A
-
Abbasi, Mahdi
Speeding up the execution-time of Crystals-Kyber PQC Algorithm on FPGA [Volume 10, Issue 4, 2023, Pages 101-110]
-
Abdoli, Hatam
Speeding up the execution-time of Crystals-Kyber PQC Algorithm on FPGA [Volume 10, Issue 4, 2023, Pages 101-110]
-
Abdollahi Azgomi, Mohammad
A Trust Evaluation Model for Cloud Computing Using Bayesian Network [Volume 10, Issue 4, 2023, Pages 53-61]
-
Aghaei, Mohammad Reza
Performance Analysis of Hybrid FSO/RF Systems Using the ℳ Distribution and Markov Function [Volume 10, Issue 2, 2022, Pages 1-10]
-
Amirkhani, Abdollah
Detection of Slippery Road Conditions using the Road CCTV Images based on the Convolutional Neural Networks and Transfer Learning [Volume 10, Issue 2, 2022, Pages 105-116]
-
Asgari Tabatabaee, Seyyed Mohammad Javad
Improving security of wireless telecommunication networks based on covert communication in presence of a controlled noise using multiple beamforming [Volume 10, Issue 1, 2022, Pages 11-19]
-
Ashoorian, Mohsen
Fast Detection of Vehicle Type and Position in Images Based on Deep Neural Network [Volume 10, Issue 2, 2022, Pages 117-127]
-
Aynehband, Meghdad
Presentation of a model for feasibility assessment of implementing the IoT social network projects using the existing public social networks as the infrastructure [Volume 10, Issue 1, 2022, Pages 73-84]
-
Azarang, Fatemeh
Improving security of wireless telecommunication networks based on covert communication in presence of a controlled noise using multiple beamforming [Volume 10, Issue 1, 2022, Pages 11-19]
B
-
Bagheri, Masood
Evaluating Deep Learning Models for Test Data Generation In File Based Fuzzers [Volume 10, Issue 2, 2022, Pages 57-73]
-
Bahramgiri, Hossein
A New Hybrid Approach for Traffic Identification and Classification in Wireless Networks [Volume 10, Issue 2, 2022, Pages 31-41]
-
Bakhshesh, Davood
A Greedy Algorithm for Constructing Region-Fault Tolerant Geometric Spanners [Volume 10, Issue 4, 2023, Pages 75-80]
-
Bastami, Esmaeil
Feature selection using a combination of Genetic-Whale-Ant colony algorithms for software fault prediction by machine learning [Volume 10, Issue 1, 2022, Pages 33-45]
-
Bastami, Sajad
Motion-encoded Gravitational Search Algorithm for moving target search using UAVs [Volume 10, Issue 4, 2023, Pages 63-73]
-
Bazooband, Maryam
A New Hybrid Approach for Traffic Identification and Classification in Wireless Networks [Volume 10, Issue 2, 2022, Pages 31-41]
-
Bigdeli, Hamid
An Optimized Compound Deep Neural Network Integrating With Feature Selection for Intrusion Detection System in Cyber Attacks [Volume 10, Issue 4, 2023, Pages 41-51]
C
-
Chamanmotlagh, Abolfazl
Performance Analysis of Hybrid FSO/RF Systems Using the ℳ Distribution and Markov Function [Volume 10, Issue 2, 2022, Pages 1-10]
-
Charoghchi, Sara
A novel lossless color secret image sharing based on homogeneous linear recursion [Volume 10, Issue 3, 2023, Pages 107-118]
D
-
Dadashtabar Ahmadi, Kourosh
A cooperative and independent deception system in the active cyber defense system [Volume 10, Issue 2, 2022, Pages 129-142]
-
Dadashtabar Ahmadi, Kourosh
Improve the detection of dangerous objects in x-ray images in security and military inspections using image processing approaches [Volume 10, Issue 4, 2023, Pages 81-89]
-
Deypir, Mahmood
Developing an Improved Method for Malware Attack Detection in Cloud Computing using Ensemble Learning [Volume 10, Issue 4, 2023, Pages 33-39]
E
-
Ebrahimi Dishabi, Mohammad Reza
A Trust Evaluation Model for Cloud Computing Using Bayesian Network [Volume 10, Issue 4, 2023, Pages 53-61]
