Keyword Index

A

  • A5 Ciphering Algorithms Prediction of Plaintext in GSM Network using SDCCH Logical Channel [Volume 9, Issue 3, 2021, Pages 39-47]
  • Access Control TNAC: A Novel Trust Negotiation Based Access Control Model Using XACML Architecture [Volume 3, Issue 1, 2015, Pages 53-67]
  • Action Abstraction A Framework for Evaluating Malware and Countermeasures with an Analytical Approach based on the Game Theory Case Study: Actors' Actions Based on Environmental Evidence [Volume 10, Issue 1, 2022, Pages 47-71]
  • Active Cyber Defense The Presentation of an Active Cyber Defense Model for Application in Cyber Deception Technology [Volume 9, Issue 4, 2021, Pages 125-140]
  • Active Cyber Defense A cooperative and independent deception system in the active cyber defense system [Volume 10, Issue 2, 2022, Pages 129-142]
  • Active Learnin A Comprehensive Semi-Suprvised Model for Collaborative Intrusion Detection Based on Network Behavior Profiling Using The Concept of Deep Learning and Fuzzy Correlation of Alerts along [Volume 9, Issue 3, 2021, Pages 165-186]
  • Active learning DDoS Attack Detection System Using Ensemble Method Classification and Active Learning Approach [Volume 11, Issue 3, 2023, Pages 101-118]
  • Activity Identifying Influential Nodes in Social Networks by Integrating the Centrality Method and Node Activity [Volume 8, Issue 3, 2020, Pages 1-11]
  • Adaptive Algorithm Blind Frequency Offset Estimation using Adaptive Algorithms in Non-Coherent OFDM Systems [Volume 3, Issue 4, 2015, Pages 61-70]
  • Adaptive Kalman Filter Three-Dimensional Angles Measurement using IME based on MEMS Technology by Adaptive Kalman Filter [Volume 7, Issue 2, 2019, Pages 81-91]
  • Adaptive Neuro-Fuzzy Inference System Investigation of a new ensemble method of intrusion detection system on different data sets [Volume 10, Issue 3, 2022, Pages 43-57]
  • Adaptive Notch Filter Reducing Interference Effect on GPS Navigation System Using Evolutionary Notch Filter [Volume 8, Issue 4, 2020, Pages 95-106]
  • Adaptive Post-Processing An Integrated Algorithm for Optimal Detection of Weak Radar Targets Masked by the Sidelobes of a Strong Target [Volume 6, Issue 4, 2018, Pages 91-104]
  • Adaptive Power And Modulation Performance Analysis of Free Space Optical Communication Links under M-PAM and M-PSK Modulations using Adaptive Power and Modulation Techniques [Volume 7, Issue 1, 2019, Pages 63-75]
  • Adaptive Pulse Compression An Integrated Algorithm for Optimal Detection of Weak Radar Targets Masked by the Sidelobes of a Strong Target [Volume 6, Issue 4, 2018, Pages 91-104]
  • Adaptive UKF High Maneuvering Target Tracking Based on Augmented State Method using Adaptive Unscented Kalman Filter [Volume 7, Issue 2, 2019, Pages 93-108]
  • Adder The residue number system component design based on OneHot coding [Volume 10, Issue 1, 2022, Pages 119-133]
  • Ad-hoc Networks Security of UAV Relay Networks based on Covert Communication in the Presence of an Eavesdropping UAV [Volume 11, Issue 2, 2023, Pages 45-56]
  • Advanced Encryption Standard A New And Efficient Method of Mass Masking and its Resistance Assessment to Power Analysis [Volume 6, Issue 2, 2018, Pages 123-134]
  • Advanced Encryption Standard A Practical Template Attack Against the Implementation of the Advanced Encryption Standard on ARM Processor [Volume 7, Issue 1, 2019, Pages 39-48]
  • Advanced Persistent Threats Detection of advanced Cyber Attacks, Using Behavior Modeling Based on Natural Language Processing [Volume 6, Issue 3, 2018, Pages 141-151]
  • AES Introducing a new timing attack on the ARM processor and its practical implementation on the Raspberrypi3 board [Volume 8, Issue 1, 2020, Pages 125-132]
  • Agent-Oriented Architecture   Providing an Agent-Based Architecture for Semantic Mining From Large-Scale Data in Distributed Environments [Volume 8, Issue 3, 2020, Pages 83-99]
  • Aggregate signature Security Analysis and Improvement of an Intelligent Transportation System based on Certificateless Aggregate Signature [Volume 8, Issue 1, 2020, Pages 25-33]
  • AKA Procedure Analyzing Security Challenges of LTE Networks, Obstacles and Opportunities of Network Localization Based on the Standard Platform [Volume 7, Issue 2, 2019, Pages 121-132]
  • Alert Management A Foresight Framework for Intrusion Response Systems in Computer Networks [Volume 6, Issue 3, 2018, Pages 13-34]
  • Algorithm Kernel density Estimation Detecting Fake Accounts in Social Networks Using Principal Components Analysis and Kernel Density Estimation Algorithm (A Case Study on the Twitter Social Network) [Volume 9, Issue 3, 2021, Pages 109-123]
  • AL-OFDM Identification of STBC-OFDM Signals by Second-Order Cyclostationarity Method [Volume 7, Issue 4, 2019, Pages 27-36]
  • ALOHA Introduction of An Anti-Collision Protocol in RFID Systems [Volume 8, Issue 4, 2020, Pages 119-128]
  • Analysis dentifying Zero Day Android Daily through Neural Networks [Volume 11, Issue 3, 2023, Pages 49-55]
  • Analyzer Environment A Secure Environment for Behavioral Malware Analysis [Volume 2, Issue 3, 2014, Pages 65-76]
  • Android dentifying Zero Day Android Daily through Neural Networks [Volume 11, Issue 3, 2023, Pages 49-55]
  • Anomalous Subgraphs Concurrent Detection of Compact Anomalous Subgraphs in Large Social Networks [Volume 9, Issue 2, 2021, Pages 179-194]
  • Anomaly Detection Hybrid Anomaly detection method using community detection in graph and feature selection [Volume 8, Issue 1, 2020, Pages 17-24]
  • Anomaly Detection An Accelerated Method for Rules Anomaly Detection in Software Defined Networks [Volume 8, Issue 4, 2020, Pages 31-39]
  • Anomaly Detection Anomaly Detection in Dynamic Social Networks Based on Behavioral Measurements [Volume 9, Issue 1, 2021, Pages 115-123]
  • Anomaly Detection Real-time Topology-based Tracking of Microscopic Objects [Volume 9, Issue 3, 2021, Pages 1-20]
  • Anomaly Detection Concurrent Detection of Compact Anomalous Subgraphs in Large Social Networks [Volume 9, Issue 2, 2021, Pages 179-194]
  • Anomaly Detection The Presentation of a Hybrid Anomaly Detection Model Using Inverse Weight Clustering and Machine Learning in Cloud Environments [Volume 9, Issue 4, 2021, Pages 21-29]
  • Anonymity A Mutual Anonymity Private Authentication Protocol to Use in Radio-Frequency Identification Systems [Volume 6, Issue 4, 2018, Pages 45-59]
  • Anonymity A new attack on Jakobsson Hybrid Mix-Net [Volume 7, Issue 3, 2019, Pages 113-119]
  • Anonymity Distributed Anonymity Based On the Integrated Block Chain in Vehicular Ad Hoc Network [Volume 8, Issue 4, 2020, Pages 41-52]
  • Anonymity Design a Blockchain based Electronic Payment with Users’ Anonymity [Volume 9, Issue 2, 2021, Pages 85-100]
  • Anonymity Evaluation and proof of routing algorithm in Tor anonymity network [Volume 11, Issue 3, 2023, Pages 15-24]
  • Anonymous Networks Designing Anonymous Communication System by Lattice-Based Cryptography [Volume 2, Issue 3, 2014, Pages 13-22]
  • Anova F-value An Optimized Compound Deep Neural Network Integrating With Feature Selection for Intrusion Detection System in Cyber Attacks [Volume 10, Issue 4, 2022, Pages 41-51]
  • Ant Colony Algorithm Sequential Forward Feature Selection for Intrusion Detection System, Using Ant Colony Algorithm [Volume 6, Issue 2, 2018, Pages 49-63]
  • Ant Colony Optimization Algorithm Feature selection using a combination of Genetic-Whale-Ant colony algorithms for software fault prediction by machine learning [Volume 10, Issue 1, 2022, Pages 33-45]
  • Antenna Array Improvement of Security in Wireless Communication Networks with Directional Modulation and Artificial Noise [Volume 10, Issue 4, 2022, Pages 11-18]
  • Anti-analysis techniques An Effective Method to Detect Environment-Aware Malware Based on the Behavioral Distances Comparison [Volume 6, Issue 4, 2018, Pages 123-133]
  • Anti_collision protocol Introduction of An Anti-Collision Protocol in RFID Systems [Volume 8, Issue 4, 2020, Pages 119-128]
  • API Calls Improvement in the Ransomwares Detection Method With New API Calls Features [Volume 8, Issue 4, 2020, Pages 107-118]
  • Approximate Dual Finite Frame as Code: Some Characterizations for Error Correction Codes and Three Algorithms for Troubleshooting in Data Transfer [Volume 7, Issue 2, 2019, Pages 1-12]
  • Archimedes optimization algorithm Presenting a new sentiment analysis method based on multi-objective Archimedes optimization algorithm and machine learning [Volume 11, Issue 4, 2023]
  • Area Coverage Optimal Placement of Cameras to Maximize Visual Coverage using Genetic Algorithm and Harmony Search [Volume 7, Issue 1, 2019, Pages 49-61]
  • ARM Microprocessor A Practical Template Attack Against the Implementation of the Advanced Encryption Standard on ARM Processor [Volume 7, Issue 1, 2019, Pages 39-48]
  • Artificial Neural Networks Network Intrusion Detection using a combination of artificial neural networks in a hierarchical manner [Volume 8, Issue 1, 2020, Pages 89-99]
  • Artificial noise The Analysis and Design of Secure Wireless Networks in the Presence of Users with Different Security Needs Based on Covert Communication and Secure Transmission of Information Theory in the Presence of a Friendly Jammer [Volume 9, Issue 4, 2021, Pages 67-76]
  • Artificial Noise (AN) Improving the Security in Cellular Communications Networks with adding Artificial Noise by method Non-Orthogonal Resource Allocation Techniques [Volume 9, Issue 2, 2021, Pages 135-142]
  • Artificial noise forwarding Information Theoretic Secret Key Agreement Based on Localization [Volume 8, Issue 2, 2020, Pages 35-49]
  • Assignment and Scheduling Sensor-Weapon/Threat Modelling and optimal solving of dependent sensor-weapon/threat assignment and scheduling problem by a metaheuristic algorithm based on GRASP [Volume 8, Issue 1, 2020, Pages 35-50]
  • Association Rules Providing an Ontology-Based Method for Exploring the Association Rules in Multi-Agent Distributed Environments [Volume 9, Issue 1, 2021, Pages 1-17]
  • Atmospheric Turbulence Performance Analysis of Free Space Optical Communication Links under M-PAM and M-PSK Modulations using Adaptive Power and Modulation Techniques [Volume 7, Issue 1, 2019, Pages 63-75]
  • Atmospheric Turbulence Introducing an Optimal Modulation Constellation, Resistant to Atmospheric Turbulence [Volume 8, Issue 2, 2020, Pages 115-124]
  • Attack Ability A Decision-Making Model in a Cyber Conflicts Acted Upon Vulnerability, Based on Game Theoretic Analysis [Volume 6, Issue 2, 2018, Pages 21-28]
  • Attack Graph Deterrence Model in Cyberspace Based on Bayesian Belief Attack Graph by using Risk Creating Payoff Function [Volume 7, Issue 1, 2019, Pages 25-38]
  • Attack Graph A Security Model Based Approach for Dynamic Risk Assessment of Multi-Step Attacks in Computer Networks [Volume 9, Issue 1, 2021, Pages 157-173]
  • Attacks Weaknesses of SPRS Authentication Protocol and Present a Developed Protocol for RFID Systems [Volume 3, Issue 3, 2015, Pages 39-48]
  • Attack Tree Design the Model of CSRF Attack Tree for Immunization the Web Application in Development Process [Volume 3, Issue 1, 2015, Pages 41-52]
  • Attack Sequence  Modeling of Obfuscated Multi- Stage cyber Attacks [Volume 8, Issue 2, 2020, Pages 61-73]
  • Attribute based encryption A Novel and Secure Model for Sharing Protected Health Record (PHR) Based on Blockchain and Attribute Based Encryption [Volume 8, Issue 1, 2020, Pages 101-124]
  • Auction Algorithm The IoT Resource Allocation Improvement in Fog Computing Using Non-Cooperative Game Theory [Volume 9, Issue 4, 2021, Pages 147-158]
  • Audio watermarking Transparent and Robust Audio Watermarking Using Synergy LU Decomposition and the Fibonacci Sequence in GBT-DCT-DWT Transforms [Volume 9, Issue 1, 2021, Pages 101-113]
  • Augmented State Approac High Maneuvering Target Tracking Based on Augmented State Method using Adaptive Unscented Kalman Filter [Volume 7, Issue 2, 2019, Pages 93-108]
  • Authentication Utilizing Port-Knocking as first defensive layer at defense-in-depth strategies using hybrid of the Internet Control Message Protocol features, Internet Addresses and Tunneling [Volume 2, Issue 4, 2014, Pages 25-40]
  • Authentication Phishing Website Detection for e-Banking by Inclined Planes Optimization Algorithm [Volume 3, Issue 1, 2015, Pages 29-39]
  • Authentication Secure and Fast Re-authentication Protocol to Support Extensive Movement of Users in IEEE 802.1X Wireless Networks [Volume 3, Issue 4, 2015, Pages 71-80]
  • Authentication A Scheme for Improvement of Security and Privacy in Mobile Health Systems by Using SIM Card [Volume 7, Issue 1, 2019, Pages 11-24]
  • Authentication A New Method for Image Steganography Using Discrete Wavelet Transforms [Volume 7, Issue 3, 2019, Pages 83-91]
  • Authentication A secure three factor authentication scheme for wireless healthcare sensor networks based on elliptic curve [Volume 8, Issue 1, 2020, Pages 147-167]
  • Authentication protocol A Mutual Authentication Protocol for IoT Users in Cloud Environment [Volume 9, Issue 2, 2021, Pages 17-28]
  • Autocorrelation Blind symbol Rate estimation in multipath channels [Volume 10, Issue 3, 2022, Pages 59-66]
  • Automated evaluation The Automated Security Evaluation of Threat Paths Based on Petri Nets [Volume 9, Issue 4, 2021, Pages 87-98]
  • Automatically Generate Optimized Test Data A novel way to identify effective test-case in software testing [Volume 11, Issue 2, 2023, Pages 103-116]
  • Automatic Text Generation Automatic Persian Text Generation Using Rule-Based Models and Word Embedding [Volume 9, Issue 4, 2021, Pages 43-54]
  • Autonomous Distributed System Self-stabilizing Grundy Coloring Using Game Theory and Heuristics Ordering [Volume 6, Issue 2, 2018, Pages 39-48]
  • Autonomous vehicles The Semantic Segmentation of Autonomous Vehicles Images with the Teacher-Student Technique [Volume 9, Issue 4, 2021, Pages 1-19]
  • Autotracking Simulation the modify FSM , in autotracking systems to Stabilization secure links of free space optical communications [Volume 2, Issue 1, 2014, Pages 61-69]
  • Auxiliary particle filter On Improvement of Cardinalized Probability Hypothesis Density Filter Implementation by using Auxiliary Particle Filter [Volume 3, Issue 4, 2015, Pages 23-41]

B

  • BAN logic A Novel and Secure Model for Sharing Protected Health Record (PHR) Based on Blockchain and Attribute Based Encryption [Volume 8, Issue 1, 2020, Pages 101-124]
  • Basic reproductive ratio SCEIRS information dissemination model based on rumor spreading in complex networks [Volume 9, Issue 2, 2021, Pages 121-134]
  • Basis Matrix Inverse Synthetic Aperture Radar (ISAR) Imaging of Targets with Non-Uniform Motion and Constant Acceleration based on Compressed Sensing [Volume 9, Issue 2, 2021, Pages 51-62]
  • Bayesian Network Target Threat Assessment using Rule-Based Joint Fuzzy and Probabilistic Networks [Volume 6, Issue 4, 2018, Pages 61-78]
  • Bayesian Network A Trust Evaluation Model for Cloud Computing Using Bayesian Network [Volume 10, Issue 4, 2022, Pages 53-61]
  • BB84 protocol Generalized Version of the BB84 QKD Protocol with n Polarization Bases and Unequal Probabilities [Volume 9, Issue 1, 2021, Pages 125-136]
  • Beamforming Robust Adaptive Beamforming Against Interferer’s Direction Of Arrival Estimation Error [Volume 7, Issue 3, 2019, Pages 27-36]
  • Beam Steerer Simulation the modify FSM , in autotracking systems to Stabilization secure links of free space optical communications [Volume 2, Issue 1, 2014, Pages 61-69]
  • Behavior Detection of advanced Cyber Attacks, Using Behavior Modeling Based on Natural Language Processing [Volume 6, Issue 3, 2018, Pages 141-151]
  • Behavioral Distance An Effective Method to Detect Environment-Aware Malware Based on the Behavioral Distances Comparison [Volume 6, Issue 4, 2018, Pages 123-133]
  • Behavioral Distance Kavosh: Offering an Analysis Method and the Impact of Normal Network Traffic on Selection and Extraction Based on the Minkowski Distance [Volume 9, Issue 1, 2021, Pages 137-147]
  • Behavioral Measurement Anomaly Detection in Dynamic Social Networks Based on Behavioral Measurements [Volume 9, Issue 1, 2021, Pages 115-123]
  • Behavioral Model Implementing a Novel Malware Detection System in Virtual Machines [Volume 2, Issue 3, 2014, Pages 23-33]
  • Behavioral signature Kashef: A Two-step detector of Windows-based Malicious executable files [Volume 10, Issue 2, 2022, Pages 143-156]
  • Belief Model Projection of Muli Stage Cyber Attack Based on Belief Model and Fuzzy Inference [Volume 3, Issue 2, 2015, Pages 13-28]
  • BER Simulation the modify FSM , in autotracking systems to Stabilization secure links of free space optical communications [Volume 2, Issue 1, 2014, Pages 61-69]
  • Bidimensional Empirical Mode Decomposition Improving the Quality of Millimeter Wave Images by Fusion with Visible Images [Volume 9, Issue 4, 2021, Pages 77-86]
  • Big Data Real-time Topology-based Tracking of Microscopic Objects [Volume 9, Issue 3, 2021, Pages 1-20]
  • Bilinear Pairing A New (t,n) Designated Verifier Threshold Proxy Signature Scheme in the Standard Model [Volume 2, Issue 1, 2014, Pages 25-35]
  • Bilinear Pairing An Improved Authentication Scheme with Conditional Privacy Preserving in VANETs [Volume 3, Issue 2, 2015, Pages 1-12]
  • Biometric An Improvement on the Identification via Gait Using the Genetic Algorithm [Volume 9, Issue 4, 2021, Pages 31-42]
  • Biometrics Offline text-Independent Persian handwriting Forgery Detection using Texture Analysis [Volume 7, Issue 3, 2019, Pages 37-52]
  • Bionic Signals Covert and Secure Underwater Acoustic Communication using Merkle Hash Tree and Dolphin Whistle [Volume 6, Issue 2, 2018, Pages 135-146]
  • Bipartite graph The relationship of software vulnerabilities and workarounds [Volume 8, Issue 2, 2020, Pages 75-81]
  • Blacklist Comparison of Supervised Machine Learning Algorithms in Detection of Botnets Domain Generation Algorithms [Volume 8, Issue 4, 2020, Pages 17-29]
  • Blind Estimation The New Algorithm for The Blind Extraction of The Radio Frequency Fingerprint Using the Specific Features of High-Power Amplifier and Local Oscillator [Volume 11, Issue 1, 2023, Pages 57-65]
  • Blind estimation of number of users Introduction of the Entropy-Based Method for Finding Influential Nodes in Information Dissemination on Online Social Networks [Volume 6, Issue 2, 2018, Pages 1-10]
  • Blind estimation of number of users Blind Estimation of Number of Users in TDMA Networks Using Redundancy of Adaptive Channel Coding [Volume 6, Issue 2, 2018, Pages 11-20]
  • Blind Recognition A New Method for Blind Recognition of the Initial State of Synchronous Scramblers When Located after the Channel Encoder [Volume 9, Issue 1, 2021, Pages 19-27]
  • Blockchain A Novel and Secure Model for Sharing Protected Health Record (PHR) Based on Blockchain and Attribute Based Encryption [Volume 8, Issue 1, 2020, Pages 101-124]
  • Blockchain Design a Blockchain based Electronic Payment with Users’ Anonymity [Volume 9, Issue 2, 2021, Pages 85-100]
  • Block Cipher Analysis of Impossible Differential on LowMC Block Cipher [Volume 7, Issue 2, 2019, Pages 69-79]
  • Block Cipher Structural Analysis based on Integral Characteristic of a Reduced Round Block Cipher with Making an Improvement [Volume 7, Issue 3, 2019, Pages 1-8]
  • Block Cipher Upper Bounds for the Probability of Differential Characteristics of Five Block Cipher Constructions Functions [Volume 8, Issue 4, 2020, Pages 129-137]
  • Bot Botnet Detection for Peer to Peer Networks [Volume 3, Issue 4, 2015, Pages 43-60]
  • Botnet Botnet Detection for Peer to Peer Networks [Volume 3, Issue 4, 2015, Pages 43-60]
  • Botnet The Distributed Denial of Service Attacks Situation Awareness Based on The Prediction of Battle Scene Using Dempster-Shefer Evidences Theories and Bayesian Rules [Volume 7, Issue 1, 2019, Pages 77-94]
  • Botnet Detecting Botnets with Timing-Based Covert Command and Control Channels [Volume 7, Issue 4, 2019, Pages 1-15]
  • Botnet P2P Botnet Detection Using Deep Learning Method [Volume 8, Issue 2, 2020, Pages 1-14]
  • Botnet Comparison of Supervised Machine Learning Algorithms in Detection of Botnets Domain Generation Algorithms [Volume 8, Issue 4, 2020, Pages 17-29]
  • Botnet Detecting of Botnets’ Malicious Domains with Deep Autoencoder Neural Network [Volume 9, Issue 1, 2021, Pages 61-74]
  • Botnet Kavosh: Offering an Analysis Method and the Impact of Normal Network Traffic on Selection and Extraction Based on the Minkowski Distance [Volume 9, Issue 1, 2021, Pages 137-147]
  • Botnet Mobile botnets detection using deep learning techniques [Volume 11, Issue 2, 2023, Pages 31-43]
  • Botnet Detection Botnet Detection for Peer to Peer Networks [Volume 3, Issue 4, 2015, Pages 43-60]
  • Botnet Detection P2P Botnet Detection Using Deep Learning Method [Volume 8, Issue 2, 2020, Pages 1-14]
  • Botnet Detection Mobile botnets detection using deep learning techniques [Volume 11, Issue 2, 2023, Pages 31-43]
  • Breaking Time Optimum Parameter Selection for Rainbow Table TMTO Attack Considering Breaking Time and Using Sequential and Index Search Methods [Volume 3, Issue 3, 2015, Pages 49-57]
  • Buffer Overflow Automated Exploit Generation For Application’s Vulnerability [Volume 4, Issue 1, 2016, Pages 35-50]
  • Buffer Overflow Error The Impact of Security Mechanisms on Software Vulnerabilities [Volume 2, Issue 1, 2014, Pages 49-60]

