A
-
ACK
A new method for ehancing TCP throughput in the 80.11n based wireless LAN [Volume 12, Issue 1, 2024, Pages 21-32]
-
Anomaly Detection
Host-based Anomaly Malware Detection Using Deep Learning [Volume 12, Issue 4, 2024]
-
Area Feature Vector
Introducing an efficient method to identify the noise pattern of helicopters based on the area feature vector and weighted sparse representation classification [Volume 12, Issue 1, 2024, Pages 33-42]
-
Army of the Islamic Republic of Iran
Futuristic analysis of the components of the model for cyber threats in the Islamic Republic of Iran Army [Volume 12, Issue 4, 2024]
-
Artificial Neural Networks
Violent behavior detection in surveillance cameras using convolutional and memory neural networks [Volume 12, Issue 4, 2024]
-
Authentication
Image encryption using face biometric and metaheuristic algorithm over blockchain system [Volume 12, Issue 2, 2024, Pages 67-83]
B
-
BB84 protocol
Introducing a decoy-state version of the high-dimensional
polarization-phase (PoP) quantum key distribution protocol and
explaining its implementation [Volume 12, Issue 2, 2024, Pages 99-107]
-
Bit Error Rate (BER)
Investigating the effect of pointing error for FSO link and evaluating its performance in the face of atmospheric phenomena [Volume 12, Issue 4, 2024]
-
Blockchain
Image encryption using face biometric and metaheuristic algorithm over blockchain system [Volume 12, Issue 2, 2024, Pages 67-83]
-
Botnet
Detection of DNS based botnets using traffic analysis in IoT [Volume 12, Issue 3, 2024, Pages 1-13]
-
Brekkhof interpulation
Survey and analysis of several secret sharing schemes based on interepulation methods [Volume 12, Issue 1, 2024, Pages 11-20]
C
-
Cache
Evaluation of Side-Channel Attacks for Different Types of Processors Vulnerabilities [Volume 12, Issue 3, 2024, Pages 101-118]
-
Changes rate of environment
Investigating the Impact of Environmental Data Changes on the Lifetime of Wireless Sensor Network [Volume 12, Issue 3, 2024, Pages 15-22]
-
Chaos
Image encryption using face biometric and metaheuristic algorithm over blockchain system [Volume 12, Issue 2, 2024, Pages 67-83]
-
Chaos Theory
A method for software fault prediction with combination of chaos theory and herd horse optimization algorithm [Volume 12, Issue 4, 2024]
-
Cheating detection
Enhancing secret sharing security: A cheating detection approach based on inverse polynomial coefficients [Volume 12, Issue 2, 2024, Pages 109-114]
-
Classification
Improving code smell detection accuracy based on gray wolf algorithm and majority voting [Volume 12, Issue 1, 2024, Pages 109-122]
-
Classification
A method for software fault prediction with combination of chaos theory and herd horse optimization algorithm [Volume 12, Issue 4, 2024]
-
Classification and regression tree algorithm
Improving the speed of the intrusion detection system performance by reducing the data volume using kernel-based DBSCAN [Volume 12, Issue 4, 2024]
-
Classification of nodes
Classification of nodes in citation graphs using graph neural networks [Volume 12, Issue 1, 2024, Pages 123-133]
-
Class Imbalance Learning
DEKF-Driven Few-Shot Class Imbalance Learning to Enhance Cyber Attack Detection [Volume 12, Issue 3, 2024, Pages 119-137]
-
Clustering
Improving the speed of the intrusion detection system performance by reducing the data volume using kernel-based DBSCAN [Volume 12, Issue 4, 2024]
-
Cognitive Radio Networks
Designing a Reactive Routing Protocol for Optimizing Channel Switching in Communication Networks [Volume 12, Issue 4, 2024, Pages 1-12]
-
Community detection
Improving the Security of Cyber Networks Based on Community Detection Using Spectral Clustering Algorithm [Volume 12, Issue 1, 2024, Pages 77-87]
-
Community discovery
discovery of communities in social networks of a dynamic layer with the approach of maximizing the importance [Volume 12, Issue 1, 2024, Pages 43-57]
