Author Index

A

  • Abdollahi, Rohollah The New Algorithm for The Blind Extraction of The Radio Frequency Fingerprint Using the Specific Features of High-Power Amplifier and Local Oscillator [Volume 11, Issue 1, 2023, Pages 57-65]
  • Abdollahi Azgomi, mohammad a conceptual model for computational evaluation of influence operations in online social networks [Volume 11, Issue 4, 2024, Pages 1-17]
  • Abdollahi Azgomi, Mohammad A Dynamic Metaheuristic Algorithm for Influence Maximization in Social Networks [Volume 11, Issue 2, 2023, Pages 57-69]
  • Alamdari, Mohammad Saeid Applying weighted smoothed norm in sparse representation classification for face recognition [Volume 11, Issue 3, 2024, Pages 57-65]
  • Alizadeh, Habib Detection of Interfering Signals and Estimation of Their Carrier Frequency in CNC Satellite Communications using Cyclic Spectrum Density [Volume 11, Issue 2, 2023, Pages 91-101]
  • Amin davar, Hamid reza The New Algorithm for The Blind Extraction of The Radio Frequency Fingerprint Using the Specific Features of High-Power Amplifier and Local Oscillator [Volume 11, Issue 1, 2023, Pages 57-65]
  • Anarfarhad, Milad Evaluation and proof of routing algorithm in Tor anonymity network [Volume 11, Issue 3, 2024, Pages 15-24]

B

  • Babaei, Morteza Detection of Interfering Signals and Estimation of Their Carrier Frequency in CNC Satellite Communications using Cyclic Spectrum Density [Volume 11, Issue 2, 2023, Pages 91-101]
  • Babaei, Morteza Semi-Blind Separation of Multiple Synchronous Wideband Frequency Hopping Signals Using a Band-Limited Receiver and Space-Time- Frequency Distributions [Volume 11, Issue 4, 2024]
  • Baei, Pooya Security of UAV Relay Networks based on Covert Communication in the Presence of an Eavesdropping UAV [Volume 11, Issue 2, 2023, Pages 45-56]
  • Baratian, Maryam Physical Layer Security with the Aid of Compressive Sensing in the Presence of Non-Ideal Relays by Removing the Effect of Hardware Impairments by Providing an Iterative Method [Volume 11, Issue 4, 2024]
  • Barzegar, Majid Identify the Factors Affecting the Culture and Awareness of Cyber Security Using Theme Analysis [Volume 11, Issue 1, 2023, Pages 67-80]
  • Bastami, Esmaeil A Malware Classification Method Using visualization and Word Embedding Features [Volume 11, Issue 1, 2023, Pages 1-13]
  • Bejani, Sadegh A novel way to identify effective test-case in software testing [Volume 11, Issue 2, 2023, Pages 103-116]
  • Binesh Marvasti, Mohammadreza Providing an Improved Unmanned Aerial Vehicle Detection System to Increase Detection speed Using Deep Learning [Volume 11, Issue 1, 2023, Pages 81-96]

D

  • Dadashtabar Ahmadi, Kourosh Improving the performance of the convolutional neural network using incremental weight loss function to deal with class imbalanced data [Volume 11, Issue 4, 2024, Pages 19-34]
  • Deypir, Mahmood Presenting A Method Based on Nearest Neighbors and Hamming Distance in Order to Identify Malicious Applications [Volume 11, Issue 2, 2023, Pages 81-90]

E

F

  • Fakhredanesh, Mohammad Improving the performance of the convolutional neural network using incremental weight loss function to deal with class imbalanced data [Volume 11, Issue 4, 2024, Pages 19-34]
  • Fatemi, Masoud Applying weighted smoothed norm in sparse representation classification for face recognition [Volume 11, Issue 3, 2024, Pages 57-65]

G

  • Ghanavati Nasab, Maryam Mobile botnets detection using deep learning techniques [Volume 11, Issue 2, 2023, Pages 31-43]
  • Ghasemian, Fahimeh Mobile botnets detection using deep learning techniques [Volume 11, Issue 2, 2023, Pages 31-43]
  • Ghazvini, Mahdieh Mobile botnets detection using deep learning techniques [Volume 11, Issue 2, 2023, Pages 31-43]
  • Ghezel Ayagh, Mohammad Hossein Sensing and detecting changes due to displacement, pressure, or dynamic vibration in an optical fiber, based on fiber Specklegram [Volume 11, Issue 3, 2024, Pages 89-99]