-
Ehtesham Rasi, Reza
A framework for assessing cyber security and privacy threats and investigating their impact on smart city performance [Volume 10, Issue 3, 2023, Pages 77-91]
-
Emami, Hossein
Fast Detection of Vehicle Type and Position in Images Based on Deep Neural Network [Volume 10, Issue 2, 2022, Pages 117-127]
-
Emrani Zarandi, Azadeh Alsadat
The residue number system component design based on OneHot coding [Volume 10, Issue 1, 2022, Pages 119-133]
F
-
FALSAFI, SEPAHDAR
Improvement of Security in Wireless Communication Networks with Directional Modulation and Artificial Noise [Volume 10, Issue 4, 2023, Pages 11-18]
-
Farshi, Mohammad
A Greedy Algorithm for Constructing Region-Fault Tolerant Geometric Spanners [Volume 10, Issue 4, 2023, Pages 75-80]
-
Fatehi, Mohammad
The Study and Analysis of Hardware Impairments Effects with Multiple Eavesdroppers in Internet of Things Network [Volume 10, Issue 3, 2023, Pages 119-126]
-
Fattahalhosseini, Seyed Hossein
Performance analysis of adaptive modulation and coding methods in the wireless telecommunication channels [Volume 10, Issue 1, 2022, Pages 99-108]
-
Fouladian, Majid
Performance Analysis of Hybrid FSO/RF Systems Using the ℳ Distribution and Markov Function [Volume 10, Issue 2, 2022, Pages 1-10]
G
-
Ghafari, Mohammad
Speeding up the execution-time of Crystals-Kyber PQC Algorithm on FPGA [Volume 10, Issue 4, 2023, Pages 101-110]
-
Ghavami, Behnam
An Approach to Dependability Enhancement of Cache Memories [Volume 10, Issue 1, 2022, Pages 1-10]
-
Ghayoori, Majid
A Framework for Evaluating Malware and Countermeasures with an Analytical Approach based on the Game Theory
Case Study: Actors' Actions Based on Environmental Evidence [Volume 10, Issue 1, 2022, Pages 47-71]
-
Ghazvini, Mahdieh
An Approach to Dependability Enhancement of Cache Memories [Volume 10, Issue 1, 2022, Pages 1-10]
-
Giyahban, Mohammad Amin
Detection of Slippery Road Conditions using the Road CCTV Images based on the Convolutional Neural Networks and Transfer Learning [Volume 10, Issue 2, 2022, Pages 105-116]
-
Golestani, Ali
Performance analysis of adaptive modulation and coding methods in the wireless telecommunication channels [Volume 10, Issue 1, 2022, Pages 99-108]
-
Gorgin, Saeid
Presentation of a model for feasibility assessment of implementing the IoT social network projects using the existing public social networks as the infrastructure [Volume 10, Issue 1, 2022, Pages 73-84]
H
-
Hajigholamreza, Mina
Investigation of the Semantic Similarity of Persian Sentences Using Vector Space Adaptation And Deep Learning [Volume 10, Issue 2, 2022, Pages 43-56]
-
Hashemi Gholpayghani, َAlireza
Rumor Detection on Social Networks Based on the Degree Distribution Analysis in Step-by-Step Propagation Subgraphs [Volume 10, Issue 3, 2023, Pages 93-105]
-
Hassan Nataj Solhdar, Mohammad
Investigation of a new ensemble method of intrusion detection system on different data sets [Volume 10, Issue 3, 2023, Pages 43-57]
-
Hemmatyar, Ali Mohammad Afshin
Performance Analysis of Hybrid FSO/RF Systems Using the ℳ Distribution and Markov Function [Volume 10, Issue 2, 2022, Pages 1-10]
-
Hesabi, Mohsen
Developing an Improved Method for Malware Attack Detection in Cloud Computing using Ensemble Learning [Volume 10, Issue 4, 2023, Pages 33-39]
-
Hosseinnezhad, Mihan
A Trust Evaluation Model for Cloud Computing Using Bayesian Network [Volume 10, Issue 4, 2023, Pages 53-61]
-
Hosseinzadeh, Mehdi
