A
-
Abdollahi, Rohollah
The New Algorithm for The Blind Extraction of The Radio Frequency Fingerprint Using the Specific Features of High-Power Amplifier and Local Oscillator [Volume 11, Issue 1, 2023, Pages 57-65]
-
Abdollahi Azgomi, mohammad
a conceptual model for computational evaluation of influence operations in online social networks [Volume 11, Issue 4, 2024, Pages 1-17]
-
Abdollahi Azgomi, Mohammad
A Dynamic Metaheuristic Algorithm for Influence Maximization in Social Networks [Volume 11, Issue 2, 2023, Pages 57-69]
-
Alamdari, Mohammad Saeid
Applying weighted smoothed norm in sparse representation classification for face recognition [Volume 11, Issue 3, 2024, Pages 57-65]
-
Alizadeh, Habib
Detection of Interfering Signals and Estimation of Their Carrier Frequency in CNC Satellite Communications using Cyclic Spectrum Density [Volume 11, Issue 2, 2023, Pages 91-101]
-
Amin davar, Hamid reza
The New Algorithm for The Blind Extraction of The Radio Frequency Fingerprint Using the Specific Features of High-Power Amplifier and Local Oscillator [Volume 11, Issue 1, 2023, Pages 57-65]
-
Anarfarhad, Milad
Evaluation and proof of routing algorithm in Tor anonymity network [Volume 11, Issue 3, 2024, Pages 15-24]
B
-
Babaei, Morteza
Detection of Interfering Signals and Estimation of Their Carrier Frequency in CNC Satellite Communications using Cyclic Spectrum Density [Volume 11, Issue 2, 2023, Pages 91-101]
-
Babaei, Morteza
Semi-Blind Separation of Multiple Synchronous Wideband Frequency Hopping Signals Using a Band-Limited Receiver and Space-Time- Frequency Distributions [Volume 11, Issue 4, 2024]
-
Baei, Pooya
Security of UAV Relay Networks based on Covert Communication in the Presence of an Eavesdropping UAV [Volume 11, Issue 2, 2023, Pages 45-56]
-
Baratian, Maryam
Physical Layer Security with the Aid of Compressive Sensing in the Presence of Non-Ideal Relays by Removing the Effect of Hardware Impairments by Providing an Iterative Method [Volume 11, Issue 4, 2024]
-
Barzegar, Majid
Identify the Factors Affecting the Culture and Awareness of Cyber Security Using Theme Analysis [Volume 11, Issue 1, 2023, Pages 67-80]
-
Bastami, Esmaeil
A Malware Classification Method Using visualization and Word Embedding Features [Volume 11, Issue 1, 2023, Pages 1-13]
-
Bejani, Sadegh
A novel way to identify effective test-case in software testing [Volume 11, Issue 2, 2023, Pages 103-116]
-
Binesh Marvasti, Mohammadreza
Providing an Improved Unmanned Aerial Vehicle Detection System to Increase Detection speed Using Deep Learning [Volume 11, Issue 1, 2023, Pages 81-96]
D
-
Dadashtabar Ahmadi, Kourosh
Improving the performance of the convolutional neural network using incremental weight loss function to deal with class imbalanced data [Volume 11, Issue 4, 2024, Pages 19-34]
-
Deypir, Mahmood
Presenting A Method Based on Nearest Neighbors and Hamming Distance in Order to Identify Malicious Applications [Volume 11, Issue 2, 2023, Pages 81-90]
F
-
Fakhredanesh, Mohammad
Improving the performance of the convolutional neural network using incremental weight loss function to deal with class imbalanced data [Volume 11, Issue 4, 2024, Pages 19-34]
-
Fatemi, Masoud
Applying weighted smoothed norm in sparse representation classification for face recognition [Volume 11, Issue 3, 2024, Pages 57-65]
G
-
Ghanavati Nasab, Maryam
Mobile botnets detection using deep learning techniques [Volume 11, Issue 2, 2023, Pages 31-43]
-
Ghasemian, Fahimeh
Mobile botnets detection using deep learning techniques [Volume 11, Issue 2, 2023, Pages 31-43]
-
Ghazvini, Mahdieh
Mobile botnets detection using deep learning techniques [Volume 11, Issue 2, 2023, Pages 31-43]
-
Ghezel Ayagh, Mohammad Hossein