C

  • Capability Projection of Cyber Attacks using Damage Estimation and Combination of Attacker’s Capability and Opportunity based on Transferable Belief Model [Volume 6, Issue 4, 2018, Pages 1-12]
  • Capacity Relating the Detection Rate, Capacity and the Cost of Steganography by Steganographer Modeling [Volume 6, Issue 3, 2018, Pages 81-94]
  • Cardinal Hermite functions Cardinal Hermit functions and their application in solving the time-delay fractional optimal control problems [Volume 8, Issue 4, 2020, Pages 153-160]
  • Cardinalized PHD On Improvement of Cardinalized Probability Hypothesis Density Filter Implementation by using Auxiliary Particle Filter [Volume 3, Issue 4, 2015, Pages 23-41]
  • Carrier Frequency Detection of Interfering Signals and Estimation of Their Carrier Frequency in CNC Satellite Communications using Cyclic Spectrum Density [Volume 11, Issue 2, 2023, Pages 91-101]
  • Cartesian Product Some New Bounds on the Information Ratio of the Cartesian Product of Some Classes of Graphs [Volume 6, Issue 4, 2018, Pages 135-142]
  • C­&­C Server Comparison of Supervised Machine Learning Algorithms in Detection of Botnets Domain Generation Algorithms [Volume 8, Issue 4, 2020, Pages 17-29]
  • Cellular communications network Enhancing Communication Security in Cellular Communications Networks by using Interference Alignment Technique [Volume 3, Issue 2, 2015, Pages 49-60]
  • Cellular phone An Anti-Spam Framework for Advertising Targeting Smart Mobile Devices on IoT [Volume 6, Issue 2, 2018, Pages 65-81]
  • Centrality Identifying Influential Nodes in Social Networks by Integrating the Centrality Method and Node Activity [Volume 8, Issue 3, 2020, Pages 1-11]
  • Centralized Daemon Self-stabilizing Grundy Coloring Using Game Theory and Heuristics Ordering [Volume 6, Issue 2, 2018, Pages 39-48]
  • CEP Optimization of Site Topologies and Delay Extraction in Radar Emitter Location [Volume 2, Issue 2, 2014, Pages 41-51]
  • Certificateless Cryptography Security Analysis and Improvement of an Intelligent Transportation System based on Certificateless Aggregate Signature [Volume 8, Issue 1, 2020, Pages 25-33]
  • Chaff Recognition Chaff from target by determining the optimal waveform in the radar detector using artificial neural network [Volume 11, Issue 2, 2023, Pages 117-132]
  • Channel Coding Quality enhancement of received video using secondary channel encoding in Joint Source and Channel Coding (JSCC) [Volume 3, Issue 2, 2015, Pages 29-48]
  • Channel Coding A New Method for Combining the Channel Coding with Polar Coding-Based Encryption [Volume 4, Issue 1, 2016, Pages 1-8]
  • Channel Encoder A New Method for Blind Recognition of the Initial State of Synchronous Scramblers When Located after the Channel Encoder [Volume 9, Issue 1, 2021, Pages 19-27]
  • Chaos Theory Energy Aware Routing in the Internet of Things using improved Grasshopper Metaheuristic Algorithm [Volume 11, Issue 1, 2023, Pages 15-29]
  • Chaos Theory Improving mobile mass monitoring in the IoT environment based on Chaotic Fog Algorithm [Volume 11, Issue 3, 2023, Pages 77-88]
  • Chaotic Processing Guilty Knowledge Test by Chaotic Processing of Electroencephalogram Signals Based on Fuzzy Recurrence Plot [Volume 10, Issue 2, 2022, Pages 87-104]
  • Charge Simulation Method A New Method to Evaluate the Launch Pad Lightning Protection System Performance by Using LPM in 3-D [Volume 3, Issue 1, 2015, Pages 15-27]
  • CICIDS2017 dataset DDoS Attack Detection System Using Ensemble Method Classification and Active Learning Approach [Volume 11, Issue 3, 2023, Pages 101-118]
  • Cipher Chains Hellman Chains Analysis Base on Graph of Random Function [Volume 4, Issue 1, 2016, Pages 81-89]
  • Class I amplifier Design and Simulation of a LORAN Signal Generator for LPS Transmitter Using Class I Amplifier [Volume 8, Issue 2, 2020, Pages 25-33]
  • Classification An Optimized Unsupervised Feature Selection Algorithm [Volume 3, Issue 3, 2015, Pages 1-7]
  • Classification Improving Intrusion Detection System Using a New Feature Selection Technique [Volume 6, Issue 4, 2018, Pages 143-152]
  • Classification Improvement in the Ransomwares Detection Method With New API Calls Features [Volume 8, Issue 4, 2020, Pages 107-118]
  • Classification Detection of Slippery Road Conditions using the Road CCTV Images based on the Convolutional Neural Networks and Transfer Learning [Volume 10, Issue 2, 2022, Pages 105-116]
  • Classification Developing an Improved Method for Malware Attack Detection in Cloud Computing using Ensemble Learning [Volume 10, Issue 4, 2022, Pages 33-39]
  • Classification A method to prediction of software system’s code smells using neural network [Volume 11, Issue 3, 2023, Pages 67-76]
  • Classification Algorithm Distributed Denial of Service Attacks Detection in Software Defined Networks [Volume 9, Issue 1, 2021, Pages 43-59]
  • Classification of Malware Implementing a Novel Malware Detection System in Virtual Machines [Volume 2, Issue 3, 2014, Pages 23-33]
  • Classifier Investigation of a new ensemble method of intrusion detection system on different data sets [Volume 10, Issue 3, 2022, Pages 43-57]
  • Classifiers Modular human face recognition method based on principal component analysis and Mahalanobis distance [Volume 11, Issue 4, 2023]
  • Clock Control Function Time Analysis Attack on a Stream Cipher Algorithm’s [Volume 4, Issue 1, 2016, Pages 51-57]
  • Closed Circuit Television (CCTV) Optimal Placement of Cameras to Maximize Visual Coverage using Genetic Algorithm and Harmony Search [Volume 7, Issue 1, 2019, Pages 49-61]
  • Cloud service Hybrid Method for Detecting Trustworthy Cloud Service Providers using Analytical Hierarchical Process and Neural Network [Volume 6, Issue 4, 2018, Pages 105-122]
  • Cloud service A Trust Evaluation Model for Cloud Computing Using Bayesian Network [Volume 10, Issue 4, 2022, Pages 53-61]
  • Clustering Fuzzy Keyword Search Scheme on an Encrypted Database in Cloud Computing Using Word Clustering [Volume 8, Issue 3, 2020, Pages 151-165]
  • Clustering Energy-Harvesting Aware Multi-Hop Routing in Wireless Sensor Networks for Defense Applications [Volume 8, Issue 4, 2020, Pages 63-73]
  • Clustering Energy-aware routing in wireless sensor networks using MLP and simulated annealing algorithms [Volume 9, Issue 3, 2021, Pages 133-142]
  • Clustering Clustering and Routing in Wireless Sensor Networks Using Multi-Objective Cuckoo Search and Game Theory [Volume 10, Issue 3, 2022, Pages 11-20]
  • Clustering Developing an Improved Method for Malware Attack Detection in Cloud Computing using Ensemble Learning [Volume 10, Issue 4, 2022, Pages 33-39]
  • Clustering Providing a routing method in Internet of Things networks based on fuzzy logic and clustering For use in smart transportatio [Volume 11, Issue 4, 2023]
  • CNC Satellite Communication Detection of Interfering Signals and Estimation of Their Carrier Frequency in CNC Satellite Communications using Cyclic Spectrum Density [Volume 11, Issue 2, 2023, Pages 91-101]
  • CNN Algorithm A Malware Classification Method Using visualization and Word Embedding Features [Volume 11, Issue 1, 2023, Pages 1-13]
  • Cognitive Radio Frequency Spectrum Sensing by Multi-Stage Adaptive Optimization Algorithm with the Efficient Non-Cooperative Technique in Cognitive radios with hardware implementation [Volume 8, Issue 3, 2020, Pages 39-51]
  • Cognitive Radio Reducing the Destructive Effect of Misbehaving Users in Cooperative Spectrum Sensing using Reinforcement Learning [Volume 10, Issue 4, 2022, Pages 1-9]
  • Cognitive Radio Network Interference Mitigation in Cognitive Radio Communication Systems Based on the Wavelet Transform [Volume 9, Issue 4, 2021, Pages 55-66]
  • Cognitive Radio Sensor Network A new analytical model for enhancing performance of cognitive radio user’s transmissions in the internet of things [Volume 9, Issue 3, 2021, Pages 73-82]
  • Cognitive Radio Technology Joint Spectrum Sensing and Power Allocation for Multiband Cognitive Radio Networks Using Probabilistic Spectrum Access [Volume 6, Issue 3, 2018, Pages 117-130]
  • Coherent sources Coherent Acoustic source DOA estimation by nested array based on sparse solution [Volume 8, Issue 1, 2020, Pages 79-88]
  • Collective Classification Collusive Fraud Classification in Network of Online Auction Using Similarity Measure in Collective Classification [Volume 7, Issue 1, 2019, Pages 95-103]
  • Color image A novel lossless color secret image sharing based on homogeneous linear recursion [Volume 10, Issue 3, 2022, Pages 107-118]
  • Combat Management Systems Modelling and Solving the Location Problem of Fire Launching Sites [Volume 6, Issue 3, 2018, Pages 45-57]
  • Combat Management Systems Modelling and Solving the Location Problem of Fire Launching Sites [Volume 6, Issue 3, 2018, Pages 59-64]
  • Combination of One-class Classifiers Web-based Military Management Systems Security Using Combination of One-class Classifiers [Volume 3, Issue 3, 2015, Pages 19-30]
  • Combinatory steganography Designing a combinatorial Image Steganography algorithm based on game theory [Volume 8, Issue 1, 2020, Pages 133-145]
  • Common Vulnerability Scoring System(CVSS) A Security Model Based Approach for Dynamic Risk Assessment of Multi-Step Attacks in Computer Networks [Volume 9, Issue 1, 2021, Pages 157-173]
  • Communication delay Guidance and distributed control of the networked UAVs [Volume 7, Issue 4, 2019, Pages 117-129]
  • Communication networks A Greedy Algorithm for Constructing Region-Fault Tolerant Geometric Spanners [Volume 10, Issue 4, 2022, Pages 75-80]
  • Communication systems Guidance and distributed control of the networked UAVs [Volume 7, Issue 4, 2019, Pages 117-129]
  • Comparator Design of Content-Addressable Memory in Quantum-Dot Cellular Automata [Volume 8, Issue 4, 2020, Pages 53-61]
  • Complexity A New Method for Combining the Channel Coding with Polar Coding-Based Encryption [Volume 4, Issue 1, 2016, Pages 1-8]
  • Complex network SCEIRS information dissemination model based on rumor spreading in complex networks [Volume 9, Issue 2, 2021, Pages 121-134]
  • Complex War Scenes The Presentation of a Model for Analyzing the Behavior of the Enemy Using Hidden Markov Models Based on Electronic Warfare Observations in Complex War Scenes [Volume 7, Issue 1, 2019, Pages 113-128]
  • Compressed Sensing (CS) Inverse Synthetic Aperture Radar (ISAR) Imaging of Targets with Non-Uniform Motion and Constant Acceleration based on Compressed Sensing [Volume 9, Issue 2, 2021, Pages 51-62]
  • Compressive Sensing Concurrent Detection of Compact Anomalous Subgraphs in Large Social Networks [Volume 9, Issue 2, 2021, Pages 179-194]
  • Computational operations A Fast Method for Computation of Scalar Multiplication of Elliptic Curve Suitable for Elliptic Curve Cryptography System [Volume 3, Issue 3, 2015, Pages 9-17]
  • Conditional Privacy Design a Blockchain based Electronic Payment with Users’ Anonymity [Volume 9, Issue 2, 2021, Pages 85-100]
  • Conditions Environment A New Method For Gradual Detection of Environmental Conditions and Resources Required by Smart Malware [Volume 6, Issue 4, 2018, Pages 33-44]
  • Conflict Analysis The Improvement of the GMCR Model Based on Statistical Analysis of the Game’ Graph (Case Study: Malwares and Countermeasures Actions Based on Detection-Independent and Deductive Evidence) [Volume 9, Issue 4, 2021, Pages 99-123]
  • Congestion control A cross layer approach for improving the TCP quality-of-service parameters over the IEEE 802.11.ac wireless networks [Volume 10, Issue 1, 2022, Pages 109-117]
  • Constrained Optimization Optimum Parameter Selection for Rainbow Table TMTO Attack Considering Breaking Time and Using Sequential and Index Search Methods [Volume 3, Issue 3, 2015, Pages 49-57]
  • Constraint non-linear optimization Wireless Target Localization Using Median Weighted Least Square Error Metric in the Presence of Non-Line of Sight Signals [Volume 8, Issue 2, 2020, Pages 125-133]
  • Content addressable memory Design of Content-Addressable Memory in Quantum-Dot Cellular Automata [Volume 8, Issue 4, 2020, Pages 53-61]
  • Content rating Spam Management in Social Networks by Content Rating [Volume 2, Issue 2, 2014, Pages 53-62]
  • Controller Presentation and Performance Evaluation of an Efficient Algorithm for a Distributed Controller in SDN [Volume 9, Issue 1, 2021, Pages 175-183]
  • Convert Channel Web Covert Timing Channel Detection based on Entropy [Volume 8, Issue 3, 2020, Pages 13-23]
  • Converter The residue number system component design based on OneHot coding [Volume 10, Issue 1, 2022, Pages 119-133]
  • Convolutional Code Constraint length Sequential Decoding Algorithms of Convolutional Codes: Implementation, Improvement and Comparison [Volume 3, Issue 2, 2015, Pages 61-73]
  • Convolutional Codes Sequential Decoding Algorithms of Convolutional Codes: Implementation, Improvement and Comparison [Volume 3, Issue 2, 2015, Pages 61-73]
  • Convolutional Neural Network Improving the performance of the convolutional neural network using incremental weight loss function to deal with class imbalanced data [Volume 11, Issue 4, 2023, Pages 19-34]
  • Convolutional neural networks The Semantic Segmentation of Autonomous Vehicles Images with the Teacher-Student Technique [Volume 9, Issue 4, 2021, Pages 1-19]
  • Convolutional neural networks Detection of Slippery Road Conditions using the Road CCTV Images based on the Convolutional Neural Networks and Transfer Learning [Volume 10, Issue 2, 2022, Pages 105-116]
  • Convolution neural network A way to predict the stock price of the Tehran Stock Exchange in relation to knowledge [Volume 10, Issue 4, 2022, Pages 91-100]
  • Cooperative Spectrum Sensing Reducing the Destructive Effect of Misbehaving Users in Cooperative Spectrum Sensing using Reinforcement Learning [Volume 10, Issue 4, 2022, Pages 1-9]
  • Copy-move forgery Forgery detection in digital images using the hybrid deep learning method [Volume 11, Issue 4, 2023]
  • Copyright protection Transparent and Robust Audio Watermarking Using Synergy LU Decomposition and the Fibonacci Sequence in GBT-DCT-DWT Transforms [Volume 9, Issue 1, 2021, Pages 101-113]
  • Corrected Conditional entropy Detecting Botnets with Timing-Based Covert Command and Control Channels [Volume 7, Issue 4, 2019, Pages 1-15]
  • Correlation Defense Against Spoofing in GPS Receiver using Correlation and Least Mean Squares Method Based on Sign-Data Algorithm [Volume 3, Issue 4, 2015, Pages 11-22]
  • Cost Optimization A Techno-Economic Model of Sustainable Communication Infrastructure in the Smart City; using WDM-PON FTTx [Volume 9, Issue 1, 2021, Pages 149-156]
  • Cost reduction Presentation of a model for feasibility assessment of implementing the IoT social network projects using the existing public social networks as the infrastructure [Volume 10, Issue 1, 2022, Pages 73-84]
  • Counterattak SCEIRS information dissemination model based on rumor spreading in complex networks [Volume 9, Issue 2, 2021, Pages 121-134]
  • Countermeasure Action A Framework for Evaluating Malware and Countermeasures with an Analytical Approach based on the Game Theory Case Study: Actors' Actions Based on Environmental Evidence [Volume 10, Issue 1, 2022, Pages 47-71]
  • Covariance Matrix Frequency Spectrum Sensing by Multi-Stage Adaptive Optimization Algorithm with the Efficient Non-Cooperative Technique in Cognitive radios with hardware implementation [Volume 8, Issue 3, 2020, Pages 39-51]
  • Cover Increasing Insertion Capacity and Resistance in Image Steganography Based on Mapping and Bits Reduction [Volume 7, Issue 2, 2019, Pages 33-39]
  • Covert and Secure UWAC Covert and Secure Underwater Acoustic Communication using Merkle Hash Tree and Dolphin Whistle [Volume 6, Issue 2, 2018, Pages 135-146]
  • Covert Channel Detecting Botnets with Timing-Based Covert Command and Control Channels [Volume 7, Issue 4, 2019, Pages 1-15]
  • Covert Communication The Analysis and Design of Secure Wireless Networks in the Presence of Users with Different Security Needs Based on Covert Communication and Secure Transmission of Information Theory in the Presence of a Friendly Jammer [Volume 9, Issue 4, 2021, Pages 67-76]
  • Covert Communication Improving security of wireless telecommunication networks based on covert communication in presence of a controlled noise using multiple beamforming [Volume 10, Issue 1, 2022, Pages 11-19]
  • Covert Communication Security of UAV Relay Networks based on Covert Communication in the Presence of an Eavesdropping UAV [Volume 11, Issue 2, 2023, Pages 45-56]
  • Covert Timing Channel Simulation and Evaluation of Jitter and Packet Loss Noises Influence on Covert Timing Channel Performance [Volume 2, Issue 3, 2014, Pages 35-49]
  • Covert Timming Channel Detecting Botnets with Timing-Based Covert Command and Control Channels [Volume 7, Issue 4, 2019, Pages 1-15]
  • Credential TNAC: A Novel Trust Negotiation Based Access Control Model Using XACML Architecture [Volume 3, Issue 1, 2015, Pages 53-67]
  • Crime Patterns Analysis of exchange market disruptors using graph-based social network analysis [Volume 11, Issue 1, 2023, Pages 107-116]
  • Crime Prevention Analysis of exchange market disruptors using graph-based social network analysis [Volume 11, Issue 1, 2023, Pages 107-116]
  • CRLB A Novel Algorithm for Radar Jamming Resource Allocation [Volume 7, Issue 3, 2019, Pages 53-70]
  • Cross Site Scripting (XSS) Automatic XSS Exploit Generation Using Grammatical Evolution [Volume 9, Issue 2, 2021, Pages 101-119]
  • Cryptanalysis Analysis of Impossible Differential on LowMC Block Cipher [Volume 7, Issue 2, 2019, Pages 69-79]
  • Cryptographic Pseudo Random Number Generator Design and Analysis of a Novel Synchronous Stream Cipher Using Secure Pseudo Random Number Generator [Volume 4, Issue 1, 2016, Pages 59-68]
  • Cryptography Design and Analysis of a Novel Synchronous Stream Cipher Using Secure Pseudo Random Number Generator [Volume 4, Issue 1, 2016, Pages 59-68]
  • Cryptography Non-Performance of Pearson Correlation Coefficient for Evaluating Image Encryption Security [Volume 6, Issue 2, 2018, Pages 83-91]
  • Cryptography A New Method for Image Steganography Using Discrete Wavelet Transforms [Volume 7, Issue 3, 2019, Pages 83-91]
  • Cryptography Distributed Anonymity Based On the Integrated Block Chain in Vehicular Ad Hoc Network [Volume 8, Issue 4, 2020, Pages 41-52]
  • Cryptography A New Mechanism for Enhancing the Security of Military Internet of Things by Using Quantum and Classic Cryptography [Volume 9, Issue 2, 2021, Pages 29-49]
  • Crystals-Kyber Speeding up the execution-time of Crystals-Kyber PQC Algorithm on FPGA [Volume 10, Issue 4, 2022, Pages 101-110]
  • CSRF Design the Model of CSRF Attack Tree for Immunization the Web Application in Development Process [Volume 3, Issue 1, 2015, Pages 41-52]
  • Cuckoo Search Clustering and Routing in Wireless Sensor Networks Using Multi-Objective Cuckoo Search and Game Theory [Volume 10, Issue 3, 2022, Pages 11-20]
  • Customization Analyzing Security Challenges of LTE Networks, Obstacles and Opportunities of Network Localization Based on the Standard Platform [Volume 7, Issue 2, 2019, Pages 121-132]
  • CWE The relationship of software vulnerabilities and workarounds [Volume 8, Issue 2, 2020, Pages 75-81]
  • Cyber Attack Projection of Muli Stage Cyber Attack Based on Belief Model and Fuzzy Inference [Volume 3, Issue 2, 2015, Pages 13-28]
  • Cyber Attacks Detection of advanced Cyber Attacks, Using Behavior Modeling Based on Natural Language Processing [Volume 6, Issue 3, 2018, Pages 141-151]
  • Cyber-Attacks An Improved Method of Incident Detection due to Cyber Attacks [Volume 7, Issue 4, 2019, Pages 105-116]
  • Cyber-Attacks A survey on detecting false data injection in power systems with auto-encoder based deep learning methods [Volume 10, Issue 2, 2022, Pages 11-17]
  • Cyber Attacks Projection Projection of Cyber Attacks using Damage Estimation and Combination of Attacker’s Capability and Opportunity based on Transferable Belief Model [Volume 6, Issue 4, 2018, Pages 1-12]
  • Cybercrime Analysis of exchange market disruptors using graph-based social network analysis [Volume 11, Issue 1, 2023, Pages 107-116]
  • Cyber Defence A Decision-Making Model in a Cyber Conflicts Acted Upon Vulnerability, Based on Game Theoretic Analysis [Volume 6, Issue 2, 2018, Pages 21-28]
  • Cyber Defense A new architecture for impact projection of cyber-attacks based on high level information fusion in cyber command and control [Volume 2, Issue 4, 2014, Pages 1-14]
  • Cyber Defense Projection of Muli Stage Cyber Attack Based on Belief Model and Fuzzy Inference [Volume 3, Issue 2, 2015, Pages 13-28]
  • Cyber Dynamic The Presentation of an Active Cyber Defense Model for Application in Cyber Deception Technology [Volume 9, Issue 4, 2021, Pages 125-140]
  • Cyber-physical systems (CPSs) A method for quantitative evaluation of security risk in cyber-physical systems [Volume 11, Issue 2, 2023, Pages 71-80]
  • Cyber Security The Presentation of an Active Cyber Defense Model for Application in Cyber Deception Technology [Volume 9, Issue 4, 2021, Pages 125-140]
  • Cyber Security The enhancement of online social network security by detecting and preventing fake accounts through machine learning [Volume 10, Issue 1, 2022, Pages 85-97]
  • Cyber Security Identify the Factors Affecting the Culture and Awareness of Cyber Security Using Theme Analysis [Volume 11, Issue 1, 2023, Pages 67-80]
  • Cyber Security Analysis A New Method for Image Steganography Using Discrete Wavelet Transforms [Volume 7, Issue 4, 2019, Pages 79-89]
  • Cyberspace Deterrence Model in Cyberspace Based on Bayesian Belief Attack Graph by using Risk Creating Payoff Function [Volume 7, Issue 1, 2019, Pages 25-38]
  • Cyberspace Development of the Concept of Deterrence Theory in the Country's Cyberspace Based on Upstream Documents and Available Approaches [Volume 8, Issue 4, 2020, Pages 161-173]
  • Cyber Space Effects of Cyber Threats in IT Projects Using the Fuzzy Cognitive Mapping Approach [Volume 7, Issue 2, 2019, Pages 41-51]
  • Cyber Threats Effects of Cyber Threats in IT Projects Using the Fuzzy Cognitive Mapping Approach [Volume 7, Issue 2, 2019, Pages 41-51]
  • Cyber Threats Development of the Concept of Deterrence Theory in the Country's Cyberspace Based on Upstream Documents and Available Approaches [Volume 8, Issue 4, 2020, Pages 161-173]
  • Cyber Attacks Modeling of Obfuscated Multi- Stage cyber Attacks [Volume 8, Issue 2, 2020, Pages 61-73]
  • Cyclic Autocorrelation Function Detection of Interfering Signals and Estimation of Their Carrier Frequency in CNC Satellite Communications using Cyclic Spectrum Density [Volume 11, Issue 2, 2023, Pages 91-101]
  • Cyclic Prefix Blind Frequency Offset Estimation using Adaptive Algorithms in Non-Coherent OFDM Systems [Volume 3, Issue 4, 2015, Pages 61-70]
  • Cyclic spectrum density Detection of Interfering Signals and Estimation of Their Carrier Frequency in CNC Satellite Communications using Cyclic Spectrum Density [Volume 11, Issue 2, 2023, Pages 91-101]
  • Cyclostationarity Identification of STBC-OFDM Signals by Second-Order Cyclostationarity Method [Volume 7, Issue 4, 2019, Pages 27-36]
  • Cyclostationery Blind symbol Rate estimation in multipath channels [Volume 10, Issue 3, 2022, Pages 59-66]