Presentation of a model for feasibility assessment of implementing the IoT social network projects using the existing public social networks as the infrastructure [Volume 10, Issue 1, 2022, Pages 73-84]
I
-
Irajimoghaddam, Mohammadreza
Feature selection using a combination of Genetic-Whale-Ant colony algorithms for software fault prediction by machine learning [Volume 10, Issue 1, 2022, Pages 33-45]
J
-
Jahanshiri, Javad
The Study and Analysis of Hardware Impairments Effects with Multiple Eavesdroppers in Internet of Things Network [Volume 10, Issue 3, 2023, Pages 119-126]
-
Jalayi, Reza
Kashef: A Two-step detector of Windows-based Malicious executable files [Volume 10, Issue 2, 2022, Pages 143-156]
-
Janghorbani, Amin
Guilty Knowledge Test by Chaotic Processing of Electroencephalogram Signals Based on Fuzzy Recurrence Plot [Volume 10, Issue 2, 2022, Pages 87-104]
-
Javadzadeh, Mohammadali
Kashef: A Two-step detector of Windows-based Malicious executable files [Volume 10, Issue 2, 2022, Pages 143-156]
K
-
Karimi, Ali
Feature selection using a combination of Genetic-Whale-Ant colony algorithms for software fault prediction by machine learning [Volume 10, Issue 1, 2022, Pages 33-45]
-
Khaleqi Bizaki, Hossein
Blind symbol Rate estimation in multipath channels [Volume 10, Issue 3, 2023, Pages 59-66]
-
Khalili Tirandaz, Amir Hossein
Security Evaluation of Mutual Random Phase Injection Scheme for Secret Key Generation over Static Point-to-Point Communications [Volume 10, Issue 2, 2022, Pages 19-30]
-
Khodabakhshi, Mohammad Bagher
Guilty Knowledge Test by Chaotic Processing of Electroencephalogram Signals Based on Fuzzy Recurrence Plot [Volume 10, Issue 2, 2022, Pages 87-104]
-
Khodadadi, Hamid Reza
Performance analysis of adaptive modulation and coding methods in the wireless telecommunication channels [Volume 10, Issue 1, 2022, Pages 99-108]
-
Khodadadi, Hamid Reza
Improvement of Security in Wireless Communication Networks with Directional Modulation and Artificial Noise [Volume 10, Issue 4, 2023, Pages 11-18]
-
Khosravi, Maryam
Rumor Detection on Social Networks Based on the Degree Distribution Analysis in Step-by-Step Propagation Subgraphs [Volume 10, Issue 3, 2023, Pages 93-105]
-
Kuhestani, کوهستانی
Security Evaluation of Mutual Random Phase Injection Scheme for Secret Key Generation over Static Point-to-Point Communications [Volume 10, Issue 2, 2022, Pages 19-30]
M
-
Mashhadi, Samaneh
A novel lossless color secret image sharing based on homogeneous linear recursion [Volume 10, Issue 3, 2023, Pages 107-118]
-
Mazloum, Jalil
An Optimized Compound Deep Neural Network Integrating With Feature Selection for Intrusion Detection System in Cyber Attacks [Volume 10, Issue 4, 2023, Pages 41-51]
-
Mohajeran, Seyed Ali
The Study and Analysis of Hardware Impairments Effects with Multiple Eavesdroppers in Internet of Things Network [Volume 10, Issue 3, 2023, Pages 119-126]
-
Mohammadi, Mahmoud
Optimal Design of Wireless Visible Light Communication Network with the Aim of Minimizing the Outage Probability at the Location of the Mobile Receiver [Volume 10, Issue 3, 2023, Pages 1-9]
-
Mohammadi, Sayed Mohammad Reza
Investigation of the Semantic Similarity of Persian Sentences Using Vector Space Adaptation And Deep Learning [Volume 10, Issue 2, 2022, Pages 43-56]
-
Mohammadzadeh, Mohammad Reza
Investigation of the Semantic Similarity of Persian Sentences Using Vector Space Adaptation And Deep Learning [Volume 10, Issue 2, 2022, Pages 43-56]
-
Mosavi, Mohammad Reza
Novel Spoofing Mitigation Method using Wavelet Transform Based on PSO Algorithm in the Acquisition Stage of GPS Receiver [Volume 10, Issue 4, 2023, Pages 19-31]