Sensing and detecting changes due to displacement, pressure, or dynamic vibration in an optical fiber, based on fiber Specklegram [Volume 11, Issue 3, 2024, Pages 89-99]
H
-
Hasani Ahangar, MohammadReza
Security of UAV Relay Networks based on Covert Communication in the Presence of an Eavesdropping UAV [Volume 11, Issue 2, 2023, Pages 45-56]
-
Heydari, Sedigheh
Identify the Factors Affecting the Culture and Awareness of Cyber Security Using Theme Analysis [Volume 11, Issue 1, 2023, Pages 67-80]
-
Hoseini, Seyyedhasan
Investigating The Effect of Social Engineering Techniques on Employees Vulnerability
(Case study: Tehran Municipality Employees) [Volume 11, Issue 1, 2023, Pages 31-46]
J
-
Jabbari Lotf, Jalil
A Dynamic Metaheuristic Algorithm for Influence Maximization in Social Networks [Volume 11, Issue 2, 2023, Pages 57-69]
K
-
Karimi, Ali
A method to prediction of software system’s code smells using neural network [Volume 11, Issue 3, 2024, Pages 67-76]
-
Karimpour, Ali
Developing a Threat-Tolerability Bilateral Concept within a Differential Game for the Analysis of the Insider/Adversary Behavior in Operational environment [Volume 11, Issue 2, 2023, Pages 15-29]
-
Kayvan Shokooh, Reza
The New Algorithm for The Blind Extraction of The Radio Frequency Fingerprint Using the Specific Features of High-Power Amplifier and Local Oscillator [Volume 11, Issue 1, 2023, Pages 57-65]
-
Kazemi, Elham
Presenting a new sentiment analysis method based on multi-objective Archimedes optimization algorithm and machine learning [Volume 11, Issue 4, 2024]
-
Keshavarzi, Parviz
A Malware Classification Method Using visualization and Word Embedding Features [Volume 11, Issue 1, 2023, Pages 1-13]
-
Kheyrandish, Mohammad
Steganalysis of Quantum Audio Signal using Quantum Support Vector Machine Algorithm [Volume 11, Issue 3, 2024, Pages 1-14]
-
Kuhestani, کوهستانی
Physical Layer Security with the Aid of Compressive Sensing in the Presence of Non-Ideal Relays by Removing the Effect of Hardware Impairments by Providing an Iterative Method [Volume 11, Issue 4, 2024]
L
-
Lak, Behzad
dentifying Zero Day Android Daily through Neural Networks [Volume 11, Issue 3, 2024, Pages 49-55]
M
-
Mahmoodi, Nasibeh
Improving the performance of the convolutional neural network using incremental weight loss function to deal with class imbalanced data [Volume 11, Issue 4, 2024, Pages 19-34]
-
Matinfar, Ahmadreza
dentifying Zero Day Android Daily through Neural Networks [Volume 11, Issue 3, 2024, Pages 49-55]
-
Mir, Masoomeh
Energy Aware Routing in the Internet of Things using improved Grasshopper Metaheuristic Algorithm [Volume 11, Issue 1, 2023, Pages 15-29]
-
Mohammad Davoodi, Amir Hossein
Identify the Factors Affecting the Culture and Awareness of Cyber Security Using Theme Analysis [Volume 11, Issue 1, 2023, Pages 67-80]
-
Mosavi, Mohammad Reza
Reducing the Effects of Deception Attack on GPS Receivers of Phasor Measurement Units using Neural Networks [Volume 11, Issue 1, 2023, Pages 97-105]
-
Mosleh, Mohammad
Steganalysis of Quantum Audio Signal using Quantum Support Vector Machine Algorithm [Volume 11, Issue 3, 2024, Pages 1-14]
-
Motedaien, Tahere
Improving mobile mass monitoring in the IoT environment based on Chaotic Fog Algorithm [Volume 11, Issue 3, 2024, Pages 77-88]
-
Motedayen, Mohammadreza
Semi-Blind Separation of Multiple Synchronous Wideband Frequency Hopping Signals Using a Band-Limited Receiver and Space-Time- Frequency Distributions [Volume 11, Issue 4, 2024]
N
-
Naseri, Amir
Providing a routing method in Internet of Things networks based on fuzzy logic and clustering
For use in smart transportatio [Volume 11, Issue 4, 2024]
-
Norouzi Larki, Sanaz
Steganalysis of Quantum Audio Signal using Quantum Support Vector Machine Algorithm [Volume 11, Issue 3, 2024, Pages 1-14]
O
-
Orouji, Niloofar
