A
-
A5 Ciphering Algorithms
Prediction of Plaintext in GSM Network using SDCCH Logical Channel [Volume 9, Issue 3, 2021, Pages 39-47]
-
Access Control
TNAC: A Novel Trust Negotiation Based Access Control Model Using XACML Architecture [Volume 3, Issue 1, 2015, Pages 53-67]
-
Action Abstraction
A Framework for Evaluating Malware and Countermeasures with an Analytical Approach based on the Game Theory
Case Study: Actors' Actions Based on Environmental Evidence [Volume 10, Issue 1, 2022, Pages 47-71]
-
Active Cyber Defense
The Presentation of an Active Cyber Defense Model for Application in Cyber Deception Technology [Volume 9, Issue 4, 2021, Pages 125-140]
-
Active Cyber Defense
A cooperative and independent deception system in the active cyber defense system [Volume 10, Issue 2, 2022, Pages 129-142]
-
Active Learnin
A Comprehensive Semi-Suprvised Model for Collaborative Intrusion Detection Based on Network Behavior Profiling Using The Concept of Deep Learning and Fuzzy Correlation of Alerts along [Volume 9, Issue 3, 2021, Pages 165-186]
-
Active learning
DDoS Attack Detection System Using Ensemble Method Classification and Active Learning Approach [Volume 11, Issue 3, 2023, Pages 101-118]
-
Activity
Identifying Influential Nodes in Social Networks by Integrating the Centrality Method and Node Activity [Volume 8, Issue 3, 2020, Pages 1-11]
-
Adaptive Algorithm
Blind Frequency Offset Estimation using Adaptive Algorithms in Non-Coherent OFDM Systems [Volume 3, Issue 4, 2015, Pages 61-70]
-
Adaptive Kalman Filter
Three-Dimensional Angles Measurement using IME based on MEMS Technology by Adaptive Kalman Filter [Volume 7, Issue 2, 2019, Pages 81-91]
-
Adaptive Neuro-Fuzzy Inference System
Investigation of a new ensemble method of intrusion detection system on different data sets [Volume 10, Issue 3, 2022, Pages 43-57]
-
Adaptive Notch Filter
Reducing Interference Effect on GPS Navigation System Using Evolutionary Notch Filter [Volume 8, Issue 4, 2020, Pages 95-106]
-
Adaptive Post-Processing
An Integrated Algorithm for Optimal Detection of Weak Radar Targets Masked by the Sidelobes of a Strong Target [Volume 6, Issue 4, 2018, Pages 91-104]
-
Adaptive Power And Modulation
Performance Analysis of Free Space Optical Communication Links under M-PAM and M-PSK Modulations using Adaptive Power and Modulation Techniques [Volume 7, Issue 1, 2019, Pages 63-75]
-
Adaptive Pulse Compression
An Integrated Algorithm for Optimal Detection of Weak Radar Targets Masked by the Sidelobes of a Strong Target [Volume 6, Issue 4, 2018, Pages 91-104]
-
Adaptive UKF
High Maneuvering Target Tracking Based on Augmented State Method using Adaptive Unscented Kalman Filter [Volume 7, Issue 2, 2019, Pages 93-108]
-
Adder
The residue number system component design based on OneHot coding [Volume 10, Issue 1, 2022, Pages 119-133]
-
Ad-hoc Networks
Security of UAV Relay Networks based on Covert Communication in the Presence of an Eavesdropping UAV [Volume 11, Issue 2, 2023, Pages 45-56]
-
Advanced Encryption Standard
A New And Efficient Method of Mass Masking and its Resistance Assessment to Power Analysis [Volume 6, Issue 2, 2018, Pages 123-134]
-
Advanced Encryption Standard
A Practical Template Attack Against the Implementation of the Advanced Encryption Standard on ARM Processor [Volume 7, Issue 1, 2019, Pages 39-48]
-
Advanced Persistent Threats
Detection of advanced Cyber Attacks, Using Behavior Modeling Based on Natural Language Processing [Volume 6, Issue 3, 2018, Pages 141-151]
-
AES
Introducing a new timing attack on the ARM processor and its practical implementation on the Raspberrypi3 board [Volume 8, Issue 1, 2020, Pages 125-132]
-
Agent-Oriented Architecture
Providing an Agent-Based Architecture for Semantic Mining From Large-Scale Data in Distributed Environments [Volume 8, Issue 3, 2020, Pages 83-99]
-
Aggregate signature
Security Analysis and Improvement of an Intelligent Transportation System based on Certificateless Aggregate Signature [Volume 8, Issue 1, 2020, Pages 25-33]
-
AKA Procedure
Analyzing Security Challenges of LTE Networks, Obstacles and Opportunities of Network Localization
Based on the Standard Platform [Volume 7, Issue 2, 2019, Pages 121-132]
-
Alert Management
A Foresight Framework for Intrusion Response Systems in Computer Networks [Volume 6, Issue 3, 2018, Pages 13-34]
-
Algorithm Kernel density Estimation
Detecting Fake Accounts in Social Networks Using Principal Components
Analysis and Kernel
Density Estimation Algorithm (A Case Study on the Twitter Social Network) [Volume 9, Issue 3, 2021, Pages 109-123]
-
AL-OFDM
Identification of STBC-OFDM Signals by Second-Order Cyclostationarity Method [Volume 7, Issue 4, 2019, Pages 27-36]
-
ALOHA
Introduction of An Anti-Collision Protocol in RFID Systems [Volume 8, Issue 4, 2020, Pages 119-128]
-
Analysis
dentifying Zero Day Android Daily through Neural Networks [Volume 11, Issue 3, 2023, Pages 49-55]
-
Analyzer Environment
A Secure Environment for Behavioral Malware Analysis [Volume 2, Issue 3, 2014, Pages 65-76]
-
Android
dentifying Zero Day Android Daily through Neural Networks [Volume 11, Issue 3, 2023, Pages 49-55]
-
Anomalous Subgraphs
Concurrent Detection of Compact Anomalous Subgraphs in Large Social Networks [Volume 9, Issue 2, 2021, Pages 179-194]
-
Anomaly Detection
Hybrid Anomaly detection method using community detection in graph and feature selection [Volume 8, Issue 1, 2020, Pages 17-24]
-
Anomaly Detection
An Accelerated Method for Rules Anomaly Detection in Software Defined Networks [Volume 8, Issue 4, 2020, Pages 31-39]
-
Anomaly Detection
Anomaly Detection in Dynamic Social Networks Based on Behavioral Measurements [Volume 9, Issue 1, 2021, Pages 115-123]
-
Anomaly Detection
Real-time Topology-based Tracking of Microscopic Objects [Volume 9, Issue 3, 2021, Pages 1-20]