D

  • Damage Estimation Projection of Cyber Attacks using Damage Estimation and Combination of Attacker’s Capability and Opportunity based on Transferable Belief Model [Volume 6, Issue 4, 2018, Pages 1-12]
  • Data Aggregation A Heuristic Data Diffusion and Gathering Scheme Using Virtual Line for Wireless Sensor Networks with Mobile Sink [Volume 9, Issue 2, 2021, Pages 195-207]
  • Database outsourcing Fuzzy Keyword Search Scheme on an Encrypted Database in Cloud Computing Using Word Clustering [Volume 8, Issue 3, 2020, Pages 151-165]
  • Database Security Detection and Prevention of SQL Injection Attacks at Runtime Using Decision Tree Classification [Volume 8, Issue 4, 2020, Pages 75-93]
  • Data classification A novel architecture for database outsourcing in cloud computing with regard to data life cycle [Volume 2, Issue 4, 2014, Pages 41-54]
  • Data classification Sonar Dataset Classification using Multi-Layer Perceptron Neural Network Based on Dragonfly and Moth Algorithms [Volume 10, Issue 3, 2022, Pages 21-31]
  • Data diffusion A Heuristic Data Diffusion and Gathering Scheme Using Virtual Line for Wireless Sensor Networks with Mobile Sink [Volume 9, Issue 2, 2021, Pages 195-207]
  • Data Fusion Detection of advanced Cyber Attacks, Using Behavior Modeling Based on Natural Language Processing [Volume 6, Issue 3, 2018, Pages 141-151]
  • Data Gathering A Heuristic Data Diffusion and Gathering Scheme Using Virtual Line for Wireless Sensor Networks with Mobile Sink [Volume 9, Issue 2, 2021, Pages 195-207]
  • Data Life Cycle A novel architecture for database outsourcing in cloud computing with regard to data life cycle [Volume 2, Issue 4, 2014, Pages 41-54]
  • Data locality A New Scheduling Algorithm to Reduce Computation Time in Hadoop Environment [Volume 8, Issue 2, 2020, Pages 51-59]
  • Data Mining Sequential Forward Feature Selection for Intrusion Detection System, Using Ant Colony Algorithm [Volume 6, Issue 2, 2018, Pages 49-63]
  • Data Mining Smart Detection of Covert Worms in Computer Networks [Volume 7, Issue 4, 2019, Pages 67-77]
  • Data Mining Hybrid Anomaly detection method using community detection in graph and feature selection [Volume 8, Issue 1, 2020, Pages 17-24]
  • Data Mining The enhancement of online social network security by detecting and preventing fake accounts through machine learning [Volume 10, Issue 1, 2022, Pages 85-97]
  • Data Mining A Trust Evaluation Model for Cloud Computing Using Bayesian Network [Volume 10, Issue 4, 2022, Pages 53-61]
  • Dataset Improvement in the Ransomwares Detection Method With New API Calls Features [Volume 8, Issue 4, 2020, Pages 107-118]
  • DDOS Detect Web Denial of Service Attacks Using Entropy and Support Vector Machine Algorithm [Volume 6, Issue 4, 2018, Pages 79-89]
  • DDoS attack detection DDoS Attack Detection System Using Ensemble Method Classification and Active Learning Approach [Volume 11, Issue 3, 2023, Pages 101-118]
  • Decentralize POMDPs Online Collaborative Planning in Complex Environment [Volume 2, Issue 4, 2014, Pages 15-23]
  • Deception Investigating The Effect of Social Engineering Techniques on Employees Vulnerability (Case study: Tehran Municipality Employees) [Volume 11, Issue 1, 2023, Pages 31-46]
  • Decision-making Process The Presentation of a Model for Analyzing the Behavior of the Enemy Using Hidden Markov Models Based on Electronic Warfare Observations in Complex War Scenes [Volume 7, Issue 1, 2019, Pages 113-128]
  • Decision Theory Online Collaborative Planning in Complex Environment [Volume 2, Issue 4, 2014, Pages 15-23]
  • Decision Tree Intrusion Detection in Computer Networks using Decision Tree and Feature Reduction [Volume 9, Issue 3, 2021, Pages 99-108]
  • Decoding Finite Frame as Code: Some Characterizations for Error Correction Codes and Three Algorithms for Troubleshooting in Data Transfer [Volume 7, Issue 2, 2019, Pages 1-12]
  • Deep Autoencoder Neural Network Detecting of Botnets’ Malicious Domains with Deep Autoencoder Neural Network [Volume 9, Issue 1, 2021, Pages 61-74]
  • Deep Convolutional Neural Networks (CNN) Fast Detection of Vehicle Type and Position in Images Based on Deep Neural Network [Volume 10, Issue 2, 2022, Pages 117-127]
  • Deep Neural Network Detecting of Botnets’ Malicious Domains with Deep Autoencoder Neural Network [Volume 9, Issue 1, 2021, Pages 61-74]
  • Deep Neural Networks Classification of High Dimensional Imbalanced Dataset via Game Theory-based Generative Adversarial Networks [Volume 9, Issue 2, 2021, Pages 63-74]
  • Delay A cross layer approach for improving the TCP quality-of-service parameters over the IEEE 802.11.ac wireless networks [Volume 10, Issue 1, 2022, Pages 109-117]
  • Delay Lock Loop GPS Spoofing Mitigation using Adaptive Estimator in Tracking Loop [Volume 6, Issue 3, 2018, Pages 65-80]
  • DEMATEL-Based Analytic Network Process (DANP) The Course of Action Selection Model in Network Centric Operation [Volume 7, Issue 2, 2019, Pages 133-155]
  • DEMATEL method Evaluation of Network-Based Operation Criteria Based on DEMATEL Method [Volume 7, Issue 1, 2019, Pages 139-153]
  • Dempster-Shefer Evidences Theory The Distributed Denial of Service Attacks Situation Awareness Based on The Prediction of Battle Scene Using Dempster-Shefer Evidences Theories and Bayesian Rules [Volume 7, Issue 1, 2019, Pages 77-94]
  • Design Structure Matrix The Design Process Reform of the Gama-ray Imaging System by using the Design Structure Matrix [Volume 6, Issue 3, 2018, Pages 95-106]
  • Detection Detection of Spoofing Attack Based on Multi-Layer Neural Network in Single-Frequency GPS Receivers [Volume 3, Issue 1, 2015, Pages 69-80]
  • Detection Defense Against Spoofing in GPS Receiver using Correlation and Least Mean Squares Method Based on Sign-Data Algorithm [Volume 3, Issue 4, 2015, Pages 11-22]
  • Detection Detection and Prevention of SQL Injection Attacks at Runtime Using Decision Tree Classification [Volume 8, Issue 4, 2020, Pages 75-93]
  • Detection Providing an Improved Unmanned Aerial Vehicle Detection System to Increase Detection speed Using Deep Learning [Volume 11, Issue 1, 2023, Pages 81-96]
  • Detection accuracy rate Improvement in the Ransomwares Detection Method With New API Calls Features [Volume 8, Issue 4, 2020, Pages 107-118]
  • Detection-Independent and deductive evidence The Improvement of the GMCR Model Based on Statistical Analysis of the Game’ Graph (Case Study: Malwares and Countermeasures Actions Based on Detection-Independent and Deductive Evidence) [Volume 9, Issue 4, 2021, Pages 99-123]
  • Detector Smart Detection of Covert Worms in Computer Networks [Volume 7, Issue 4, 2019, Pages 67-77]
  • Differential Upper Bounds for the Probability of Differential Characteristics of Five Block Cipher Constructions Functions [Volume 8, Issue 4, 2020, Pages 129-137]
  • Differential Characteristic Upper Bounds for the Probability of Differential Characteristics of Five Block Cipher Constructions Functions [Volume 8, Issue 4, 2020, Pages 129-137]
  • Differential game Developing a Threat-Tolerability Bilateral Concept within a Differential Game for the Analysis of the Insider/Adversary Behavior in Operational environment [Volume 11, Issue 2, 2023, Pages 15-29]
  • Differential privacy Trajectory Database Release with Differential Privacy Guarantee [Volume 9, Issue 1, 2021, Pages 29-42]
  • Diffusion model A Dynamic Metaheuristic Algorithm for Influence Maximization in Social Networks [Volume 11, Issue 2, 2023, Pages 57-69]
  • Digital Signature A New Mechanism for Enhancing the Security of Military Internet of Things by Using Quantum and Classic Cryptography [Volume 9, Issue 2, 2021, Pages 29-49]
  • Dimensionality reduction Fixing Security Defects of Video Authentication Systems with Face Recognition, Based on 3D Structure and Shape Evaluation [Volume 9, Issue 4, 2021, Pages 141-145]
  • Directional Modulation Improvement of Security in Wireless Communication Networks with Directional Modulation and Artificial Noise [Volume 10, Issue 4, 2022, Pages 11-18]
  • Direction finding Coherent Acoustic source DOA estimation by nested array based on sparse solution [Volume 8, Issue 1, 2020, Pages 79-88]
  • Direct Trust A Fuzzy Trust Evaluation Model to Enhance Security of cloud System Entities with Petri Net [Volume 4, Issue 1, 2016, Pages 19-34]
  • Discrete Cosine Transform Enhancing E-Security by Inserting a Watermark Using the Combination of Genetic Algorithm and Tabu Search [Volume 8, Issue 3, 2020, Pages 25-37]
  • Discrete Cosine Transform(DCT) Transparent and Robust Audio Watermarking Using Synergy LU Decomposition and the Fibonacci Sequence in GBT-DCT-DWT Transforms [Volume 9, Issue 1, 2021, Pages 101-113]
  • Discrete wavelet transform (DWT) LU decomposition Transparent and Robust Audio Watermarking Using Synergy LU Decomposition and the Fibonacci Sequence in GBT-DCT-DWT Transforms [Volume 9, Issue 1, 2021, Pages 101-113]
  • Distributed Algorithm Real-time Topology-based Tracking of Microscopic Objects [Volume 9, Issue 3, 2021, Pages 1-20]
  • Distributed command and control Guidance and distributed control of the networked UAVs [Volume 7, Issue 4, 2019, Pages 117-129]
  • Distributed Denial of Service The Distributed Denial of Service Attacks Situation Awareness Based on The Prediction of Battle Scene Using Dempster-Shefer Evidences Theories and Bayesian Rules [Volume 7, Issue 1, 2019, Pages 77-94]
  • Distributed Denial of Service Distributed Denial of Service Attacks Detection in Software Defined Networks [Volume 9, Issue 1, 2021, Pages 43-59]
  • Distributed problems Distributed Solving of Weapon Target Assignment Problem using Learning Automata [Volume 11, Issue 1, 2023, Pages 47-55]
  • Distributed Processing A Distributed Approach to Community Detection in Large Social Networks Based on Label Propagation [Volume 8, Issue 4, 2020, Pages 1-15]
  • Distributed Simulation A Software System for Large-Scale Simulation of Malware Propagation in Computer Networks [Volume 7, Issue 2, 2019, Pages 53-67]
  • Distribution Presentation and Performance Evaluation of an Efficient Algorithm for a Distributed Controller in SDN [Volume 9, Issue 1, 2021, Pages 175-183]
  • DNS data Malicious Domain Detection using DNS Records [Volume 9, Issue 3, 2021, Pages 83-97]
  • DOA estimation error Robust Adaptive Beamforming Against Interferer’s Direction Of Arrival Estimation Error [Volume 7, Issue 3, 2019, Pages 27-36]
  • Dolphin Whistle Covert and Secure Underwater Acoustic Communication using Merkle Hash Tree and Dolphin Whistle [Volume 6, Issue 2, 2018, Pages 135-146]
  • Domain Generation Algorithms (DGAs) Comparison of Supervised Machine Learning Algorithms in Detection of Botnets Domain Generation Algorithms [Volume 8, Issue 4, 2020, Pages 17-29]
  • Domain Generation Algorithms (DGAs) Detecting of Botnets’ Malicious Domains with Deep Autoencoder Neural Network [Volume 9, Issue 1, 2021, Pages 61-74]
  • Dominating set k-Adjacency Domination in Graphs [Volume 9, Issue 3, 2021, Pages 125-131]
  • Domination number k-Adjacency Domination in Graphs [Volume 9, Issue 3, 2021, Pages 125-131]
  • DoS attack Intrusion Detection in Computer Networks using Decision Tree and Feature Reduction [Volume 9, Issue 3, 2021, Pages 99-108]
  • DoS attacks Cyber disruption in the hierarchical control of intelligent microgrid power sharing [Volume 11, Issue 4, 2023]
  • Doubleround(x) Function An Efficient Visual Multi-Secret Sharing Scheme [Volume 3, Issue 4, 2015, Pages 1-9]
  • Double-slit Experiment A New Approach for Estimating the Rate of Emission in Quantum Bit Exchange‏ ‎Systems ‎Using Binomial Distribution [Volume 7, Issue 1, 2019, Pages 105-112]
  • Dragonfly Algorithm A model for Multi-Class Intrusion Detection Using the Dragonfly Feature Selection by Learning on the KDD-CUP99 Dataset [Volume 10, Issue 3, 2022, Pages 33-42]
  • Dragonfly Optimization Algorithm Providing a behavioral malware detection system based on the function of hardware counters using a neural network optimized with a dragonfly algorithm [Volume 9, Issue 2, 2021, Pages 9-16]
  • Drone . Deep learnings Providing an Improved Unmanned Aerial Vehicle Detection System to Increase Detection speed Using Deep Learning [Volume 11, Issue 1, 2023, Pages 81-96]
  • Drones Motion-encoded Gravitational Search Algorithm for moving target search using UAVs [Volume 10, Issue 4, 2022, Pages 63-73]
  • DS/CDMA Using Generalized Entropy Approach for Blind Estimation of the Length of Spreading Sequences in Code Division Multiple Access Systems [Volume 8, Issue 3, 2020, Pages 53-61]
  • Dynamic Differential Logic Side-Channel Attack Resistance Approaches Through Dynamic Differential Logic [Volume 7, Issue 3, 2019, Pages 93-104]
  • Dynamic Graph Anomaly Detection in Dynamic Social Networks Based on Behavioral Measurements [Volume 9, Issue 1, 2021, Pages 115-123]
  • Dynamic priority A New Scheduling Algorithm to Reduce Computation Time in Hadoop Environment [Volume 8, Issue 2, 2020, Pages 51-59]
  • Dynamic Query Syntax and Semantic Analysis for SQL-Injection Attacks [Volume 2, Issue 1, 2014, Pages 83-97]

E

  • EAP Protocol Secure and Fast Re-authentication Protocol to Support Extensive Movement of Users in IEEE 802.1X Wireless Networks [Volume 3, Issue 4, 2015, Pages 71-80]
  • Eclipsing Pulse An Integrated Algorithm for Optimal Detection of Weak Radar Targets Masked by the Sidelobes of a Strong Target [Volume 6, Issue 4, 2018, Pages 91-104]
  • Edge dominating set Generating Tree Decomposition of Graphs with Imperialist Competitive Algorithm for Use in Secret Sharing Scheme [Volume 7, Issue 3, 2019, Pages 105-111]
  • Effective Base Approach Evaluation of Network-Based Operation Criteria Based on DEMATEL Method [Volume 7, Issue 1, 2019, Pages 139-153]
  • Effective Options The Improvement of the GMCR Model Based on Statistical Analysis of the Game’ Graph (Case Study: Malwares and Countermeasures Actions Based on Detection-Independent and Deductive Evidence) [Volume 9, Issue 4, 2021, Pages 99-123]
  • Effective Test Cases A novel way to identify effective test-case in software testing [Volume 11, Issue 2, 2023, Pages 103-116]
  • EGSO algorithm Providing a Method for the Optimal Detection of Software Testing Paths Using Meta-Algorithms [Volume 6, Issue 4, 2018, Pages 13-22]
  • E-Health A secure three factor authentication scheme for wireless healthcare sensor networks based on elliptic curve [Volume 8, Issue 1, 2020, Pages 147-167]
  • Elasticity Resource Elasticity Management using Fuzzy Controller Based on Threshold Changes in the Cloud Computing Environment [Volume 8, Issue 3, 2020, Pages 63-81]
  • Electroencephalogram Guilty Knowledge Test by Chaotic Processing of Electroencephalogram Signals Based on Fuzzy Recurrence Plot [Volume 10, Issue 2, 2022, Pages 87-104]
  • Electronic health A Novel and Secure Model for Sharing Protected Health Record (PHR) Based on Blockchain and Attribute Based Encryption [Volume 8, Issue 1, 2020, Pages 101-124]
  • Electronic Payment Design a Blockchain based Electronic Payment with Users’ Anonymity [Volume 9, Issue 2, 2021, Pages 85-100]
  • Electronic voting A Fast Method for Computation of Scalar Multiplication of Elliptic Curve Suitable for Elliptic Curve Cryptography System [Volume 3, Issue 3, 2015, Pages 9-17]
  • Electronic Warfare The Presentation of a Model for Analyzing the Behavior of the Enemy Using Hidden Markov Models Based on Electronic Warfare Observations in Complex War Scenes [Volume 7, Issue 1, 2019, Pages 113-128]
  • Elliptic Curve Cryptography A Fast Method for Computation of Scalar Multiplication of Elliptic Curve Suitable for Elliptic Curve Cryptography System [Volume 3, Issue 3, 2015, Pages 9-17]
  • Embed Capacity Increasing Insertion Capacity and Resistance in Image Steganography Based on Mapping and Bits Reduction [Volume 7, Issue 2, 2019, Pages 33-39]
  • Embedding Data Robust Steganography Algorithm Text in the Image Using A Spread Spectrum Method [Volume 2, Issue 3, 2014, Pages 77-83]
  • Encoding Finite Frame as Code: Some Characterizations for Error Correction Codes and Three Algorithms for Troubleshooting in Data Transfer [Volume 7, Issue 2, 2019, Pages 1-12]
  • Encryption A New Method for Combining the Channel Coding with Polar Coding-Based Encryption [Volume 4, Issue 1, 2016, Pages 1-8]
  • Encryption Hierarchical Fuzzy Identity-Based Encryption [Volume 6, Issue 3, 2018, Pages 35-44]
  • End to end delay A new analytical model for enhancing performance of cognitive radio user’s transmissions in the internet of things [Volume 9, Issue 3, 2021, Pages 73-82]
  • Enemy’s Behavior Analysis Model The Presentation of a Model for Analyzing the Behavior of the Enemy Using Hidden Markov Models Based on Electronic Warfare Observations in Complex War Scenes [Volume 7, Issue 1, 2019, Pages 113-128]
  • Energy Detector Frequency Spectrum Sensing by Multi-Stage Adaptive Optimization Algorithm with the Efficient Non-Cooperative Technique in Cognitive radios with hardware implementation [Volume 8, Issue 3, 2020, Pages 39-51]
  • Energy harvesting Energy-Harvesting Aware Multi-Hop Routing in Wireless Sensor Networks for Defense Applications [Volume 8, Issue 4, 2020, Pages 63-73]
  • Ensemble Learning Detection of Unknown Malicious Network Streams using Ensemble Learning [Volume 6, Issue 2, 2018, Pages 93-108]
  • Ensemble Learning Developing an Improved Method for Malware Attack Detection in Cloud Computing using Ensemble Learning [Volume 10, Issue 4, 2022, Pages 33-39]
  • Ensemble method DDoS Attack Detection System Using Ensemble Method Classification and Active Learning Approach [Volume 11, Issue 3, 2023, Pages 101-118]
  • Environmental Evidence A Framework for Evaluating Malware and Countermeasures with an Analytical Approach based on the Game Theory Case Study: Actors' Actions Based on Environmental Evidence [Volume 10, Issue 1, 2022, Pages 47-71]
  • Environment-aware malware An Effective Method to Detect Environment-Aware Malware Based on the Behavioral Distances Comparison [Volume 6, Issue 4, 2018, Pages 123-133]
  • Epidemic Phenomena Modeling A Software System for Large-Scale Simulation of Malware Propagation in Computer Networks [Volume 7, Issue 2, 2019, Pages 53-67]
  • Error Bit Rate Steganography on raw video based on proper detection and compromise between the parameters of transparency, resistance and capacity [Volume 8, Issue 1, 2020, Pages 51-65]
  • ESM Robust Adaptive Beamforming Against Interferer’s Direction Of Arrival Estimation Error [Volume 7, Issue 3, 2019, Pages 27-36]
  • ESprite A Combined Improved Algorithm to Estimating The delay of Sky waves In Loran c Receiver [Volume 2, Issue 4, 2014, Pages 55-63]
  • Euclidean Distance Modular human face recognition method based on principal component analysis and Mahalanobis distance [Volume 11, Issue 4, 2023]
  • Evaluation A method for quantitative evaluation of security risk in cyber-physical systems [Volume 11, Issue 2, 2023, Pages 71-80]
  • Event Detection Presentation of a model for feasibility assessment of implementing the IoT social network projects using the existing public social networks as the infrastructure [Volume 10, Issue 1, 2022, Pages 73-84]
  • Event prediction Presentation of a model for feasibility assessment of implementing the IoT social network projects using the existing public social networks as the infrastructure [Volume 10, Issue 1, 2022, Pages 73-84]
  • Evolutionary Algorithm Reducing Interference Effect on GPS Navigation System Using Evolutionary Notch Filter [Volume 8, Issue 4, 2020, Pages 95-106]
  • Executable file Kashef: A Two-step detector of Windows-based Malicious executable files [Volume 10, Issue 2, 2022, Pages 143-156]
  • Expected Number of Transmissions Performance Analysis of Hybrid FSO/RF Systems Using the ℳ Distribution and Markov Function [Volume 10, Issue 2, 2022, Pages 1-10]
  • Expert The Distributed Denial of Service Attacks Situation Awareness Based on The Prediction of Battle Scene Using Dempster-Shefer Evidences Theories and Bayesian Rules [Volume 7, Issue 1, 2019, Pages 77-94]
  • Exploit Automated Exploit Generation For Application’s Vulnerability [Volume 4, Issue 1, 2016, Pages 35-50]
  • Exploitation Automatic XSS Exploit Generation Using Grammatical Evolution [Volume 9, Issue 2, 2021, Pages 101-119]
  • Exposed SCEIRS information dissemination model based on rumor spreading in complex networks [Volume 9, Issue 2, 2021, Pages 121-134]
  • Extended Kalman Filter Target Tracking Algorithm in Wireless Sensor Networks with Optimum Power Consumption Using Quantized Observation [Volume 6, Issue 2, 2018, Pages 109-121]

F

  • Face recognition Fixing Security Defects of Video Authentication Systems with Face Recognition, Based on 3D Structure and Shape Evaluation [Volume 9, Issue 4, 2021, Pages 141-145]
  • Face recognition Modular human face recognition method based on principal component analysis and Mahalanobis distance [Volume 11, Issue 4, 2023]
  • Face recongnition Applying weighted smoothed norm in sparse representation classification for face recognition [Volume 11, Issue 3, 2023, Pages 57-65]
  • Fake accounts The enhancement of online social network security by detecting and preventing fake accounts through machine learning [Volume 10, Issue 1, 2022, Pages 85-97]
  • False Alarm Rate A New Hybrid Approach for Traffic Identification and Classification in Wireless Networks [Volume 10, Issue 2, 2022, Pages 31-41]
  • False data A survey on detecting false data injection in power systems with auto-encoder based deep learning methods [Volume 10, Issue 2, 2022, Pages 11-17]
  • False Hit An Approach to Dependability Enhancement of Cache Memories [Volume 10, Issue 1, 2022, Pages 1-10]
  • FA-MABC Algorithm A novel way to identify effective test-case in software testing [Volume 11, Issue 2, 2023, Pages 103-116]
  • Fano Algorithm Sequential Decoding Algorithms of Convolutional Codes: Implementation, Improvement and Comparison [Volume 3, Issue 2, 2015, Pages 61-73]
  • Farsnet An Approach Based on Semantic Similarity in Persian Query-Based Summarization [Volume 2, Issue 3, 2014, Pages 51-63]
  • Fault Tolerance A Fault Tolerant Task Scheduling Method for Optimal use of Resources in Cloud Computing Environment [Volume 8, Issue 2, 2020, Pages 95-103]
  • Feature Extraction Detecting of Botnets’ Malicious Domains with Deep Autoencoder Neural Network [Volume 9, Issue 1, 2021, Pages 61-74]
  • Feature Extraction Kavosh: Offering an Analysis Method and the Impact of Normal Network Traffic on Selection and Extraction Based on the Minkowski Distance [Volume 9, Issue 1, 2021, Pages 137-147]
  • Feature Extraction Providing a new solution to botnet detection in a Markov chain-based network [Volume 9, Issue 3, 2021, Pages 59-71]
  • Feature Extraction Identify malicious traffic on IoT infrastructure using neural networks and deep learning [Volume 11, Issue 2, 2023, Pages 1-13]
  • Feature Extraction Applying weighted smoothed norm in sparse representation classification for face recognition [Volume 11, Issue 3, 2023, Pages 57-65]
  • Feature Vector An Optimized Unsupervised Feature Selection Algorithm [Volume 3, Issue 3, 2015, Pages 1-7]
  • Feature Vector Selection An Optimized Unsupervised Feature Selection Algorithm [Volume 3, Issue 3, 2015, Pages 1-7]
  • Fire launching sites Modelling and Solving the Location Problem of Fire Launching Sites [Volume 6, Issue 3, 2018, Pages 45-57]
  • Fire launching sites Modelling and Solving the Location Problem of Fire Launching Sites [Volume 6, Issue 3, 2018, Pages 59-64]
  • Flow-level features DDoS Attack Detection System Using Ensemble Method Classification and Active Learning Approach [Volume 11, Issue 3, 2023, Pages 101-118]
  • Flow Rules An Accelerated Method for Rules Anomaly Detection in Software Defined Networks [Volume 8, Issue 4, 2020, Pages 31-39]
  • Flow Tables An Accelerated Method for Rules Anomaly Detection in Software Defined Networks [Volume 8, Issue 4, 2020, Pages 31-39]
  • Fog Computing The Presentation of a Hybrid Anomaly Detection Model Using Inverse Weight Clustering and Machine Learning in Cloud Environments [Volume 9, Issue 4, 2021, Pages 21-29]
  • Fog Computing The IoT Resource Allocation Improvement in Fog Computing Using Non-Cooperative Game Theory [Volume 9, Issue 4, 2021, Pages 147-158]
  • Foresight A Foresight Framework for Intrusion Response Systems in Computer Networks [Volume 6, Issue 3, 2018, Pages 13-34]
  • Forest Optimization Algorithm Improving mobile mass monitoring in the IoT environment based on Chaotic Fog Algorithm [Volume 11, Issue 3, 2023, Pages 77-88]
  • Forgeability Security Analysis and Improvement of an Intelligent Transportation System based on Certificateless Aggregate Signature [Volume 8, Issue 1, 2020, Pages 25-33]
  • Format String Errors The Impact of Security Mechanisms on Software Vulnerabilities [Volume 2, Issue 1, 2014, Pages 49-60]
  • Fourier Transform Enhancing E-Security by Inserting a Watermark Using the Combination of Genetic Algorithm and Tabu Search [Volume 8, Issue 3, 2020, Pages 25-37]
  • Fourth Generation (4G) Mobile Network Analyzing Security Challenges of LTE Networks, Obstacles and Opportunities of Network Localization Based on the Standard Platform [Volume 7, Issue 2, 2019, Pages 121-132]
  • FPGA Implementation Design and Implementation of a Physically Unclonable Function on FPGA [Volume 6, Issue 4, 2018, Pages 23-32]
  • FPGA Implementation Design and Production of Hardware Authentication Code Using Physically Unclonable Functions and a Random Number Generator on FPGA [Volume 7, Issue 4, 2019, Pages 37-50]
  • Fractional optimal control problem of time delay Cardinal Hermit functions and their application in solving the time-delay fractional optimal control problems [Volume 8, Issue 4, 2020, Pages 153-160]
  • Frame Finite Frame as Code: Some Characterizations for Error Correction Codes and Three Algorithms for Troubleshooting in Data Transfer [Volume 7, Issue 2, 2019, Pages 1-12]
  • Free-Space Optical Communication Introducing an Optimal Modulation Constellation, Resistant to Atmospheric Turbulence [Volume 8, Issue 2, 2020, Pages 115-124]
  • Free-Space Optical Communications (FSO) Performance Analysis of Free Space Optical Communication Links under M-PAM and M-PSK Modulations using Adaptive Power and Modulation Techniques [Volume 7, Issue 1, 2019, Pages 63-75]
  • Frequency Offset Blind Frequency Offset Estimation using Adaptive Algorithms in Non-Coherent OFDM Systems [Volume 3, Issue 4, 2015, Pages 61-70]
  • Frequency Selective Fading Blind symbol Rate estimation in multipath channels [Volume 10, Issue 3, 2022, Pages 59-66]
  • Frequency-Selective Multipath Channel Blind Frequency Offset Estimation using Adaptive Algorithms in Non-Coherent OFDM Systems [Volume 3, Issue 4, 2015, Pages 61-70]
  • Friendly jammer The Analysis and Design of Secure Wireless Networks in the Presence of Users with Different Security Needs Based on Covert Communication and Secure Transmission of Information Theory in the Presence of a Friendly Jammer [Volume 9, Issue 4, 2021, Pages 67-76]
  • FSM Simulation the modify FSM , in autotracking systems to Stabilization secure links of free space optical communications [Volume 2, Issue 1, 2014, Pages 61-69]
  • FSO Simulation the modify FSM , in autotracking systems to Stabilization secure links of free space optical communications [Volume 2, Issue 1, 2014, Pages 61-69]
  • FTTx A Techno-Economic Model of Sustainable Communication Infrastructure in the Smart City; using WDM-PON FTTx [Volume 9, Issue 1, 2021, Pages 149-156]
  • Fusion Evaluation Criterion Improving the Quality of Millimeter Wave Images by Fusion with Visible Images [Volume 9, Issue 4, 2021, Pages 77-86]
  • Fuzzer Automatic XSS Exploit Generation Using Grammatical Evolution [Volume 9, Issue 2, 2021, Pages 101-119]
  • Fuzzing Evaluating Deep Learning Models for Test Data Generation In File Based Fuzzers [Volume 10, Issue 2, 2022, Pages 57-73]
  • Fuzz Testing Automatic Test Data Generation in File Format Fuzzers [Volume 8, Issue 1, 2020, Pages 1-16]
  • Fuzz Testing Automatic XSS Exploit Generation Using Grammatical Evolution [Volume 9, Issue 2, 2021, Pages 101-119]
  • Fuzzy and Probabilistic uncertainty Target Threat Assessment using Rule-Based Joint Fuzzy and Probabilistic Networks [Volume 6, Issue 4, 2018, Pages 61-78]
  • Fuzzy Best-Worst Multi-Criteria method A framework for assessing cyber security and privacy threats and investigating their impact on smart city performance [Volume 10, Issue 3, 2022, Pages 77-91]
  • Fuzzy Cognitive Map Target Threat Assessment using Rule-Based Joint Fuzzy and Probabilistic Networks [Volume 6, Issue 4, 2018, Pages 61-78]
  • Fuzzy Cognitive Map Effects of Cyber Threats in IT Projects Using the Fuzzy Cognitive Mapping Approach [Volume 7, Issue 2, 2019, Pages 41-51]
  • Fuzzy control system Resource Elasticity Management using Fuzzy Controller Based on Threshold Changes in the Cloud Computing Environment [Volume 8, Issue 3, 2020, Pages 63-81]
  • Fuzzy Correlator A Comprehensive Semi-Suprvised Model for Collaborative Intrusion Detection Based on Network Behavior Profiling Using The Concept of Deep Learning and Fuzzy Correlation of Alerts along [Volume 9, Issue 3, 2021, Pages 165-186]
  • Fuzzy Delphi Method A framework for assessing cyber security and privacy threats and investigating their impact on smart city performance [Volume 10, Issue 3, 2022, Pages 77-91]
  • Fuzzy Identity-Based Hierarchical Fuzzy Identity-Based Encryption [Volume 6, Issue 3, 2018, Pages 35-44]
  • Fuzzy Inference Projection of Muli Stage Cyber Attack Based on Belief Model and Fuzzy Inference [Volume 3, Issue 2, 2015, Pages 13-28]
  • Fuzzy Logic A Fuzzy Trust Evaluation Model to Enhance Security of cloud System Entities with Petri Net [Volume 4, Issue 1, 2016, Pages 19-34]
  • Fuzzy Logic A model for feature selection in software fault prediction based on memetic algorithm and fuzzy logic [Volume 9, Issue 3, 2021, Pages 143-163]
  • Fuzzy Logic Energy Aware Routing in the Internet of Things using improved Grasshopper Metaheuristic Algorithm [Volume 11, Issue 1, 2023, Pages 15-29]
  • Fuzzy Logic Providing a routing method in Internet of Things networks based on fuzzy logic and clustering For use in smart transportatio [Volume 11, Issue 4, 2023]
  • Fuzzy Recurrence Plot Guilty Knowledge Test by Chaotic Processing of Electroencephalogram Signals Based on Fuzzy Recurrence Plot [Volume 10, Issue 2, 2022, Pages 87-104]
  • Fuzzy Search Fuzzy Keyword Search Scheme on an Encrypted Database in Cloud Computing Using Word Clustering [Volume 8, Issue 3, 2020, Pages 151-165]
  • Fuzzy System Improving mobile mass monitoring in the IoT environment based on Chaotic Fog Algorithm [Volume 11, Issue 3, 2023, Pages 77-88]