-
Complex Question Answering
A Deep Neural Network-Based Information Retrieval Method for Complex Question-Answering Systems [Volume 12, Issue 1, 2024, Pages 1-11]
-
Convolutional Neural Network
A hybrid model based on CNN-LSTM for speech emotion reognition [Volume 12, Issue 4, 2024, Pages 21-25]
-
Covert Communication
Covert communication in the presence of untrusted relay [Volume 12, Issue 2, 2024, Pages 1-14]
-
Cryptography
Survey and analysis of several secret sharing schemes based on interepulation methods [Volume 12, Issue 1, 2024, Pages 11-20]
-
Cryptography
Enhancing secret sharing security: A cheating detection approach based on inverse polynomial coefficients [Volume 12, Issue 2, 2024, Pages 109-114]
-
Cyber networks
Improving the Security of Cyber Networks Based on Community Detection Using Spectral Clustering Algorithm [Volume 12, Issue 1, 2024, Pages 77-87]
-
Cyber Threats
Futuristic analysis of the components of the model for cyber threats in the Islamic Republic of Iran Army [Volume 12, Issue 4, 2024]
D
-
DAS
DAS system performance improvement algorithm based on quantum technology [Volume 12, Issue 2, 2024, Pages 85-97]
-
Data reduction
Improving the speed of the intrusion detection system performance by reducing the data volume using kernel-based DBSCAN [Volume 12, Issue 4, 2024]
-
DBSCAN
Improving the speed of the intrusion detection system performance by reducing the data volume using kernel-based DBSCAN [Volume 12, Issue 4, 2024]
-
Decision tree algorithm
A method for software fault prediction with combination of chaos theory and herd horse optimization algorithm [Volume 12, Issue 4, 2024]
-
Decoupled Extended Kalman Filter
DEKF-Driven Few-Shot Class Imbalance Learning to Enhance Cyber Attack Detection [Volume 12, Issue 3, 2024, Pages 119-137]
-
Deep Generative Adversarial Networks
Host-based Anomaly Malware Detection Using Deep Learning [Volume 12, Issue 4, 2024]
-
Deep Neural Networks
A Deep Neural Network-Based Information Retrieval Method for Complex Question-Answering Systems [Volume 12, Issue 1, 2024, Pages 1-11]
-
Delay reduction
A Method for Energy and Delay Aware Routing in Wireless Multimedia Sensor Networks [Volume 12, Issue 3, 2024, Pages 49-59]
-
Discrete random phase injection
A Novel Secret Key Generation Scheme in the Presence of an Untrusted Relay [Volume 12, Issue 3, 2024, Pages 73-84]
-
DNS Attacks
Detection of DNS based botnets using traffic analysis in IoT [Volume 12, Issue 3, 2024, Pages 1-13]
-
DOG
Improved implementation of image processing algorithm with HLS software for use in optical seeker [Volume 12, Issue 4, 2024, Pages 13-19]
-
DSP48
Improved implementation of image processing algorithm with HLS software for use in optical seeker [Volume 12, Issue 4, 2024, Pages 13-19]
E
-
Echo Hiding
A Robust Quantum Audio Watermarking Using Synergy of Echo Hiding and Least Significant Bit Technique [Volume 12, Issue 1, 2024, Pages 59-76]
-
Energy consumption optimization
A Method for Energy and Delay Aware Routing in Wireless Multimedia Sensor Networks [Volume 12, Issue 3, 2024, Pages 49-59]
F
-
Face detection
Image encryption using face biometric and metaheuristic algorithm over blockchain system [Volume 12, Issue 2, 2024, Pages 67-83]
-
Feature Extraction
A method for software fault prediction with combination of chaos theory and herd horse optimization algorithm [Volume 12, Issue 4, 2024]
-
Few Shot Learning MAML
DEKF-Driven Few-Shot Class Imbalance Learning to Enhance Cyber Attack Detection [Volume 12, Issue 3, 2024, Pages 119-137]
-
Formal analysis
Formal Analysis of Security Vulnerabilities in OLSR Routing Protocol Using SPAN Tool [Volume 12, Issue 3, 2024, Pages 61-71]
-
Free Space Optical communication (FSO)