-
Anomaly Detection
Concurrent Detection of Compact Anomalous Subgraphs in Large Social Networks [Volume 9, Issue 2, 2021, Pages 179-194]
-
Anomaly Detection
The Presentation of a Hybrid Anomaly Detection Model Using Inverse Weight Clustering and Machine Learning in Cloud Environments [Volume 9, Issue 4, 2021, Pages 21-29]
-
Anonymity
A Mutual Anonymity Private Authentication Protocol to Use in Radio-Frequency Identification Systems [Volume 6, Issue 4, 2018, Pages 45-59]
-
Anonymity
A new attack on Jakobsson Hybrid Mix-Net [Volume 7, Issue 3, 2019, Pages 113-119]
-
Anonymity
Distributed Anonymity Based On the Integrated Block Chain in Vehicular Ad Hoc Network [Volume 8, Issue 4, 2020, Pages 41-52]
-
Anonymity
Design a Blockchain based Electronic Payment with Users’ Anonymity [Volume 9, Issue 2, 2021, Pages 85-100]
-
Anonymity
Evaluation and proof of routing algorithm in Tor anonymity network [Volume 11, Issue 3, 2023, Pages 15-24]
-
Anonymous Networks
Designing Anonymous Communication System by Lattice-Based Cryptography [Volume 2, Issue 3, 2014, Pages 13-22]
-
Anova F-value
An Optimized Compound Deep Neural Network Integrating With Feature Selection for Intrusion Detection System in Cyber Attacks [Volume 10, Issue 4, 2022, Pages 41-51]
-
Ant Colony Algorithm
Sequential Forward Feature Selection for Intrusion Detection System, Using Ant Colony Algorithm [Volume 6, Issue 2, 2018, Pages 49-63]
-
Ant Colony Optimization Algorithm
Feature selection using a combination of Genetic-Whale-Ant colony algorithms for software fault prediction by machine learning [Volume 10, Issue 1, 2022, Pages 33-45]
-
Antenna Array
Improvement of Security in Wireless Communication Networks with Directional Modulation and Artificial Noise [Volume 10, Issue 4, 2022, Pages 11-18]
-
Anti-analysis techniques
An Effective Method to Detect Environment-Aware Malware Based on the Behavioral Distances Comparison [Volume 6, Issue 4, 2018, Pages 123-133]
-
Anti_collision protocol
Introduction of An Anti-Collision Protocol in RFID Systems [Volume 8, Issue 4, 2020, Pages 119-128]
-
API Calls
Improvement in the Ransomwares Detection Method With New API
Calls Features [Volume 8, Issue 4, 2020, Pages 107-118]
-
Approximate Dual
Finite Frame as Code: Some Characterizations for Error Correction Codes and Three Algorithms for Troubleshooting in Data Transfer [Volume 7, Issue 2, 2019, Pages 1-12]
-
Archimedes optimization algorithm
Presenting a new sentiment analysis method based on multi-objective Archimedes optimization algorithm and machine learning [Volume 11, Issue 4, 2023]
-
Area Coverage
Optimal Placement of Cameras to Maximize Visual Coverage using Genetic Algorithm and Harmony Search [Volume 7, Issue 1, 2019, Pages 49-61]
-
ARM Microprocessor
A Practical Template Attack Against the Implementation of the Advanced Encryption Standard on ARM Processor [Volume 7, Issue 1, 2019, Pages 39-48]
-
Artificial Neural Networks
Network Intrusion Detection using a combination of artificial neural networks in a hierarchical manner [Volume 8, Issue 1, 2020, Pages 89-99]
-
Artificial noise
The Analysis and Design of Secure Wireless Networks in the Presence of Users with Different Security Needs Based on Covert Communication and Secure Transmission of Information Theory in the Presence of a Friendly Jammer [Volume 9, Issue 4, 2021, Pages 67-76]
-
Artificial Noise (AN)
Improving the Security in Cellular Communications Networks with adding Artificial Noise by method Non-Orthogonal Resource Allocation Techniques [Volume 9, Issue 2, 2021, Pages 135-142]
-
Artificial noise forwarding
Information Theoretic Secret Key Agreement Based on Localization [Volume 8, Issue 2, 2020, Pages 35-49]
-
Assignment and Scheduling Sensor-Weapon/Threat
Modelling and optimal solving of dependent sensor-weapon/threat assignment and scheduling problem by a metaheuristic algorithm based on GRASP [Volume 8, Issue 1, 2020, Pages 35-50]
-
Association Rules
Providing an Ontology-Based Method for Exploring the Association Rules in
Multi-Agent Distributed Environments [Volume 9, Issue 1, 2021, Pages 1-17]
-
Atmospheric Turbulence
Performance Analysis of Free Space Optical Communication Links under M-PAM and M-PSK Modulations using Adaptive Power and Modulation Techniques [Volume 7, Issue 1, 2019, Pages 63-75]
-
Atmospheric Turbulence
Introducing an Optimal Modulation Constellation, Resistant to Atmospheric Turbulence [Volume 8, Issue 2, 2020, Pages 115-124]
-
Attack Ability
A Decision-Making Model in a Cyber Conflicts Acted Upon Vulnerability, Based on Game Theoretic Analysis [Volume 6, Issue 2, 2018, Pages 21-28]
-
Attack Graph
Deterrence Model in Cyberspace Based on Bayesian Belief Attack Graph by using Risk Creating Payoff Function [Volume 7, Issue 1, 2019, Pages 25-38]
-
Attack Graph
A Security Model Based Approach for Dynamic Risk Assessment of Multi-Step Attacks in Computer Networks [Volume 9, Issue 1, 2021, Pages 157-173]
-
Attacks
Weaknesses of SPRS Authentication Protocol and Present a Developed Protocol for RFID Systems [Volume 3, Issue 3, 2015, Pages 39-48]
-
Attack Tree
Design the Model of CSRF Attack Tree for Immunization the Web Application in Development Process [Volume 3, Issue 1, 2015, Pages 41-52]
-
Attack Sequence
Modeling of Obfuscated Multi- Stage cyber Attacks [Volume 8, Issue 2, 2020, Pages 61-73]
-
Attribute based encryption
A Novel and Secure Model for Sharing Protected Health Record (PHR) Based on Blockchain and Attribute Based Encryption [Volume 8, Issue 1, 2020, Pages 101-124]
-
Auction Algorithm
The IoT Resource Allocation Improvement in Fog Computing Using Non-Cooperative Game Theory [Volume 9, Issue 4, 2021, Pages 147-158]
-
Audio watermarking
Transparent and Robust Audio Watermarking Using Synergy LU Decomposition and the Fibonacci Sequence in GBT-DCT-DWT Transforms [Volume 9, Issue 1, 2021, Pages 101-113]