H

  • Hasani Ahangar, MohammadReza Security of UAV Relay Networks based on Covert Communication in the Presence of an Eavesdropping UAV [Volume 11, Issue 2, 2023, Pages 45-56]
  • Heydari, Sedigheh Identify the Factors Affecting the Culture and Awareness of Cyber Security Using Theme Analysis [Volume 11, Issue 1, 2023, Pages 67-80]
  • Hoseini, Seyyedhasan Investigating The Effect of Social Engineering Techniques on Employees Vulnerability (Case study: Tehran Municipality Employees) [Volume 11, Issue 1, 2023, Pages 31-46]

J

  • Jabbari Lotf, Jalil A Dynamic Metaheuristic Algorithm for Influence Maximization in Social Networks [Volume 11, Issue 2, 2023, Pages 57-69]

K

  • Karimi, Ali A method to prediction of software system’s code smells using neural network [Volume 11, Issue 3, 2024, Pages 67-76]
  • Karimpour, Ali Developing a Threat-Tolerability Bilateral Concept within a Differential Game for the Analysis of the Insider/Adversary Behavior in Operational environment [Volume 11, Issue 2, 2023, Pages 15-29]
  • Kayvan Shokooh, Reza The New Algorithm for The Blind Extraction of The Radio Frequency Fingerprint Using the Specific Features of High-Power Amplifier and Local Oscillator [Volume 11, Issue 1, 2023, Pages 57-65]
  • Kazemi, Elham Presenting a new sentiment analysis method based on multi-objective Archimedes optimization algorithm and machine learning [Volume 11, Issue 4, 2024]
  • Keshavarzi, Parviz A Malware Classification Method Using visualization and Word Embedding Features [Volume 11, Issue 1, 2023, Pages 1-13]
  • Kheyrandish, Mohammad Steganalysis of Quantum Audio Signal using Quantum Support Vector Machine Algorithm [Volume 11, Issue 3, 2024, Pages 1-14]
  • Kuhestani, کوهستانی Physical Layer Security with the Aid of Compressive Sensing in the Presence of Non-Ideal Relays by Removing the Effect of Hardware Impairments by Providing an Iterative Method [Volume 11, Issue 4, 2024]

L

  • Lak, Behzad dentifying Zero Day Android Daily through Neural Networks [Volume 11, Issue 3, 2024, Pages 49-55]

M

  • Mahmoodi, Nasibeh Improving the performance of the convolutional neural network using incremental weight loss function to deal with class imbalanced data [Volume 11, Issue 4, 2024, Pages 19-34]
  • Matinfar, Ahmadreza dentifying Zero Day Android Daily through Neural Networks [Volume 11, Issue 3, 2024, Pages 49-55]
  • Mir, Masoomeh Energy Aware Routing in the Internet of Things using improved Grasshopper Metaheuristic Algorithm [Volume 11, Issue 1, 2023, Pages 15-29]
  • Mohammad Davoodi, Amir Hossein Identify the Factors Affecting the Culture and Awareness of Cyber Security Using Theme Analysis [Volume 11, Issue 1, 2023, Pages 67-80]
  • Mosavi, Mohammad Reza Reducing the Effects of Deception Attack on GPS Receivers of Phasor Measurement Units using Neural Networks [Volume 11, Issue 1, 2023, Pages 97-105]
  • Mosleh, Mohammad Steganalysis of Quantum Audio Signal using Quantum Support Vector Machine Algorithm [Volume 11, Issue 3, 2024, Pages 1-14]
  • Motedaien, Tahere Improving mobile mass monitoring in the IoT environment based on Chaotic Fog Algorithm [Volume 11, Issue 3, 2024, Pages 77-88]
  • Motedayen, Mohammadreza Semi-Blind Separation of Multiple Synchronous Wideband Frequency Hopping Signals Using a Band-Limited Receiver and Space-Time- Frequency Distributions [Volume 11, Issue 4, 2024]

N

  • Naseri, Amir Providing a routing method in Internet of Things networks based on fuzzy logic and clustering For use in smart transportatio [Volume 11, Issue 4, 2024]
  • Norouzi Larki, Sanaz Steganalysis of Quantum Audio Signal using Quantum Support Vector Machine Algorithm [Volume 11, Issue 3, 2024, Pages 1-14]