G

  • Gait Energy Image (GEI) An Improvement on the Identification via Gait Using the Genetic Algorithm [Volume 9, Issue 4, 2021, Pages 31-42]
  • Gama-Ray Imaging System The Design Process Reform of the Gama-ray Imaging System by using the Design Structure Matrix [Volume 6, Issue 3, 2018, Pages 95-106]
  • Game Theory A Decision-Making Model in a Cyber Conflicts Acted Upon Vulnerability, Based on Game Theoretic Analysis [Volume 6, Issue 2, 2018, Pages 21-28]
  • Game Theory Designing a combinatorial Image Steganography algorithm based on game theory [Volume 8, Issue 1, 2020, Pages 133-145]
  • Game Theory Classification of High Dimensional Imbalanced Dataset via Game Theory-based Generative Adversarial Networks [Volume 9, Issue 2, 2021, Pages 63-74]
  • Game Theory A Framework for Evaluating Malware and Countermeasures with an Analytical Approach based on the Game Theory Case Study: Actors' Actions Based on Environmental Evidence [Volume 10, Issue 1, 2022, Pages 47-71]
  • Game Theory The Improvement of the GMCR Model Based on Statistical Analysis of the Game’ Graph (Case Study: Malwares and Countermeasures Actions Based on Detection-Independent and Deductive Evidence) [Volume 9, Issue 4, 2021, Pages 99-123]
  • Game Theory A method to detect intrusion into the Internet of Things using the game theory [Volume 10, Issue 1, 2022, Pages 21-31]
  • Game Theory Clustering and Routing in Wireless Sensor Networks Using Multi-Objective Cuckoo Search and Game Theory [Volume 10, Issue 3, 2022, Pages 11-20]
  • Game Theory Routing and Buffer managment based on game theory in delay tolerant network [Volume 11, Issue 4, 2023, Pages 35-43]
  • Gamma-Gamma Distribution Introducing an Optimal Modulation Constellation, Resistant to Atmospheric Turbulence [Volume 8, Issue 2, 2020, Pages 115-124]
  • General Access Structure A Hash-Based Multi-Use Multi-Stage Secret Sharing Scheme with General Access Structure [Volume 6, Issue 3, 2018, Pages 107-115]
  • Generating Function An Efficient Visual Multi-Secret Sharing Scheme [Volume 3, Issue 4, 2015, Pages 1-9]
  • Generative Adversarial Networks Classification of High Dimensional Imbalanced Dataset via Game Theory-based Generative Adversarial Networks [Volume 9, Issue 2, 2021, Pages 63-74]
  • Genetic Algorithm (GA) An Improvement on the Identification via Gait Using the Genetic Algorithm [Volume 9, Issue 4, 2021, Pages 31-42]
  • Geometric methods Fixing Security Defects of Video Authentication Systems with Face Recognition, Based on 3D Structure and Shape Evaluation [Volume 9, Issue 4, 2021, Pages 141-145]
  • Geometric secrecy Security Evaluation of Mutual Random Phase Injection Scheme for Secret Key Generation over Static Point-to-Point Communications [Volume 10, Issue 2, 2022, Pages 19-30]
  • Geometric spanners A Greedy Algorithm for Constructing Region-Fault Tolerant Geometric Spanners [Volume 10, Issue 4, 2022, Pages 75-80]
  • Global Positioning System Reducing the Effects of Deception Attack on GPS Receivers of Phasor Measurement Units using Neural Networks [Volume 11, Issue 1, 2023, Pages 97-105]
  • GPS Detection of Spoofing Attack Based on Multi-Layer Neural Network in Single-Frequency GPS Receivers [Volume 3, Issue 1, 2015, Pages 69-80]
  • GPS Enhancing Vector Tracking Accuracy of GPS in Weak Signal Condition Based on Adaptive Strong Tracking Kalman Filter​ [Volume 6, Issue 3, 2018, Pages 1-12]
  • GPS Reducing Interference Effect on GPS Navigation System Using Evolutionary Notch Filter [Volume 8, Issue 4, 2020, Pages 95-106]
  • GPS Improving INS/GPS Integration with Artificial Intelligence during GPS Outage [Volume 9, Issue 2, 2021, Pages 143-157]
  • GPS Receiver A New Method for Cancelling CW Jamming in GPS Receivers [Volume 4, Issue 1, 2016, Pages 69-79]
  • GPS Receiver GPS Spoofing Mitigation using Adaptive Estimator in Tracking Loop [Volume 6, Issue 3, 2018, Pages 65-80]
  • GPS Receiver Reducing Interference Effect on GPS Receiver by Using Multi-correlation Architecture [Volume 9, Issue 3, 2021, Pages 49-57]
  • GPS Spoofing Defense Against Spoofing in GPS Receiver using Correlation and Least Mean Squares Method Based on Sign-Data Algorithm [Volume 3, Issue 4, 2015, Pages 11-22]
  • Grammatical Evolution Automatic XSS Exploit Generation Using Grammatical Evolution [Volume 9, Issue 2, 2021, Pages 101-119]
  • Graph k-Adjacency Domination in Graphs [Volume 9, Issue 3, 2021, Pages 125-131]
  • Graph Analysis Detecting Fake Accounts in Social Networks Using Principal Components Analysis and Kernel Density Estimation Algorithm (A Case Study on the Twitter Social Network) [Volume 9, Issue 3, 2021, Pages 109-123]
  • Graph Anonymization An Improved Method for Graph Data Anonymization with Emphasis on Preserving the Average Path length [Volume 7, Issue 2, 2019, Pages 25-32]
  • Graph-based Transform(GBT) Transparent and Robust Audio Watermarking Using Synergy LU Decomposition and the Fibonacci Sequence in GBT-DCT-DWT Transforms [Volume 9, Issue 1, 2021, Pages 101-113]
  • Graph mining Hybrid Anomaly detection method using community detection in graph and feature selection [Volume 8, Issue 1, 2020, Pages 17-24]
  • Graph Model A Framework for Evaluating Malware and Countermeasures with an Analytical Approach based on the Game Theory Case Study: Actors' Actions Based on Environmental Evidence [Volume 10, Issue 1, 2022, Pages 47-71]
  • Graph Model The Improvement of the GMCR Model Based on Statistical Analysis of the Game’ Graph (Case Study: Malwares and Countermeasures Actions Based on Detection-Independent and Deductive Evidence) [Volume 9, Issue 4, 2021, Pages 99-123]
  • Graph Theory Concurrent Detection of Compact Anomalous Subgraphs in Large Social Networks [Volume 9, Issue 2, 2021, Pages 179-194]
  • Grasshopper Optimization Algorithm Energy Aware Routing in the Internet of Things using improved Grasshopper Metaheuristic Algorithm [Volume 11, Issue 1, 2023, Pages 15-29]
  • Gravitational Search Algorithm Motion-encoded Gravitational Search Algorithm for moving target search using UAVs [Volume 10, Issue 4, 2022, Pages 63-73]
  • Greedy algorithm A Greedy Algorithm for Constructing Region-Fault Tolerant Geometric Spanners [Volume 10, Issue 4, 2022, Pages 75-80]
  • Grey Wolf Optimization Algorithm An Optimized Compound Deep Neural Network Integrating With Feature Selection for Intrusion Detection System in Cyber Attacks [Volume 10, Issue 4, 2022, Pages 41-51]
  • GSM Network Prediction of Plaintext in GSM Network using SDCCH Logical Channel [Volume 9, Issue 3, 2021, Pages 39-47]
  • Guilty Knowledge Test Guilty Knowledge Test by Chaotic Processing of Electroencephalogram Signals Based on Fuzzy Recurrence Plot [Volume 10, Issue 2, 2022, Pages 87-104]

H

  • Hadoop scheduling A New Scheduling Algorithm to Reduce Computation Time in Hadoop Environment [Volume 8, Issue 2, 2020, Pages 51-59]
  • Hamming distance An Approach to Dependability Enhancement of Cache Memories [Volume 10, Issue 1, 2022, Pages 1-10]
  • Hamming distance Presenting A Method Based on Nearest Neighbors and Hamming Distance in Order to Identify Malicious Applications [Volume 11, Issue 2, 2023, Pages 81-90]
  • Handshake Secure and Efficient 4-way Handshake in Smart Grid to DoS Attacks Mitigation [Volume 4, Issue 1, 2016, Pages 9-17]
  • Hard and Soft Data Fusion A New Method for Image Steganography Using Discrete Wavelet Transforms [Volume 7, Issue 4, 2019, Pages 79-89]
  • Hardware Chips Side Channel Analysis of International Data Encryption Algorithm (IDEA) [Volume 7, Issue 4, 2019, Pages 51-57]
  • Hardware Counters Providing a behavioral malware detection system based on the function of hardware counters using a neural network optimized with a dragonfly algorithm [Volume 9, Issue 2, 2021, Pages 9-16]
  • Hardware Security Design and Implementation of a Physically Unclonable Function on FPGA [Volume 6, Issue 4, 2018, Pages 23-32]
  • Hardware Security Design and Production of Hardware Authentication Code Using Physically Unclonable Functions and a Random Number Generator on FPGA [Volume 7, Issue 4, 2019, Pages 37-50]
  • Harmony search algorithm Optimal Placement of Cameras to Maximize Visual Coverage using Genetic Algorithm and Harmony Search [Volume 7, Issue 1, 2019, Pages 49-61]
  • Hash Function Secure and Efficient 4-way Handshake in Smart Grid to DoS Attacks Mitigation [Volume 4, Issue 1, 2016, Pages 9-17]
  • Hash Function A Hash-Based Multi-Use Multi-Stage Secret Sharing Scheme with General Access Structure [Volume 6, Issue 3, 2018, Pages 107-115]
  • Hash Function Improvement of Rotational Cryptanalysis of Shabal and Cubehash Hash Functions [Volume 9, Issue 1, 2021, Pages 91-100]
  • Heap Automated Exploit Generation For Application’s Vulnerability [Volume 4, Issue 1, 2016, Pages 35-50]
  • Hermite pulse shaping filter A new method for data transmission in shallow water channel based on offset multi-carrier filter bank [Volume 11, Issue 3, 2023, Pages 25-34]
  • Hidden Markov Models The Presentation of a Model for Analyzing the Behavior of the Enemy Using Hidden Markov Models Based on Electronic Warfare Observations in Complex War Scenes [Volume 7, Issue 1, 2019, Pages 113-128]
  • Hidden State Hellman Chains Analysis Base on Graph of Random Function [Volume 4, Issue 1, 2016, Pages 81-89]
  • Hierarchical Hierarchical Fuzzy Identity-Based Encryption [Volume 6, Issue 3, 2018, Pages 35-44]
  • High Maneuvering Target Tracking High Maneuvering Target Tracking Based on Augmented State Method using Adaptive Unscented Kalman Filter [Volume 7, Issue 2, 2019, Pages 93-108]
  • Homogeneous linear recursion A novel lossless color secret image sharing based on homogeneous linear recursion [Volume 10, Issue 3, 2022, Pages 107-118]
  • Honeynet Detection of Unknown Malicious Network Streams using Ensemble Learning [Volume 6, Issue 2, 2018, Pages 93-108]
  • Honeypot A cooperative and independent deception system in the active cyber defense system [Volume 10, Issue 2, 2022, Pages 129-142]
  • Hooking A Secure Environment for Behavioral Malware Analysis [Volume 2, Issue 3, 2014, Pages 65-76]
  • Hybrid algorithm A New Scheduling Algorithm to Reduce Computation Time in Hadoop Environment [Volume 8, Issue 2, 2020, Pages 51-59]
  • Hybrid Approach in Machine Learning A New Hybrid Approach for Traffic Identification and Classification in Wireless Networks [Volume 10, Issue 2, 2022, Pages 31-41]
  • Hybrid cloud Secure and confidential workflow scheduling in hybrid cloud using improved particle swarm optimization algorithm [Volume 7, Issue 4, 2019, Pages 131-145]
  • Hybrid FSO/RF Performance Analysis of Hybrid FSO/RF Systems Using the ℳ Distribution and Markov Function [Volume 10, Issue 2, 2022, Pages 1-10]
  • Hyper-parameter Optimization An Optimized Compound Deep Neural Network Integrating With Feature Selection for Intrusion Detection System in Cyber Attacks [Volume 10, Issue 4, 2022, Pages 41-51]

I

  • Identifying Misbehaving Users Reducing the Destructive Effect of Misbehaving Users in Cooperative Spectrum Sensing using Reinforcement Learning [Volume 10, Issue 4, 2022, Pages 1-9]
  • IDS The Presentation of a Hybrid Anomaly Detection Model Using Inverse Weight Clustering and Machine Learning in Cloud Environments [Volume 9, Issue 4, 2021, Pages 21-29]
  • IEEE 802.15.4 Enhance Media Access Control in IEEE 802.15.4 Based Smart Grids using Swarm Intelligence Algorithms [Volume 7, Issue 3, 2019, Pages 9-20]
  • IFFT A Combined Improved Algorithm to Estimating The delay of Sky waves In Loran c Receiver [Volume 2, Issue 4, 2014, Pages 55-63]
  • Image authentication Detection of Median Filtering Manipulation in Compressed Images [Volume 7, Issue 3, 2019, Pages 121-129]
  • Image Classification Classification of High Dimensional Imbalanced Dataset via Game Theory-based Generative Adversarial Networks [Volume 9, Issue 2, 2021, Pages 63-74]
  • Image Compressing Standard An Optimized Unsupervised Feature Selection Algorithm [Volume 3, Issue 3, 2015, Pages 1-7]
  • Image Encryption Non-Performance of Pearson Correlation Coefficient for Evaluating Image Encryption Security [Volume 6, Issue 2, 2018, Pages 83-91]
  • Image Encryption An Image Encryption Algorithm Based on the Sn Permutation Group and Chaotic Functions [Volume 8, Issue 3, 2020, Pages 139-150]
  • Image Forensics Detection of Median Filtering Manipulation in Compressed Images [Volume 7, Issue 3, 2019, Pages 121-129]
  • Image forgery detection Forgery detection in digital images using the hybrid deep learning method [Volume 11, Issue 4, 2023]
  • Image Fusion Improving the Quality of Millimeter Wave Images by Fusion with Visible Images [Volume 9, Issue 4, 2021, Pages 77-86]
  • Image Processing Robust Steganography Algorithm Text in the Image Using A Spread Spectrum Method [Volume 2, Issue 3, 2014, Pages 77-83]
  • Image Processing Real-time Topology-based Tracking of Microscopic Objects [Volume 9, Issue 3, 2021, Pages 1-20]
  • Image Processing Improve the detection of dangerous objects in x-ray images in security and military inspections using image processing approaches [Volume 10, Issue 4, 2022, Pages 81-89]
  • Imbalanced Data Detection of Unknown Malicious Network Streams using Ensemble Learning [Volume 6, Issue 2, 2018, Pages 93-108]
  • Imbalanced Dataset Classification of High Dimensional Imbalanced Dataset via Game Theory-based Generative Adversarial Networks [Volume 9, Issue 2, 2021, Pages 63-74]
  • Impact projection A new architecture for impact projection of cyber-attacks based on high level information fusion in cyber command and control [Volume 2, Issue 4, 2014, Pages 1-14]
  • Imperialist Competitive Algorithm (ICA) Generating Tree Decomposition of Graphs with Imperialist Competitive Algorithm for Use in Secret Sharing Scheme [Volume 7, Issue 3, 2019, Pages 105-111]
  • Impossible Differential Attack Analysis of Impossible Differential on LowMC Block Cipher [Volume 7, Issue 2, 2019, Pages 69-79]
  • IMU Three-Dimensional Angles Measurement using IME based on MEMS Technology by Adaptive Kalman Filter [Volume 7, Issue 2, 2019, Pages 81-91]
  • Incremental Online Learning A Comprehensive Semi-Suprvised Model for Collaborative Intrusion Detection Based on Network Behavior Profiling Using The Concept of Deep Learning and Fuzzy Correlation of Alerts along [Volume 9, Issue 3, 2021, Pages 165-186]
  • Index Search Optimum Parameter Selection for Rainbow Table TMTO Attack Considering Breaking Time and Using Sequential and Index Search Methods [Volume 3, Issue 3, 2015, Pages 49-57]
  • Industrial Control Systems Security Prioritizing Obstacles to Industrial Control Systems Security Management Implementation, using Interpretive Structural Modeling (ISM) Approach [Volume 7, Issue 2, 2019, Pages 109-119]
  • Influence Identifying Influential Nodes in Social Networks by Integrating the Centrality Method and Node Activity [Volume 8, Issue 3, 2020, Pages 1-11]
  • Influence maximization A Dynamic Metaheuristic Algorithm for Influence Maximization in Social Networks [Volume 11, Issue 2, 2023, Pages 57-69]
  • Influence Maximization (IM) Identifying Influential Nodes in Social Networks by Integrating the Centrality Method and Node Activity [Volume 8, Issue 3, 2020, Pages 1-11]
  • Influential Nodes Identifying Influential Nodes in Social Networks by Integrating the Centrality Method and Node Activity [Volume 8, Issue 3, 2020, Pages 1-11]
  • Information Fusion A new architecture for impact projection of cyber-attacks based on high level information fusion in cyber command and control [Volume 2, Issue 4, 2014, Pages 1-14]
  • Information Hiding Side-Channel Attack Resistance Approaches Through Dynamic Differential Logic [Volume 7, Issue 3, 2019, Pages 93-104]
  • Information Index Non-Performance of Pearson Correlation Coefficient for Evaluating Image Encryption Security [Volume 6, Issue 2, 2018, Pages 83-91]
  • Information Ratio Some New Bounds on the Information Ratio of the Cartesian Product of Some Classes of Graphs [Volume 6, Issue 4, 2018, Pages 135-142]
  • Information Security Web Covert Timing Channel Detection based on Entropy [Volume 8, Issue 3, 2020, Pages 13-23]
  • Information Technology Project Effects of Cyber Threats in IT Projects Using the Fuzzy Cognitive Mapping Approach [Volume 7, Issue 2, 2019, Pages 41-51]
  • Information theoretic secrecy Information Theoretic Secret Key Agreement Based on Localization [Volume 8, Issue 2, 2020, Pages 35-49]
  • Information theory Using Generalized Entropy Approach for Blind Estimation of the Length of Spreading Sequences in Code Division Multiple Access Systems [Volume 8, Issue 3, 2020, Pages 53-61]
  • Initial State A New Method for Blind Recognition of the Initial State of Synchronous Scramblers When Located after the Channel Encoder [Volume 9, Issue 1, 2021, Pages 19-27]
  • INS Improving INS/GPS Integration with Artificial Intelligence during GPS Outage [Volume 9, Issue 2, 2021, Pages 143-157]
  • Integral characteristic Structural Analysis based on Integral Characteristic of a Reduced Round Block Cipher with Making an Improvement [Volume 7, Issue 3, 2019, Pages 1-8]
  • Intelligence Mobile Advertising and Electronic Commerce An Anti-Spam Framework for Advertising Targeting Smart Mobile Devices on IoT [Volume 6, Issue 2, 2018, Pages 65-81]
  • Intentional Interference Interference Mitigation in Cognitive Radio Communication Systems Based on the Wavelet Transform [Volume 9, Issue 4, 2021, Pages 55-66]
  • Inter-cluster routing Energy-Harvesting Aware Multi-Hop Routing in Wireless Sensor Networks for Defense Applications [Volume 8, Issue 4, 2020, Pages 63-73]
  • Interference Mitigation Interference Mitigation in Cognitive Radio Communication Systems Based on the Wavelet Transform [Volume 9, Issue 4, 2021, Pages 55-66]
  • Interfering Signals Detection Detection of Interfering Signals and Estimation of Their Carrier Frequency in CNC Satellite Communications using Cyclic Spectrum Density [Volume 11, Issue 2, 2023, Pages 91-101]
  • Intermediate Frequency Coefficients of the Wavelet Steganography on raw video based on proper detection and compromise between the parameters of transparency, resistance and capacity [Volume 8, Issue 1, 2020, Pages 51-65]
  • International Data Encryption Algorithm (IDEA) Side Channel Analysis of International Data Encryption Algorithm (IDEA) [Volume 7, Issue 4, 2019, Pages 51-57]
  • Internet of Things A Mutual Authentication Protocol for IoT Users in Cloud Environment [Volume 9, Issue 2, 2021, Pages 17-28]
  • Internet of Things A new analytical model for enhancing performance of cognitive radio user’s transmissions in the internet of things [Volume 9, Issue 3, 2021, Pages 73-82]
  • Internet of Things Presentation of a model for feasibility assessment of implementing the IoT social network projects using the existing public social networks as the infrastructure [Volume 10, Issue 1, 2022, Pages 73-84]
  • Internet of Things Energy Aware Routing in the Internet of Things using improved Grasshopper Metaheuristic Algorithm [Volume 11, Issue 1, 2023, Pages 15-29]
  • Internet of Things Improving mobile mass monitoring in the IoT environment based on Chaotic Fog Algorithm [Volume 11, Issue 3, 2023, Pages 77-88]
  • Internet of Things A recommender system using a support vector machine and the TOPSIS model in the Internet of Things [Volume 11, Issue 4, 2023]
  • Internet of Things Providing a routing method in Internet of Things networks based on fuzzy logic and clustering For use in smart transportatio [Volume 11, Issue 4, 2023]
  • Internet of Things (IoT) Real-time Topology-based Tracking of Microscopic Objects [Volume 9, Issue 3, 2021, Pages 1-20]
  • Internet service A recommender system using a support vector machine and the TOPSIS model in the Internet of Things [Volume 11, Issue 4, 2023]
  • Intra-pulse modulation Intra-pulse Modulation Recognition Using Time-Frequency Features Based on Modified-B Distribution [Volume 7, Issue 1, 2019, Pages 129-138]
  • Intrusion detection Web-based Military Management Systems Security Using Combination of One-class Classifiers [Volume 3, Issue 3, 2015, Pages 19-30]
  • Intrusion detection Improving Intrusion Detection System Using a New Feature Selection Technique [Volume 6, Issue 4, 2018, Pages 143-152]
  • Intrusion detection Intrusion Detection in Computer Networks using Decision Tree and Feature Reduction [Volume 9, Issue 3, 2021, Pages 99-108]
  • Intrusion detection A method to detect intrusion into the Internet of Things using the game theory [Volume 10, Issue 1, 2022, Pages 21-31]
  • Intrusion detection A model for Multi-Class Intrusion Detection Using the Dragonfly Feature Selection by Learning on the KDD-CUP99 Dataset [Volume 10, Issue 3, 2022, Pages 33-42]
  • Intrusion Detection System Sequential Forward Feature Selection for Intrusion Detection System, Using Ant Colony Algorithm [Volume 6, Issue 2, 2018, Pages 49-63]
  • Intrusion Detection System Network Intrusion Detection using a combination of artificial neural networks in a hierarchical manner [Volume 8, Issue 1, 2020, Pages 89-99]
  • Intrusion Detection System Detection of the Remote Code Execution Attacks Using the PHP Web Application Intrusion Detection System [Volume 10, Issue 2, 2022, Pages 75-85]
  • Intrusion Detection System Investigation of a new ensemble method of intrusion detection system on different data sets [Volume 10, Issue 3, 2022, Pages 43-57]
  • Intrusion Detection System An Optimized Compound Deep Neural Network Integrating With Feature Selection for Intrusion Detection System in Cyber Attacks [Volume 10, Issue 4, 2022, Pages 41-51]
  • Intrusion Response System A Foresight Framework for Intrusion Response Systems in Computer Networks [Volume 6, Issue 3, 2018, Pages 13-34]
  • Inverse Synthetic Aperture Radar (ISAR) Inverse Synthetic Aperture Radar (ISAR) Imaging of Targets with Non-Uniform Motion and Constant Acceleration based on Compressed Sensing [Volume 9, Issue 2, 2021, Pages 51-62]
  • IoT An Anti-Spam Framework for Advertising Targeting Smart Mobile Devices on IoT [Volume 6, Issue 2, 2018, Pages 65-81]
  • IoT The Presentation of a Hybrid Anomaly Detection Model Using Inverse Weight Clustering and Machine Learning in Cloud Environments [Volume 9, Issue 4, 2021, Pages 21-29]
  • IoT The IoT Resource Allocation Improvement in Fog Computing Using Non-Cooperative Game Theory [Volume 9, Issue 4, 2021, Pages 147-158]
  • IoT A method to detect intrusion into the Internet of Things using the game theory [Volume 10, Issue 1, 2022, Pages 21-31]
  • IoT Identify malicious traffic on IoT infrastructure using neural networks and deep learning [Volume 11, Issue 2, 2023, Pages 1-13]
  • ISCM Neural Network Improving the Quality of Millimeter Wave Images by Fusion with Visible Images [Volume 9, Issue 4, 2021, Pages 77-86]