-
Augmented State Approac
High Maneuvering Target Tracking Based on Augmented State Method using Adaptive Unscented Kalman Filter [Volume 7, Issue 2, 2019, Pages 93-108]
-
Authentication
Utilizing Port-Knocking as first defensive layer at defense-in-depth strategies using hybrid of the Internet Control Message Protocol features, Internet Addresses and Tunneling [Volume 2, Issue 4, 2014, Pages 25-40]
-
Authentication
Phishing Website Detection for e-Banking by Inclined Planes Optimization Algorithm [Volume 3, Issue 1, 2015, Pages 29-39]
-
Authentication
Secure and Fast Re-authentication Protocol to Support Extensive Movement of Users in IEEE 802.1X Wireless Networks [Volume 3, Issue 4, 2015, Pages 71-80]
-
Authentication
A Scheme for Improvement of Security and Privacy in Mobile Health Systems by Using SIM Card [Volume 7, Issue 1, 2019, Pages 11-24]
-
Authentication
A New Method for Image Steganography Using Discrete Wavelet Transforms [Volume 7, Issue 3, 2019, Pages 83-91]
-
Authentication
A secure three factor authentication scheme for wireless
healthcare sensor networks based on elliptic curve [Volume 8, Issue 1, 2020, Pages 147-167]
-
Authentication protocol
A Mutual Authentication Protocol for IoT Users in Cloud Environment [Volume 9, Issue 2, 2021, Pages 17-28]
-
Autocorrelation
Blind symbol Rate estimation in multipath channels [Volume 10, Issue 3, 2022, Pages 59-66]
-
Automated evaluation
The Automated Security Evaluation of Threat Paths Based on Petri Nets [Volume 9, Issue 4, 2021, Pages 87-98]
-
Automatically Generate Optimized Test Data
A novel way to identify effective test-case in software testing [Volume 11, Issue 2, 2023, Pages 103-116]
-
Automatic Text Generation
Automatic Persian Text Generation Using Rule-Based Models and Word Embedding [Volume 9, Issue 4, 2021, Pages 43-54]
-
Autonomous Distributed System
Self-stabilizing Grundy Coloring Using Game Theory and Heuristics Ordering [Volume 6, Issue 2, 2018, Pages 39-48]
-
Autonomous vehicles
The Semantic Segmentation of Autonomous Vehicles Images with the Teacher-Student Technique [Volume 9, Issue 4, 2021, Pages 1-19]
-
Autotracking
Simulation the modify FSM , in autotracking systems to Stabilization secure links of free space optical communications [Volume 2, Issue 1, 2014, Pages 61-69]
-
Auxiliary particle filter
On Improvement of Cardinalized Probability Hypothesis Density Filter Implementation by using Auxiliary Particle Filter [Volume 3, Issue 4, 2015, Pages 23-41]
B
-
BAN logic
A Novel and Secure Model for Sharing Protected Health Record (PHR) Based on Blockchain and Attribute Based Encryption [Volume 8, Issue 1, 2020, Pages 101-124]
-
Basic reproductive ratio
SCEIRS information dissemination model based on rumor spreading in complex networks [Volume 9, Issue 2, 2021, Pages 121-134]
-
Basis Matrix
Inverse Synthetic Aperture Radar (ISAR) Imaging of Targets with Non-Uniform Motion and Constant Acceleration based on Compressed Sensing [Volume 9, Issue 2, 2021, Pages 51-62]
-
Bayesian Network
Target Threat Assessment using Rule-Based Joint Fuzzy and Probabilistic Networks [Volume 6, Issue 4, 2018, Pages 61-78]
-
Bayesian Network
A Trust Evaluation Model for Cloud Computing Using Bayesian Network [Volume 10, Issue 4, 2022, Pages 53-61]
-
BB84 protocol
Generalized Version of the BB84 QKD Protocol with n Polarization Bases and Unequal Probabilities [Volume 9, Issue 1, 2021, Pages 125-136]
-
Beamforming
Robust Adaptive Beamforming Against Interferer’s Direction Of Arrival Estimation Error [Volume 7, Issue 3, 2019, Pages 27-36]
-
Beam Steerer
Simulation the modify FSM , in autotracking systems to Stabilization secure links of free space optical communications [Volume 2, Issue 1, 2014, Pages 61-69]
-
Behavior
Detection of advanced Cyber Attacks, Using Behavior Modeling Based on Natural Language Processing [Volume 6, Issue 3, 2018, Pages 141-151]
-
Behavioral Distance
An Effective Method to Detect Environment-Aware Malware Based on the Behavioral Distances Comparison [Volume 6, Issue 4, 2018, Pages 123-133]
-
Behavioral Distance
Kavosh: Offering an Analysis Method and the Impact of Normal Network Traffic on Selection and Extraction Based on the Minkowski Distance [Volume 9, Issue 1, 2021, Pages 137-147]
-
Behavioral Measurement
Anomaly Detection in Dynamic Social Networks Based on Behavioral Measurements [Volume 9, Issue 1, 2021, Pages 115-123]
-
Behavioral Model
Implementing a Novel Malware Detection System in Virtual Machines [Volume 2, Issue 3, 2014, Pages 23-33]
-
Behavioral signature
Kashef: A Two-step detector of Windows-based Malicious executable files [Volume 10, Issue 2, 2022, Pages 143-156]
-
Belief Model
Projection of Muli Stage Cyber Attack Based on Belief Model and Fuzzy Inference [Volume 3, Issue 2, 2015, Pages 13-28]
-
BER
Simulation the modify FSM , in autotracking systems to Stabilization secure links of free space optical communications [Volume 2, Issue 1, 2014, Pages 61-69]
-
Bidimensional Empirical Mode Decomposition
Improving the Quality of Millimeter Wave Images by Fusion with Visible Images [Volume 9, Issue 4, 2021, Pages 77-86]
-
Big Data
Real-time Topology-based Tracking of Microscopic Objects [Volume 9, Issue 3, 2021, Pages 1-20]
-
Bilinear Pairing
A New (t,n) Designated Verifier Threshold Proxy Signature Scheme in the Standard Model [Volume 2, Issue 1, 2014, Pages 25-35]
-
Bilinear Pairing
An Improved Authentication Scheme with Conditional Privacy Preserving in VANETs [Volume 3, Issue 2, 2015, Pages 1-12]
-
Biometric
An Improvement on the Identification via Gait Using the Genetic Algorithm [Volume 9, Issue 4, 2021, Pages 31-42]
-
Biometrics
Offline text-Independent Persian handwriting Forgery Detection using Texture Analysis [Volume 7, Issue 3, 2019, Pages 37-52]
-
Bionic Signals
