Author Index

A

  • Abadi, M. Trajectory Database Release with Differential Privacy Guarantee [Volume 9, Issue 1, 2021, Pages 29-42]
  • Abdolkarimi, E. S. Improving INS/GPS Integration with Artificial Intelligence during GPS Outage [Volume 9, Issue 2, 2021, Pages 143-157]
  • Aboei Mehrizi, M. Improvement of Rotational Cryptanalysis of Shabal and Cubehash Hash Functions [Volume 9, Issue 1, 2021, Pages 91-100]
  • Aghanis, A. Generalized Version of the BB84 QKD Protocol with n Polarization Bases and Unequal Probabilities [Volume 9, Issue 1, 2021, Pages 125-136]
  • Alaei, M. A Heuristic Data Diffusion and Gathering Scheme Using Virtual Line for Wireless Sensor Networks with Mobile Sink [Volume 9, Issue 2, 2021, Pages 195-207]
  • Alemi, H. A New Method for Blind Recognition of the Initial State of Synchronous Scramblers When Located after the Channel Encoder [Volume 9, Issue 1, 2021, Pages 19-27]
  • Alizadeh, J. Improvement of Rotational Cryptanalysis of Shabal and Cubehash Hash Functions [Volume 9, Issue 1, 2021, Pages 91-100]
  • Amini Rad, Roya Improving the Quality of Millimeter Wave Images by Fusion with Visible Images [Volume 9, Issue 4, 2022, Pages 77-86]
  • Amirkhani, Abdollah The Semantic Segmentation of Autonomous Vehicles Images with the Teacher-Student Technique [Volume 9, Issue 4, 2022, Pages 1-19]
  • Asadi, M. Detecting of Botnets’ Malicious Domains with Deep Autoencoder Neural Network [Volume 9, Issue 1, 2021, Pages 61-74]
  • Asgarirad, M. R. A Techno-Economic Model of Sustainable Communication Infrastructure in the Smart City; using WDM-PON FTTx [Volume 9, Issue 1, 2021, Pages 149-156]
  • Asgari Tabatabaei, S. M. The Analysis and Design of Secure Wireless Networks in the Presence of Users with Different Security Needs Based on Covert Communication and Secure Transmission of Information Theory in the Presence of a Friendly Jammer [Volume 9, Issue 4, 2022, Pages 67-76]
  • Azizi, M. Design secure two party protocol based on expanded cut and choose bilateral oblivious transfer [Volume 9, Issue 3, 2021, Pages 21-37]

B

  • Baei, Pooya The Analysis and Design of Secure Wireless Networks in the Presence of Users with Different Security Needs Based on Covert Communication and Secure Transmission of Information Theory in the Presence of a Friendly Jammer [Volume 9, Issue 4, 2022, Pages 67-76]
  • Bagheri, F. Malicious Domain Detection using DNS Records [Volume 9, Issue 3, 2021, Pages 83-97]
  • Bagheri, M. Automatic XSS Exploit Generation Using Grammatical Evolution [Volume 9, Issue 2, 2021, Pages 101-119]
  • Bakhshesh, Davood k-Adjacency Domination in Graphs [Volume 9, Issue 3, 2021, Pages 125-131]
  • Banihashemi, S. M. Presentation and Performance Evaluation of an Efficient Algorithm for a Distributed Controller in SDN [Volume 9, Issue 1, 2021, Pages 175-183]
  • Banitalebi dehkordi, A. Distributed Denial of Service Attacks Detection in Software Defined Networks [Volume 9, Issue 1, 2021, Pages 43-59]
  • Barekatain, B. Transparent and Robust Audio Watermarking Using Synergy LU Decomposition and the Fibonacci Sequence in GBT-DCT-DWT Transforms [Volume 9, Issue 1, 2021, Pages 101-113]
  • Bastami, Esmaeil A model for feature selection in software fault prediction based on memetic algorithm and fuzzy logic [Volume 9, Issue 3, 2021, Pages 143-163]
  • Bayat, M. Design a Blockchain based Electronic Payment with Users’ Anonymity [Volume 9, Issue 2, 2021, Pages 85-100]
  • Bayat, meysam Interference Mitigation in Cognitive Radio Communication Systems Based on the Wavelet Transform [Volume 9, Issue 4, 2022, Pages 55-66]

