issue 4, 2021, Pages 139-152]
  • Mostafavi, S. A. Distributed Anonymity Based On the Integrated Block Chain in Vehicular Ad Hoc Network [Volume 8, Issue 4, 2021, Pages 41-52]

N

  • Naseri, A. Introducing an Optimal Modulation Constellation, Resistant to Atmospheric Turbulence [Volume 8, Issue 2, 2020, Pages 115-124]
  • Nasseralfoghara, M. Web Covert Timing Channel Detection based on Entropy [Volume 8, Issue 3, 2020, Pages 13-23]
  • Nemati, M. Identifying Influential Nodes in Social Networks by Integrating the Centrality Method and Node Activity [Volume 8, Issue 3, 2020, Pages 1-11]
  • Norozi, Z. Steganography on raw video based on proper detection and compromise between the parameters of transparency, resistance and capacity [Volume 8, Issue 1, 2020, Pages 51-65]

O

  • Ordokhani, Yadollah Cardinal Hermit functions and their application in solving the time-delay fractional optimal control problems [Volume 8, Issue 4, 2021, Pages 153-160]

P

  • Pakize, S. R. A New Scheduling Algorithm to Reduce Computation Time in Hadoop Environment [Volume 8, Issue 2, 2020, Pages 51-59]
  • Pakniat, N. Security Analysis and Improvement of an Intelligent Transportation System based on Certificateless Aggregate Signature [Volume 8, Issue 1, 2020, Pages 25-33]
  • Parsa, S. Automatic Test Data Generation in File Format Fuzzers [Volume 8, Issue 1, 2020, Pages 1-16]
  • Parsa, S. P2P Botnet Detection Using Deep Learning Method [Volume 8, Issue 2, 2020, Pages 1-14]
  • Parsa, S. Comparison of Supervised Machine Learning Algorithms in Detection of Botnets Domain Generation Algorithms [Volume 8, Issue 4, 2021, Pages 17-29]
  • Pournaghi, M. A secure three factor authentication scheme for wireless healthcare sensor networks based on elliptic curve [Volume 8, Issue 1, 2020, Pages 147-167]
  • Pournaghi, S. M. A Novel and Secure Model for Sharing Protected Health Record (PHR) Based on Blockchain and Attribute Based Encryption [Volume 8, Issue 1, 2020, Pages 101-124]

R

  • Rahimi, A. Fuzzy Keyword Search Scheme on an Encrypted Database in Cloud Computing Using Word Clustering [Volume 8, Issue 3, 2020, Pages 151-165]
  • Ranjbar, J. Wireless Target Localization Using Median Weighted Least Square Error Metric in the Presence of Non-Line of Sight Signals [Volume 8, Issue 2, 2020, Pages 125-133]
  • Ranjbar, M. Modelling and optimal solving of dependent sensor-weapon/threat assignment and scheduling problem by a metaheuristic algorithm based on GRASP [Volume 8, Issue 1, 2020, Pages 35-50]
  • Rashidi, A. J. Modeling of cyber-attacks obfuscation, based on alteration technique of attack [Volume 8, Issue 1, 2020, Pages 67-77]
  • Rasouli Heikalabad, S. Design of Content-Addressable Memory in Quantum-Dot Cellular Automata [Volume 8, Issue 4, 2021, Pages 53-61]
  • Rasouli Heikalabad, S. Proposing a New and Comprehensive Method for Quantum Representation of Digital Audio Signals [Volume 8, Issue 4, 2021, Pages 139-152]
  • Rezazadeh, F. Distributed Anonymity Based On the Integrated Block Chain in Vehicular Ad Hoc Network [Volume 8, Issue 4, 2021, Pages 41-52]

S

  • Sadidpour, S. S. Automatic Keyword Extraction from Persian short Text Using word2vec [Volume 8, Issue 2, 2020, Pages 105-114]
  • Safakish Hamedani, G. Multipartite Integral Circulant Graphs [Volume 8, Issue 3, 2020, Pages 167-170]
  • Saleh Esfehani, M. Identifying Influential Nodes in Social Networks by Integrating the Centrality Method and Node Activity [Volume 8, Issue 3, 2020, Pages 1-11]
  • Salimzadeh, F. Design of Content-Addressable Memory in Quantum-Dot Cellular Automata [Volume 8, Issue 4, 2021, Pages 53-61]
  • Samadi, R. Introducing an OFDM-CDMA Hybrid Algorithm Based on the Multiple Access Technique to Improve Indoor Visible Light Communication Link [Volume 8, Issue 3, 2020, Pages 131-137]
  • Samsami Khodadad, F. Using Generalized Entropy Approach for Blind Estimation of the Length of Spreading Sequences in Code Division Multiple Access Systems [Volume 8, Issue 3, 2020, Pages 53-61]
  • Sarram, M. A. Distributed Anonymity Based On the Integrated Block Chain in Vehicular Ad Hoc Network [Volume 8, Issue 4, 2021, Pages 41-52]
  • Shaghaghi, E. Improvement in the Ransomwares Detection Method With New API Calls Features [Volume 8, Issue 4, 2021, Pages 107-118]
  • Shahidinejad, A. Resource Elasticity Management using Fuzzy Controller Based on Threshold Changes in the Cloud Computing Environment [Volume 8, Issue 3, 2020, Pages 63-81]
  • Shahidinejad, A. Detection and Prevention of SQL Injection Attacks at Runtime Using Decision Tree Classification [Volume 8, Issue 4, 2021, Pages 75-93]
  • Shamalizade Baei, M. A. Designing a combinatorial Image Steganography algorithm based on game theory [Volume 8, Issue 1, 2020, Pages 133-145]
  • Shoshian, K. Modeling of Obfuscated Multi- Stage cyber Attacks [Volume 8, Issue 2, 2020, Pages 61-73]
  • Shoushian, K. Modeling of cyber-attacks obfuscation, based on alteration technique of attack [Volume 8, Issue 1, 2020, Pages 67-77]
  • Soleimany, H. Introducing a new timing attack on the ARM processor and its practical implementation on the Raspberrypi3 board [Volume 8, Issue 1, 2020, Pages 125-132]

T

  • Torabi, M. Resource Elasticity Management using Fuzzy Controller Based on Threshold Changes in the Cloud Computing Environment [Volume 8, Issue 3, 2020, Pages 63-81]
  • Torabi, M. Detection and Prevention of SQL Injection Attacks at Runtime Using Decision Tree Classification [Volume 8, Issue 4, 2021, Pages 75-93]
  • Toroghi Haghighat, A. An Improved New Link Prediction Method in Social Multilplex Networks Based on the Gravitational Search Algorithm [Volume 8, Issue 2, 2020, Pages 15-24]

Y

  • Yosefi, F. S. Cardinal Hermit functions and their application in solving the time-delay fractional optimal control problems [Volume 8, Issue 4, 2021, Pages 153-160]

Z

  • Zabbah, E. Network Intrusion Detection using a combination of artificial neural networks in a hierarchical manner [Volume 8, Issue 1, 2020, Pages 89-99]
  • Z.akeri Nasrabadi, M. Automatic Test Data Generation in File Format Fuzzers [Volume 8, Issue 1, 2020, Pages 1-16]
  • Zarei Zefreh, E. An Image Encryption Algorithm Based on the Sn Permutation Group and Chaotic Functions [Volume 8, Issue 3, 2020, Pages 139-150]
  • Zeynali, B. Introduction of An Anti-Collision Protocol in RFID Systems [Volume 8, Issue 4, 2021, Pages 119-128]