Covert and Secure Underwater Acoustic Communication using Merkle Hash Tree and Dolphin Whistle [Volume 6, Issue 2, 2018, Pages 135-146]
-
Bipartite graph
The relationship of software vulnerabilities and workarounds [Volume 8, Issue 2, 2020, Pages 75-81]
-
Blacklist
Comparison of Supervised Machine Learning Algorithms in Detection of Botnets Domain Generation Algorithms [Volume 8, Issue 4, 2020, Pages 17-29]
-
Blind Estimation
The New Algorithm for The Blind Extraction of The Radio Frequency Fingerprint Using the Specific Features of High-Power Amplifier and Local Oscillator [Volume 11, Issue 1, 2023, Pages 57-65]
-
Blind estimation of number of users
Introduction of the Entropy-Based Method for Finding Influential Nodes in Information Dissemination on Online Social Networks [Volume 6, Issue 2, 2018, Pages 1-10]
-
Blind estimation of number of users
Blind Estimation of Number of Users in TDMA Networks Using Redundancy of Adaptive Channel Coding [Volume 6, Issue 2, 2018, Pages 11-20]
-
Blind Recognition
A New Method for Blind Recognition of the Initial State of Synchronous Scramblers When Located after the Channel Encoder [Volume 9, Issue 1, 2021, Pages 19-27]
-
Blockchain
A Novel and Secure Model for Sharing Protected Health Record (PHR) Based on Blockchain and Attribute Based Encryption [Volume 8, Issue 1, 2020, Pages 101-124]
-
Blockchain
Design a Blockchain based Electronic Payment with Users’ Anonymity [Volume 9, Issue 2, 2021, Pages 85-100]
-
Block Cipher
Analysis of Impossible Differential on LowMC Block Cipher [Volume 7, Issue 2, 2019, Pages 69-79]
-
Block Cipher
Structural Analysis based on Integral Characteristic of a Reduced Round Block Cipher with Making an Improvement [Volume 7, Issue 3, 2019, Pages 1-8]
-
Block Cipher
Upper Bounds for the Probability of Differential Characteristics of Five Block Cipher
Constructions Functions [Volume 8, Issue 4, 2020, Pages 129-137]
-
Bot
Botnet Detection for Peer to Peer Networks [Volume 3, Issue 4, 2015, Pages 43-60]
-
Botnet
Botnet Detection for Peer to Peer Networks [Volume 3, Issue 4, 2015, Pages 43-60]
-
Botnet
The Distributed Denial of Service Attacks Situation Awareness Based on The Prediction of Battle Scene Using Dempster-Shefer Evidences Theories and Bayesian Rules [Volume 7, Issue 1, 2019, Pages 77-94]
-
Botnet
Detecting Botnets with Timing-Based Covert Command and Control Channels [Volume 7, Issue 4, 2019, Pages 1-15]
-
Botnet
P2P Botnet Detection Using Deep Learning Method [Volume 8, Issue 2, 2020, Pages 1-14]
-
Botnet
Comparison of Supervised Machine Learning Algorithms in Detection of Botnets Domain Generation Algorithms [Volume 8, Issue 4, 2020, Pages 17-29]
-
Botnet
Detecting of Botnets’ Malicious Domains with Deep Autoencoder Neural Network [Volume 9, Issue 1, 2021, Pages 61-74]
-
Botnet
Kavosh: Offering an Analysis Method and the Impact of Normal Network Traffic on Selection and Extraction Based on the Minkowski Distance [Volume 9, Issue 1, 2021, Pages 137-147]
-
Botnet
Mobile botnets detection using deep learning techniques [Volume 11, Issue 2, 2023, Pages 31-43]
-
Botnet Detection
Botnet Detection for Peer to Peer Networks [Volume 3, Issue 4, 2015, Pages 43-60]
-
Botnet Detection
P2P Botnet Detection Using Deep Learning Method [Volume 8, Issue 2, 2020, Pages 1-14]
-
Botnet Detection
Mobile botnets detection using deep learning techniques [Volume 11, Issue 2, 2023, Pages 31-43]
-
Breaking Time
Optimum Parameter Selection for Rainbow Table TMTO Attack Considering Breaking Time and Using Sequential and Index Search Methods [Volume 3, Issue 3, 2015, Pages 49-57]
-
Buffer Overflow
Automated Exploit Generation For Application’s Vulnerability [Volume 4, Issue 1, 2016, Pages 35-50]
-
Buffer Overflow Error
The Impact of Security Mechanisms on Software Vulnerabilities [Volume 2, Issue 1, 2014, Pages 49-60]
C
-
Capability
Projection of Cyber Attacks using Damage Estimation and Combination of Attacker’s Capability and Opportunity based on Transferable Belief Model [Volume 6, Issue 4, 2018, Pages 1-12]
-
Capacity
Relating the Detection Rate, Capacity and the Cost of Steganography by Steganographer Modeling [Volume 6, Issue 3, 2018, Pages 81-94]
-
Cardinal Hermite functions
Cardinal Hermit functions and their application in solving the time-delay fractional optimal control problems [Volume 8, Issue 4, 2020, Pages 153-160]
-
Cardinalized PHD
On Improvement of Cardinalized Probability Hypothesis Density Filter Implementation by using Auxiliary Particle Filter [Volume 3, Issue 4, 2015, Pages 23-41]
-
Carrier Frequency
Detection of Interfering Signals and Estimation of Their Carrier Frequency in CNC Satellite Communications using Cyclic Spectrum Density [Volume 11, Issue 2, 2023, Pages 91-101]
-
Cartesian Product
Some New Bounds on the Information Ratio of the Cartesian Product of Some Classes of Graphs [Volume 6, Issue 4, 2018, Pages 135-142]
-
C&C Server
Comparison of Supervised Machine Learning Algorithms in Detection of Botnets Domain Generation Algorithms [Volume 8, Issue 4, 2020, Pages 17-29]
-
Cellular communications network
Enhancing Communication Security in Cellular Communications Networks by using Interference Alignment Technique [Volume 3, Issue 2, 2015, Pages 49-60]
-
Cellular phone
An Anti-Spam Framework for Advertising Targeting Smart Mobile Devices on IoT [Volume 6, Issue 2, 2018, Pages 65-81]
-
Centrality
Identifying Influential Nodes in Social Networks by Integrating the Centrality Method and Node Activity [Volume 8, Issue 3, 2020, Pages 1-11]
-
Centralized Daemon
Self-stabilizing Grundy Coloring Using Game Theory and Heuristics Ordering [Volume 6, Issue 2, 2018, Pages 39-48]
-
CEP
Optimization of Site Topologies and Delay Extraction in Radar Emitter Location [Volume 2, Issue 2, 2014, Pages 41-51]
-
Certificateless Cryptography