O

  • Orouji, Niloofar Reducing the Effects of Deception Attack on GPS Receivers of Phasor Measurement Units using Neural Networks [Volume 11, Issue 1, 2023, Pages 97-105]

P

  • Pariz, Naser Developing a Threat-Tolerability Bilateral Concept within a Differential Game for the Analysis of the Insider/Adversary Behavior in Operational environment [Volume 11, Issue 2, 2023, Pages 15-29]
  • Parsa, Saeed Fault Proness Estimation of Software Modules Using Machine learning [Volume 11, Issue 4, 2024]

R

  • Rahmanimanesh, Mohammad A Malware Classification Method Using visualization and Word Embedding Features [Volume 11, Issue 1, 2023, Pages 1-13]
  • Rahmanimanesh, Mohammad DDoS Attack Detection System Using Ensemble Method Classification and Active Learning Approach [Volume 11, Issue 3, 2024, Pages 101-118]
  • Rezaee, Mohsen Semi-Blind Separation of Multiple Synchronous Wideband Frequency Hopping Signals Using a Band-Limited Receiver and Space-Time- Frequency Distributions [Volume 11, Issue 4, 2024]
  • Rezaei Kheir Abadi, Mohsen Detection of Interfering Signals and Estimation of Their Carrier Frequency in CNC Satellite Communications using Cyclic Spectrum Density [Volume 11, Issue 2, 2023, Pages 91-101]

S

  • Sadeghzadeh, Mehdi Presenting a new sentiment analysis method based on multi-objective Archimedes optimization algorithm and machine learning [Volume 11, Issue 4, 2024]
  • Sahlani, Hossein Analysis of exchange market disruptors using graph-based social network analysis [Volume 11, Issue 1, 2023, Pages 107-116]
  • Samsami Khodadad, Farid Security of UAV Relay Networks based on Covert Communication in the Presence of an Eavesdropping UAV [Volume 11, Issue 2, 2023, Pages 45-56]
  • Samsami Khodadad, Farid A new method for data transmission in shallow water channel based on offset multi-carrier filter bank [Volume 11, Issue 3, 2024, Pages 25-34]
  • Sepehrzadeh, Hamed A method for quantitative evaluation of security risk in cyber-physical systems [Volume 11, Issue 2, 2023, Pages 71-80]
  • Shirazi, Hossein Improving the performance of the convolutional neural network using incremental weight loss function to deal with class imbalanced data [Volume 11, Issue 4, 2024, Pages 19-34]
  • Shokoohi, Maryam Distributed Solving of Weapon Target Assignment Problem using Learning Automata [Volume 11, Issue 1, 2023, Pages 47-55]
  • Soltaninia, Vahidreza Security of UAV Relay Networks based on Covert Communication in the Presence of an Eavesdropping UAV [Volume 11, Issue 2, 2023, Pages 45-56]
  • Soltanizadeh, Hadi A Malware Classification Method Using visualization and Word Embedding Features [Volume 11, Issue 1, 2023, Pages 1-13]

T

  • Taei zadeh, Ali Presenting a new sentiment analysis method based on multi-objective Archimedes optimization algorithm and machine learning [Volume 11, Issue 4, 2024]
  • Talati, saeed Security of UAV Relay Networks based on Covert Communication in the Presence of an Eavesdropping UAV [Volume 11, Issue 2, 2023, Pages 45-56]
  • Talebpour Ardakani, Mohsen Sensing and detecting changes due to displacement, pressure, or dynamic vibration in an optical fiber, based on fiber Specklegram [Volume 11, Issue 3, 2024, Pages 89-99]
  • Tavasoli, Afsaneh Reducing the Effects of Deception Attack on GPS Receivers of Phasor Measurement Units using Neural Networks [Volume 11, Issue 1, 2023, Pages 97-105]

Y

  • Yadegari, Vahid dentifying Zero Day Android Daily through Neural Networks [Volume 11, Issue 3, 2024, Pages 49-55]
  • Yaghoobi, Mahdi Energy Aware Routing in the Internet of Things using improved Grasshopper Metaheuristic Algorithm [Volume 11, Issue 1, 2023, Pages 15-29]
  • Yaghoobi, Mahdi Improving mobile mass monitoring in the IoT environment based on Chaotic Fog Algorithm [Volume 11, Issue 3, 2024, Pages 77-88]