J

  • Jitter Simulation and Evaluation of Jitter and Packet Loss Noises Influence on Covert Timing Channel Performance [Volume 2, Issue 3, 2014, Pages 35-49]
  • Jitter A cross layer approach for improving the TCP quality-of-service parameters over the IEEE 802.11.ac wireless networks [Volume 10, Issue 1, 2022, Pages 109-117]
  • Joint channel and data detection A New Method for Detection of Discrete Data Transmitted over Non-Linear Dynamic Wireless Channels [Volume 3, Issue 2, 2015, Pages 75-85]

K

  • KDD-CUP99 A model for Multi-Class Intrusion Detection Using the Dragonfly Feature Selection by Learning on the KDD-CUP99 Dataset [Volume 10, Issue 3, 2022, Pages 33-42]
  • KDD Cup99 dataset Intrusion Detection in Computer Networks using Decision Tree and Feature Reduction [Volume 9, Issue 3, 2021, Pages 99-108]
  • Key Agreement A secure three factor authentication scheme for wireless healthcare sensor networks based on elliptic curve [Volume 8, Issue 1, 2020, Pages 147-167]
  • Key exchange Secure and Efficient 4-way Handshake in Smart Grid to DoS Attacks Mitigation [Volume 4, Issue 1, 2016, Pages 9-17]
  • Key Management Analyzing Security Challenges of LTE Networks, Obstacles and Opportunities of Network Localization Based on the Standard Platform [Volume 7, Issue 2, 2019, Pages 121-132]
  • Key Rate A New Approach for Estimating the Rate of Emission in Quantum Bit Exchange‏ ‎Systems ‎Using Binomial Distribution [Volume 7, Issue 1, 2019, Pages 105-112]
  • Keyword Extraction Automatic Keyword Extraction from Persian short Text Using word2vec [Volume 8, Issue 2, 2020, Pages 105-114]
  • K-Nearest Neighbors Guilty Knowledge Test by Chaotic Processing of Electroencephalogram Signals Based on Fuzzy Recurrence Plot [Volume 10, Issue 2, 2022, Pages 87-104]

L

  • L1-norm Collusive Fraud Classification in Network of Online Auction Using Similarity Measure in Collective Classification [Volume 7, Issue 1, 2019, Pages 95-103]
  • Label Propagation Algorithm A Distributed Approach to Community Detection in Large Social Networks Based on Label Propagation [Volume 8, Issue 4, 2020, Pages 1-15]
  • Lanchester equation Developing a Threat-Tolerability Bilateral Concept within a Differential Game for the Analysis of the Insider/Adversary Behavior in Operational environment [Volume 11, Issue 2, 2023, Pages 15-29]
  • Large Scale Data Providing an Agent-Based Architecture for Semantic Mining From Large-Scale Data in Distributed Environments [Volume 8, Issue 3, 2020, Pages 83-99]
  • Latin square Quasi-transversals in Latin squares and k-domination in graphs [Volume 10, Issue 3, 2022, Pages 67-75]
  • Lattice Two Verifiable Multi-Secret Sharing Schemes: A Linear Scheme with Standard Security and A Lattice-Based Scheme [Volume 8, Issue 3, 2020, Pages 101-115]
  • Launch Pad A New Method to Evaluate the Launch Pad Lightning Protection System Performance by Using LPM in 3-D [Volume 3, Issue 1, 2015, Pages 15-27]
  • Layered approach Detection of the Remote Code Execution Attacks Using the PHP Web Application Intrusion Detection System [Volume 10, Issue 2, 2022, Pages 75-85]
  • Leader Progression Model A New Method to Evaluate the Launch Pad Lightning Protection System Performance by Using LPM in 3-D [Volume 3, Issue 1, 2015, Pages 15-27]
  • Learning Automata Reducing the Destructive Effect of Misbehaving Users in Cooperative Spectrum Sensing using Reinforcement Learning [Volume 10, Issue 4, 2022, Pages 1-9]
  • Learning Automata Distributed Solving of Weapon Target Assignment Problem using Learning Automata [Volume 11, Issue 1, 2023, Pages 47-55]
  • Level Crossing Rate Performance Analysis of Hybrid FSO/RF Systems Using the ℳ Distribution and Markov Function [Volume 10, Issue 2, 2022, Pages 1-10]
  • Lifi Optimal Design of Wireless Visible Light Communication Network with the Aim of Minimizing the Outage Probability at the Location of the Mobile Receiver [Volume 10, Issue 3, 2022, Pages 1-9]
  • Linear discriminant analysis (LDA) Fixing Security Defects of Video Authentication Systems with Face Recognition, Based on 3D Structure and Shape Evaluation [Volume 9, Issue 4, 2021, Pages 141-145]
  • Link prediction An Improved New Link Prediction Method in Social Multilplex Networks Based on the Gravitational Search Algorithm [Volume 8, Issue 2, 2020, Pages 15-24]
  • LMS and Sign-Data Algorithm Defense Against Spoofing in GPS Receiver using Correlation and Least Mean Squares Method Based on Sign-Data Algorithm [Volume 3, Issue 4, 2015, Pages 11-22]
  • Load Balancing Presentation and Performance Evaluation of an Efficient Algorithm for a Distributed Controller in SDN [Volume 9, Issue 1, 2021, Pages 175-183]
  • Localization Information Theoretic Secret Key Agreement Based on Localization [Volume 8, Issue 2, 2020, Pages 35-49]
  • Localization Wireless Target Localization Using Median Weighted Least Square Error Metric in the Presence of Non-Line of Sight Signals [Volume 8, Issue 2, 2020, Pages 125-133]
  • Localization Systems A Novel Algorithm for Radar Jamming Resource Allocation [Volume 7, Issue 3, 2019, Pages 53-70]
  • Local Positioning System Design and Simulation of a LORAN Signal Generator for LPS Transmitter Using Class I Amplifier [Volume 8, Issue 2, 2020, Pages 25-33]
  • Location Modelling and Solving the Location Problem of Fire Launching Sites [Volume 6, Issue 3, 2018, Pages 45-57]
  • Location Modelling and Solving the Location Problem of Fire Launching Sites [Volume 6, Issue 3, 2018, Pages 59-64]
  • Long Short Term Memory (LSTM) P2P Botnet Detection Using Deep Learning Method [Volume 8, Issue 2, 2020, Pages 1-14]
  • Loopy Belief Propagation Collusive Fraud Classification in Network of Online Auction Using Similarity Measure in Collective Classification [Volume 7, Issue 1, 2019, Pages 95-103]
  • LORAN signal Design and Simulation of a LORAN Signal Generator for LPS Transmitter Using Class I Amplifier [Volume 8, Issue 2, 2020, Pages 25-33]
  • LORAN Transmitter Reliability Analysis of Open-Loop Switching Loran Signal Generator Using Omoe Indicator [Volume 8, Issue 2, 2020, Pages 83-93]
  • Lossless recovery A novel lossless color secret image sharing based on homogeneous linear recursion [Volume 10, Issue 3, 2022, Pages 107-118]
  • Low-distortion Topology Optimal Design of Low-power High-resolution Unity-STF S-MASH Sigma Delta Modulator for Telecommunication Applications [Volume 7, Issue 2, 2019, Pages 13-24]
  • LowMC Block Cipher Analysis of Impossible Differential on LowMC Block Cipher [Volume 7, Issue 2, 2019, Pages 69-79]
  • LPS Design and Simulation of a LORAN Signal Generator for LPS Transmitter Using Class I Amplifier [Volume 8, Issue 2, 2020, Pages 25-33]
  • LSB Speech Steganalysis of Least Significant Bits Based on the Percentage of Equal Adjacent Samples [Volume 9, Issue 1, 2021, Pages 75-90]
  • LSTM neural network A way to predict the stock price of the Tehran Stock Exchange in relation to knowledge [Volume 10, Issue 4, 2022, Pages 91-100]
  • LTE Network Analyzing Security Challenges of LTE Networks, Obstacles and Opportunities of Network Localization Based on the Standard Platform [Volume 7, Issue 2, 2019, Pages 121-132]
  • LVQ Radar data processing using a combination of principal component analysis methods and self-organizing and digitized neural networks of the learning vector [Volume 9, Issue 2, 2021, Pages 1-7]
  • LWE Problem Two Verifiable Multi-Secret Sharing Schemes: A Linear Scheme with Standard Security and A Lattice-Based Scheme [Volume 8, Issue 3, 2020, Pages 101-115]

M

  • Machine Intelligence A Practical Template Attack Against the Implementation of the Advanced Encryption Standard on ARM Processor [Volume 7, Issue 1, 2019, Pages 39-48]
  • Machine Learning Introduction of the Entropy-Based Method for Finding Influential Nodes in Information Dissemination on Online Social Networks [Volume 6, Issue 2, 2018, Pages 1-10]
  • Machine Learning Blind Estimation of Number of Users in TDMA Networks Using Redundancy of Adaptive Channel Coding [Volume 6, Issue 2, 2018, Pages 11-20]
  • Machine Learning Improvement in the Ransomwares Detection Method With New API Calls Features [Volume 8, Issue 4, 2020, Pages 107-118]
  • Machine Learning Classification of High Dimensional Imbalanced Dataset via Game Theory-based Generative Adversarial Networks [Volume 9, Issue 2, 2021, Pages 63-74]
  • Machine Learning A method to prediction of software system’s code smells using neural network [Volume 11, Issue 3, 2023, Pages 67-76]
  • Machine Learning Algorithms Comparison of Supervised Machine Learning Algorithms in Detection of Botnets Domain Generation Algorithms [Volume 8, Issue 4, 2020, Pages 17-29]
  • MAG Architecture The Improvement of the GMCR Model Based on Statistical Analysis of the Game’ Graph (Case Study: Malwares and Countermeasures Actions Based on Detection-Independent and Deductive Evidence) [Volume 9, Issue 4, 2021, Pages 99-123]
  • Mahalanobis Distance Modular human face recognition method based on principal component analysis and Mahalanobis distance [Volume 11, Issue 4, 2023]
  • Malicious Attacks Covert and Secure Underwater Acoustic Communication using Merkle Hash Tree and Dolphin Whistle [Volume 6, Issue 2, 2018, Pages 135-146]
  • Malicious domain detection Malicious Domain Detection using DNS Records [Volume 9, Issue 3, 2021, Pages 83-97]
  • Malware A New Method For Gradual Detection of Environmental Conditions and Resources Required by Smart Malware [Volume 6, Issue 4, 2018, Pages 33-44]
  • Malware Providing a behavioral malware detection system based on the function of hardware counters using a neural network optimized with a dragonfly algorithm [Volume 9, Issue 2, 2021, Pages 9-16]
  • Malware Kashef: A Two-step detector of Windows-based Malicious executable files [Volume 10, Issue 2, 2022, Pages 143-156]
  • Malware Identify malicious traffic on IoT infrastructure using neural networks and deep learning [Volume 11, Issue 2, 2023, Pages 1-13]
  • Malware Presenting A Method Based on Nearest Neighbors and Hamming Distance in Order to Identify Malicious Applications [Volume 11, Issue 2, 2023, Pages 81-90]
  • Malware dentifying Zero Day Android Daily through Neural Networks [Volume 11, Issue 3, 2023, Pages 49-55]
  • Malware Analysis A Secure Environment for Behavioral Malware Analysis [Volume 2, Issue 3, 2014, Pages 65-76]
  • Malware Analysis A New Method For Gradual Detection of Environmental Conditions and Resources Required by Smart Malware [Volume 6, Issue 4, 2018, Pages 33-44]
  • Malware Analysis A Framework for Evaluating Malware and Countermeasures with an Analytical Approach based on the Game Theory Case Study: Actors' Actions Based on Environmental Evidence [Volume 10, Issue 1, 2022, Pages 47-71]
  • Malware Analysis The Improvement of the GMCR Model Based on Statistical Analysis of the Game’ Graph (Case Study: Malwares and Countermeasures Actions Based on Detection-Independent and Deductive Evidence) [Volume 9, Issue 4, 2021, Pages 99-123]
  • Malware attacks Developing an Improved Method for Malware Attack Detection in Cloud Computing using Ensemble Learning [Volume 10, Issue 4, 2022, Pages 33-39]
  • Malware Detection Kashef: A Two-step detector of Windows-based Malicious executable files [Volume 10, Issue 2, 2022, Pages 143-156]
  • Malware Detection A Malware Classification Method Using visualization and Word Embedding Features [Volume 11, Issue 1, 2023, Pages 1-13]
  • Malware Embedding A Malware Classification Method Using visualization and Word Embedding Features [Volume 11, Issue 1, 2023, Pages 1-13]
  • Malware Propagation Malware Propagation Modeling Considering Software Diversity Approach in Weighted Scale-Free Network [Volume 6, Issue 3, 2018, Pages 131-140]
  • Malware Propagation A Software System for Large-Scale Simulation of Malware Propagation in Computer Networks [Volume 7, Issue 2, 2019, Pages 53-67]
  • Malware Visualization A Malware Classification Method Using visualization and Word Embedding Features [Volume 11, Issue 1, 2023, Pages 1-13]
  • Mapping-Reduction Providing an Ontology-Based Method for Exploring the Association Rules in Multi-Agent Distributed Environments [Volume 9, Issue 1, 2021, Pages 1-17]
  • MapReduce scheduling A New Scheduling Algorithm to Reduce Computation Time in Hadoop Environment [Volume 8, Issue 2, 2020, Pages 51-59]
  • Markov Interference Mitigation in Cognitive Radio Communication Systems Based on the Wavelet Transform [Volume 9, Issue 4, 2021, Pages 55-66]
  • Markov Chain A new analytical model for enhancing performance of cognitive radio user’s transmissions in the internet of things [Volume 9, Issue 3, 2021, Pages 73-82]
  • Markov Chain Providing a new solution to botnet detection in a Markov chain-based network [Volume 9, Issue 3, 2021, Pages 59-71]
  • Markov Chain The Presentation of an Active Cyber Defense Model for Application in Cyber Deception Technology [Volume 9, Issue 4, 2021, Pages 125-140]
  • Markov Chaining Improvement of Rotational Cryptanalysis of Shabal and Cubehash Hash Functions [Volume 9, Issue 1, 2021, Pages 91-100]
  • Markov Decision Process A Foresight Framework for Intrusion Response Systems in Computer Networks [Volume 6, Issue 3, 2018, Pages 13-34]
  • Markov Random Field Collusive Fraud Classification in Network of Online Auction Using Similarity Measure in Collective Classification [Volume 7, Issue 1, 2019, Pages 95-103]
  • Masking A New And Efficient Method of Mass Masking and its Resistance Assessment to Power Analysis [Volume 6, Issue 2, 2018, Pages 123-134]
  • Matched Filter An Integrated Algorithm for Optimal Detection of Weak Radar Targets Masked by the Sidelobes of a Strong Target [Volume 6, Issue 4, 2018, Pages 91-104]
  • Matrix Finite Frame as Code: Some Characterizations for Error Correction Codes and Three Algorithms for Troubleshooting in Data Transfer [Volume 7, Issue 2, 2019, Pages 1-12]
  • Mean Squared Error Blind Frequency Offset Estimation using Adaptive Algorithms in Non-Coherent OFDM Systems [Volume 3, Issue 4, 2015, Pages 61-70]
  • Media Access Control Enhance Media Access Control in IEEE 802.15.4 Based Smart Grids using Swarm Intelligence Algorithms [Volume 7, Issue 3, 2019, Pages 9-20]
  • Median filter Detection of Median Filtering Manipulation in Compressed Images [Volume 7, Issue 3, 2019, Pages 121-129]
  • MEMS Three-Dimensional Angles Measurement using IME based on MEMS Technology by Adaptive Kalman Filter [Volume 7, Issue 2, 2019, Pages 81-91]
  • Merkle Hash Tree Covert and Secure Underwater Acoustic Communication using Merkle Hash Tree and Dolphin Whistle [Volume 6, Issue 2, 2018, Pages 135-146]
  • Meta- heuristic Security-aware Task Scheduling Algorithm based on Multi Adaptive Learning and PSO Technique [Volume 9, Issue 2, 2021, Pages 159-178]
  • Metaheuristic Algorithm Feature selection using a combination of Genetic-Whale-Ant colony algorithms for software fault prediction by machine learning [Volume 10, Issue 1, 2022, Pages 33-45]
  • Meta-Heuristic Algorithms Sonar Dataset Classification using Multi-Layer Perceptron Neural Network Based on Dragonfly and Moth Algorithms [Volume 10, Issue 3, 2022, Pages 21-31]
  • MICMAC Prioritizing Obstacles to Industrial Control Systems Security Management Implementation, using Interpretive Structural Modeling (ISM) Approach [Volume 7, Issue 2, 2019, Pages 109-119]
  • Microscopic Objects Real-time Topology-based Tracking of Microscopic Objects [Volume 9, Issue 3, 2021, Pages 1-20]
  • Middle Band Enhancing E-Security by Inserting a Watermark Using the Combination of Genetic Algorithm and Tabu Search [Volume 8, Issue 3, 2020, Pages 25-37]
  • Military Internet of Things A New Mechanism for Enhancing the Security of Military Internet of Things by Using Quantum and Classic Cryptography [Volume 9, Issue 2, 2021, Pages 29-49]
  • MILP A Techno-Economic Model of Sustainable Communication Infrastructure in the Smart City; using WDM-PON FTTx [Volume 9, Issue 1, 2021, Pages 149-156]
  • MIMO Identification of STBC-OFDM Signals by Second-Order Cyclostationarity Method [Volume 7, Issue 4, 2019, Pages 27-36]
  • MIMO interference channel Enhancing Communication Security in Cellular Communications Networks by using Interference Alignment Technique [Volume 3, Issue 2, 2015, Pages 49-60]
  • Minkowski Distance Kavosh: Offering an Analysis Method and the Impact of Normal Network Traffic on Selection and Extraction Based on the Minkowski Distance [Volume 9, Issue 1, 2021, Pages 137-147]
  • Mitigation Defense Against Spoofing in GPS Receiver using Correlation and Least Mean Squares Method Based on Sign-Data Algorithm [Volume 3, Issue 4, 2015, Pages 11-22]
  • Mixed Integer Linear Programming Upper Bounds for the Probability of Differential Characteristics of Five Block Cipher Constructions Functions [Volume 8, Issue 4, 2020, Pages 129-137]
  • Mobile Health A Scheme for Improvement of Security and Privacy in Mobile Health Systems by Using SIM Card [Volume 7, Issue 1, 2019, Pages 11-24]
  • Mobile Sink A Heuristic Data Diffusion and Gathering Scheme Using Virtual Line for Wireless Sensor Networks with Mobile Sink [Volume 9, Issue 2, 2021, Pages 195-207]
  • Mobile User Optimal Design of Wireless Visible Light Communication Network with the Aim of Minimizing the Outage Probability at the Location of the Mobile Receiver [Volume 10, Issue 3, 2022, Pages 1-9]
  • Mobile AD hoc Networks Performance Improvement of the ODMRP Protocol using Analysis of the Received Signal Strength Level [Volume 7, Issue 3, 2019, Pages 21-26]
  • Modeling of cyber-attacks Modeling of cyber-attacks obfuscation, based on alteration technique of attack [Volume 8, Issue 1, 2020, Pages 67-77]
  • Modified-B distribution Intra-pulse Modulation Recognition Using Time-Frequency Features Based on Modified-B Distribution [Volume 7, Issue 1, 2019, Pages 129-138]
  • Modular Addition Improvement of Rotational Cryptanalysis of Shabal and Cubehash Hash Functions [Volume 9, Issue 1, 2021, Pages 91-100]
  • Monitoring and electronic action A New Method in Wide Band Adaptive Beam Forming By Deep Learning Method In An Array System [Volume 11, Issue 3, 2023, Pages 35-47]
  • Multi-agent systems Distributed Solving of Weapon Target Assignment Problem using Learning Automata [Volume 11, Issue 1, 2023, Pages 47-55]
  • Multi Agent Systems Providing an Ontology-Based Method for Exploring the Association Rules in Multi-Agent Distributed Environments [Volume 9, Issue 1, 2021, Pages 1-17]
  • MultiAgent Systems Online Collaborative Planning in Complex Environment [Volume 2, Issue 4, 2014, Pages 15-23]
  • Multi-class A model for Multi-Class Intrusion Detection Using the Dragonfly Feature Selection by Learning on the KDD-CUP99 Dataset [Volume 10, Issue 3, 2022, Pages 33-42]
  • Multi-correlation Architecture Reducing Interference Effect on GPS Receiver by Using Multi-correlation Architecture [Volume 9, Issue 3, 2021, Pages 49-57]
  • Multi-Criteria Decision Making Evaluation of Network-Based Operation Criteria Based on DEMATEL Method [Volume 7, Issue 1, 2019, Pages 139-153]
  • Multi-Layer Perceptron Neural Network Providing a behavioral malware detection system based on the function of hardware counters using a neural network optimized with a dragonfly algorithm [Volume 9, Issue 2, 2021, Pages 9-16]
  • Multi-level PWM Reliability Analysis of Open-Loop Switching Loran Signal Generator Using Omoe Indicator [Volume 8, Issue 2, 2020, Pages 83-93]
  • Multimode fiber Sensing and detecting changes due to displacement, pressure, or dynamic vibration in an optical fiber, based on fiber Specklegram [Volume 11, Issue 3, 2023, Pages 89-99]
  • Multi Path Channel Blind symbol Rate estimation in multipath channels [Volume 10, Issue 3, 2022, Pages 59-66]
  • Multipath phenomena Coherent Acoustic source DOA estimation by nested array based on sparse solution [Volume 8, Issue 1, 2020, Pages 79-88]
  • Multiple Antennas Security of UAV Relay Networks based on Covert Communication in the Presence of an Eavesdropping UAV [Volume 11, Issue 2, 2023, Pages 45-56]
  • Multiple-Criteria/Attribute Decision-making The Course of Action Selection Model in Network Centric Operation [Volume 7, Issue 2, 2019, Pages 133-155]
  • Multiplex networks An Improved New Link Prediction Method in Social Multilplex Networks Based on the Gravitational Search Algorithm [Volume 8, Issue 2, 2020, Pages 15-24]
  • Multiplier The residue number system component design based on OneHot coding [Volume 10, Issue 1, 2022, Pages 119-133]
  • Multi-stage A Hash-Based Multi-Use Multi-Stage Secret Sharing Scheme with General Access Structure [Volume 6, Issue 3, 2018, Pages 107-115]
  • Multi-Step Attacks A Security Model Based Approach for Dynamic Risk Assessment of Multi-Step Attacks in Computer Networks [Volume 9, Issue 1, 2021, Pages 157-173]
  • Multitarget tracking On Improvement of Cardinalized Probability Hypothesis Density Filter Implementation by using Auxiliary Particle Filter [Volume 3, Issue 4, 2015, Pages 23-41]
  • Multi-use A Hash-Based Multi-Use Multi-Stage Secret Sharing Scheme with General Access Structure [Volume 6, Issue 3, 2018, Pages 107-115]
  • Multi – Stage Modeling of Obfuscated Multi- Stage cyber Attacks [Volume 8, Issue 2, 2020, Pages 61-73]
  • Music A Combined Improved Algorithm to Estimating The delay of Sky waves In Loran c Receiver [Volume 2, Issue 4, 2014, Pages 55-63]
  • Mutation Testing A novel way to identify effective test-case in software testing [Volume 11, Issue 2, 2023, Pages 103-116]
  • Mutipath Channel A New Metric for Estimation the User Position in the Multi User OFDMA Networks [Volume 2, Issue 3, 2014, Pages 1-11]
  • Mutual Authentication A Mutual Anonymity Private Authentication Protocol to Use in Radio-Frequency Identification Systems [Volume 6, Issue 4, 2018, Pages 45-59]
  • Mutual Information An Optimized Compound Deep Neural Network Integrating With Feature Selection for Intrusion Detection System in Cyber Attacks [Volume 10, Issue 4, 2022, Pages 41-51]

