Keyword Index

A

  • ACK A new method for ehancing TCP throughput in the 80.11n based wireless LAN [Volume 12, Issue 1, 2024, Pages 21-32]
  • Anomaly Detection Host-based Anomaly Malware Detection Using Deep Learning [Volume 12, Issue 4, 2024]
  • Area Feature Vector Introducing an efficient method to identify the noise pattern of helicopters based on the area feature vector and weighted sparse representation classification [Volume 12, Issue 1, 2024, Pages 33-42]
  • Army of the Islamic Republic of Iran Futuristic analysis of the components of the model for cyber threats in the Islamic Republic of Iran Army [Volume 12, Issue 4, 2024]
  • Artificial Neural Networks Violent behavior detection in surveillance cameras using convolutional and memory neural networks [Volume 12, Issue 4, 2024]
  • Authentication Image encryption using face biometric and metaheuristic algorithm over blockchain system [Volume 12, Issue 2, 2024, Pages 67-83]

B

  • BB84 protocol Introducing a decoy-state version of the high-dimensional polarization-phase (PoP) quantum key distribution protocol and explaining its implementation [Volume 12, Issue 2, 2024, Pages 99-107]
  • Bit Error Rate (BER) Investigating the effect of pointing error for FSO link and evaluating its performance in the face of atmospheric phenomena [Volume 12, Issue 4, 2024]
  • Blockchain Image encryption using face biometric and metaheuristic algorithm over blockchain system [Volume 12, Issue 2, 2024, Pages 67-83]
  • Botnet Detection of DNS based botnets using traffic analysis in IoT [Volume 12, Issue 3, 2024, Pages 1-13]
  • Brekkhof interpulation Survey and analysis of several secret sharing schemes based on interepulation methods [Volume 12, Issue 1, 2024, Pages 11-20]

C

  • Cache Evaluation of Side-Channel Attacks for Different Types of Processors Vulnerabilities [Volume 12, Issue 3, 2024, Pages 101-118]
  • Changes rate of environment Investigating the Impact of Environmental Data Changes on the Lifetime of Wireless Sensor Network [Volume 12, Issue 3, 2024, Pages 15-22]
  • Chaos Image encryption using face biometric and metaheuristic algorithm over blockchain system [Volume 12, Issue 2, 2024, Pages 67-83]
  • Chaos Theory A method for software fault prediction with combination of chaos theory and herd horse optimization algorithm [Volume 12, Issue 4, 2024]
  • Cheating detection Enhancing secret sharing security: A cheating detection approach based on inverse polynomial coefficients [Volume 12, Issue 2, 2024, Pages 109-114]
  • Classification Improving code smell detection accuracy based on gray wolf algorithm and majority voting [Volume 12, Issue 1, 2024, Pages 109-122]
  • Classification A method for software fault prediction with combination of chaos theory and herd horse optimization algorithm [Volume 12, Issue 4, 2024]
  • Classification and regression tree algorithm Improving the speed of the intrusion detection system performance by reducing the data volume using kernel-based DBSCAN [Volume 12, Issue 4, 2024]
  • Classification of nodes Classification of nodes in citation graphs using graph neural networks [Volume 12, Issue 1, 2024, Pages 123-133]
  • Class Imbalance Learning DEKF-Driven Few-Shot Class Imbalance Learning to Enhance Cyber Attack Detection [Volume 12, Issue 3, 2024, Pages 119-137]
  • Clustering Improving the speed of the intrusion detection system performance by reducing the data volume using kernel-based DBSCAN [Volume 12, Issue 4, 2024]
  • Cognitive Radio Networks Designing a Reactive Routing Protocol for Optimizing Channel Switching in Communication Networks [Volume 12, Issue 4, 2024, Pages 1-12]
  • Community detection Improving the Security of Cyber Networks Based on Community Detection Using Spectral Clustering Algorithm [Volume 12, Issue 1, 2024, Pages 77-87]
  • Community discovery discovery of communities in social networks of a dynamic layer with the approach of maximizing the importance [Volume 12, Issue 1, 2024, Pages 43-57]
  • Complex Question Answering A Deep Neural Network-Based Information Retrieval Method for Complex Question-Answering Systems [Volume 12, Issue 1, 2024, Pages 1-11]
  • Convolutional Neural Network A hybrid model based on CNN-LSTM for speech emotion reognition [Volume 12, Issue 4, 2024, Pages 21-25]
  • Covert Communication Covert communication in the presence of untrusted relay [Volume 12, Issue 2, 2024, Pages 1-14]
  • Cryptography Survey and analysis of several secret sharing schemes based on interepulation methods [Volume 12, Issue 1, 2024, Pages 11-20]
  • Cryptography Enhancing secret sharing security: A cheating detection approach based on inverse polynomial coefficients [Volume 12, Issue 2, 2024, Pages 109-114]
  • Cyber networks Improving the Security of Cyber Networks Based on Community Detection Using Spectral Clustering Algorithm [Volume 12, Issue 1, 2024, Pages 77-87]
  • Cyber Threats Futuristic analysis of the components of the model for cyber threats in the Islamic Republic of Iran Army [Volume 12, Issue 4, 2024]

