B
-
Beamforming
Providing a suitable method for estimating the millimeter wave channel using compact sensing [Volume 13, Issue 1, 2025, Pages 45-60]
C
-
Chaos mapping
An Improved Flow Direction Optimization Algorithm for Spam Email Detection [Volume 13, Issue 1, 2025, Pages 17-28]
-
Classical post-processing
Introducing a post-processing protocol for quantum key distribution (QKD) systems [Volume 13, Issue 1, 2025, Pages 61-72]
-
Clustering
A Two Level Architecture to increase Quality of Service in Vehicular Ad hoc Networks [Volume 13, Issue 1, 2025, Pages 1-15]
-
Compressive Sensing
Providing a suitable method for estimating the millimeter wave channel using compact sensing [Volume 13, Issue 1, 2025, Pages 45-60]
-
Computer vision
Detection of motorcycle helmets by traffic cameras in difficult situations using deep learning [Volume 13, Issue 1, 2025, Pages 83-94]
-
Cyber Defense
Explanation of the Stratification Strategy of Various Threats in security and Cyber Defense of Knowledge-Based Organizations in the Country [Volume 13, Issue 1, 2025, Pages 95-116]
-
Cyber risk
Analyzing the concept of cyber risk and its security coverage methods [Volume 13, Issue 1, 2025, Pages 29-43]
D
-
Directional Modulation
Robust Physical Layer Security Using Frequency Diverse Array Directional Modulation [Volume 13, Issue 1, 2025, Pages 73-82]
-
Distribution
Malware detection using federated learning and incremental learning [Volume 13, Issue 1, 2025, Pages 117-130]
F
-
Fog Computing
A Two Level Architecture to increase Quality of Service in Vehicular Ad hoc Networks [Volume 13, Issue 1, 2025, Pages 1-15]
I
-
Information exchange space
Analyzing the concept of cyber risk and its security coverage methods [Volume 13, Issue 1, 2025, Pages 29-43]
-
Insurance coverage
Analyzing the concept of cyber risk and its security coverage methods [Volume 13, Issue 1, 2025, Pages 29-43]
-
InvBR-LWE
Reducing delay of InvBR-LWE PQC algorithm in limited-resources devices [Volume 13, Issue 1, 2025, Pages 131-143]
-
IoT Security
Reducing delay of InvBR-LWE PQC algorithm in limited-resources devices [Volume 13, Issue 1, 2025, Pages 131-143]
K
-
Knowledge-based Organizations
Explanation of the Stratification Strategy of Various Threats in security and Cyber Defense of Knowledge-Based Organizations in the Country [Volume 13, Issue 1, 2025, Pages 95-116]
L
-
Lattice-Based Algorithms
Reducing delay of InvBR-LWE PQC algorithm in limited-resources devices [Volume 13, Issue 1, 2025, Pages 131-143]
M
-
Machine Learning
Malware detection using federated learning and incremental learning [Volume 13, Issue 1, 2025, Pages 117-130]
-
Malware Detection
Malware detection using federated learning and incremental learning [Volume 13, Issue 1, 2025, Pages 117-130]
-
Massive MIMO
Providing a suitable method for estimating the millimeter wave channel using compact sensing [Volume 13, Issue 1, 2025, Pages 45-60]
P
-
Position Estimation Error
Robust Physical Layer Security Using Frequency Diverse Array Directional Modulation [Volume 13, Issue 1, 2025, Pages 73-82]
-
Post-quantum cryptography
Reducing delay of InvBR-LWE PQC algorithm in limited-resources devices [Volume 13, Issue 1, 2025, Pages 131-143]
-
Prediction
A Two Level Architecture to increase Quality of Service in Vehicular Ad hoc Networks [Volume 13, Issue 1, 2025, Pages 1-15]
Q
-
QKD protocol
Introducing a post-processing protocol for quantum key distribution (QKD) systems [Volume 13, Issue 1, 2025, Pages 61-72]
-
Quantum Cryptography
Introducing a post-processing protocol for quantum key distribution (QKD) systems [Volume 13, Issue 1, 2025, Pages 61-72]
-
Quantum key distribution (QKD)
Introducing a post-processing protocol for quantum key distribution (QKD) systems [Volume 13, Issue 1, 2025, Pages 61-72]
R
-
Random frequency Diverse Array
Robust Physical Layer Security Using Frequency Diverse Array Directional Modulation [Volume 13, Issue 1, 2025, Pages 73-82]
S
-
Secure key
Introducing a post-processing protocol for quantum key distribution (QKD) systems [Volume 13, Issue 1, 2025, Pages 61-72]
-
Spam email detection
An Improved Flow Direction Optimization Algorithm for Spam Email Detection [Volume 13, Issue 1, 2025, Pages 17-28]
-
Strategic
Explanation of the Stratification Strategy of Various Threats in security and Cyber Defense of Knowledge-Based Organizations in the Country [Volume 13, Issue 1, 2025, Pages 95-116]
T
-
Threat Leveling
Explanation of the Stratification Strategy of Various Threats in security and Cyber Defense of Knowledge-Based Organizations in the Country [Volume 13, Issue 1, 2025, Pages 95-116]
V
-
VANET
A Two Level Architecture to increase Quality of Service in Vehicular Ad hoc Networks [Volume 13, Issue 1, 2025, Pages 1-15]
Your query does not match with any item