N

  • Nanotechnology Design of Content-Addressable Memory in Quantum-Dot Cellular Automata [Volume 8, Issue 4, 2020, Pages 53-61]
  • Narrow Band Correlator GPS Spoofing Mitigation using Adaptive Estimator in Tracking Loop [Volume 6, Issue 3, 2018, Pages 65-80]
  • Nash Equilibrium Self-stabilizing Grundy Coloring Using Game Theory and Heuristics Ordering [Volume 6, Issue 2, 2018, Pages 39-48]
  • Nash Equilibrium The IoT Resource Allocation Improvement in Fog Computing Using Non-Cooperative Game Theory [Volume 9, Issue 4, 2021, Pages 147-158]
  • Natural Language Generation Automatic Persian Text Generation Using Rule-Based Models and Word Embedding [Volume 9, Issue 4, 2021, Pages 43-54]
  • Natural Language Processing Detection of advanced Cyber Attacks, Using Behavior Modeling Based on Natural Language Processing [Volume 6, Issue 3, 2018, Pages 141-151]
  • Navigation Design and Simulation of a LORAN Signal Generator for LPS Transmitter Using Class I Amplifier [Volume 8, Issue 2, 2020, Pages 25-33]
  • Navigation Improving INS/GPS Integration with Artificial Intelligence during GPS Outage [Volume 9, Issue 2, 2021, Pages 143-157]
  • Nearest neighbor Presenting A Method Based on Nearest Neighbors and Hamming Distance in Order to Identify Malicious Applications [Volume 11, Issue 2, 2023, Pages 81-90]
  • Network Attack A Trust Model Based on Swarm Intelligence Algorithms in WSNs [Volume 7, Issue 1, 2019, Pages 1-10]
  • Network Centric Operation The Course of Action Selection Model in Network Centric Operation [Volume 7, Issue 2, 2019, Pages 133-155]
  • Network-centric warfare Evaluation of Network-Based Operation Criteria Based on DEMATEL Method [Volume 7, Issue 1, 2019, Pages 139-153]
  • Network Dependency Graph A Foresight Framework for Intrusion Response Systems in Computer Networks [Volume 6, Issue 3, 2018, Pages 13-34]
  • Network dynamicity A Dynamic Metaheuristic Algorithm for Influence Maximization in Social Networks [Volume 11, Issue 2, 2023, Pages 57-69]
  • Networked UAVs Guidance and distributed control of the networked UAVs [Volume 7, Issue 4, 2019, Pages 117-129]
  • Network Flow Kavosh: Offering an Analysis Method and the Impact of Normal Network Traffic on Selection and Extraction Based on the Minkowski Distance [Volume 9, Issue 1, 2021, Pages 137-147]
  • Network Flow Providing a new solution to botnet detection in a Markov chain-based network [Volume 9, Issue 3, 2021, Pages 59-71]
  • Network Flow Analysis Botnet Detection for Peer to Peer Networks [Volume 3, Issue 4, 2015, Pages 43-60]
  • Network Forensics Improving Payload Attribution Techniques in Computer Network Criminology with Time based Hierarchical Bloom Filter [Volume 7, Issue 3, 2019, Pages 71-81]
  • Network Noise Simulation and Evaluation of Jitter and Packet Loss Noises Influence on Covert Timing Channel Performance [Volume 2, Issue 3, 2014, Pages 35-49]
  • Network Traffic A New Hybrid Approach for Traffic Identification and Classification in Wireless Networks [Volume 10, Issue 2, 2022, Pages 31-41]
  • Network Traffic Identify malicious traffic on IoT infrastructure using neural networks and deep learning [Volume 11, Issue 2, 2023, Pages 1-13]
  • Network traffic classification DDoS Attack Detection System Using Ensemble Method Classification and Active Learning Approach [Volume 11, Issue 3, 2023, Pages 101-118]
  • Neural Networks Increasing the Accuracy of Locating in Wireless Communication Systems Based on Neural Networks [Volume 3, Issue 3, 2015, Pages 31-38]
  • Neural Networks MLP Energy-aware routing in wireless sensor networks using MLP and simulated annealing algorithms [Volume 9, Issue 3, 2021, Pages 133-142]
  • Neural Networks VGG Fast Detection of Vehicle Type and Position in Images Based on Deep Neural Network [Volume 10, Issue 2, 2022, Pages 117-127]
  • N-gram properties Design the Model of CSRF Attack Tree for Immunization the Web Application in Development Process [Volume 3, Issue 1, 2015, Pages 41-52]
  • NIST Tests Design and Analysis of a Novel Synchronous Stream Cipher Using Secure Pseudo Random Number Generator [Volume 4, Issue 1, 2016, Pages 59-68]
  • Noise Reduction Novel Spoofing Mitigation Method using Wavelet Transform Based on PSO Algorithm in the Acquisition Stage of GPS Receiver [Volume 10, Issue 4, 2022, Pages 19-31]
  • Noisy path tree Trajectory Database Release with Differential Privacy Guarantee [Volume 9, Issue 1, 2021, Pages 29-42]
  • Non-line of sight signals Wireless Target Localization Using Median Weighted Least Square Error Metric in the Presence of Non-Line of Sight Signals [Volume 8, Issue 2, 2020, Pages 125-133]
  • Non-orthogonal multiple access (NOMA) Improving the Security in Cellular Communications Networks with adding Artificial Noise by method Non-Orthogonal Resource Allocation Techniques [Volume 9, Issue 2, 2021, Pages 135-142]
  • Non-uniform motion Inverse Synthetic Aperture Radar (ISAR) Imaging of Targets with Non-Uniform Motion and Constant Acceleration based on Compressed Sensing [Volume 9, Issue 2, 2021, Pages 51-62]
  • Normal Distribution Distributed Denial of Service Attacks Detection in Software Defined Networks [Volume 9, Issue 1, 2021, Pages 43-59]
  • Notch Filter A New Method for Cancelling CW Jamming in GPS Receivers [Volume 4, Issue 1, 2016, Pages 69-79]
  • NSS Digital Signature Designing Anonymous Communication System by Lattice-Based Cryptography [Volume 2, Issue 3, 2014, Pages 13-22]
  • NTRU Cryptography System Designing Anonymous Communication System by Lattice-Based Cryptography [Volume 2, Issue 3, 2014, Pages 13-22]
  • NTT Speeding up the execution-time of Crystals-Kyber PQC Algorithm on FPGA [Volume 10, Issue 4, 2022, Pages 101-110]
  • Number Errors The Impact of Security Mechanisms on Software Vulnerabilities [Volume 2, Issue 1, 2014, Pages 49-60]

O

  • Obstacles to Implementing Security Prioritizing Obstacles to Industrial Control Systems Security Management Implementation, using Interpretive Structural Modeling (ISM) Approach [Volume 7, Issue 2, 2019, Pages 109-119]
  • ODMRP protocol Performance Improvement of the ODMRP Protocol using Analysis of the Received Signal Strength Level [Volume 7, Issue 3, 2019, Pages 21-26]
  • OFDM Blind Frequency Offset Estimation using Adaptive Algorithms in Non-Coherent OFDM Systems [Volume 3, Issue 4, 2015, Pages 61-70]
  • OFDM Identification of STBC-OFDM Signals by Second-Order Cyclostationarity Method [Volume 7, Issue 4, 2019, Pages 27-36]
  • OFDMA A New Metric for Estimation the User Position in the Multi User OFDMA Networks [Volume 2, Issue 3, 2014, Pages 1-11]
  • OMOE indicator Reliability Analysis of Open-Loop Switching Loran Signal Generator Using Omoe Indicator [Volume 8, Issue 2, 2020, Pages 83-93]
  • OneHot coding The residue number system component design based on OneHot coding [Volume 10, Issue 1, 2022, Pages 119-133]
  • One-knownsecret Attack A Hash-Based Multi-Use Multi-Stage Secret Sharing Scheme with General Access Structure [Volume 6, Issue 3, 2018, Pages 107-115]
  • Online Collaborative Planning Online Collaborative Planning in Complex Environment [Volume 2, Issue 4, 2014, Pages 15-23]
  • Online social network (OSN) a conceptual model for computational evaluation of influence operations in online social networks [Volume 11, Issue 4, 2023, Pages 1-17]
  • Ontology Syntax and Semantic Analysis for SQL-Injection Attacks [Volume 2, Issue 1, 2014, Pages 83-97]
  • Ontology A New Method for Image Steganography Using Discrete Wavelet Transforms [Volume 7, Issue 4, 2019, Pages 79-89]
  • Ontology Providing an Agent-Based Architecture for Semantic Mining From Large-Scale Data in Distributed Environments [Volume 8, Issue 3, 2020, Pages 83-99]
  • Ontology Providing an Ontology-Based Method for Exploring the Association Rules in Multi-Agent Distributed Environments [Volume 9, Issue 1, 2021, Pages 1-17]
  • Operational matrices Cardinal Hermit functions and their application in solving the time-delay fractional optimal control problems [Volume 8, Issue 4, 2020, Pages 153-160]
  • Operator Finite Frame as Code: Some Characterizations for Error Correction Codes and Three Algorithms for Troubleshooting in Data Transfer [Volume 7, Issue 2, 2019, Pages 1-12]
  • Opportunity Projection of Cyber Attacks using Damage Estimation and Combination of Attacker’s Capability and Opportunity based on Transferable Belief Model [Volume 6, Issue 4, 2018, Pages 1-12]
  • Optical Fiber Sensor Sensing and detecting changes due to displacement, pressure, or dynamic vibration in an optical fiber, based on fiber Specklegram [Volume 11, Issue 3, 2023, Pages 89-99]
  • Optimal LED Placement Optimal Design of Wireless Visible Light Communication Network with the Aim of Minimizing the Outage Probability at the Location of the Mobile Receiver [Volume 10, Issue 3, 2022, Pages 1-9]
  • Optimization Guidance and distributed control of the networked UAVs [Volume 7, Issue 4, 2019, Pages 117-129]
  • Optimization Motion-encoded Gravitational Search Algorithm for moving target search using UAVs [Volume 10, Issue 4, 2022, Pages 63-73]
  • Organized Crime Analysis of exchange market disruptors using graph-based social network analysis [Volume 11, Issue 1, 2023, Pages 107-116]
  • Outage Improving INS/GPS Integration with Artificial Intelligence during GPS Outage [Volume 9, Issue 2, 2021, Pages 143-157]
  • Outage Probability Optimal Design of Wireless Visible Light Communication Network with the Aim of Minimizing the Outage Probability at the Location of the Mobile Receiver [Volume 10, Issue 3, 2022, Pages 1-9]
  • Outsourcing A novel architecture for database outsourcing in cloud computing with regard to data life cycle [Volume 2, Issue 4, 2014, Pages 41-54]
  • Outsourcing Architecture A novel architecture for database outsourcing in cloud computing with regard to data life cycle [Volume 2, Issue 4, 2014, Pages 41-54]
  • Outsourcing Security A novel architecture for database outsourcing in cloud computing with regard to data life cycle [Volume 2, Issue 4, 2014, Pages 41-54]
  • Overlapping Community Detection A Distributed Approach to Community Detection in Large Social Networks Based on Label Propagation [Volume 8, Issue 4, 2020, Pages 1-15]
  • Overselling A New Approach for Estimating the Rate of Emission in Quantum Bit Exchange‏ ‎Systems ‎Using Binomial Distribution [Volume 7, Issue 1, 2019, Pages 105-112]

P

  • Packet Loss Simulation and Evaluation of Jitter and Packet Loss Noises Influence on Covert Timing Channel Performance [Volume 2, Issue 3, 2014, Pages 35-49]
  • Packet Loss A cross layer approach for improving the TCP quality-of-service parameters over the IEEE 802.11.ac wireless networks [Volume 10, Issue 1, 2022, Pages 109-117]
  • Packet loss probability A new analytical model for enhancing performance of cognitive radio user’s transmissions in the internet of things [Volume 9, Issue 3, 2021, Pages 73-82]
  • Part Algorithm Sequential Forward Feature Selection for Intrusion Detection System, Using Ant Colony Algorithm [Volume 6, Issue 2, 2018, Pages 49-63]
  • Partial Least Squares approach A framework for assessing cyber security and privacy threats and investigating their impact on smart city performance [Volume 10, Issue 3, 2022, Pages 77-91]
  • Particle Fil-ter؛ Posterior Cramer-Rao Lower Bound Target Tracking Algorithm in Wireless Sensor Networks with Optimum Power Consumption Using Quantized Observation [Volume 6, Issue 2, 2018, Pages 109-121]
  • Passive Defense Energy-Harvesting Aware Multi-Hop Routing in Wireless Sensor Networks for Defense Applications [Volume 8, Issue 4, 2020, Pages 63-73]
  • Passive Millimeter Wave Imaging Improving the Quality of Millimeter Wave Images by Fusion with Visible Images [Volume 9, Issue 4, 2021, Pages 77-86]
  • Passive Radars Optimization of Site Topologies and Delay Extraction in Radar Emitter Location [Volume 2, Issue 2, 2014, Pages 41-51]
  • Payload Attribution Improving Payload Attribution Techniques in Computer Network Criminology with Time based Hierarchical Bloom Filter [Volume 7, Issue 3, 2019, Pages 71-81]
  • PCA Radar data processing using a combination of principal component analysis methods and self-organizing and digitized neural networks of the learning vector [Volume 9, Issue 2, 2021, Pages 1-7]
  • Pearson Correlation Coefficient Non-Performance of Pearson Correlation Coefficient for Evaluating Image Encryption Security [Volume 6, Issue 2, 2018, Pages 83-91]
  • Peer to Peer Botnet Botnet Detection for Peer to Peer Networks [Volume 3, Issue 4, 2015, Pages 43-60]
  • PendingIntent PIVATool- a fast and precise tool for analysis and detection of PendingIntent vulnerabilities [Volume 9, Issue 2, 2021, Pages 75-83]
  • Persian Language Automatic Keyword Extraction from Persian short Text Using word2vec [Volume 8, Issue 2, 2020, Pages 105-114]
  • Personal Data An Improved Method for Graph Data Anonymization with Emphasis on Preserving the Average Path length [Volume 7, Issue 2, 2019, Pages 25-32]
  • Per survivor processing (PSP) Technique A New Method for Detection of Discrete Data Transmitted over Non-Linear Dynamic Wireless Channels [Volume 3, Issue 2, 2015, Pages 75-85]
  • Petri Nets The Automated Security Evaluation of Threat Paths Based on Petri Nets [Volume 9, Issue 4, 2021, Pages 87-98]
  • Phase Noise The New Algorithm for The Blind Extraction of The Radio Frequency Fingerprint Using the Specific Features of High-Power Amplifier and Local Oscillator [Volume 11, Issue 1, 2023, Pages 57-65]
  • Phase Shift Keying Modulation (PSK) Performance Analysis of Free Space Optical Communication Links under M-PAM and M-PSK Modulations using Adaptive Power and Modulation Techniques [Volume 7, Issue 1, 2019, Pages 63-75]
  • Phasor Mesurement Units Reducing the Effects of Deception Attack on GPS Receivers of Phasor Measurement Units using Neural Networks [Volume 11, Issue 1, 2023, Pages 97-105]
  • Phishing Malicious Domain Detection using DNS Records [Volume 9, Issue 3, 2021, Pages 83-97]
  • Phisical Layer Security and Artificial Noise Improvement of Security in Wireless Communication Networks with Directional Modulation and Artificial Noise [Volume 10, Issue 4, 2022, Pages 11-18]
  • PHP server side language Detection of the Remote Code Execution Attacks Using the PHP Web Application Intrusion Detection System [Volume 10, Issue 2, 2022, Pages 75-85]
  • Physically Unclonable Function Design and Implementation of a Physically Unclonable Function on FPGA [Volume 6, Issue 4, 2018, Pages 23-32]
  • Physically Unclonable Function Design and Production of Hardware Authentication Code Using Physically Unclonable Functions and a Random Number Generator on FPGA [Volume 7, Issue 4, 2019, Pages 37-50]
  • Physical security systems Cyber disruption in the hierarchical control of intelligent microgrid power sharing [Volume 11, Issue 4, 2023]
  • PIAnalyzer PIVATool- a fast and precise tool for analysis and detection of PendingIntent vulnerabilities [Volume 9, Issue 2, 2021, Pages 75-83]
  • PIC Microcontroller Side Channel Analysis of International Data Encryption Algorithm (IDEA) [Volume 7, Issue 4, 2019, Pages 51-57]
  • PIVATool PIVATool- a fast and precise tool for analysis and detection of PendingIntent vulnerabilities [Volume 9, Issue 2, 2021, Pages 75-83]
  • Pixel Cost Relating the Detection Rate, Capacity and the Cost of Steganography by Steganographer Modeling [Volume 6, Issue 3, 2018, Pages 81-94]
  • Pixel forgery detection Forgery detection in digital images using the hybrid deep learning method [Volume 11, Issue 4, 2023]
  • Pizerenco A Combined Improved Algorithm to Estimating The delay of Sky waves In Loran c Receiver [Volume 2, Issue 4, 2014, Pages 55-63]
  • Polar Code A New Method for Combining the Channel Coding with Polar Coding-Based Encryption [Volume 4, Issue 1, 2016, Pages 1-8]
  • Polarization Shift Keying Introducing an Optimal Modulation Constellation, Resistant to Atmospheric Turbulence [Volume 8, Issue 2, 2020, Pages 115-124]
  • Policy Tree Online Collaborative Planning in Complex Environment [Volume 2, Issue 4, 2014, Pages 15-23]
  • Port-Knocking Utilizing Port-Knocking as first defensive layer at defense-in-depth strategies using hybrid of the Internet Control Message Protocol features, Internet Addresses and Tunneling [Volume 2, Issue 4, 2014, Pages 25-40]
  • Port-Knocking Phishing Website Detection for e-Banking by Inclined Planes Optimization Algorithm [Volume 3, Issue 1, 2015, Pages 29-39]
  • Port Security Utilizing Port-Knocking as first defensive layer at defense-in-depth strategies using hybrid of the Internet Control Message Protocol features, Internet Addresses and Tunneling [Volume 2, Issue 4, 2014, Pages 25-40]
  • Port Security Phishing Website Detection for e-Banking by Inclined Planes Optimization Algorithm [Volume 3, Issue 1, 2015, Pages 29-39]
  • Position Estimation A New Metric for Estimation the User Position in the Multi User OFDMA Networks [Volume 2, Issue 3, 2014, Pages 1-11]
  • Post-Quantum Two Verifiable Multi-Secret Sharing Schemes: A Linear Scheme with Standard Security and A Lattice-Based Scheme [Volume 8, Issue 3, 2020, Pages 101-115]
  • Post-quantum cryptography Speeding up the execution-time of Crystals-Kyber PQC Algorithm on FPGA [Volume 10, Issue 4, 2022, Pages 101-110]
  • Power amplifier The New Algorithm for The Blind Extraction of The Radio Frequency Fingerprint Using the Specific Features of High-Power Amplifier and Local Oscillator [Volume 11, Issue 1, 2023, Pages 57-65]
  • Power Analysis Attacks A New And Efficient Method of Mass Masking and its Resistance Assessment to Power Analysis [Volume 6, Issue 2, 2018, Pages 123-134]
  • Power Spectral Density A New Metric for Estimation the User Position in the Multi User OFDMA Networks [Volume 2, Issue 3, 2014, Pages 1-11]
  • Practical properties Design the Model of CSRF Attack Tree for Immunization the Web Application in Development Process [Volume 3, Issue 1, 2015, Pages 41-52]
  • Prevention Detection and Prevention of SQL Injection Attacks at Runtime Using Decision Tree Classification [Volume 8, Issue 4, 2020, Pages 75-93]
  • Primary user A new analytical model for enhancing performance of cognitive radio user’s transmissions in the internet of things [Volume 9, Issue 3, 2021, Pages 73-82]
  • Principal Component Analysis (PCA) An Improvement on the Identification via Gait Using the Genetic Algorithm [Volume 9, Issue 4, 2021, Pages 31-42]
  • Principal Component Analysis (PCA) Fixing Security Defects of Video Authentication Systems with Face Recognition, Based on 3D Structure and Shape Evaluation [Volume 9, Issue 4, 2021, Pages 141-145]
  • Principal Component Analysis (PCA) Modular human face recognition method based on principal component analysis and Mahalanobis distance [Volume 11, Issue 4, 2023]
  • Privacy A Mutual Anonymity Private Authentication Protocol to Use in Radio-Frequency Identification Systems [Volume 6, Issue 4, 2018, Pages 45-59]
  • Privacy A Scheme for Improvement of Security and Privacy in Mobile Health Systems by Using SIM Card [Volume 7, Issue 1, 2019, Pages 11-24]
  • Privacy An Improved Method for Graph Data Anonymization with Emphasis on Preserving the Average Path length [Volume 7, Issue 2, 2019, Pages 25-32]
  • Privacy A secure three factor authentication scheme for wireless healthcare sensor networks based on elliptic curve [Volume 8, Issue 1, 2020, Pages 147-167]
  • Privacy-preserving Security Analysis and Improvement of an Intelligent Transportation System based on Certificateless Aggregate Signature [Volume 8, Issue 1, 2020, Pages 25-33]
  • Probabilistic modeling Modeling of Obfuscated Multi- Stage cyber Attacks [Volume 8, Issue 2, 2020, Pages 61-73]
  • Probabilistic Spectrum Access Function Joint Spectrum Sensing and Power Allocation for Multiband Cognitive Radio Networks Using Probabilistic Spectrum Access [Volume 6, Issue 3, 2018, Pages 117-130]
  • Probability hypothesis density filter On Improvement of Cardinalized Probability Hypothesis Density Filter Implementation by using Auxiliary Particle Filter [Volume 3, Issue 4, 2015, Pages 23-41]
  • Probability of Detection A New Hybrid Approach for Traffic Identification and Classification in Wireless Networks [Volume 10, Issue 2, 2022, Pages 31-41]
  • Probability of successful recognition Intra-pulse Modulation Recognition Using Time-Frequency Features Based on Modified-B Distribution [Volume 7, Issue 1, 2019, Pages 129-138]
  • Probable Data Flow Analysis A new approach for static detection of security vulnerabilities in web applications [Volume 2, Issue 4, 2014, Pages 65-74]
  • Projection of Future The Distributed Denial of Service Attacks Situation Awareness Based on The Prediction of Battle Scene Using Dempster-Shefer Evidences Theories and Bayesian Rules [Volume 7, Issue 1, 2019, Pages 77-94]
  • Proper Detection Steganography on raw video based on proper detection and compromise between the parameters of transparency, resistance and capacity [Volume 8, Issue 1, 2020, Pages 51-65]
  • Provable Security A New (t,n) Designated Verifier Threshold Proxy Signature Scheme in the Standard Model [Volume 2, Issue 1, 2014, Pages 25-35]
  • ProVerif A secure three factor authentication scheme for wireless healthcare sensor networks based on elliptic curve [Volume 8, Issue 1, 2020, Pages 147-167]
  • Proxy signature scheme A New (t,n) Designated Verifier Threshold Proxy Signature Scheme in the Standard Model [Volume 2, Issue 1, 2014, Pages 25-35]
  • Pulse Amplitude Modulation (PAM) Performance Analysis of Free Space Optical Communication Links under M-PAM and M-PSK Modulations using Adaptive Power and Modulation Techniques [Volume 7, Issue 1, 2019, Pages 63-75]
  • Pure Adaptive steganography Designing a combinatorial Image Steganography algorithm based on game theory [Volume 8, Issue 1, 2020, Pages 133-145]
  • PWM Design and Simulation of a LORAN Signal Generator for LPS Transmitter Using Class I Amplifier [Volume 8, Issue 2, 2020, Pages 25-33]

Q

  • Quality of service. Network Bandwidth A cross layer approach for improving the TCP quality-of-service parameters over the IEEE 802.11.ac wireless networks [Volume 10, Issue 1, 2022, Pages 109-117]
  • Quantization Target Tracking Algorithm in Wireless Sensor Networks with Optimum Power Consumption Using Quantized Observation [Volume 6, Issue 2, 2018, Pages 109-121]
  • Quantum computing Proposing a New and Comprehensive Method for Quantum Representation of Digital Audio Signals [Volume 8, Issue 4, 2020, Pages 139-152]
  • Quantum-dot Cellular Automata (QCA) Design of Content-Addressable Memory in Quantum-Dot Cellular Automata [Volume 8, Issue 4, 2020, Pages 53-61]
  • Quantum Fourier transform Steganalysis of Quantum Audio Signal using Quantum Support Vector Machine Algorithm [Volume 11, Issue 3, 2023, Pages 1-14]
  • Quantum Key Distribution A New Approach for Estimating the Rate of Emission in Quantum Bit Exchange‏ ‎Systems ‎Using Binomial Distribution [Volume 7, Issue 1, 2019, Pages 105-112]
  • Quantum Secret Sharing A New Mechanism for Enhancing the Security of Military Internet of Things by Using Quantum and Classic Cryptography [Volume 9, Issue 2, 2021, Pages 29-49]
  • Quantum Spectrum Bandwidth Steganalysis of Quantum Audio Signal using Quantum Support Vector Machine Algorithm [Volume 11, Issue 3, 2023, Pages 1-14]
  • Quantum Spectrum Centroid Steganalysis of Quantum Audio Signal using Quantum Support Vector Machine Algorithm [Volume 11, Issue 3, 2023, Pages 1-14]
  • Quantum steganalysis Steganalysis of Quantum Audio Signal using Quantum Support Vector Machine Algorithm [Volume 11, Issue 3, 2023, Pages 1-14]
  • Query An Approach Based on Semantic Similarity in Persian Query-Based Summarization [Volume 2, Issue 3, 2014, Pages 51-63]
  • Query-Based Suummarization An Approach Based on Semantic Similarity in Persian Query-Based Summarization [Volume 2, Issue 3, 2014, Pages 51-63]