D

  • DAS DAS system performance improvement algorithm based on quantum technology [Volume 12, Issue 2, 2024, Pages 85-97]
  • Data reduction Improving the speed of the intrusion detection system performance by reducing the data volume using kernel-based DBSCAN [Volume 12, Issue 4, 2024]
  • DBSCAN Improving the speed of the intrusion detection system performance by reducing the data volume using kernel-based DBSCAN [Volume 12, Issue 4, 2024]
  • Decision tree algorithm A method for software fault prediction with combination of chaos theory and herd horse optimization algorithm [Volume 12, Issue 4, 2024]
  • Decoupled Extended Kalman Filter DEKF-Driven Few-Shot Class Imbalance Learning to Enhance Cyber Attack Detection [Volume 12, Issue 3, 2024, Pages 119-137]
  • Deep Generative Adversarial Networks Host-based Anomaly Malware Detection Using Deep Learning [Volume 12, Issue 4, 2024]
  • Deep Neural Networks A Deep Neural Network-Based Information Retrieval Method for Complex Question-Answering Systems [Volume 12, Issue 1, 2024, Pages 1-11]
  • Delay reduction A Method for Energy and Delay Aware Routing in Wireless Multimedia Sensor Networks [Volume 12, Issue 3, 2024, Pages 49-59]
  • Discrete random phase injection A Novel Secret Key Generation Scheme in the Presence of an Untrusted Relay [Volume 12, Issue 3, 2024, Pages 73-84]
  • DNS Attacks Detection of DNS based botnets using traffic analysis in IoT [Volume 12, Issue 3, 2024, Pages 1-13]
  • DOG Improved implementation of image processing algorithm with HLS software for use in optical seeker [Volume 12, Issue 4, 2024, Pages 13-19]
  • DSP48 Improved implementation of image processing algorithm with HLS software for use in optical seeker [Volume 12, Issue 4, 2024, Pages 13-19]

E

  • Echo Hiding A Robust Quantum Audio Watermarking Using Synergy of Echo Hiding and Least Significant Bit Technique [Volume 12, Issue 1, 2024, Pages 59-76]
  • Energy consumption optimization A Method for Energy and Delay Aware Routing in Wireless Multimedia Sensor Networks [Volume 12, Issue 3, 2024, Pages 49-59]

F

  • Face detection Image encryption using face biometric and metaheuristic algorithm over blockchain system [Volume 12, Issue 2, 2024, Pages 67-83]
  • Feature Extraction A method for software fault prediction with combination of chaos theory and herd horse optimization algorithm [Volume 12, Issue 4, 2024]
  • Few Shot Learning MAML DEKF-Driven Few-Shot Class Imbalance Learning to Enhance Cyber Attack Detection [Volume 12, Issue 3, 2024, Pages 119-137]
  • Formal analysis Formal Analysis of Security Vulnerabilities in OLSR Routing Protocol Using SPAN Tool [Volume 12, Issue 3, 2024, Pages 61-71]
  • Free Space Optical communication (FSO) Investigating the effect of pointing error for FSO link and evaluating its performance in the face of atmospheric phenomena [Volume 12, Issue 4, 2024]
  • Frequency Differences Of Arrival Localization of ground emitters using LEO satellites in LER scenario based on combined TDOA-FDOA method [Volume 12, Issue 2, 2024, Pages 115-123]
  • Futures studies Futuristic analysis of the components of the model for cyber threats in the Islamic Republic of Iran Army [Volume 12, Issue 4, 2024]