Investigating the effect of pointing error for FSO link and evaluating its performance in the face of atmospheric phenomena [Volume 12, Issue 4, 2024]
-
Frequency Differences Of Arrival
Localization of ground emitters using LEO satellites in LER scenario based on combined TDOA-FDOA method [Volume 12, Issue 2, 2024, Pages 115-123]
-
Futures studies
Futuristic analysis of the components of the model for cyber threats in the Islamic Republic of Iran Army [Volume 12, Issue 4, 2024]
G
-
Gray Wolf Algorithm
Improving code smell detection accuracy based on gray wolf algorithm and majority voting [Volume 12, Issue 1, 2024, Pages 109-122]
-
Group Jamming
Targeted Group Jamming Against Radar Systems [Volume 12, Issue 3, 2024, Pages 85-100]
-
Guard band
A Novel Secret Key Generation Scheme in the Presence of an Untrusted Relay [Volume 12, Issue 3, 2024, Pages 73-84]
H
-
Hierarchical Analysis
Evaluation of Side-Channel Attacks for Different Types of Processors Vulnerabilities [Volume 12, Issue 3, 2024, Pages 101-118]
-
High-dimensional QKD
Introducing a decoy-state version of the high-dimensional
polarization-phase (PoP) quantum key distribution protocol and
explaining its implementation [Volume 12, Issue 2, 2024, Pages 99-107]
-
HLS
Improved implementation of image processing algorithm with HLS software for use in optical seeker [Volume 12, Issue 4, 2024, Pages 13-19]
I
-
Image Classification
Malware Classification Based On Visualizing Binary Content of Samples [Volume 12, Issue 3, 2024, Pages 35-47]
-
Image Encryption
Image encryption using face biometric and metaheuristic algorithm over blockchain system [Volume 12, Issue 2, 2024, Pages 67-83]
-
Imam Khomeini Port Complex
Assessment of Desirability of Information Security and Cyber Network Indices in Ports with Emphasis on Passive Defense (Case Study: Imam Khomeini Port Complex) [Volume 12, Issue 4, 2024]
-
Information Retrieval
A Deep Neural Network-Based Information Retrieval Method for Complex Question-Answering Systems [Volume 12, Issue 1, 2024, Pages 1-11]
-
Information Security
Improving the Security of Cyber Networks Based on Community Detection Using Spectral Clustering Algorithm [Volume 12, Issue 1, 2024, Pages 77-87]
-
Information Security and Cyber Network
Assessment of Desirability of Information Security and Cyber Network Indices in Ports with Emphasis on Passive Defense (Case Study: Imam Khomeini Port Complex) [Volume 12, Issue 4, 2024]
-
Information Security Risk Assessment (ISRA)
Proposing framework for comparative evaluation of information security risk assessment methods
(Case of study: Iranian Research Institute for Information Science and Technology (IranDoc)) [Volume 12, Issue 2, 2024, Pages 27-39]
-
Information theory security
Covert communication in the presence of untrusted relay [Volume 12, Issue 2, 2024, Pages 1-14]
-
Internet of Things
Improving the speed of the intrusion detection system performance by reducing the data volume using kernel-based DBSCAN [Volume 12, Issue 4, 2024]
-
Internet of Things
Detection of DNS based botnets using traffic analysis in IoT [Volume 12, Issue 3, 2024, Pages 1-13]
-
Intrusion detection
Smart Home Intrusion Detection Model based on Principal
Component Analysis and Random Forest Classification [Volume 12, Issue 2, 2024, Pages 15-25]
-
Intrusion Detection System
Improving the speed of the intrusion detection system performance by reducing the data volume using kernel-based DBSCAN [Volume 12, Issue 4, 2024]
-
IoTID20 dataset
Smart Home Intrusion Detection Model based on Principal
Component Analysis and Random Forest Classification [Volume 12, Issue 2, 2024, Pages 15-25]
-
IranDoc
Proposing framework for comparative evaluation of information security risk assessment methods
(Case of study: Iranian Research Institute for Information Science and Technology (IranDoc)) [Volume 12, Issue 2, 2024, Pages 27-39]
-
ISRA methods