Reducing the Effects of Deception Attack on GPS Receivers of Phasor Measurement Units using Neural Networks [Volume 11, Issue 1, 2023, Pages 97-105]
P
-
Pariz, Naser
Developing a Threat-Tolerability Bilateral Concept within a Differential Game for the Analysis of the Insider/Adversary Behavior in Operational environment [Volume 11, Issue 2, 2023, Pages 15-29]
-
Parsa, Saeed
Fault Proness Estimation of Software Modules Using Machine learning [Volume 11, Issue 4, 2024]
R
-
Rahmanimanesh, Mohammad
A Malware Classification Method Using visualization and Word Embedding Features [Volume 11, Issue 1, 2023, Pages 1-13]
-
Rahmanimanesh, Mohammad
DDoS Attack Detection System Using Ensemble Method Classification and Active Learning Approach [Volume 11, Issue 3, 2024, Pages 101-118]
-
Rezaee, Mohsen
Semi-Blind Separation of Multiple Synchronous Wideband Frequency Hopping Signals Using a Band-Limited Receiver and Space-Time- Frequency Distributions [Volume 11, Issue 4, 2024]
-
Rezaei Kheir Abadi, Mohsen
Detection of Interfering Signals and Estimation of Their Carrier Frequency in CNC Satellite Communications using Cyclic Spectrum Density [Volume 11, Issue 2, 2023, Pages 91-101]
S
-
Sadeghzadeh, Mehdi
Presenting a new sentiment analysis method based on multi-objective Archimedes optimization algorithm and machine learning [Volume 11, Issue 4, 2024]
-
Sahlani, Hossein
Analysis of exchange market disruptors using graph-based social network analysis [Volume 11, Issue 1, 2023, Pages 107-116]
-
Samsami Khodadad, Farid
Security of UAV Relay Networks based on Covert Communication in the Presence of an Eavesdropping UAV [Volume 11, Issue 2, 2023, Pages 45-56]
-
Samsami Khodadad, Farid
A new method for data transmission in shallow water channel based on offset multi-carrier filter bank [Volume 11, Issue 3, 2024, Pages 25-34]
-
Sepehrzadeh, Hamed
A method for quantitative evaluation of security risk in cyber-physical systems [Volume 11, Issue 2, 2023, Pages 71-80]
-
Shirazi, Hossein
Improving the performance of the convolutional neural network using incremental weight loss function to deal with class imbalanced data [Volume 11, Issue 4, 2024, Pages 19-34]
-
Shokoohi, Maryam
Distributed Solving of Weapon Target Assignment Problem using Learning Automata [Volume 11, Issue 1, 2023, Pages 47-55]
-
Soltaninia, Vahidreza
Security of UAV Relay Networks based on Covert Communication in the Presence of an Eavesdropping UAV [Volume 11, Issue 2, 2023, Pages 45-56]
-
Soltanizadeh, Hadi
A Malware Classification Method Using visualization and Word Embedding Features [Volume 11, Issue 1, 2023, Pages 1-13]
T
-
Taei zadeh, Ali
Presenting a new sentiment analysis method based on multi-objective Archimedes optimization algorithm and machine learning [Volume 11, Issue 4, 2024]
-
Talati, saeed
Security of UAV Relay Networks based on Covert Communication in the Presence of an Eavesdropping UAV [Volume 11, Issue 2, 2023, Pages 45-56]
-
Talebpour Ardakani, Mohsen
Sensing and detecting changes due to displacement, pressure, or dynamic vibration in an optical fiber, based on fiber Specklegram [Volume 11, Issue 3, 2024, Pages 89-99]
-
Tavasoli, Afsaneh
Reducing the Effects of Deception Attack on GPS Receivers of Phasor Measurement Units using Neural Networks [Volume 11, Issue 1, 2023, Pages 97-105]
Y
-
Yadegari, Vahid
dentifying Zero Day Android Daily through Neural Networks [Volume 11, Issue 3, 2024, Pages 49-55]
-
Yaghoobi, Mahdi
Energy Aware Routing in the Internet of Things using improved Grasshopper Metaheuristic Algorithm [Volume 11, Issue 1, 2023, Pages 15-29]
-
Yaghoobi, Mahdi
Improving mobile mass monitoring in the IoT environment based on Chaotic Fog Algorithm [Volume 11, Issue 3, 2024, Pages 77-88]
Your query does not match with any item