D

  • Dadashtabar Ahmadi, Kourosh The Presentation of an Active Cyber Defense Model for Application in Cyber Deception Technology [Volume 9, Issue 4, 2022, Pages 125-140]
  • Deldar, F. Trajectory Database Release with Differential Privacy Guarantee [Volume 9, Issue 1, 2021, Pages 29-42]
  • Doustimotlagh, N. Generalized Version of the BB84 QKD Protocol with n Polarization Bases and Unequal Probabilities [Volume 9, Issue 1, 2021, Pages 125-136]
  • Doustimotlagh, S. N. A New Mechanism for Enhancing the Security of Military Internet of Things by Using Quantum and Classic Cryptography [Volume 9, Issue 2, 2021, Pages 29-49]

E

  • Ebrahimi, A. Improving INS/GPS Integration with Artificial Intelligence during GPS Outage [Volume 9, Issue 2, 2021, Pages 143-157]
  • Ebrahimi Sookht Abanani, Ali Interference Mitigation in Cognitive Radio Communication Systems Based on the Wavelet Transform [Volume 9, Issue 4, 2022, Pages 55-66]
  • Emrani Zarandi, A. A new analytical model for enhancing performance of cognitive radio user’s transmissions in the internet of things [Volume 9, Issue 3, 2021, Pages 73-82]
  • Entezari, R. Inverse Synthetic Aperture Radar (ISAR) Imaging of Targets with Non-Uniform Motion and Constant Acceleration based on Compressed Sensing [Volume 9, Issue 2, 2021, Pages 51-62]
  • Eshraghi Nia, Mohammad A model for feature selection in software fault prediction based on memetic algorithm and fuzzy logic [Volume 9, Issue 3, 2021, Pages 143-163]
  • Ezzatneshan, A. Providing a new solution to botnet detection in a Markov chain-based network [Volume 9, Issue 3, 2021, Pages 59-71]

F

  • Faghihniya, M. J. Kavosh: Offering an Analysis Method and the Impact of Normal Network Traffic on Selection and Extraction Based on the Minkowski Distance [Volume 9, Issue 1, 2021, Pages 137-147]
  • Fateh, Mansoor Malicious Domain Detection using DNS Records [Volume 9, Issue 3, 2021, Pages 83-97]

G

  • Ghaderi Piraghum, S. Anomaly Detection in Dynamic Social Networks Based on Behavioral Measurements [Volume 9, Issue 1, 2021, Pages 115-123]
  • Ghaemi, R. Providing a new solution to botnet detection in a Markov chain-based network [Volume 9, Issue 3, 2021, Pages 59-71]
  • Ghafari, R. Security-aware Task Scheduling Algorithm based on Multi Adaptive Learning and PSO Technique [Volume 9, Issue 2, 2021, Pages 159-178]
  • Ghaffari, Ali Energy-aware routing in wireless sensor networks using MLP and simulated annealing algorithms [Volume 9, Issue 3, 2021, Pages 133-142]
  • Ghayoori, Majid The Improvement of the GMCR Model Based on Statistical Analysis of the Game’ Graph (Case Study: Malwares and Countermeasures Actions Based on Detection-Independent and Deductive Evidence) [Volume 9, Issue 4, 2022, Pages 99-123]
  • Ghazi maghrebi, S. A New Method for Blind Recognition of the Initial State of Synchronous Scramblers When Located after the Channel Encoder [Volume 9, Issue 1, 2021, Pages 19-27]
  • Ghorban Zadeh, S. Design secure two party protocol based on expanded cut and choose bilateral oblivious transfer [Volume 9, Issue 3, 2021, Pages 21-37]