Proposing framework for comparative evaluation of information security risk assessment methods
(Case of study: Iranian Research Institute for Information Science and Technology (IranDoc)) [Volume 12, Issue 2, 2024, Pages 27-39]
K
-
Kaggle dataset
Improving the speed of the intrusion detection system performance by reducing the data volume using kernel-based DBSCAN [Volume 12, Issue 4, 2024]
-
Keywords: Tapping
DAS system performance improvement algorithm based on quantum technology [Volume 12, Issue 2, 2024, Pages 85-97]
L
-
Large Equal Radius scenario
Localization of ground emitters using LEO satellites in LER scenario based on combined TDOA-FDOA method [Volume 12, Issue 2, 2024, Pages 115-123]
-
Least Significant Bit
A Robust Quantum Audio Watermarking Using Synergy of Echo Hiding and Least Significant Bit Technique [Volume 12, Issue 1, 2024, Pages 59-76]
-
Lifetime of wireless sensor networks
Investigating the Impact of Environmental Data Changes on the Lifetime of Wireless Sensor Network [Volume 12, Issue 3, 2024, Pages 15-22]
-
Linear secret sharing
Enhancing secret sharing security: A cheating detection approach based on inverse polynomial coefficients [Volume 12, Issue 2, 2024, Pages 109-114]
-
Load Balancing
Sink mobility management in mobile sensor networks for
cluster-heads load balancing [Volume 12, Issue 2, 2024, Pages 53-66]
M
-
Machine Learning
Improving code smell detection accuracy based on gray wolf algorithm and majority voting [Volume 12, Issue 1, 2024, Pages 109-122]
-
Machine Vision
Violent behavior detection in surveillance cameras using convolutional and memory neural networks [Volume 12, Issue 4, 2024]
-
Malware Family
Malware Classification Based On Visualizing Binary Content of Samples [Volume 12, Issue 3, 2024, Pages 35-47]
-
Mean Delay
A new method for ehancing TCP throughput in the 80.11n based wireless LAN [Volume 12, Issue 1, 2024, Pages 21-32]
-
Mirai
Detection of DNS based botnets using traffic analysis in IoT [Volume 12, Issue 3, 2024, Pages 1-13]
-
Mobile Sink
Sink mobility management in mobile sensor networks for
cluster-heads load balancing [Volume 12, Issue 2, 2024, Pages 53-66]
N
-
Network Analysis
Improving the Security of Cyber Networks Based on Community Detection Using Spectral Clustering Algorithm [Volume 12, Issue 1, 2024, Pages 77-87]
-
NSGA
Covert communication in the presence of untrusted relay [Volume 12, Issue 2, 2024, Pages 1-14]
-
NSL_KDD dataset
Improving the speed of the intrusion detection system performance by reducing the data volume using kernel-based DBSCAN [Volume 12, Issue 4, 2024]
O
-
OLSR protocol
Formal Analysis of Security Vulnerabilities in OLSR Routing Protocol Using SPAN Tool [Volume 12, Issue 3, 2024, Pages 61-71]
-
One-Class Deep Learning
Host-based Anomaly Malware Detection Using Deep Learning [Volume 12, Issue 4, 2024]
-
Online social networks
a computational model to evaluate the agent of influence operations in online social networks [Volume 12, Issue 1, 2024, Pages 89-107]
-
OTDR
DAS system performance improvement algorithm based on quantum technology [Volume 12, Issue 2, 2024, Pages 85-97]
P
-
Paragraph Selection
A Deep Neural Network-Based Information Retrieval Method for Complex Question-Answering Systems [Volume 12, Issue 1, 2024, Pages 1-11]
-
Passive Defense
Assessment of Desirability of Information Security and Cyber Network Indices in Ports with Emphasis on Passive Defense (Case Study: Imam Khomeini Port Complex) [Volume 12, Issue 4, 2024]
-
Passive satellite positioning
Localization of ground emitters using LEO satellites in LER scenario based on combined TDOA-FDOA method [Volume 12, Issue 2, 2024, Pages 115-123]
-
Pattern of Confrontation
Futuristic analysis of the components of the model for cyber threats in the Islamic Republic of Iran Army [Volume 12, Issue 4, 2024]
-
Pattern Recognition