R

  • Radar Recognition Chaff from target by determining the optimal waveform in the radar detector using artificial neural network [Volume 11, Issue 2, 2023, Pages 117-132]
  • Radar Processing Radar data processing using a combination of principal component analysis methods and self-organizing and digitized neural networks of the learning vector [Volume 9, Issue 2, 2021, Pages 1-7]
  • Radio Frequency Fingerprint The New Algorithm for The Blind Extraction of The Radio Frequency Fingerprint Using the Specific Features of High-Power Amplifier and Local Oscillator [Volume 11, Issue 1, 2023, Pages 57-65]
  • Radio Resource Allocation Joint Spectrum Sensing and Power Allocation for Multiband Cognitive Radio Networks Using Probabilistic Spectrum Access [Volume 6, Issue 3, 2018, Pages 117-130]
  • RainbowTables Hellman Chains Analysis Base on Graph of Random Function [Volume 4, Issue 1, 2016, Pages 81-89]
  • Random Finite Set On Improvement of Cardinalized Probability Hypothesis Density Filter Implementation by using Auxiliary Particle Filter [Volume 3, Issue 4, 2015, Pages 23-41]
  • Random forest A model for Multi-Class Intrusion Detection Using the Dragonfly Feature Selection by Learning on the KDD-CUP99 Dataset [Volume 10, Issue 3, 2022, Pages 33-42]
  • Random Forest Algorithm Kashef: A Two-step detector of Windows-based Malicious executable files [Volume 10, Issue 2, 2022, Pages 143-156]
  • Random Functional Graph Hellman Chains Analysis Base on Graph of Random Function [Volume 4, Issue 1, 2016, Pages 81-89]
  • Random Number Generator Design and Production of Hardware Authentication Code Using Physically Unclonable Functions and a Random Number Generator on FPGA [Volume 7, Issue 4, 2019, Pages 37-50]
  • Ransomware Improvement in the Ransomwares Detection Method With New API Calls Features [Volume 8, Issue 4, 2020, Pages 107-118]
  • Rate of detection speed Improvement in the Ransomwares Detection Method With New API Calls Features [Volume 8, Issue 4, 2020, Pages 107-118]
  • Rate of Emission A New Approach for Estimating the Rate of Emission in Quantum Bit Exchange‏ ‎Systems ‎Using Binomial Distribution [Volume 7, Issue 1, 2019, Pages 105-112]
  • Reachability graph The Automated Security Evaluation of Threat Paths Based on Petri Nets [Volume 9, Issue 4, 2021, Pages 87-98]
  • Real-time An Improved Method of Incident Detection due to Cyber Attacks [Volume 7, Issue 4, 2019, Pages 105-116]
  • Real-time algorithm Fast Detection of Vehicle Type and Position in Images Based on Deep Neural Network [Volume 10, Issue 2, 2022, Pages 117-127]
  • Real-time Topology-based Tracking Real-time Topology-based Tracking of Microscopic Objects [Volume 9, Issue 3, 2021, Pages 1-20]
  • Recommendation Trust A Fuzzy Trust Evaluation Model to Enhance Security of cloud System Entities with Petri Net [Volume 4, Issue 1, 2016, Pages 19-34]
  • Recommender System A recommender system using a support vector machine and the TOPSIS model in the Internet of Things [Volume 11, Issue 4, 2023]
  • Reconfigurable Chips Side-Channel Attack Resistance Approaches Through Dynamic Differential Logic [Volume 7, Issue 3, 2019, Pages 93-104]
  • Recurrent Neural Network (RNN) P2P Botnet Detection Using Deep Learning Method [Volume 8, Issue 2, 2020, Pages 1-14]
  • Reiterative Minimum Mean Square Error An Integrated Algorithm for Optimal Detection of Weak Radar Targets Masked by the Sidelobes of a Strong Target [Volume 6, Issue 4, 2018, Pages 91-104]
  • Relay Cluster-Head Energy-Harvesting Aware Multi-Hop Routing in Wireless Sensor Networks for Defense Applications [Volume 8, Issue 4, 2020, Pages 63-73]
  • Reliability Reliability Analysis of Open-Loop Switching Loran Signal Generator Using Omoe Indicator [Volume 8, Issue 2, 2020, Pages 83-93]
  • Reliability An Approach to Dependability Enhancement of Cache Memories [Volume 10, Issue 1, 2022, Pages 1-10]
  • Remote code execution attack Detection of the Remote Code Execution Attacks Using the PHP Web Application Intrusion Detection System [Volume 10, Issue 2, 2022, Pages 75-85]
  • Residue number system The residue number system component design based on OneHot coding [Volume 10, Issue 1, 2022, Pages 119-133]
  • Resistance Increasing Insertion Capacity and Resistance in Image Steganography Based on Mapping and Bits Reduction [Volume 7, Issue 2, 2019, Pages 33-39]
  • Resource Allocation A Novel Algorithm for Radar Jamming Resource Allocation [Volume 7, Issue 3, 2019, Pages 53-70]
  • Resource Allocation Improving the Security in Cellular Communications Networks with adding Artificial Noise by method Non-Orthogonal Resource Allocation Techniques [Volume 9, Issue 2, 2021, Pages 135-142]
  • Resource Allocation The IoT Resource Allocation Improvement in Fog Computing Using Non-Cooperative Game Theory [Volume 9, Issue 4, 2021, Pages 147-158]
  • Resource Assignment Modelling and optimal solving of dependent sensor-weapon/threat assignment and scheduling problem by a metaheuristic algorithm based on GRASP [Volume 8, Issue 1, 2020, Pages 35-50]
  • Resource Assignment Developing a Threat-Tolerability Bilateral Concept within a Differential Game for the Analysis of the Insider/Adversary Behavior in Operational environment [Volume 11, Issue 2, 2023, Pages 15-29]
  • Resource provisioning Resource Elasticity Management using Fuzzy Controller Based on Threshold Changes in the Cloud Computing Environment [Volume 8, Issue 3, 2020, Pages 63-81]
  • Revocation Design a Blockchain based Electronic Payment with Users’ Anonymity [Volume 9, Issue 2, 2021, Pages 85-100]
  • RFID A Mutual Anonymity Private Authentication Protocol to Use in Radio-Frequency Identification Systems [Volume 6, Issue 4, 2018, Pages 45-59]
  • RFID Authentication Protocols Weaknesses of SPRS Authentication Protocol and Present a Developed Protocol for RFID Systems [Volume 3, Issue 3, 2015, Pages 39-48]
  • RFID (Radio Frequency Identification) An Anti-Spam Framework for Advertising Targeting Smart Mobile Devices on IoT [Volume 6, Issue 2, 2018, Pages 65-81]
  • RFID System Introduction of An Anti-Collision Protocol in RFID Systems [Volume 8, Issue 4, 2020, Pages 119-128]
  • Risk A method for quantitative evaluation of security risk in cyber-physical systems [Volume 11, Issue 2, 2023, Pages 71-80]
  • Risk Creating Payoff Function Deterrence Model in Cyberspace Based on Bayesian Belief Attack Graph by using Risk Creating Payoff Function [Volume 7, Issue 1, 2019, Pages 25-38]
  • Road Safety Detection of Slippery Road Conditions using the Road CCTV Images based on the Convolutional Neural Networks and Transfer Learning [Volume 10, Issue 2, 2022, Pages 105-116]
  • Rotational Cryptanalysis Improvement of Rotational Cryptanalysis of Shabal and Cubehash Hash Functions [Volume 9, Issue 1, 2021, Pages 91-100]
  • Routing protocol Providing a routing method in Internet of Things networks based on fuzzy logic and clustering For use in smart transportatio [Volume 11, Issue 4, 2023]
  • Routing protocols Performance Improvement of the ODMRP Protocol using Analysis of the Received Signal Strength Level [Volume 7, Issue 3, 2019, Pages 21-26]
  • Rule-Based Method Automatic Persian Text Generation Using Rule-Based Models and Word Embedding [Volume 9, Issue 4, 2021, Pages 43-54]
  • Rules Target Threat Assessment using Rule-Based Joint Fuzzy and Probabilistic Networks [Volume 6, Issue 4, 2018, Pages 61-78]
  • Rumor SCEIRS information dissemination model based on rumor spreading in complex networks [Volume 9, Issue 2, 2021, Pages 121-134]
  • Rumor Rumor Detection on Social Networks Based on the Degree Distribution Analysis in Step-by-Step Propagation Subgraphs [Volume 10, Issue 3, 2022, Pages 93-105]

S

  • Sandbox A Secure Environment for Behavioral Malware Analysis [Volume 2, Issue 3, 2014, Pages 65-76]
  • Sandbox A New Method For Gradual Detection of Environmental Conditions and Resources Required by Smart Malware [Volume 6, Issue 4, 2018, Pages 33-44]
  • S-box An Image Encryption Algorithm Based on the Sn Permutation Group and Chaotic Functions [Volume 8, Issue 3, 2020, Pages 139-150]
  • Scalability Presentation and Performance Evaluation of an Efficient Algorithm for a Distributed Controller in SDN [Volume 9, Issue 1, 2021, Pages 175-183]
  • Scalar Multiplication A Fast Method for Computation of Scalar Multiplication of Elliptic Curve Suitable for Elliptic Curve Cryptography System [Volume 3, Issue 3, 2015, Pages 9-17]
  • Scan Smart Detection of Covert Worms in Computer Networks [Volume 7, Issue 4, 2019, Pages 67-77]
  • Scheduling Modelling and optimal solving of dependent sensor-weapon/threat assignment and scheduling problem by a metaheuristic algorithm based on GRASP [Volume 8, Issue 1, 2020, Pages 35-50]
  • SDCCH logical channel Prediction of Plaintext in GSM Network using SDCCH Logical Channel [Volume 9, Issue 3, 2021, Pages 39-47]
  • Searchable encryption Fuzzy Keyword Search Scheme on an Encrypted Database in Cloud Computing Using Word Clustering [Volume 8, Issue 3, 2020, Pages 151-165]
  • Secondary User A new analytical model for enhancing performance of cognitive radio user’s transmissions in the internet of things [Volume 9, Issue 3, 2021, Pages 73-82]
  • Secondary Users Interference Mitigation in Cognitive Radio Communication Systems Based on the Wavelet Transform [Volume 9, Issue 4, 2021, Pages 55-66]
  • Secrecy Sum Rate (SSR) Improving the Security in Cellular Communications Networks with adding Artificial Noise by method Non-Orthogonal Resource Allocation Techniques [Volume 9, Issue 2, 2021, Pages 135-142]
  • Secret image An Efficient Visual Multi-Secret Sharing Scheme [Volume 3, Issue 4, 2015, Pages 1-9]
  • Secret image sharing A novel lossless color secret image sharing based on homogeneous linear recursion [Volume 10, Issue 3, 2022, Pages 107-118]
  • Secret key agreement Information Theoretic Secret Key Agreement Based on Localization [Volume 8, Issue 2, 2020, Pages 35-49]
  • Secret key capacity Information Theoretic Secret Key Agreement Based on Localization [Volume 8, Issue 2, 2020, Pages 35-49]
  • Secret key generation Security Evaluation of Mutual Random Phase Injection Scheme for Secret Key Generation over Static Point-to-Point Communications [Volume 10, Issue 2, 2022, Pages 19-30]
  • Secret Sharing Generating Tree Decomposition of Graphs with Imperialist Competitive Algorithm for Use in Secret Sharing Scheme [Volume 7, Issue 3, 2019, Pages 105-111]
  • Secret Sharing A new attack on Jakobsson Hybrid Mix-Net [Volume 7, Issue 3, 2019, Pages 113-119]
  • Secret Sharing Two Verifiable Multi-Secret Sharing Schemes: A Linear Scheme with Standard Security and A Lattice-Based Scheme [Volume 8, Issue 3, 2020, Pages 101-115]
  • Secret Sharing Scheme A Hash-Based Multi-Use Multi-Stage Secret Sharing Scheme with General Access Structure [Volume 6, Issue 3, 2018, Pages 107-115]
  • Secret Sharing Scheme Some New Bounds on the Information Ratio of the Cartesian Product of Some Classes of Graphs [Volume 6, Issue 4, 2018, Pages 135-142]
  • Secure transmission The Analysis and Design of Secure Wireless Networks in the Presence of Users with Different Security Needs Based on Covert Communication and Secure Transmission of Information Theory in the Presence of a Friendly Jammer [Volume 9, Issue 4, 2021, Pages 67-76]
  • Securing the Virtual Machine Implementing a Novel Malware Detection System in Virtual Machines [Volume 2, Issue 3, 2014, Pages 23-33]
  • Security and Privacy Weaknesses of SPRS Authentication Protocol and Present a Developed Protocol for RFID Systems [Volume 3, Issue 3, 2015, Pages 39-48]
  • Security Bound Upper Bounds for the Probability of Differential Characteristics of Five Block Cipher Constructions Functions [Volume 8, Issue 4, 2020, Pages 129-137]
  • Security in cyberspace Improving Intrusion Detection System Using a New Feature Selection Technique [Volume 6, Issue 4, 2018, Pages 143-152]
  • Security in Linux Implementing a Novel Malware Detection System in Virtual Machines [Volume 2, Issue 3, 2014, Pages 23-33]
  • Security Mechanism The Impact of Security Mechanisms on Software Vulnerabilities [Volume 2, Issue 1, 2014, Pages 49-60]
  • Security Metric A Security Model Based Approach for Dynamic Risk Assessment of Multi-Step Attacks in Computer Networks [Volume 9, Issue 1, 2021, Pages 157-173]
  • Security Operation Center An Improved Method of Incident Detection due to Cyber Attacks [Volume 7, Issue 4, 2019, Pages 105-116]
  • Security Policy TNAC: A Novel Trust Negotiation Based Access Control Model Using XACML Architecture [Volume 3, Issue 1, 2015, Pages 53-67]
  • Security requirements The Automated Security Evaluation of Threat Paths Based on Petri Nets [Volume 9, Issue 4, 2021, Pages 87-98]
  • Security requirements of task and data Secure and confidential workflow scheduling in hybrid cloud using improved particle swarm optimization algorithm [Volume 7, Issue 4, 2019, Pages 131-145]
  • Security risk Presenting A Method Based on Nearest Neighbors and Hamming Distance in Order to Identify Malicious Applications [Volume 11, Issue 2, 2023, Pages 81-90]
  • Security strength of resource and communication paths Secure and confidential workflow scheduling in hybrid cloud using improved particle swarm optimization algorithm [Volume 7, Issue 4, 2019, Pages 131-145]
  • Semantic Analysis Syntax and Semantic Analysis for SQL-Injection Attacks [Volume 2, Issue 1, 2014, Pages 83-97]
  • Semantic Mining Providing an Agent-Based Architecture for Semantic Mining From Large-Scale Data in Distributed Environments [Volume 8, Issue 3, 2020, Pages 83-99]
  • Semantic Segmentation The Semantic Segmentation of Autonomous Vehicles Images with the Teacher-Student Technique [Volume 9, Issue 4, 2021, Pages 1-19]
  • Semantic Similarity An Approach Based on Semantic Similarity in Persian Query-Based Summarization [Volume 2, Issue 3, 2014, Pages 51-63]
  • Semi-blind separation Semi-Blind Separation of Multiple Synchronous Wideband Frequency Hopping Signals Using a Band-Limited Receiver and Space-Time- Frequency Distributions [Volume 11, Issue 4, 2023]
  • Sensor Fusion Three-Dimensional Angles Measurement using IME based on MEMS Technology by Adaptive Kalman Filter [Volume 7, Issue 2, 2019, Pages 81-91]
  • Sentence Concept Extraction Investigation of the Semantic Similarity of Persian Sentences Using Vector Space Adaptation And Deep Learning [Volume 10, Issue 2, 2022, Pages 43-56]
  • Sentence Similarity Extraction Investigation of the Semantic Similarity of Persian Sentences Using Vector Space Adaptation And Deep Learning [Volume 10, Issue 2, 2022, Pages 43-56]
  • Sentiment Analysis Presenting a new sentiment analysis method based on multi-objective Archimedes optimization algorithm and machine learning [Volume 11, Issue 4, 2023]
  • Sequential Decoding of Convolutional Codes Sequential Decoding Algorithms of Convolutional Codes: Implementation, Improvement and Comparison [Volume 3, Issue 2, 2015, Pages 61-73]
  • Sequential Search Optimum Parameter Selection for Rainbow Table TMTO Attack Considering Breaking Time and Using Sequential and Index Search Methods [Volume 3, Issue 3, 2015, Pages 49-57]
  • Service Quality A Trust Evaluation Model for Cloud Computing Using Bayesian Network [Volume 10, Issue 4, 2022, Pages 53-61]
  • Service Security Utilizing Port-Knocking as first defensive layer at defense-in-depth strategies using hybrid of the Internet Control Message Protocol features, Internet Addresses and Tunneling [Volume 2, Issue 4, 2014, Pages 25-40]
  • Service Security Phishing Website Detection for e-Banking by Inclined Planes Optimization Algorithm [Volume 3, Issue 1, 2015, Pages 29-39]
  • Shadow image An Efficient Visual Multi-Secret Sharing Scheme [Volume 3, Issue 4, 2015, Pages 1-9]
  • Shadow image A novel lossless color secret image sharing based on homogeneous linear recursion [Volume 10, Issue 3, 2022, Pages 107-118]
  • Shearlet Transform Improving the Quality of Millimeter Wave Images by Fusion with Visible Images [Volume 9, Issue 4, 2021, Pages 77-86]
  • Shellcode Automated Exploit Generation For Application’s Vulnerability [Volume 4, Issue 1, 2016, Pages 35-50]
  • Short Burst Blind symbol Rate estimation in multipath channels [Volume 10, Issue 3, 2022, Pages 59-66]
  • Side Channel Attack Side-Channel Attack Resistance Approaches Through Dynamic Differential Logic [Volume 7, Issue 3, 2019, Pages 93-104]
  • Side Channel Attacks Side Channel Analysis of International Data Encryption Algorithm (IDEA) [Volume 7, Issue 4, 2019, Pages 51-57]
  • Sigma Delta Modulator Optimal Design of Low-power High-resolution Unity-STF S-MASH Sigma Delta Modulator for Telecommunication Applications [Volume 7, Issue 2, 2019, Pages 13-24]
  • Signal identification Identification of STBC-OFDM Signals by Second-Order Cyclostationarity Method [Volume 7, Issue 4, 2019, Pages 27-36]
  • Signaling Game Deterrence Model in Cyberspace Based on Bayesian Belief Attack Graph by using Risk Creating Payoff Function [Volume 7, Issue 1, 2019, Pages 25-38]
  • Signal Processing Concurrent Detection of Compact Anomalous Subgraphs in Large Social Networks [Volume 9, Issue 2, 2021, Pages 179-194]
  • Signal to Interference plus Noise Ratio Robust Adaptive Beamforming Against Interferer’s Direction Of Arrival Estimation Error [Volume 7, Issue 3, 2019, Pages 27-36]
  • SIM card A Scheme for Improvement of Security and Privacy in Mobile Health Systems by Using SIM Card [Volume 7, Issue 1, 2019, Pages 11-24]
  • Similarity Matrix Detecting Botnets with Timing-Based Covert Command and Control Channels [Volume 7, Issue 4, 2019, Pages 1-15]
  • Similarity Measure Collusive Fraud Classification in Network of Online Auction Using Similarity Measure in Collective Classification [Volume 7, Issue 1, 2019, Pages 95-103]
  • Simulated Annealing Energy-aware routing in wireless sensor networks using MLP and simulated annealing algorithms [Volume 9, Issue 3, 2021, Pages 133-142]
  • Simulation Simulation and Evaluation of Jitter and Packet Loss Noises Influence on Covert Timing Channel Performance [Volume 2, Issue 3, 2014, Pages 35-49]
  • Simulation Designing Systolic Array for SL0 Algorithm Implementation [Volume 7, Issue 4, 2019, Pages 59-65]
  • Simulation Environment A Software System for Large-Scale Simulation of Malware Propagation in Computer Networks [Volume 7, Issue 2, 2019, Pages 53-67]
  • Situationa Awareness Projection of Muli Stage Cyber Attack Based on Belief Model and Fuzzy Inference [Volume 3, Issue 2, 2015, Pages 13-28]
  • Situation Awareness Projection of Cyber Attacks using Damage Estimation and Combination of Attacker’s Capability and Opportunity based on Transferable Belief Model [Volume 6, Issue 4, 2018, Pages 1-12]
  • Situation Awareness The Distributed Denial of Service Attacks Situation Awareness Based on The Prediction of Battle Scene Using Dempster-Shefer Evidences Theories and Bayesian Rules [Volume 7, Issue 1, 2019, Pages 77-94]
  • SL0 algorithm Designing Systolic Array for SL0 Algorithm Implementation [Volume 7, Issue 4, 2019, Pages 59-65]
  • Smart City A Techno-Economic Model of Sustainable Communication Infrastructure in the Smart City; using WDM-PON FTTx [Volume 9, Issue 1, 2021, Pages 149-156]
  • Smart City A framework for assessing cyber security and privacy threats and investigating their impact on smart city performance [Volume 10, Issue 3, 2022, Pages 77-91]
  • Smart Grid Secure and Efficient 4-way Handshake in Smart Grid to DoS Attacks Mitigation [Volume 4, Issue 1, 2016, Pages 9-17]
  • Smart Grid Enhance Media Access Control in IEEE 802.15.4 Based Smart Grids using Swarm Intelligence Algorithms [Volume 7, Issue 3, 2019, Pages 9-20]
  • Smart Malware A New Method For Gradual Detection of Environmental Conditions and Resources Required by Smart Malware [Volume 6, Issue 4, 2018, Pages 33-44]
  • S-MASH Optimal Design of Low-power High-resolution Unity-STF S-MASH Sigma Delta Modulator for Telecommunication Applications [Volume 7, Issue 2, 2019, Pages 13-24]
  • SM-OFDM Identification of STBC-OFDM Signals by Second-Order Cyclostationarity Method [Volume 7, Issue 4, 2019, Pages 27-36]
  • Social network Spam Management in Social Networks by Content Rating [Volume 2, Issue 2, 2014, Pages 53-62]
  • Social network SCEIRS information dissemination model based on rumor spreading in complex networks [Volume 9, Issue 2, 2021, Pages 121-134]
  • Social network Rumor Detection on Social Networks Based on the Degree Distribution Analysis in Step-by-Step Propagation Subgraphs [Volume 10, Issue 3, 2022, Pages 93-105]
  • Social network analysis An Improved New Link Prediction Method in Social Multilplex Networks Based on the Gravitational Search Algorithm [Volume 8, Issue 2, 2020, Pages 15-24]
  • Social network analysis Analysis of exchange market disruptors using graph-based social network analysis [Volume 11, Issue 1, 2023, Pages 107-116]
  • Software basis path Providing a Method for the Optimal Detection of Software Testing Paths Using Meta-Algorithms [Volume 6, Issue 4, 2018, Pages 13-22]
  • Software Defined Network An Accelerated Method for Rules Anomaly Detection in Software Defined Networks [Volume 8, Issue 4, 2020, Pages 31-39]
  • Software Defined Network Distributed Denial of Service Attacks Detection in Software Defined Networks [Volume 9, Issue 1, 2021, Pages 43-59]
  • Software Defined Network Presentation and Performance Evaluation of an Efficient Algorithm for a Distributed Controller in SDN [Volume 9, Issue 1, 2021, Pages 175-183]
  • Software Diversity Malware Propagation Modeling Considering Software Diversity Approach in Weighted Scale-Free Network [Volume 6, Issue 3, 2018, Pages 131-140]
  • Software Quality Fault Proness Estimation of Software Modules Using Machine learning [Volume 11, Issue 4, 2023]
  • Software Verification A Secure Environment for Behavioral Malware Analysis [Volume 2, Issue 3, 2014, Pages 65-76]
  • Software vulnerability The relationship of software vulnerabilities and workarounds [Volume 8, Issue 2, 2020, Pages 75-81]
  • SOM Radar data processing using a combination of principal component analysis methods and self-organizing and digitized neural networks of the learning vector [Volume 9, Issue 2, 2021, Pages 1-7]
  • Sonar targets Sonar Dataset Classification using Multi-Layer Perceptron Neural Network Based on Dragonfly and Moth Algorithms [Volume 10, Issue 3, 2022, Pages 21-31]
  • S-OWA Operator Web-based Military Management Systems Security Using Combination of One-class Classifiers [Volume 3, Issue 3, 2015, Pages 19-30]
  • Spam Spam Management in Social Networks by Content Rating [Volume 2, Issue 2, 2014, Pages 53-62]
  • Sparse Coherent Acoustic source DOA estimation by nested array based on sparse solution [Volume 8, Issue 1, 2020, Pages 79-88]
  • Sparse representation classification Applying weighted smoothed norm in sparse representation classification for face recognition [Volume 11, Issue 3, 2023, Pages 57-65]
  • Specific Values Frequency Spectrum Sensing by Multi-Stage Adaptive Optimization Algorithm with the Efficient Non-Cooperative Technique in Cognitive radios with hardware implementation [Volume 8, Issue 3, 2020, Pages 39-51]
  • Spectral Efficiency Performance Analysis of Hybrid FSO/RF Systems Using the ℳ Distribution and Markov Function [Volume 10, Issue 2, 2022, Pages 1-10]
  • Spectral Holes Frequency Spectrum Sensing by Multi-Stage Adaptive Optimization Algorithm with the Efficient Non-Cooperative Technique in Cognitive radios with hardware implementation [Volume 8, Issue 3, 2020, Pages 39-51]
  • Spectral Sensors Frequency Spectrum Sensing by Multi-Stage Adaptive Optimization Algorithm with the Efficient Non-Cooperative Technique in Cognitive radios with hardware implementation [Volume 8, Issue 3, 2020, Pages 39-51]
  • Spectrum Efficiency Performance analysis of adaptive modulation and coding methods in the wireless telecommunication channels [Volume 10, Issue 1, 2022, Pages 99-108]
  • Spectrum Sensing Joint Spectrum Sensing and Power Allocation for Multiband Cognitive Radio Networks Using Probabilistic Spectrum Access [Volume 6, Issue 3, 2018, Pages 117-130]
  • Speech steganalysis Speech Steganalysis of Least Significant Bits Based on the Percentage of Equal Adjacent Samples [Volume 9, Issue 1, 2021, Pages 75-90]
  • Spoofing Reducing Interference Effect on GPS Receiver by Using Multi-correlation Architecture [Volume 9, Issue 3, 2021, Pages 49-57]
  • Spoofing Attack Detection of Spoofing Attack Based on Multi-Layer Neural Network in Single-Frequency GPS Receivers [Volume 3, Issue 1, 2015, Pages 69-80]
  • Spoofing Attack GPS Spoofing Mitigation using Adaptive Estimator in Tracking Loop [Volume 6, Issue 3, 2018, Pages 65-80]
  • Spoofing Attack Novel Spoofing Mitigation Method using Wavelet Transform Based on PSO Algorithm in the Acquisition Stage of GPS Receiver [Volume 10, Issue 4, 2022, Pages 19-31]
  • Spoofing Attacks Reducing the Effects of Deception Attack on GPS Receivers of Phasor Measurement Units using Neural Networks [Volume 11, Issue 1, 2023, Pages 97-105]
  • Spread Spectrum Steganography on raw video based on proper detection and compromise between the parameters of transparency, resistance and capacity [Volume 8, Issue 1, 2020, Pages 51-65]
  • Spread Spectrum Communication Robust Steganography Algorithm Text in the Image Using A Spread Spectrum Method [Volume 2, Issue 3, 2014, Pages 77-83]
  • SPRS Protocol Weaknesses of SPRS Authentication Protocol and Present a Developed Protocol for RFID Systems [Volume 3, Issue 3, 2015, Pages 39-48]
  • SQL injection Syntax and Semantic Analysis for SQL-Injection Attacks [Volume 2, Issue 1, 2014, Pages 83-97]
  • SQL Injection Attacks Detection and Prevention of SQL Injection Attacks at Runtime Using Decision Tree Classification [Volume 8, Issue 4, 2020, Pages 75-93]
  • Stack Automated Exploit Generation For Application’s Vulnerability [Volume 4, Issue 1, 2016, Pages 35-50]
  • Stack Algorithm Sequential Decoding Algorithms of Convolutional Codes: Implementation, Improvement and Comparison [Volume 3, Issue 2, 2015, Pages 61-73]
  • Standard model A New (t,n) Designated Verifier Threshold Proxy Signature Scheme in the Standard Model [Volume 2, Issue 1, 2014, Pages 25-35]
  • Standard Security Two Verifiable Multi-Secret Sharing Schemes: A Linear Scheme with Standard Security and A Lattice-Based Scheme [Volume 8, Issue 3, 2020, Pages 101-115]
  • Static Analysis An Improved New Link Prediction Method in Social Multilplex Networks Based on the Gravitational Search Algorithm [Volume 8, Issue 2, 2020, Pages 15-24]
  • Static Analysis A Malware Classification Method Using visualization and Word Embedding Features [Volume 11, Issue 1, 2023, Pages 1-13]
  • Static and Dynamic Analysis Syntax and Semantic Analysis for SQL-Injection Attacks [Volume 2, Issue 1, 2014, Pages 83-97]
  • Statistical Detectability Relating the Detection Rate, Capacity and the Cost of Steganography by Steganographer Modeling [Volume 6, Issue 3, 2018, Pages 81-94]
  • Statistical Tests Detection of Unknown Malicious Network Streams using Ensemble Learning [Volume 6, Issue 2, 2018, Pages 93-108]
  • STBC Identification of STBC-OFDM Signals by Second-Order Cyclostationarity Method [Volume 7, Issue 4, 2019, Pages 27-36]
  • Steganalysis Model Relating the Detection Rate, Capacity and the Cost of Steganography by Steganographer Modeling [Volume 6, Issue 3, 2018, Pages 81-94]
  • Steganlysis Increasing Insertion Capacity and Resistance in Image Steganography Based on Mapping and Bits Reduction [Volume 7, Issue 2, 2019, Pages 33-39]
  • Steganography Robust Steganography Algorithm Text in the Image Using A Spread Spectrum Method [Volume 2, Issue 3, 2014, Pages 77-83]
  • Steganography Relating the Detection Rate, Capacity and the Cost of Steganography by Steganographer Modeling [Volume 6, Issue 3, 2018, Pages 81-94]
  • Steganography Increasing Insertion Capacity and Resistance in Image Steganography Based on Mapping and Bits Reduction [Volume 7, Issue 2, 2019, Pages 33-39]
  • Steganography Speech Steganalysis of Least Significant Bits Based on the Percentage of Equal Adjacent Samples [Volume 9, Issue 1, 2021, Pages 75-90]
  • Strategy A Decision-Making Model in a Cyber Conflicts Acted Upon Vulnerability, Based on Game Theoretic Analysis [Volume 6, Issue 2, 2018, Pages 21-28]
  • Stream Cipher Algorithm Time Analysis Attack on a Stream Cipher Algorithm’s [Volume 4, Issue 1, 2016, Pages 51-57]
  • Stream Ciphers Design and Analysis of a Novel Synchronous Stream Cipher Using Secure Pseudo Random Number Generator [Volume 4, Issue 1, 2016, Pages 59-68]
  • Strong Tracking Kalman Filter Enhancing Vector Tracking Accuracy of GPS in Weak Signal Condition Based on Adaptive Strong Tracking Kalman Filter​ [Volume 6, Issue 3, 2018, Pages 1-12]
  • Structural analysis Structural Analysis based on Integral Characteristic of a Reduced Round Block Cipher with Making an Improvement [Volume 7, Issue 3, 2019, Pages 1-8]
  • Structural Equation Modelling A framework for assessing cyber security and privacy threats and investigating their impact on smart city performance [Volume 10, Issue 3, 2022, Pages 77-91]
  • Subtractor The residue number system component design based on OneHot coding [Volume 10, Issue 1, 2022, Pages 119-133]
  • Support Vectore machin(SVM) Detect Web Denial of Service Attacks Using Entropy and Support Vector Machine Algorithm [Volume 6, Issue 4, 2018, Pages 79-89]
  • Support Vector Machines An Effective Method to Detect Environment-Aware Malware Based on the Behavioral Distances Comparison [Volume 6, Issue 4, 2018, Pages 123-133]
  • Support Vector Machines Investigation of a new ensemble method of intrusion detection system on different data sets [Volume 10, Issue 3, 2022, Pages 43-57]
  • Support Vector Machine (SVM) A recommender system using a support vector machine and the TOPSIS model in the Internet of Things [Volume 11, Issue 4, 2023]
  • SURF algorithm Improve the detection of dangerous objects in x-ray images in security and military inspections using image processing approaches [Volume 10, Issue 4, 2022, Pages 81-89]
  • Switching amplifier Reliability Analysis of Open-Loop Switching Loran Signal Generator Using Omoe Indicator [Volume 8, Issue 2, 2020, Pages 83-93]
  • Switching state space mode (SSSM) A New Method for Detection of Discrete Data Transmitted over Non-Linear Dynamic Wireless Channels [Volume 3, Issue 2, 2015, Pages 75-85]
  • Symbol Rate Estimation Blind symbol Rate estimation in multipath channels [Volume 10, Issue 3, 2022, Pages 59-66]
  • Synchronous Scrambler A New Method for Blind Recognition of the Initial State of Synchronous Scramblers When Located after the Channel Encoder [Volume 9, Issue 1, 2021, Pages 19-27]
  • Systematic Design Process The Design Process Reform of the Gama-ray Imaging System by using the Design Structure Matrix [Volume 6, Issue 3, 2018, Pages 95-106]
  • System call An Effective Method to Detect Environment-Aware Malware Based on the Behavioral Distances Comparison [Volume 6, Issue 4, 2018, Pages 123-133]
  • System Call Tracking A Secure Environment for Behavioral Malware Analysis [Volume 2, Issue 3, 2014, Pages 65-76]
  • Systolic array Designing Systolic Array for SL0 Algorithm Implementation [Volume 7, Issue 4, 2019, Pages 59-65]