G

  • Gray Wolf Algorithm Improving code smell detection accuracy based on gray wolf algorithm and majority voting [Volume 12, Issue 1, 2024, Pages 109-122]
  • Group Jamming Targeted Group Jamming Against Radar Systems [Volume 12, Issue 3, 2024, Pages 85-100]
  • Guard band A Novel Secret Key Generation Scheme in the Presence of an Untrusted Relay [Volume 12, Issue 3, 2024, Pages 73-84]

H

  • Hierarchical Analysis Evaluation of Side-Channel Attacks for Different Types of Processors Vulnerabilities [Volume 12, Issue 3, 2024, Pages 101-118]
  • High-dimensional QKD Introducing a decoy-state version of the high-dimensional polarization-phase (PoP) quantum key distribution protocol and explaining its implementation [Volume 12, Issue 2, 2024, Pages 99-107]
  • HLS Improved implementation of image processing algorithm with HLS software for use in optical seeker [Volume 12, Issue 4, 2024, Pages 13-19]

I

  • Image Classification Malware Classification Based On Visualizing Binary Content of Samples [Volume 12, Issue 3, 2024, Pages 35-47]
  • Image Encryption Image encryption using face biometric and metaheuristic algorithm over blockchain system [Volume 12, Issue 2, 2024, Pages 67-83]
  • Imam Khomeini Port Complex Assessment of Desirability of Information Security and Cyber Network Indices in Ports with Emphasis on Passive Defense (Case Study: Imam Khomeini Port Complex) [Volume 12, Issue 4, 2024]
  • Information Retrieval A Deep Neural Network-Based Information Retrieval Method for Complex Question-Answering Systems [Volume 12, Issue 1, 2024, Pages 1-11]
  • Information Security Improving the Security of Cyber Networks Based on Community Detection Using Spectral Clustering Algorithm [Volume 12, Issue 1, 2024, Pages 77-87]
  • Information Security and Cyber Network Assessment of Desirability of Information Security and Cyber Network Indices in Ports with Emphasis on Passive Defense (Case Study: Imam Khomeini Port Complex) [Volume 12, Issue 4, 2024]
  • Information Security Risk Assessment (ISRA) Proposing framework for comparative evaluation of information security risk assessment methods (Case of study: Iranian Research Institute for Information Science and Technology (IranDoc)) [Volume 12, Issue 2, 2024, Pages 27-39]
  • Information theory security Covert communication in the presence of untrusted relay [Volume 12, Issue 2, 2024, Pages 1-14]
  • Internet of Things Improving the speed of the intrusion detection system performance by reducing the data volume using kernel-based DBSCAN [Volume 12, Issue 4, 2024]
  • Internet of Things Detection of DNS based botnets using traffic analysis in IoT [Volume 12, Issue 3, 2024, Pages 1-13]
  • Intrusion detection Smart Home Intrusion Detection Model based on Principal Component Analysis and Random Forest Classification [Volume 12, Issue 2, 2024, Pages 15-25]
  • Intrusion Detection System Improving the speed of the intrusion detection system performance by reducing the data volume using kernel-based DBSCAN [Volume 12, Issue 4, 2024]
  • IoTID20 dataset Smart Home Intrusion Detection Model based on Principal Component Analysis and Random Forest Classification [Volume 12, Issue 2, 2024, Pages 15-25]
  • IranDoc Proposing framework for comparative evaluation of information security risk assessment methods (Case of study: Iranian Research Institute for Information Science and Technology (IranDoc)) [Volume 12, Issue 2, 2024, Pages 27-39]
  • ISRA methods Proposing framework for comparative evaluation of information security risk assessment methods (Case of study: Iranian Research Institute for Information Science and Technology (IranDoc)) [Volume 12, Issue 2, 2024, Pages 27-39]