Security Analysis and Improvement of an Intelligent Transportation System based on Certificateless Aggregate Signature [Volume 8, Issue 1, 2020, Pages 25-33]
-
Chaff
Recognition Chaff from target by determining the optimal waveform in the radar detector using artificial neural network [Volume 11, Issue 2, 2023, Pages 117-132]
-
Channel Coding
Quality enhancement of received video using secondary channel encoding in Joint Source and Channel Coding (JSCC) [Volume 3, Issue 2, 2015, Pages 29-48]
-
Channel Coding
A New Method for Combining the Channel Coding with Polar Coding-Based Encryption [Volume 4, Issue 1, 2016, Pages 1-8]
-
Channel Encoder
A New Method for Blind Recognition of the Initial State of Synchronous Scramblers When Located after the Channel Encoder [Volume 9, Issue 1, 2021, Pages 19-27]
-
Chaos Theory
Energy Aware Routing in the Internet of Things using improved Grasshopper Metaheuristic Algorithm [Volume 11, Issue 1, 2023, Pages 15-29]
-
Chaos Theory
Improving mobile mass monitoring in the IoT environment based on Chaotic Fog Algorithm [Volume 11, Issue 3, 2023, Pages 77-88]
-
Chaotic Processing
Guilty Knowledge Test by Chaotic Processing of Electroencephalogram Signals Based on Fuzzy Recurrence Plot [Volume 10, Issue 2, 2022, Pages 87-104]
-
Charge Simulation Method
A New Method to Evaluate the Launch Pad Lightning Protection
System Performance by Using LPM in 3-D [Volume 3, Issue 1, 2015, Pages 15-27]
-
CICIDS2017 dataset
DDoS Attack Detection System Using Ensemble Method Classification and Active Learning Approach [Volume 11, Issue 3, 2023, Pages 101-118]
-
Cipher Chains
Hellman Chains Analysis Base on Graph of Random Function [Volume 4, Issue 1, 2016, Pages 81-89]
-
Class I amplifier
Design and Simulation of a LORAN Signal Generator for LPS Transmitter Using Class I Amplifier [Volume 8, Issue 2, 2020, Pages 25-33]
-
Classification
An Optimized Unsupervised Feature Selection Algorithm [Volume 3, Issue 3, 2015, Pages 1-7]
-
Classification
Improving Intrusion Detection System Using a New Feature Selection Technique [Volume 6, Issue 4, 2018, Pages 143-152]
-
Classification
Improvement in the Ransomwares Detection Method With New API
Calls Features [Volume 8, Issue 4, 2020, Pages 107-118]
-
Classification
Detection of Slippery Road Conditions using the Road CCTV Images based on the Convolutional Neural Networks and Transfer Learning [Volume 10, Issue 2, 2022, Pages 105-116]
-
Classification
Developing an Improved Method for Malware Attack Detection in Cloud Computing using Ensemble Learning [Volume 10, Issue 4, 2022, Pages 33-39]
-
Classification
A method to prediction of software system’s code smells using neural network [Volume 11, Issue 3, 2023, Pages 67-76]
-
Classification Algorithm
Distributed Denial of Service Attacks Detection in Software Defined Networks [Volume 9, Issue 1, 2021, Pages 43-59]
-
Classification of Malware
Implementing a Novel Malware Detection System in Virtual Machines [Volume 2, Issue 3, 2014, Pages 23-33]
-
Classifier
Investigation of a new ensemble method of intrusion detection system on different data sets [Volume 10, Issue 3, 2022, Pages 43-57]
-
Classifiers
Modular human face recognition method based on principal component analysis and Mahalanobis distance [Volume 11, Issue 4, 2023]
-
Clock Control Function
Time Analysis Attack on a Stream Cipher Algorithm’s [Volume 4, Issue 1, 2016, Pages 51-57]
-
Closed Circuit Television (CCTV)
Optimal Placement of Cameras to Maximize Visual Coverage using Genetic Algorithm and Harmony Search [Volume 7, Issue 1, 2019, Pages 49-61]
-
Cloud service
Hybrid Method for Detecting Trustworthy Cloud Service Providers using Analytical Hierarchical Process and Neural Network [Volume 6, Issue 4, 2018, Pages 105-122]
-
Cloud service
A Trust Evaluation Model for Cloud Computing Using Bayesian Network [Volume 10, Issue 4, 2022, Pages 53-61]
-
Clustering
Fuzzy Keyword Search Scheme on an Encrypted Database in Cloud Computing Using Word Clustering [Volume 8, Issue 3, 2020, Pages 151-165]
-
Clustering
Energy-Harvesting Aware Multi-Hop Routing in Wireless Sensor Networks for Defense Applications [Volume 8, Issue 4, 2020, Pages 63-73]
-
Clustering
Energy-aware routing in wireless sensor networks using MLP and simulated annealing algorithms [Volume 9, Issue 3, 2021, Pages 133-142]
-
Clustering
Clustering and Routing in Wireless Sensor Networks Using Multi-Objective Cuckoo Search and Game Theory [Volume 10, Issue 3, 2022, Pages 11-20]
-
Clustering
Developing an Improved Method for Malware Attack Detection in Cloud Computing using Ensemble Learning [Volume 10, Issue 4, 2022, Pages 33-39]
-
Clustering
Providing a routing method in Internet of Things networks based on fuzzy logic and clustering
For use in smart transportatio [Volume 11, Issue 4, 2023]
-
CNC Satellite Communication
Detection of Interfering Signals and Estimation of Their Carrier Frequency in CNC Satellite Communications using Cyclic Spectrum Density [Volume 11, Issue 2, 2023, Pages 91-101]
-
CNN Algorithm
A Malware Classification Method Using visualization and Word Embedding Features [Volume 11, Issue 1, 2023, Pages 1-13]
-
Cognitive Radio
Frequency Spectrum Sensing by Multi-Stage Adaptive Optimization Algorithm with the Efficient Non-Cooperative Technique in Cognitive radios with hardware implementation [Volume 8, Issue 3, 2020, Pages 39-51]
-
Cognitive Radio
Reducing the Destructive Effect of Misbehaving Users in Cooperative Spectrum Sensing using Reinforcement Learning [Volume 10, Issue 4, 2022, Pages 1-9]
-
Cognitive Radio Network
Interference Mitigation in Cognitive Radio Communication Systems Based on the Wavelet Transform [Volume 9, Issue 4, 2021, Pages 55-66]
-
Cognitive Radio Sensor Network
A new analytical model for enhancing performance of cognitive radio user’s transmissions in the internet of things [Volume 9, Issue 3, 2021, Pages 73-82]