H

  • Hajipoor, omid Automatic Persian Text Generation Using Rule-Based Models and Word Embedding [Volume 9, Issue 4, 2022, Pages 43-54]
  • Hamian, N. Design a Blockchain based Electronic Payment with Users’ Anonymity [Volume 9, Issue 2, 2021, Pages 85-100]
  • Hasani Ahangar, M. R. Radar data processing using a combination of principal component analysis methods and self-organizing and digitized neural networks of the learning vector [Volume 9, Issue 2, 2021, Pages 1-7]
  • Hasani Ahangar, M. R. Providing an Ontology-Based Method for Exploring the Association Rules in Multi-Agent Distributed Environments [Volume 9, Issue 1, 2021, Pages 1-17]
  • Hatefi, Z. Design a Blockchain based Electronic Payment with Users’ Anonymity [Volume 9, Issue 2, 2021, Pages 85-100]
  • Hooshmand, Reza Interference Mitigation in Cognitive Radio Communication Systems Based on the Wavelet Transform [Volume 9, Issue 4, 2022, Pages 55-66]
  • Hosseini, S. SCEIRS information dissemination model based on rumor spreading in complex networks [Volume 9, Issue 2, 2021, Pages 121-134]

J

  • Jalaei, R. Kavosh: Offering an Analysis Method and the Impact of Normal Network Traffic on Selection and Extraction Based on the Minkowski Distance [Volume 9, Issue 1, 2021, Pages 137-147]

K

  • Kamari, M. A. Improving the Security in Cellular Communications Networks with adding Artificial Noise by method Non-Orthogonal Resource Allocation Techniques [Volume 9, Issue 2, 2021, Pages 135-142]
  • Kamel Tabbakh Farizani, Seyed Reza Providing a new solution to botnet detection in a Markov chain-based network [Volume 9, Issue 3, 2021, Pages 59-71]
  • Kangaavari, M. R. Providing an Ontology-Based Method for Exploring the Association Rules in Multi-Agent Distributed Environments [Volume 9, Issue 1, 2021, Pages 1-17]
  • Kangavari, M. R. Classification of High Dimensional Imbalanced Dataset via Game Theory-based Generative Adversarial Networks [Volume 9, Issue 2, 2021, Pages 63-74]
  • Karami, M. Providing a behavioral malware detection system based on the function of hardware counters using a neural network optimized with a dragonfly algorithm [Volume 9, Issue 2, 2021, Pages 9-16]
  • Keramati, M. A Security Model Based Approach for Dynamic Risk Assessment of Multi-Step Attacks in Computer Networks [Volume 9, Issue 1, 2021, Pages 157-173]
  • Kheirabadi, M. Providing a new solution to botnet detection in a Markov chain-based network [Volume 9, Issue 3, 2021, Pages 59-71]
  • Kheyrandish, M. Speech Steganalysis of Least Significant Bits Based on the Percentage of Equal Adjacent Samples [Volume 9, Issue 1, 2021, Pages 75-90]
  • Khodadadi, H. R. Improving the Security in Cellular Communications Networks with adding Artificial Noise by method Non-Orthogonal Resource Allocation Techniques [Volume 9, Issue 2, 2021, Pages 135-142]
  • Khosravian, Amir The Semantic Segmentation of Autonomous Vehicles Images with the Teacher-Student Technique [Volume 9, Issue 4, 2022, Pages 1-19]