-
Mousavi, Seyed Mohammad Reza
Sonar Dataset Classification using Multi-Layer Perceptron Neural Network Based on Dragonfly and Moth Algorithms [Volume 10, Issue 3, 2023, Pages 21-31]
-
Mousavipour, Seyed Farid
Sonar Dataset Classification using Multi-Layer Perceptron Neural Network Based on Dragonfly and Moth Algorithms [Volume 10, Issue 3, 2023, Pages 21-31]
N
-
Nasehi, Mojtaba
Fast Detection of Vehicle Type and Position in Images Based on Deep Neural Network [Volume 10, Issue 2, 2022, Pages 117-127]
-
Noorani, Seyede Fatemeh
The enhancement of online social network security by detecting and preventing fake accounts through machine learning [Volume 10, Issue 1, 2022, Pages 85-97]
P
-
Pahlavsay, Behnaz
Quasi-transversals in Latin squares and k-domination in graphs [Volume 10, Issue 3, 2023, Pages 67-75]
-
P. Kazemi, Adel
Quasi-transversals in Latin squares and k-domination in graphs [Volume 10, Issue 3, 2023, Pages 67-75]
R
-
Razavi, Sakineh
Guilty Knowledge Test by Chaotic Processing of Electroencephalogram Signals Based on Fuzzy Recurrence Plot [Volume 10, Issue 2, 2022, Pages 87-104]
S
-
Sabbah, Farideh
The residue number system component design based on OneHot coding [Volume 10, Issue 1, 2022, Pages 119-133]
-
Sadidpour, Saeedeh Sadat
Investigation of the Semantic Similarity of Persian Sentences Using Vector Space Adaptation And Deep Learning [Volume 10, Issue 2, 2022, Pages 43-56]
-
Sadough, Seyed Mohammad Sajad
Optimal Design of Wireless Visible Light Communication Network with the Aim of Minimizing the Outage Probability at the Location of the Mobile Receiver [Volume 10, Issue 3, 2023, Pages 1-9]
-
Samsami Khodadad, Farid
Improving security of wireless telecommunication networks based on covert communication in presence of a controlled noise using multiple beamforming [Volume 10, Issue 1, 2022, Pages 11-19]
-
Sanaei, Mohammad Reza
A framework for assessing cyber security and privacy threats and investigating their impact on smart city performance [Volume 10, Issue 3, 2023, Pages 77-91]
-
Seddighi, Nazila
A framework for assessing cyber security and privacy threats and investigating their impact on smart city performance [Volume 10, Issue 3, 2023, Pages 77-91]
-
Shirazi, Hossein
Rumor Detection on Social Networks Based on the Degree Distribution Analysis in Step-by-Step Propagation Subgraphs [Volume 10, Issue 3, 2023, Pages 93-105]
-
Shojaeefard, Mohammad H
Detection of Slippery Road Conditions using the Road CCTV Images based on the Convolutional Neural Networks and Transfer Learning [Volume 10, Issue 2, 2022, Pages 105-116]
-
Soleimani Majd, Reza
Novel Spoofing Mitigation Method using Wavelet Transform Based on PSO Algorithm in the Acquisition Stage of GPS Receiver [Volume 10, Issue 4, 2023, Pages 19-31]
T
-
Taghavi, Mohammad Taghi
Evaluating Deep Learning Models for Test Data Generation In File Based Fuzzers [Volume 10, Issue 2, 2022, Pages 57-73]
-
Tanha, Jafar
A model for Multi-Class Intrusion Detection Using the Dragonfly Feature Selection by Learning on the KDD-CUP99 Dataset [Volume 10, Issue 3, 2023, Pages 33-42]
-
Tohidi, S.
Novel Spoofing Mitigation Method using Wavelet Transform Based on PSO Algorithm in the Acquisition Stage of GPS Receiver [Volume 10, Issue 4, 2023, Pages 19-31]
Z
-
Zarrabi, Houman
Presentation of a model for feasibility assessment of implementing the IoT social network projects using the existing public social networks as the infrastructure [Volume 10, Issue 1, 2022, Pages 73-84]
Your query does not match with any item