T

  • Tabu Search Enhancing E-Security by Inserting a Watermark Using the Combination of Genetic Algorithm and Tabu Search [Volume 8, Issue 3, 2020, Pages 25-37]
  • Tag Identification Introduction of An Anti-Collision Protocol in RFID Systems [Volume 8, Issue 4, 2020, Pages 119-128]
  • Target Tracking Target Tracking Algorithm in Wireless Sensor Networks with Optimum Power Consumption Using Quantized Observation [Volume 6, Issue 2, 2018, Pages 109-121]
  • Task scheduling Secure and confidential workflow scheduling in hybrid cloud using improved particle swarm optimization algorithm [Volume 7, Issue 4, 2019, Pages 131-145]
  • Task scheduling A Fault Tolerant Task Scheduling Method for Optimal use of Resources in Cloud Computing Environment [Volume 8, Issue 2, 2020, Pages 95-103]
  • Task scheduling Security-aware Task Scheduling Algorithm based on Multi Adaptive Learning and PSO Technique [Volume 9, Issue 2, 2021, Pages 159-178]
  • TDMA networks Introduction of the Entropy-Based Method for Finding Influential Nodes in Information Dissemination on Online Social Networks [Volume 6, Issue 2, 2018, Pages 1-10]
  • TDMA networks Blind Estimation of Number of Users in TDMA Networks Using Redundancy of Adaptive Channel Coding [Volume 6, Issue 2, 2018, Pages 11-20]
  • TDOA Optimization of Site Topologies and Delay Extraction in Radar Emitter Location [Volume 2, Issue 2, 2014, Pages 41-51]
  • Teacher-student technique The Semantic Segmentation of Autonomous Vehicles Images with the Teacher-Student Technique [Volume 9, Issue 4, 2021, Pages 1-19]
  • Technique of Order Preference for Similarity to Ideal Solution (TOPSIS) A recommender system using a support vector machine and the TOPSIS model in the Internet of Things [Volume 11, Issue 4, 2023]
  • Template Side-Channel Attack A Practical Template Attack Against the Implementation of the Advanced Encryption Standard on ARM Processor [Volume 7, Issue 1, 2019, Pages 39-48]
  • Terminal Vertices Hellman Chains Analysis Base on Graph of Random Function [Volume 4, Issue 1, 2016, Pages 81-89]
  • Text Mining Automatic Keyword Extraction from Persian short Text Using word2vec [Volume 8, Issue 2, 2020, Pages 105-114]
  • Text Test Data Generation Evaluating Deep Learning Models for Test Data Generation In File Based Fuzzers [Volume 10, Issue 2, 2022, Pages 57-73]
  • Texture analysis Offline text-Independent Persian handwriting Forgery Detection using Texture Analysis [Volume 7, Issue 3, 2019, Pages 37-52]
  • The Combination of Encryption and Coding A New Method for Combining the Channel Coding with Polar Coding-Based Encryption [Volume 4, Issue 1, 2016, Pages 1-8]
  • The EM approach A New Method for Detection of Discrete Data Transmitted over Non-Linear Dynamic Wireless Channels [Volume 3, Issue 2, 2015, Pages 75-85]
  • The Viterbi algorithm A New Method for Detection of Discrete Data Transmitted over Non-Linear Dynamic Wireless Channels [Volume 3, Issue 2, 2015, Pages 75-85]
  • Threat assessment Target Threat Assessment using Rule-Based Joint Fuzzy and Probabilistic Networks [Volume 6, Issue 4, 2018, Pages 61-78]
  • Threat evaluation Developing a Threat-Tolerability Bilateral Concept within a Differential Game for the Analysis of the Insider/Adversary Behavior in Operational environment [Volume 11, Issue 2, 2023, Pages 15-29]
  • Threat modelling The Automated Security Evaluation of Threat Paths Based on Petri Nets [Volume 9, Issue 4, 2021, Pages 87-98]
  • Threat path The Automated Security Evaluation of Threat Paths Based on Petri Nets [Volume 9, Issue 4, 2021, Pages 87-98]
  • Threshold Resource Elasticity Management using Fuzzy Controller Based on Threshold Changes in the Cloud Computing Environment [Volume 8, Issue 3, 2020, Pages 63-81]
  • Threshold proxy signature scheme A New (t,n) Designated Verifier Threshold Proxy Signature Scheme in the Standard Model [Volume 2, Issue 1, 2014, Pages 25-35]
  • Throughput A new analytical model for enhancing performance of cognitive radio user’s transmissions in the internet of things [Volume 9, Issue 3, 2021, Pages 73-82]
  • Time Analysis Attack Time Analysis Attack on a Stream Cipher Algorithm’s [Volume 4, Issue 1, 2016, Pages 51-57]
  • Time-Memory Trade-Off (TMTO) Attack Optimum Parameter Selection for Rainbow Table TMTO Attack Considering Breaking Time and Using Sequential and Index Search Methods [Volume 3, Issue 3, 2015, Pages 49-57]
  • Time Synchronization Attacks Reducing the Effects of Deception Attack on GPS Receivers of Phasor Measurement Units using Neural Networks [Volume 11, Issue 1, 2023, Pages 97-105]
  • Timing Channel Web Covert Timing Channel Detection based on Entropy [Volume 8, Issue 3, 2020, Pages 13-23]
  • TOA ، TDOA ،Loran C A Combined Improved Algorithm to Estimating The delay of Sky waves In Loran c Receiver [Volume 2, Issue 4, 2014, Pages 55-63]
  • Tolerability Developing a Threat-Tolerability Bilateral Concept within a Differential Game for the Analysis of the Insider/Adversary Behavior in Operational environment [Volume 11, Issue 2, 2023, Pages 15-29]
  • Topic Models Relating the Detection Rate, Capacity and the Cost of Steganography by Steganographer Modeling [Volume 6, Issue 3, 2018, Pages 81-94]
  • TOPSIS Method The Course of Action Selection Model in Network Centric Operation [Volume 7, Issue 2, 2019, Pages 133-155]
  • Tor Network Evaluation and proof of routing algorithm in Tor anonymity network [Volume 11, Issue 3, 2023, Pages 15-24]
  • Traceability Design a Blockchain based Electronic Payment with Users’ Anonymity [Volume 9, Issue 2, 2021, Pages 85-100]
  • Trade-off Attacks Hellman Chains Analysis Base on Graph of Random Function [Volume 4, Issue 1, 2016, Pages 81-89]
  • Trajectory database release Trajectory Database Release with Differential Privacy Guarantee [Volume 9, Issue 1, 2021, Pages 29-42]
  • Trajectory pattern Trajectory Database Release with Differential Privacy Guarantee [Volume 9, Issue 1, 2021, Pages 29-42]
  • Transferable Belief Model Projection of Cyber Attacks using Damage Estimation and Combination of Attacker’s Capability and Opportunity based on Transferable Belief Model [Volume 6, Issue 4, 2018, Pages 1-12]
  • Transfer Learning Detection of Slippery Road Conditions using the Road CCTV Images based on the Convolutional Neural Networks and Transfer Learning [Volume 10, Issue 2, 2022, Pages 105-116]
  • Transient Fault Self-stabilizing Grundy Coloring Using Game Theory and Heuristics Ordering [Volume 6, Issue 2, 2018, Pages 39-48]
  • Transmission Control Protocol A cross layer approach for improving the TCP quality-of-service parameters over the IEEE 802.11.ac wireless networks [Volume 10, Issue 1, 2022, Pages 109-117]
  • Transport protocol A new analytical model for enhancing performance of cognitive radio user’s transmissions in the internet of things [Volume 9, Issue 3, 2021, Pages 73-82]
  • Tree-based Protocol Introduction of An Anti-Collision Protocol in RFID Systems [Volume 8, Issue 4, 2020, Pages 119-128]
  • Tree decomposition Generating Tree Decomposition of Graphs with Imperialist Competitive Algorithm for Use in Secret Sharing Scheme [Volume 7, Issue 3, 2019, Pages 105-111]
  • Trust Hybrid Method for Detecting Trustworthy Cloud Service Providers using Analytical Hierarchical Process and Neural Network [Volume 6, Issue 4, 2018, Pages 105-122]
  • Trust A Trust Model Based on Swarm Intelligence Algorithms in WSNs [Volume 7, Issue 1, 2019, Pages 1-10]
  • Trust A Trust Evaluation Model for Cloud Computing Using Bayesian Network [Volume 10, Issue 4, 2022, Pages 53-61]
  • Trust Models A Fuzzy Trust Evaluation Model to Enhance Security of cloud System Entities with Petri Net [Volume 4, Issue 1, 2016, Pages 19-34]
  • Trust Negotiation TNAC: A Novel Trust Negotiation Based Access Control Model Using XACML Architecture [Volume 3, Issue 1, 2015, Pages 53-67]
  • T-Test Analysis A New And Efficient Method of Mass Masking and its Resistance Assessment to Power Analysis [Volume 6, Issue 2, 2018, Pages 123-134]

U

  • UAV relay Security of UAV Relay Networks based on Covert Communication in the Presence of an Eavesdropping UAV [Volume 11, Issue 2, 2023, Pages 45-56]
  • Uncertainty-aware Attack Graph A Foresight Framework for Intrusion Response Systems in Computer Networks [Volume 6, Issue 3, 2018, Pages 13-34]
  • Uncertainty modeling A New Method for Image Steganography Using Discrete Wavelet Transforms [Volume 7, Issue 4, 2019, Pages 79-89]
  • Underdetermined Coherent Acoustic source DOA estimation by nested array based on sparse solution [Volume 8, Issue 1, 2020, Pages 79-88]
  • Underwater transmission A new method for data transmission in shallow water channel based on offset multi-carrier filter bank [Volume 11, Issue 3, 2023, Pages 25-34]
  • Unity-STF Optimal Design of Low-power High-resolution Unity-STF S-MASH Sigma Delta Modulator for Telecommunication Applications [Volume 7, Issue 2, 2019, Pages 13-24]
  • Unknown Attacks Detection of Unknown Malicious Network Streams using Ensemble Learning [Volume 6, Issue 2, 2018, Pages 93-108]
  • Unknown Input Estimation High Maneuvering Target Tracking Based on Augmented State Method using Adaptive Unscented Kalman Filter [Volume 7, Issue 2, 2019, Pages 93-108]
  • Upward leaders A New Method to Evaluate the Launch Pad Lightning Protection System Performance by Using LPM in 3-D [Volume 3, Issue 1, 2015, Pages 15-27]
  • User-association Joint Optimization of User Association, Subchannel Allocation and Power Allocation in OFDMA Heterogeneous Networks [Volume 8, Issue 3, 2020, Pages 117-129]

V

  • Validation criteria Target Threat Assessment using Rule-Based Joint Fuzzy and Probabilistic Networks [Volume 6, Issue 4, 2018, Pages 61-78]
  • VANET An Improved Authentication Scheme with Conditional Privacy Preserving in VANETs [Volume 3, Issue 2, 2015, Pages 1-12]
  • VANET Security Analysis and Improvement of an Intelligent Transportation System based on Certificateless Aggregate Signature [Volume 8, Issue 1, 2020, Pages 25-33]
  • VANET Distributed Anonymity Based On the Integrated Block Chain in Vehicular Ad Hoc Network [Volume 8, Issue 4, 2020, Pages 41-52]
  • Variable Bit Rate Quality enhancement of received video using secondary channel encoding in Joint Source and Channel Coding (JSCC) [Volume 3, Issue 2, 2015, Pages 29-48]
  • Variance Detect Web Denial of Service Attacks Using Entropy and Support Vector Machine Algorithm [Volume 6, Issue 4, 2018, Pages 79-89]
  • Vector Space Adaptation Investigation of the Semantic Similarity of Persian Sentences Using Vector Space Adaptation And Deep Learning [Volume 10, Issue 2, 2022, Pages 43-56]
  • Vector Tracking Enhancing Vector Tracking Accuracy of GPS in Weak Signal Condition Based on Adaptive Strong Tracking Kalman Filter​ [Volume 6, Issue 3, 2018, Pages 1-12]
  • Vehicle Detection Fast Detection of Vehicle Type and Position in Images Based on Deep Neural Network [Volume 10, Issue 2, 2022, Pages 117-127]
  • Verifiability Two Verifiable Multi-Secret Sharing Schemes: A Linear Scheme with Standard Security and A Lattice-Based Scheme [Volume 8, Issue 3, 2020, Pages 101-115]
  • Video Coding Quality enhancement of received video using secondary channel encoding in Joint Source and Channel Coding (JSCC) [Volume 3, Issue 2, 2015, Pages 29-48]
  • Virtual line A Heuristic Data Diffusion and Gathering Scheme Using Virtual Line for Wireless Sensor Networks with Mobile Sink [Volume 9, Issue 2, 2021, Pages 195-207]
  • Visible Light Communication Optimal Design of Wireless Visible Light Communication Network with the Aim of Minimizing the Outage Probability at the Location of the Mobile Receiver [Volume 10, Issue 3, 2022, Pages 1-9]
  • Visual Multiple-Secret Sharing Scheme An Efficient Visual Multi-Secret Sharing Scheme [Volume 3, Issue 4, 2015, Pages 1-9]
  • Visual Sensor Networks Optimal Placement of Cameras to Maximize Visual Coverage using Genetic Algorithm and Harmony Search [Volume 7, Issue 1, 2019, Pages 49-61]
  • Viterbi Algorithm Sequential Decoding Algorithms of Convolutional Codes: Implementation, Improvement and Comparison [Volume 3, Issue 2, 2015, Pages 61-73]
  • Vulnerabilities Static detection A new approach for static detection of security vulnerabilities in web applications [Volume 2, Issue 4, 2014, Pages 65-74]
  • Vulnerability The Impact of Security Mechanisms on Software Vulnerabilities [Volume 2, Issue 1, 2014, Pages 49-60]
  • Vulnerability Automated Exploit Generation For Application’s Vulnerability [Volume 4, Issue 1, 2016, Pages 35-50]
  • Vulnerability A Decision-Making Model in a Cyber Conflicts Acted Upon Vulnerability, Based on Game Theoretic Analysis [Volume 6, Issue 2, 2018, Pages 21-28]
  • Vulnerability PIVATool- a fast and precise tool for analysis and detection of PendingIntent vulnerabilities [Volume 9, Issue 2, 2021, Pages 75-83]
  • Vulnerability Automatic XSS Exploit Generation Using Grammatical Evolution [Volume 9, Issue 2, 2021, Pages 101-119]
  • Vulnerability Investigating The Effect of Social Engineering Techniques on Employees Vulnerability (Case study: Tehran Municipality Employees) [Volume 11, Issue 1, 2023, Pages 31-46]
  • Vulnerability Probability Graph A new approach for static detection of security vulnerabilities in web applications [Volume 2, Issue 4, 2014, Pages 65-74]
  • VuWaDB database The relationship of software vulnerabilities and workarounds [Volume 8, Issue 2, 2020, Pages 75-81]

W

  • Wavelet Conversion Blind symbol Rate estimation in multipath channels [Volume 10, Issue 3, 2022, Pages 59-66]
  • Wavelet Transform A New Method for Cancelling CW Jamming in GPS Receivers [Volume 4, Issue 1, 2016, Pages 69-79]
  • Wavelet Transform A New Method for Image Steganography Using Discrete Wavelet Transforms [Volume 7, Issue 3, 2019, Pages 83-91]
  • Wavelet Transform Interference Mitigation in Cognitive Radio Communication Systems Based on the Wavelet Transform [Volume 9, Issue 4, 2021, Pages 55-66]
  • Wavelet Transform Novel Spoofing Mitigation Method using Wavelet Transform Based on PSO Algorithm in the Acquisition Stage of GPS Receiver [Volume 10, Issue 4, 2022, Pages 19-31]
  • WDM-PON A Techno-Economic Model of Sustainable Communication Infrastructure in the Smart City; using WDM-PON FTTx [Volume 9, Issue 1, 2021, Pages 149-156]
  • Weak Signal Enhancing Vector Tracking Accuracy of GPS in Weak Signal Condition Based on Adaptive Strong Tracking Kalman Filter​ [Volume 6, Issue 3, 2018, Pages 1-12]
  • WEB Web Covert Timing Channel Detection based on Entropy [Volume 8, Issue 3, 2020, Pages 13-23]
  • Web Applications A new approach for static detection of security vulnerabilities in web applications [Volume 2, Issue 4, 2014, Pages 65-74]
  • Web Applications Detection and Prevention of SQL Injection Attacks at Runtime Using Decision Tree Classification [Volume 8, Issue 4, 2020, Pages 75-93]
  • Web Applications Detection of the Remote Code Execution Attacks Using the PHP Web Application Intrusion Detection System [Volume 10, Issue 2, 2022, Pages 75-85]
  • Web-Applications Web-based Military Management Systems Security Using Combination of One-class Classifiers [Volume 3, Issue 3, 2015, Pages 19-30]
  • Weighted Least Square Eerror Wireless Target Localization Using Median Weighted Least Square Error Metric in the Presence of Non-Line of Sight Signals [Volume 8, Issue 2, 2020, Pages 125-133]
  • Weighted Scale-Free Network Malware Propagation Modeling Considering Software Diversity Approach in Weighted Scale-Free Network [Volume 6, Issue 3, 2018, Pages 131-140]
  • Weighted smoothed l0 norm Applying weighted smoothed norm in sparse representation classification for face recognition [Volume 11, Issue 3, 2023, Pages 57-65]
  • Weighted Voting Detection of Unknown Malicious Network Streams using Ensemble Learning [Volume 6, Issue 2, 2018, Pages 93-108]
  • Whale optimization algorithm Feature selection using a combination of Genetic-Whale-Ant colony algorithms for software fault prediction by machine learning [Volume 10, Issue 1, 2022, Pages 33-45]
  • Whale optimization algorithm An Optimized Compound Deep Neural Network Integrating With Feature Selection for Intrusion Detection System in Cyber Attacks [Volume 10, Issue 4, 2022, Pages 41-51]
  • Wideband Beamforming A New Method in Wide Band Adaptive Beam Forming By Deep Learning Method In An Array System [Volume 11, Issue 3, 2023, Pages 35-47]
  • Wireless Ad hoc Networks A New Hybrid Approach for Traffic Identification and Classification in Wireless Networks [Volume 10, Issue 2, 2022, Pages 31-41]
  • Wireless networks Secure and Fast Re-authentication Protocol to Support Extensive Movement of Users in IEEE 802.1X Wireless Networks [Volume 3, Issue 4, 2015, Pages 71-80]
  • Wireless networks Performance Improvement of the ODMRP Protocol using Analysis of the Received Signal Strength Level [Volume 7, Issue 3, 2019, Pages 21-26]
  • Wireless networks Security of UAV Relay Networks based on Covert Communication in the Presence of an Eavesdropping UAV [Volume 11, Issue 2, 2023, Pages 45-56]
  • Wireless Networks Security Secure and Fast Re-authentication Protocol to Support Extensive Movement of Users in IEEE 802.1X Wireless Networks [Volume 3, Issue 4, 2015, Pages 71-80]
  • Wireless Sensor Network Target Tracking Algorithm in Wireless Sensor Networks with Optimum Power Consumption Using Quantized Observation [Volume 6, Issue 2, 2018, Pages 109-121]
  • Wireless Sensor Network A Trust Model Based on Swarm Intelligence Algorithms in WSNs [Volume 7, Issue 1, 2019, Pages 1-10]
  • Wireless Sensor Network Clustering and Routing in Wireless Sensor Networks Using Multi-Objective Cuckoo Search and Game Theory [Volume 10, Issue 3, 2022, Pages 11-20]
  • Wireless Sensor Networks Enhance Media Access Control in IEEE 802.15.4 Based Smart Grids using Swarm Intelligence Algorithms [Volume 7, Issue 3, 2019, Pages 9-20]
  • Wireless Sensor Networks Energy-Harvesting Aware Multi-Hop Routing in Wireless Sensor Networks for Defense Applications [Volume 8, Issue 4, 2020, Pages 63-73]
  • Wireless Sensor Networks A Heuristic Data Diffusion and Gathering Scheme Using Virtual Line for Wireless Sensor Networks with Mobile Sink [Volume 9, Issue 2, 2021, Pages 195-207]
  • Wireless Sensor Networks Energy-aware routing in wireless sensor networks using MLP and simulated annealing algorithms [Volume 9, Issue 3, 2021, Pages 133-142]
  • Word Embedding Automatic Persian Text Generation Using Rule-Based Models and Word Embedding [Volume 9, Issue 4, 2021, Pages 43-54]
  • Word Embedding Investigation of the Semantic Similarity of Persian Sentences Using Vector Space Adaptation And Deep Learning [Volume 10, Issue 2, 2022, Pages 43-56]
  • Word Sense Disambiguation An Approach Based on Semantic Similarity in Persian Query-Based Summarization [Volume 2, Issue 3, 2014, Pages 51-63]
  • Word Similarity Automatic Keyword Extraction from Persian short Text Using word2vec [Volume 8, Issue 2, 2020, Pages 105-114]
  • Workaround The relationship of software vulnerabilities and workarounds [Volume 8, Issue 2, 2020, Pages 75-81]
  • Worm Smart Detection of Covert Worms in Computer Networks [Volume 7, Issue 4, 2019, Pages 67-77]

X

  • XACML Architecture TNAC: A Novel Trust Negotiation Based Access Control Model Using XACML Architecture [Volume 3, Issue 1, 2015, Pages 53-67]
  • X-ray images Improve the detection of dangerous objects in x-ray images in security and military inspections using image processing approaches [Volume 10, Issue 4, 2022, Pages 81-89]

Z

  • Zero day Smart Detection of Covert Worms in Computer Networks [Volume 7, Issue 4, 2019, Pages 67-77]
  • Zero-Day Attacks A Security Model Based Approach for Dynamic Risk Assessment of Multi-Step Attacks in Computer Networks [Volume 9, Issue 1, 2021, Pages 157-173]