Introducing an efficient method to identify the noise pattern of helicopters based on the area feature vector and weighted sparse representation classification [Volume 12, Issue 1, 2024, Pages 33-42]
-
Physical layer secret key generation
A Novel Secret Key Generation Scheme in the Presence of an Untrusted Relay [Volume 12, Issue 3, 2024, Pages 73-84]
-
Pointing error
Investigating the effect of pointing error for FSO link and evaluating its performance in the face of atmospheric phenomena [Volume 12, Issue 4, 2024]
-
Ports
Assessment of Desirability of Information Security and Cyber Network Indices in Ports with Emphasis on Passive Defense (Case Study: Imam Khomeini Port Complex) [Volume 12, Issue 4, 2024]
-
Principal Component Analysis (PCA)
Smart Home Intrusion Detection Model based on Principal
Component Analysis and Random Forest Classification [Volume 12, Issue 2, 2024, Pages 15-25]
-
Processors Vulnerability
Evaluation of Side-Channel Attacks for Different Types of Processors Vulnerabilities [Volume 12, Issue 3, 2024, Pages 101-118]
Q
-
QKD
Introducing a decoy-state version of the high-dimensional
polarization-phase (PoP) quantum key distribution protocol and
explaining its implementation [Volume 12, Issue 2, 2024, Pages 99-107]
-
QKD CV
DAS system performance improvement algorithm based on quantum technology [Volume 12, Issue 2, 2024, Pages 85-97]
-
QKD DV
DAS system performance improvement algorithm based on quantum technology [Volume 12, Issue 2, 2024, Pages 85-97]
-
Quality of Service
A new method for ehancing TCP throughput in the 80.11n based wireless LAN [Volume 12, Issue 1, 2024, Pages 21-32]
-
Quantum Audio watermarking
A Robust Quantum Audio Watermarking Using Synergy of Echo Hiding and Least Significant Bit Technique [Volume 12, Issue 1, 2024, Pages 59-76]
-
Quantum computing
A Robust Quantum Audio Watermarking Using Synergy of Echo Hiding and Least Significant Bit Technique [Volume 12, Issue 1, 2024, Pages 59-76]
-
Quantum Cryptography
Introducing a decoy-state version of the high-dimensional
polarization-phase (PoP) quantum key distribution protocol and
explaining its implementation [Volume 12, Issue 2, 2024, Pages 99-107]
-
Quantum key
DAS system performance improvement algorithm based on quantum technology [Volume 12, Issue 2, 2024, Pages 85-97]
-
Quantum Key Distribution
Introducing a decoy-state version of the high-dimensional
polarization-phase (PoP) quantum key distribution protocol and
explaining its implementation [Volume 12, Issue 2, 2024, Pages 99-107]
R
-
Radar Systems
Targeted Group Jamming Against Radar Systems [Volume 12, Issue 3, 2024, Pages 85-100]
-
Random Forest Algorithm
Smart Home Intrusion Detection Model based on Principal
Component Analysis and Random Forest Classification [Volume 12, Issue 2, 2024, Pages 15-25]
-
Reduce channel switching
Designing a Reactive Routing Protocol for Optimizing Channel Switching in Communication Networks [Volume 12, Issue 4, 2024, Pages 1-12]
-
Resource Assignment
Targeted Group Jamming Against Radar Systems [Volume 12, Issue 3, 2024, Pages 85-100]
-
RN_DBSCAN
Improving the speed of the intrusion detection system performance by reducing the data volume using kernel-based DBSCAN [Volume 12, Issue 4, 2024]
S
-
Secret Sharing
Enhancing secret sharing security: A cheating detection approach based on inverse polynomial coefficients [Volume 12, Issue 2, 2024, Pages 109-114]
-
Secret Sharing Scheme
Survey and analysis of several secret sharing schemes based on interepulation methods [Volume 12, Issue 1, 2024, Pages 11-20]
-
Security vulnerabilities
Formal Analysis of Security Vulnerabilities in OLSR Routing Protocol Using SPAN Tool [Volume 12, Issue 3, 2024, Pages 61-71]
-
SIFT
Improved implementation of image processing algorithm with HLS software for use in optical seeker [Volume 12, Issue 4, 2024, Pages 13-19]
-
Smoothed l0 Norm