-
Cognitive Radio Technology
Joint Spectrum Sensing and Power Allocation for Multiband Cognitive Radio Networks Using Probabilistic Spectrum Access [Volume 6, Issue 3, 2018, Pages 117-130]
-
Coherent sources
Coherent Acoustic source DOA estimation by nested array based on sparse solution [Volume 8, Issue 1, 2020, Pages 79-88]
-
Collective Classification
Collusive Fraud Classification in Network of Online Auction Using Similarity Measure in Collective Classification [Volume 7, Issue 1, 2019, Pages 95-103]
-
Color image
A novel lossless color secret image sharing based on homogeneous linear recursion [Volume 10, Issue 3, 2022, Pages 107-118]
-
Combat Management Systems
Modelling and Solving the Location Problem of Fire Launching Sites [Volume 6, Issue 3, 2018, Pages 45-57]
-
Combat Management Systems
Modelling and Solving the Location Problem of Fire Launching Sites [Volume 6, Issue 3, 2018, Pages 59-64]
-
Combination of One-class Classifiers
Web-based Military Management Systems Security Using Combination of One-class Classifiers [Volume 3, Issue 3, 2015, Pages 19-30]
-
Combinatory steganography
Designing a combinatorial Image Steganography algorithm based on game theory [Volume 8, Issue 1, 2020, Pages 133-145]
-
Common Vulnerability Scoring System(CVSS)
A Security Model Based Approach for Dynamic Risk Assessment of Multi-Step Attacks in Computer Networks [Volume 9, Issue 1, 2021, Pages 157-173]
-
Communication delay
Guidance and distributed control of the networked UAVs [Volume 7, Issue 4, 2019, Pages 117-129]
-
Communication networks
A Greedy Algorithm for Constructing Region-Fault Tolerant Geometric Spanners [Volume 10, Issue 4, 2022, Pages 75-80]
-
Communication systems
Guidance and distributed control of the networked UAVs [Volume 7, Issue 4, 2019, Pages 117-129]
-
Comparator
Design of Content-Addressable Memory in Quantum-Dot Cellular Automata [Volume 8, Issue 4, 2020, Pages 53-61]
-
Complexity
A New Method for Combining the Channel Coding with Polar Coding-Based Encryption [Volume 4, Issue 1, 2016, Pages 1-8]
-
Complex network
SCEIRS information dissemination model based on rumor spreading in complex networks [Volume 9, Issue 2, 2021, Pages 121-134]
-
Complex War Scenes
The Presentation of a Model for Analyzing the Behavior of the Enemy Using Hidden Markov Models Based on Electronic Warfare Observations in Complex War Scenes [Volume 7, Issue 1, 2019, Pages 113-128]
-
Compressed Sensing (CS)
Inverse Synthetic Aperture Radar (ISAR) Imaging of Targets with Non-Uniform Motion and Constant Acceleration based on Compressed Sensing [Volume 9, Issue 2, 2021, Pages 51-62]
-
Compressive Sensing
Concurrent Detection of Compact Anomalous Subgraphs in Large Social Networks [Volume 9, Issue 2, 2021, Pages 179-194]
-
Computational operations
A Fast Method for Computation of Scalar Multiplication of Elliptic Curve Suitable for Elliptic Curve Cryptography System [Volume 3, Issue 3, 2015, Pages 9-17]
-
Conditional Privacy
Design a Blockchain based Electronic Payment with Users’ Anonymity [Volume 9, Issue 2, 2021, Pages 85-100]
-
Conditions Environment
A New Method For Gradual Detection of Environmental Conditions and Resources Required by Smart Malware [Volume 6, Issue 4, 2018, Pages 33-44]
-
Conflict Analysis
The Improvement of the GMCR Model Based on Statistical Analysis of the Game’ Graph (Case Study: Malwares and Countermeasures Actions Based on Detection-Independent and Deductive Evidence) [Volume 9, Issue 4, 2021, Pages 99-123]
-
Congestion control
A cross layer approach for improving the TCP quality-of-service parameters over the IEEE 802.11.ac wireless networks [Volume 10, Issue 1, 2022, Pages 109-117]
-
Constrained Optimization
Optimum Parameter Selection for Rainbow Table TMTO Attack Considering Breaking Time and Using Sequential and Index Search Methods [Volume 3, Issue 3, 2015, Pages 49-57]
-
Constraint non-linear optimization
Wireless Target Localization Using Median Weighted Least Square Error Metric in the Presence of Non-Line of Sight Signals [Volume 8, Issue 2, 2020, Pages 125-133]
-
Content addressable memory
Design of Content-Addressable Memory in Quantum-Dot Cellular Automata [Volume 8, Issue 4, 2020, Pages 53-61]
-
Content rating
Spam Management in Social Networks by Content Rating [Volume 2, Issue 2, 2014, Pages 53-62]
-
Controller
Presentation and Performance Evaluation of an Efficient Algorithm for a Distributed Controller in SDN [Volume 9, Issue 1, 2021, Pages 175-183]
-
Convert Channel
Web Covert Timing Channel Detection based on Entropy [Volume 8, Issue 3, 2020, Pages 13-23]
-
Converter
The residue number system component design based on OneHot coding [Volume 10, Issue 1, 2022, Pages 119-133]
-
Convolutional Code Constraint length
Sequential Decoding Algorithms of Convolutional Codes: Implementation, Improvement and Comparison [Volume 3, Issue 2, 2015, Pages 61-73]
-
Convolutional Codes
Sequential Decoding Algorithms of Convolutional Codes: Implementation, Improvement and Comparison [Volume 3, Issue 2, 2015, Pages 61-73]
-
Convolutional Neural Network
Improving the performance of the convolutional neural network using incremental weight loss function to deal with class imbalanced data [Volume 11, Issue 4, 2023, Pages 19-34]
-
Convolutional neural networks
The Semantic Segmentation of Autonomous Vehicles Images with the Teacher-Student Technique [Volume 9, Issue 4, 2021, Pages 1-19]
-
Convolutional neural networks
Detection of Slippery Road Conditions using the Road CCTV Images based on the Convolutional Neural Networks and Transfer Learning [Volume 10, Issue 2, 2022, Pages 105-116]
-
Convolution neural network
A way to predict the stock price of the Tehran Stock Exchange in relation to knowledge [Volume 10, Issue 4, 2022, Pages 91-100]
-
Cooperative Spectrum Sensing