M

  • Mahabadi, A. Concurrent Detection of Compact Anomalous Subgraphs in Large Social Networks [Volume 9, Issue 2, 2021, Pages 179-194]
  • Mahabadi, Aminollah Real-time Topology-based Tracking of Microscopic Objects [Volume 9, Issue 3, 2021, Pages 1-20]
  • Mahmoudi, Reza Energy-aware routing in wireless sensor networks using MLP and simulated annealing algorithms [Volume 9, Issue 3, 2021, Pages 133-142]
  • Mansoorizadeh, M. Anomaly Detection in Dynamic Social Networks Based on Behavioral Measurements [Volume 9, Issue 1, 2021, Pages 115-123]
  • Mansouri, N. Security-aware Task Scheduling Algorithm based on Multi Adaptive Learning and PSO Technique [Volume 9, Issue 2, 2021, Pages 159-178]
  • Masih-Tehrani, Masoud The Semantic Segmentation of Autonomous Vehicles Images with the Teacher-Student Technique [Volume 9, Issue 4, 2022, Pages 1-19]
  • Mehrpoya, M. R. Presentation and Performance Evaluation of an Efficient Algorithm for a Distributed Controller in SDN [Volume 9, Issue 1, 2021, Pages 175-183]
  • Mirabedini, Sh. Classification of High Dimensional Imbalanced Dataset via Game Theory-based Generative Adversarial Networks [Volume 9, Issue 2, 2021, Pages 63-74]
  • Moazedi, M. Reducing Interference Effect on GPS Receiver by Using Multi-correlation Architecture [Volume 9, Issue 3, 2021, Pages 49-57]
  • Moghaddasi, A. Automatic XSS Exploit Generation Using Grammatical Evolution [Volume 9, Issue 2, 2021, Pages 101-119]
  • Mohammad Hasani Zade, B. Security-aware Task Scheduling Algorithm based on Multi Adaptive Learning and PSO Technique [Volume 9, Issue 2, 2021, Pages 159-178]
  • Mohammad Zadeh, J. Classification of High Dimensional Imbalanced Dataset via Game Theory-based Generative Adversarial Networks [Volume 9, Issue 2, 2021, Pages 63-74]
  • Mosavi, M. R. Improving INS/GPS Integration with Artificial Intelligence during GPS Outage [Volume 9, Issue 2, 2021, Pages 143-157]
  • Mosavi, M. R. Reducing Interference Effect on GPS Receiver by Using Multi-correlation Architecture [Volume 9, Issue 3, 2021, Pages 49-57]
  • Mosleh, M. Transparent and Robust Audio Watermarking Using Synergy LU Decomposition and the Fibonacci Sequence in GBT-DCT-DWT Transforms [Volume 9, Issue 1, 2021, Pages 101-113]
  • Mosleh, M. Transparent and Robust Audio Watermarking Using Synergy LU Decomposition and the Fibonacci Sequence in GBT-DCT-DWT Transforms [Volume 9, Issue 1, 2021, Pages 101-113]
  • Mosleh, M. Speech Steganalysis of Least Significant Bits Based on the Percentage of Equal Adjacent Samples [Volume 9, Issue 1, 2021, Pages 75-90]
  • Mosleh, M. Providing a behavioral malware detection system based on the function of hardware counters using a neural network optimized with a dragonfly algorithm [Volume 9, Issue 2, 2021, Pages 9-16]

N

  • Nadinejad, A. A Heuristic Data Diffusion and Gathering Scheme Using Virtual Line for Wireless Sensor Networks with Mobile Sink [Volume 9, Issue 2, 2021, Pages 195-207]
  • Naseri, A. Presentation and Performance Evaluation of an Efficient Algorithm for a Distributed Controller in SDN [Volume 9, Issue 1, 2021, Pages 175-183]
  • Navidi, Hamidreza The IoT Resource Allocation Improvement in Fog Computing Using Non-Cooperative Game Theory [Volume 9, Issue 4, 2022, Pages 147-158]
  • Nejati Jahromi, M. A Techno-Economic Model of Sustainable Communication Infrastructure in the Smart City; using WDM-PON FTTx [Volume 9, Issue 1, 2021, Pages 149-156]
  • Nezhadshahbodaghi, M. Improving INS/GPS Integration with Artificial Intelligence during GPS Outage [Volume 9, Issue 2, 2021, Pages 143-157]

P

  • Parsa, S. Detecting of Botnets’ Malicious Domains with Deep Autoencoder Neural Network [Volume 9, Issue 1, 2021, Pages 61-74]
  • Pashmforoush, S. A new analytical model for enhancing performance of cognitive radio user’s transmissions in the internet of things [Volume 9, Issue 3, 2021, Pages 73-82]

R

  • Rashidi, A. J. Inverse Synthetic Aperture Radar (ISAR) Imaging of Targets with Non-Uniform Motion and Constant Acceleration based on Compressed Sensing [Volume 9, Issue 2, 2021, Pages 51-62]
  • Rezakhani, A. The Presentation of a Hybrid Anomaly Detection Model Using Inverse Weight Clustering and Machine Learning in Cloud Environments [Volume 9, Issue 4, 2022, Pages 21-29]
  • Rezvani, M. Malicious Domain Detection using DNS Records [Volume 9, Issue 3, 2021, Pages 83-97]