K

  • Kaggle dataset Improving the speed of the intrusion detection system performance by reducing the data volume using kernel-based DBSCAN [Volume 12, Issue 4, 2024]
  • Keywords: Tapping DAS system performance improvement algorithm based on quantum technology [Volume 12, Issue 2, 2024, Pages 85-97]

L

  • Large Equal Radius scenario Localization of ground emitters using LEO satellites in LER scenario based on combined TDOA-FDOA method [Volume 12, Issue 2, 2024, Pages 115-123]
  • Least Significant Bit A Robust Quantum Audio Watermarking Using Synergy of Echo Hiding and Least Significant Bit Technique [Volume 12, Issue 1, 2024, Pages 59-76]
  • Lifetime of wireless sensor networks Investigating the Impact of Environmental Data Changes on the Lifetime of Wireless Sensor Network [Volume 12, Issue 3, 2024, Pages 15-22]
  • Linear secret sharing Enhancing secret sharing security: A cheating detection approach based on inverse polynomial coefficients [Volume 12, Issue 2, 2024, Pages 109-114]
  • Load Balancing Sink mobility management in mobile sensor networks for cluster-heads load balancing [Volume 12, Issue 2, 2024, Pages 53-66]

M

  • Machine Learning Improving code smell detection accuracy based on gray wolf algorithm and majority voting [Volume 12, Issue 1, 2024, Pages 109-122]
  • Machine Vision Violent behavior detection in surveillance cameras using convolutional and memory neural networks [Volume 12, Issue 4, 2024]
  • Malware Family Malware Classification Based On Visualizing Binary Content of Samples [Volume 12, Issue 3, 2024, Pages 35-47]
  • Mean Delay A new method for ehancing TCP throughput in the 80.11n based wireless LAN [Volume 12, Issue 1, 2024, Pages 21-32]
  • Mirai Detection of DNS based botnets using traffic analysis in IoT [Volume 12, Issue 3, 2024, Pages 1-13]
  • Mobile Sink Sink mobility management in mobile sensor networks for cluster-heads load balancing [Volume 12, Issue 2, 2024, Pages 53-66]

N

  • Network Analysis Improving the Security of Cyber Networks Based on Community Detection Using Spectral Clustering Algorithm [Volume 12, Issue 1, 2024, Pages 77-87]
  • NSGA Covert communication in the presence of untrusted relay [Volume 12, Issue 2, 2024, Pages 1-14]
  • NSL_KDD dataset Improving the speed of the intrusion detection system performance by reducing the data volume using kernel-based DBSCAN [Volume 12, Issue 4, 2024]

O

  • OLSR protocol Formal Analysis of Security Vulnerabilities in OLSR Routing Protocol Using SPAN Tool [Volume 12, Issue 3, 2024, Pages 61-71]
  • One-Class Deep Learning Host-based Anomaly Malware Detection Using Deep Learning [Volume 12, Issue 4, 2024]
  • Online social networks a computational model to evaluate the agent of influence operations in online social networks [Volume 12, Issue 1, 2024, Pages 89-107]
  • OTDR DAS system performance improvement algorithm based on quantum technology [Volume 12, Issue 2, 2024, Pages 85-97]