Reducing the Destructive Effect of Misbehaving Users in Cooperative Spectrum Sensing using Reinforcement Learning [Volume 10, Issue 4, 2022, Pages 1-9]
-
Copy-move forgery
Forgery detection in digital images using the hybrid deep learning method [Volume 11, Issue 4, 2023]
-
Copyright protection
Transparent and Robust Audio Watermarking Using Synergy LU Decomposition and the Fibonacci Sequence in GBT-DCT-DWT Transforms [Volume 9, Issue 1, 2021, Pages 101-113]
-
Corrected Conditional entropy
Detecting Botnets with Timing-Based Covert Command and Control Channels [Volume 7, Issue 4, 2019, Pages 1-15]
-
Correlation
Defense Against Spoofing in GPS Receiver using Correlation and Least Mean Squares Method Based on Sign-Data Algorithm [Volume 3, Issue 4, 2015, Pages 11-22]
-
Cost Optimization
A Techno-Economic Model of Sustainable Communication Infrastructure in the Smart City; using WDM-PON FTTx [Volume 9, Issue 1, 2021, Pages 149-156]
-
Cost reduction
Presentation of a model for feasibility assessment of implementing the IoT social network projects using the existing public social networks as the infrastructure [Volume 10, Issue 1, 2022, Pages 73-84]
-
Counterattak
SCEIRS information dissemination model based on rumor spreading in complex networks [Volume 9, Issue 2, 2021, Pages 121-134]
-
Countermeasure Action
A Framework for Evaluating Malware and Countermeasures with an Analytical Approach based on the Game Theory
Case Study: Actors' Actions Based on Environmental Evidence [Volume 10, Issue 1, 2022, Pages 47-71]
-
Covariance Matrix
Frequency Spectrum Sensing by Multi-Stage Adaptive Optimization Algorithm with the Efficient Non-Cooperative Technique in Cognitive radios with hardware implementation [Volume 8, Issue 3, 2020, Pages 39-51]
-
Cover
Increasing Insertion Capacity and Resistance in Image Steganography Based on Mapping and Bits Reduction [Volume 7, Issue 2, 2019, Pages 33-39]
-
Covert and Secure UWAC
Covert and Secure Underwater Acoustic Communication using Merkle Hash Tree and Dolphin Whistle [Volume 6, Issue 2, 2018, Pages 135-146]
-
Covert Channel
Detecting Botnets with Timing-Based Covert Command and Control Channels [Volume 7, Issue 4, 2019, Pages 1-15]
-
Covert Communication
The Analysis and Design of Secure Wireless Networks in the Presence of Users with Different Security Needs Based on Covert Communication and Secure Transmission of Information Theory in the Presence of a Friendly Jammer [Volume 9, Issue 4, 2021, Pages 67-76]
-
Covert Communication
Improving security of wireless telecommunication networks based on covert communication in presence of a controlled noise using multiple beamforming [Volume 10, Issue 1, 2022, Pages 11-19]
-
Covert Communication
Security of UAV Relay Networks based on Covert Communication in the Presence of an Eavesdropping UAV [Volume 11, Issue 2, 2023, Pages 45-56]
-
Covert Timing Channel
Simulation and Evaluation of Jitter and Packet Loss Noises Influence on Covert Timing Channel Performance [Volume 2, Issue 3, 2014, Pages 35-49]
-
Covert Timming Channel
Detecting Botnets with Timing-Based Covert Command and Control Channels [Volume 7, Issue 4, 2019, Pages 1-15]
-
Credential
TNAC: A Novel Trust Negotiation Based Access Control Model Using XACML Architecture [Volume 3, Issue 1, 2015, Pages 53-67]
-
Crime Patterns
Analysis of exchange market disruptors using graph-based social network analysis [Volume 11, Issue 1, 2023, Pages 107-116]
-
Crime Prevention
Analysis of exchange market disruptors using graph-based social network analysis [Volume 11, Issue 1, 2023, Pages 107-116]
-
CRLB
A Novel Algorithm for Radar Jamming Resource Allocation [Volume 7, Issue 3, 2019, Pages 53-70]
-
Cross Site Scripting (XSS)
Automatic XSS Exploit Generation Using Grammatical Evolution [Volume 9, Issue 2, 2021, Pages 101-119]
-
Cryptanalysis
Analysis of Impossible Differential on LowMC Block Cipher [Volume 7, Issue 2, 2019, Pages 69-79]
-
Cryptographic Pseudo Random Number Generator
Design and Analysis of a Novel Synchronous Stream Cipher Using Secure Pseudo Random Number Generator [Volume 4, Issue 1, 2016, Pages 59-68]
-
Cryptography
Design and Analysis of a Novel Synchronous Stream Cipher Using Secure Pseudo Random Number Generator [Volume 4, Issue 1, 2016, Pages 59-68]
-
Cryptography
Non-Performance of Pearson Correlation Coefficient for Evaluating Image Encryption Security [Volume 6, Issue 2, 2018, Pages 83-91]
-
Cryptography
A New Method for Image Steganography Using Discrete Wavelet Transforms [Volume 7, Issue 3, 2019, Pages 83-91]
-
Cryptography
Distributed Anonymity Based On the Integrated Block Chain in Vehicular Ad Hoc Network [Volume 8, Issue 4, 2020, Pages 41-52]
-
Cryptography
A New Mechanism for Enhancing the Security of Military Internet of Things by Using Quantum and Classic Cryptography [Volume 9, Issue 2, 2021, Pages 29-49]
-
Crystals-Kyber
Speeding up the execution-time of Crystals-Kyber PQC Algorithm on FPGA [Volume 10, Issue 4, 2022, Pages 101-110]
-
CSRF
Design the Model of CSRF Attack Tree for Immunization the Web Application in Development Process [Volume 3, Issue 1, 2015, Pages 41-52]
-
Cuckoo Search
Clustering and Routing in Wireless Sensor Networks Using Multi-Objective Cuckoo Search and Game Theory [Volume 10, Issue 3, 2022, Pages 11-20]
-
Customization
Analyzing Security Challenges of LTE Networks, Obstacles and Opportunities of Network Localization
Based on the Standard Platform [Volume 7, Issue 2, 2019, Pages 121-132]
-
CWE
The relationship of software vulnerabilities and workarounds [Volume 8, Issue 2, 2020, Pages 75-81]
-
Cyber Attack
Projection of Muli Stage Cyber Attack Based on Belief Model and Fuzzy Inference [Volume 3, Issue 2, 2015, Pages 13-28]
-
Cyber Attacks
Detection of advanced Cyber Attacks, Using Behavior Modeling Based on Natural Language Processing [Volume 6, Issue 3, 2018, Pages 141-151]