S

  • Saberi, H. Providing an Ontology-Based Method for Exploring the Association Rules in Multi-Agent Distributed Environments [Volume 9, Issue 1, 2021, Pages 1-17]
  • Sadeghi, M. Improving INS/GPS Integration with Artificial Intelligence during GPS Outage [Volume 9, Issue 2, 2021, Pages 143-157]
  • Sadidpour, Saeedeh Sadat Automatic Persian Text Generation Using Rule-Based Models and Word Embedding [Volume 9, Issue 4, 2022, Pages 43-54]
  • Sakhaei-nia, M. PIVATool- a fast and precise tool for analysis and detection of PendingIntent vulnerabilities [Volume 9, Issue 2, 2021, Pages 75-83]
  • Sakhaei-nia, M. Anomaly Detection in Dynamic Social Networks Based on Behavioral Measurements [Volume 9, Issue 1, 2021, Pages 115-123]
  • Samsami Khodadad, Farid The Analysis and Design of Secure Wireless Networks in the Presence of Users with Different Security Needs Based on Covert Communication and Secure Transmission of Information Theory in the Presence of a Friendly Jammer [Volume 9, Issue 4, 2022, Pages 67-76]
  • Sarvazimi, A. PIVATool- a fast and precise tool for analysis and detection of PendingIntent vulnerabilities [Volume 9, Issue 2, 2021, Pages 75-83]
  • Setayeshi, S. Transparent and Robust Audio Watermarking Using Synergy LU Decomposition and the Fibonacci Sequence in GBT-DCT-DWT Transforms [Volume 9, Issue 1, 2021, Pages 101-113]
  • Shah Hosseini, M. Concurrent Detection of Compact Anomalous Subgraphs in Large Social Networks [Volume 9, Issue 2, 2021, Pages 179-194]
  • Shahidinejad, A. A Mutual Authentication Protocol for IoT Users in Cloud Environment [Volume 9, Issue 2, 2021, Pages 17-28]
  • Shahrezaee, Mohsen Fixing Security Defects of Video Authentication Systems with Face Recognition, Based on 3D Structure and Shape Evaluation [Volume 9, Issue 4, 2022, Pages 141-145]
  • Shiri Ahmadabadi, M. E. The Presentation of a Hybrid Anomaly Detection Model Using Inverse Weight Clustering and Machine Learning in Cloud Environments [Volume 9, Issue 4, 2022, Pages 21-29]
  • Shojaee yas, H. Kavosh: Offering an Analysis Method and the Impact of Normal Network Traffic on Selection and Extraction Based on the Minkowski Distance [Volume 9, Issue 1, 2021, Pages 137-147]
  • Soltanaghaie, M. R. Distributed Denial of Service Attacks Detection in Software Defined Networks [Volume 9, Issue 1, 2021, Pages 43-59]

T

  • Tahanian, Esmaeel Malicious Domain Detection using DNS Records [Volume 9, Issue 3, 2021, Pages 83-97]
  • Tajari Siahmarzkooh, Aliakbar Intrusion Detection in Computer Networks using Decision Tree and Feature Reduction [Volume 9, Issue 3, 2021, Pages 99-108]
  • Talati, S. Radar data processing using a combination of principal component analysis methods and self-organizing and digitized neural networks of the learning vector [Volume 9, Issue 2, 2021, Pages 1-7]
  • Teimouri, M. Prediction of Plaintext in GSM Network using SDCCH Logical Channel [Volume 9, Issue 3, 2021, Pages 39-47]
  • Tohidi, S. Reducing Interference Effect on GPS Receiver by Using Multi-correlation Architecture [Volume 9, Issue 3, 2021, Pages 49-57]

V

  • Vosoughi, V. Detecting of Botnets’ Malicious Domains with Deep Autoencoder Neural Network [Volume 9, Issue 1, 2021, Pages 61-74]

Y

  • Yazdanpanah, S. Speech Steganalysis of Least Significant Bits Based on the Percentage of Equal Adjacent Samples [Volume 9, Issue 1, 2021, Pages 75-90]

Z

  • Zamani Boroujeni, F. Distributed Denial of Service Attacks Detection in Software Defined Networks [Volume 9, Issue 1, 2021, Pages 43-59]
  • Zandvakili, A. SCEIRS information dissemination model based on rumor spreading in complex networks [Volume 9, Issue 2, 2021, Pages 121-134]