P

  • Paragraph Selection A Deep Neural Network-Based Information Retrieval Method for Complex Question-Answering Systems [Volume 12, Issue 1, 2024, Pages 1-11]
  • Passive Defense Assessment of Desirability of Information Security and Cyber Network Indices in Ports with Emphasis on Passive Defense (Case Study: Imam Khomeini Port Complex) [Volume 12, Issue 4, 2024]
  • Passive satellite positioning Localization of ground emitters using LEO satellites in LER scenario based on combined TDOA-FDOA method [Volume 12, Issue 2, 2024, Pages 115-123]
  • Pattern of Confrontation Futuristic analysis of the components of the model for cyber threats in the Islamic Republic of Iran Army [Volume 12, Issue 4, 2024]
  • Pattern Recognition Introducing an efficient method to identify the noise pattern of helicopters based on the area feature vector and weighted sparse representation classification [Volume 12, Issue 1, 2024, Pages 33-42]
  • Physical layer secret key generation A Novel Secret Key Generation Scheme in the Presence of an Untrusted Relay [Volume 12, Issue 3, 2024, Pages 73-84]
  • Pointing error Investigating the effect of pointing error for FSO link and evaluating its performance in the face of atmospheric phenomena [Volume 12, Issue 4, 2024]
  • Ports Assessment of Desirability of Information Security and Cyber Network Indices in Ports with Emphasis on Passive Defense (Case Study: Imam Khomeini Port Complex) [Volume 12, Issue 4, 2024]
  • Principal Component Analysis (PCA) Smart Home Intrusion Detection Model based on Principal Component Analysis and Random Forest Classification [Volume 12, Issue 2, 2024, Pages 15-25]
  • Processors Vulnerability Evaluation of Side-Channel Attacks for Different Types of Processors Vulnerabilities [Volume 12, Issue 3, 2024, Pages 101-118]

Q

  • QKD Introducing a decoy-state version of the high-dimensional polarization-phase (PoP) quantum key distribution protocol and explaining its implementation [Volume 12, Issue 2, 2024, Pages 99-107]
  • QKD CV DAS system performance improvement algorithm based on quantum technology [Volume 12, Issue 2, 2024, Pages 85-97]
  • QKD DV DAS system performance improvement algorithm based on quantum technology [Volume 12, Issue 2, 2024, Pages 85-97]
  • Quality of Service A new method for ehancing TCP throughput in the 80.11n based wireless LAN [Volume 12, Issue 1, 2024, Pages 21-32]
  • Quantum Audio watermarking A Robust Quantum Audio Watermarking Using Synergy of Echo Hiding and Least Significant Bit Technique [Volume 12, Issue 1, 2024, Pages 59-76]
  • Quantum computing A Robust Quantum Audio Watermarking Using Synergy of Echo Hiding and Least Significant Bit Technique [Volume 12, Issue 1, 2024, Pages 59-76]
  • Quantum Cryptography Introducing a decoy-state version of the high-dimensional polarization-phase (PoP) quantum key distribution protocol and explaining its implementation [Volume 12, Issue 2, 2024, Pages 99-107]
  • Quantum key DAS system performance improvement algorithm based on quantum technology [Volume 12, Issue 2, 2024, Pages 85-97]
  • Quantum Key Distribution Introducing a decoy-state version of the high-dimensional polarization-phase (PoP) quantum key distribution protocol and explaining its implementation [Volume 12, Issue 2, 2024, Pages 99-107]

R

  • Radar Systems Targeted Group Jamming Against Radar Systems [Volume 12, Issue 3, 2024, Pages 85-100]
  • Random Forest Algorithm Smart Home Intrusion Detection Model based on Principal Component Analysis and Random Forest Classification [Volume 12, Issue 2, 2024, Pages 15-25]
  • Reduce channel switching Designing a Reactive Routing Protocol for Optimizing Channel Switching in Communication Networks [Volume 12, Issue 4, 2024, Pages 1-12]
  • Resource Assignment Targeted Group Jamming Against Radar Systems [Volume 12, Issue 3, 2024, Pages 85-100]
  • RN_DBSCAN Improving the speed of the intrusion detection system performance by reducing the data volume using kernel-based DBSCAN [Volume 12, Issue 4, 2024]