Introducing an efficient method to identify the noise pattern of helicopters based on the area feature vector and weighted sparse representation classification [Volume 12, Issue 1, 2024, Pages 33-42]
-
Software defect
A method for software fault prediction with combination of chaos theory and herd horse optimization algorithm [Volume 12, Issue 4, 2024]
-
SPAN tool
Formal Analysis of Security Vulnerabilities in OLSR Routing Protocol Using SPAN Tool [Volume 12, Issue 3, 2024, Pages 61-71]
-
Spectral Clustering
Improving the Security of Cyber Networks Based on Community Detection Using Spectral Clustering Algorithm [Volume 12, Issue 1, 2024, Pages 77-87]
-
Static Analysis
Malware Classification Based On Visualizing Binary Content of Samples [Volume 12, Issue 3, 2024, Pages 35-47]
T
-
TCP downstream flows
A new method for ehancing TCP throughput in the 80.11n based wireless LAN [Volume 12, Issue 1, 2024, Pages 21-32]
-
TCP protocol
A new method for ehancing TCP throughput in the 80.11n based wireless LAN [Volume 12, Issue 1, 2024, Pages 21-32]
-
TCP upstream flows
A new method for ehancing TCP throughput in the 80.11n based wireless LAN [Volume 12, Issue 1, 2024, Pages 21-32]
-
Threshold secret sharing
Survey and analysis of several secret sharing schemes based on interepulation methods [Volume 12, Issue 1, 2024, Pages 11-20]
-
Throughput
A new method for ehancing TCP throughput in the 80.11n based wireless LAN [Volume 12, Issue 1, 2024, Pages 21-32]
-
Time Differences Of Arrival
Localization of ground emitters using LEO satellites in LER scenario based on combined TDOA-FDOA method [Volume 12, Issue 2, 2024, Pages 115-123]
-
Trajectory determination
Sink mobility management in mobile sensor networks for
cluster-heads load balancing [Volume 12, Issue 2, 2024, Pages 53-66]
-
Transport layer
A new method for ehancing TCP throughput in the 80.11n based wireless LAN [Volume 12, Issue 1, 2024, Pages 21-32]
-
Turbulence
Investigating the effect of pointing error for FSO link and evaluating its performance in the face of atmospheric phenomena [Volume 12, Issue 4, 2024]
U
-
Untrusted relay
Covert communication in the presence of untrusted relay [Volume 12, Issue 2, 2024, Pages 1-14]
-
Untrusted relay
A Novel Secret Key Generation Scheme in the Presence of an Untrusted Relay [Volume 12, Issue 3, 2024, Pages 73-84]
V
-
VANETs
Improving the Geo-LU routing algorithm by considering the lifetime of links in selecting the next hop toward the destination in VANETs [Volume 12, Issue 2, 2024, Pages 41-52]
-
VOTDR
DAS system performance improvement algorithm based on quantum technology [Volume 12, Issue 2, 2024, Pages 85-97]
W
-
Weighted Least Squares
Localization of ground emitters using LEO satellites in LER scenario based on combined TDOA-FDOA method [Volume 12, Issue 2, 2024, Pages 115-123]
-
Weighted Sparse Representation Classification
Introducing an efficient method to identify the noise pattern of helicopters based on the area feature vector and weighted sparse representation classification [Volume 12, Issue 1, 2024, Pages 33-42]
-
Wild horse algorithm
A method for software fault prediction with combination of chaos theory and herd horse optimization algorithm [Volume 12, Issue 4, 2024]
-
Windows Malware
Host-based Anomaly Malware Detection Using Deep Learning [Volume 12, Issue 4, 2024]
-
Wireless multimedia sensor networks
A Method for Energy and Delay Aware Routing in Wireless Multimedia Sensor Networks [Volume 12, Issue 3, 2024, Pages 49-59]
-
Wireless Sensor Networks
Sink mobility management in mobile sensor networks for
cluster-heads load balancing [Volume 12, Issue 2, 2024, Pages 53-66]
-
Wireless Sensor Networks
Investigating the Impact of Environmental Data Changes on the Lifetime of Wireless Sensor Network [Volume 12, Issue 3, 2024, Pages 15-22]
Your query does not match with any item