S

  • Secret Sharing Enhancing secret sharing security: A cheating detection approach based on inverse polynomial coefficients [Volume 12, Issue 2, 2024, Pages 109-114]
  • Secret Sharing Scheme Survey and analysis of several secret sharing schemes based on interepulation methods [Volume 12, Issue 1, 2024, Pages 11-20]
  • Security vulnerabilities Formal Analysis of Security Vulnerabilities in OLSR Routing Protocol Using SPAN Tool [Volume 12, Issue 3, 2024, Pages 61-71]
  • SIFT Improved implementation of image processing algorithm with HLS software for use in optical seeker [Volume 12, Issue 4, 2024, Pages 13-19]
  • Smoothed l0 Norm Introducing an efficient method to identify the noise pattern of helicopters based on the area feature vector and weighted sparse representation classification [Volume 12, Issue 1, 2024, Pages 33-42]
  • Software defect A method for software fault prediction with combination of chaos theory and herd horse optimization algorithm [Volume 12, Issue 4, 2024]
  • SPAN tool Formal Analysis of Security Vulnerabilities in OLSR Routing Protocol Using SPAN Tool [Volume 12, Issue 3, 2024, Pages 61-71]
  • Spectral Clustering Improving the Security of Cyber Networks Based on Community Detection Using Spectral Clustering Algorithm [Volume 12, Issue 1, 2024, Pages 77-87]
  • Static Analysis Malware Classification Based On Visualizing Binary Content of Samples [Volume 12, Issue 3, 2024, Pages 35-47]

T

  • TCP downstream flows A new method for ehancing TCP throughput in the 80.11n based wireless LAN [Volume 12, Issue 1, 2024, Pages 21-32]
  • TCP protocol A new method for ehancing TCP throughput in the 80.11n based wireless LAN [Volume 12, Issue 1, 2024, Pages 21-32]
  • TCP upstream flows A new method for ehancing TCP throughput in the 80.11n based wireless LAN [Volume 12, Issue 1, 2024, Pages 21-32]
  • Threshold secret sharing Survey and analysis of several secret sharing schemes based on interepulation methods [Volume 12, Issue 1, 2024, Pages 11-20]
  • Throughput A new method for ehancing TCP throughput in the 80.11n based wireless LAN [Volume 12, Issue 1, 2024, Pages 21-32]
  • Time Differences Of Arrival Localization of ground emitters using LEO satellites in LER scenario based on combined TDOA-FDOA method [Volume 12, Issue 2, 2024, Pages 115-123]
  • Trajectory determination Sink mobility management in mobile sensor networks for cluster-heads load balancing [Volume 12, Issue 2, 2024, Pages 53-66]
  • Transport layer A new method for ehancing TCP throughput in the 80.11n based wireless LAN [Volume 12, Issue 1, 2024, Pages 21-32]
  • Turbulence Investigating the effect of pointing error for FSO link and evaluating its performance in the face of atmospheric phenomena [Volume 12, Issue 4, 2024]

U

  • Untrusted relay Covert communication in the presence of untrusted relay [Volume 12, Issue 2, 2024, Pages 1-14]
  • Untrusted relay A Novel Secret Key Generation Scheme in the Presence of an Untrusted Relay [Volume 12, Issue 3, 2024, Pages 73-84]

V

  • VANETs Improving the Geo-LU routing algorithm by considering the lifetime of links in selecting the next hop toward the destination in VANETs [Volume 12, Issue 2, 2024, Pages 41-52]
  • VOTDR DAS system performance improvement algorithm based on quantum technology [Volume 12, Issue 2, 2024, Pages 85-97]

W

  • Weighted Least Squares Localization of ground emitters using LEO satellites in LER scenario based on combined TDOA-FDOA method [Volume 12, Issue 2, 2024, Pages 115-123]
  • Weighted Sparse Representation Classification Introducing an efficient method to identify the noise pattern of helicopters based on the area feature vector and weighted sparse representation classification [Volume 12, Issue 1, 2024, Pages 33-42]
  • Wild horse algorithm A method for software fault prediction with combination of chaos theory and herd horse optimization algorithm [Volume 12, Issue 4, 2024]
  • Windows Malware Host-based Anomaly Malware Detection Using Deep Learning [Volume 12, Issue 4, 2024]
  • Wireless multimedia sensor networks A Method for Energy and Delay Aware Routing in Wireless Multimedia Sensor Networks [Volume 12, Issue 3, 2024, Pages 49-59]
  • Wireless Sensor Networks Sink mobility management in mobile sensor networks for cluster-heads load balancing [Volume 12, Issue 2, 2024, Pages 53-66]
  • Wireless Sensor Networks Investigating the Impact of Environmental Data Changes on the Lifetime of Wireless Sensor Network [Volume 12, Issue 3, 2024, Pages 15-22]