-
Cyber-Attacks
An Improved Method of Incident Detection due to Cyber Attacks [Volume 7, Issue 4, 2019, Pages 105-116]
-
Cyber-Attacks
A survey on detecting false data injection in power systems with auto-encoder based deep learning methods [Volume 10, Issue 2, 2022, Pages 11-17]
-
Cyber Attacks Projection
Projection of Cyber Attacks using Damage Estimation and Combination of Attacker’s Capability and Opportunity based on Transferable Belief Model [Volume 6, Issue 4, 2018, Pages 1-12]
-
Cybercrime
Analysis of exchange market disruptors using graph-based social network analysis [Volume 11, Issue 1, 2023, Pages 107-116]
-
Cyber Defence
A Decision-Making Model in a Cyber Conflicts Acted Upon Vulnerability, Based on Game Theoretic Analysis [Volume 6, Issue 2, 2018, Pages 21-28]
-
Cyber Defense
A new architecture for impact projection of cyber-attacks based on high level information fusion in cyber command and control [Volume 2, Issue 4, 2014, Pages 1-14]
-
Cyber Defense
Projection of Muli Stage Cyber Attack Based on Belief Model and Fuzzy Inference [Volume 3, Issue 2, 2015, Pages 13-28]
-
Cyber Dynamic
The Presentation of an Active Cyber Defense Model for Application in Cyber Deception Technology [Volume 9, Issue 4, 2021, Pages 125-140]
-
Cyber-physical systems (CPSs)
A method for quantitative evaluation of security risk in cyber-physical systems [Volume 11, Issue 2, 2023, Pages 71-80]
-
Cyber Security
The Presentation of an Active Cyber Defense Model for Application in Cyber Deception Technology [Volume 9, Issue 4, 2021, Pages 125-140]
-
Cyber Security
The enhancement of online social network security by detecting and preventing fake accounts through machine learning [Volume 10, Issue 1, 2022, Pages 85-97]
-
Cyber Security
Identify the Factors Affecting the Culture and Awareness of Cyber Security Using Theme Analysis [Volume 11, Issue 1, 2023, Pages 67-80]
-
Cyber Security Analysis
A New Method for Image Steganography Using Discrete Wavelet Transforms [Volume 7, Issue 4, 2019, Pages 79-89]
-
Cyberspace
Deterrence Model in Cyberspace Based on Bayesian Belief Attack Graph by using Risk Creating Payoff Function [Volume 7, Issue 1, 2019, Pages 25-38]
-
Cyberspace
Development of the Concept of Deterrence Theory in the Country's Cyberspace
Based on Upstream Documents and Available Approaches [Volume 8, Issue 4, 2020, Pages 161-173]
-
Cyber Space
Effects of Cyber Threats in IT Projects Using the Fuzzy Cognitive Mapping Approach [Volume 7, Issue 2, 2019, Pages 41-51]
-
Cyber Threats
Effects of Cyber Threats in IT Projects Using the Fuzzy Cognitive Mapping Approach [Volume 7, Issue 2, 2019, Pages 41-51]
-
Cyber Threats
Development of the Concept of Deterrence Theory in the Country's Cyberspace
Based on Upstream Documents and Available Approaches [Volume 8, Issue 4, 2020, Pages 161-173]
-
Cyber Attacks
Modeling of Obfuscated Multi- Stage cyber Attacks [Volume 8, Issue 2, 2020, Pages 61-73]
-
Cyclic Autocorrelation Function
Detection of Interfering Signals and Estimation of Their Carrier Frequency in CNC Satellite Communications using Cyclic Spectrum Density [Volume 11, Issue 2, 2023, Pages 91-101]
-
Cyclic Prefix
Blind Frequency Offset Estimation using Adaptive Algorithms in Non-Coherent OFDM Systems [Volume 3, Issue 4, 2015, Pages 61-70]
-
Cyclic spectrum density
Detection of Interfering Signals and Estimation of Their Carrier Frequency in CNC Satellite Communications using Cyclic Spectrum Density [Volume 11, Issue 2, 2023, Pages 91-101]
-
Cyclostationarity
Identification of STBC-OFDM Signals by Second-Order Cyclostationarity Method [Volume 7, Issue 4, 2019, Pages 27-36]
-
Cyclostationery
Blind symbol Rate estimation in multipath channels [Volume 10, Issue 3, 2022, Pages 59-66]
D
-
Damage Estimation
Projection of Cyber Attacks using Damage Estimation and Combination of Attacker’s Capability and Opportunity based on Transferable Belief Model [Volume 6, Issue 4, 2018, Pages 1-12]
-
Data Aggregation
A Heuristic Data Diffusion and Gathering Scheme Using Virtual Line for Wireless Sensor Networks with Mobile Sink [Volume 9, Issue 2, 2021, Pages 195-207]
-
Database outsourcing
Fuzzy Keyword Search Scheme on an Encrypted Database in Cloud Computing Using Word Clustering [Volume 8, Issue 3, 2020, Pages 151-165]
-
Database Security
Detection and Prevention of SQL Injection Attacks at Runtime Using Decision Tree Classification [Volume 8, Issue 4, 2020, Pages 75-93]
-
Data classification
A novel architecture for database outsourcing in cloud computing with regard to data life cycle [Volume 2, Issue 4, 2014, Pages 41-54]
-
Data classification
Sonar Dataset Classification using Multi-Layer Perceptron Neural Network Based on Dragonfly and Moth Algorithms [Volume 10, Issue 3, 2022, Pages 21-31]
-
Data diffusion
A Heuristic Data Diffusion and Gathering Scheme Using Virtual Line for Wireless Sensor Networks with Mobile Sink [Volume 9, Issue 2, 2021, Pages 195-207]
-
Data Fusion
Detection of advanced Cyber Attacks, Using Behavior Modeling Based on Natural Language Processing [Volume 6, Issue 3, 2018, Pages 141-151]
-
Data Gathering
A Heuristic Data Diffusion and Gathering Scheme Using Virtual Line for Wireless Sensor Networks with Mobile Sink [Volume 9, Issue 2, 2021, Pages 195-207]
-
Data Life Cycle
A novel architecture for database outsourcing in cloud computing with regard to data life cycle [Volume 2, Issue 4, 2014, Pages 41-54]
-
Data locality
A New Scheduling Algorithm to Reduce Computation Time in Hadoop Environment [Volume 8, Issue 2, 2020, Pages 51-59]
-
Data Mining
Sequential Forward Feature Selection for Intrusion Detection System, Using Ant Colony Algorithm [Volume 6, Issue 2, 2018, Pages 49-63]
-
Data Mining
Smart Detection of Covert Worms in Computer Networks [Volume 7, Issue 4, 2019, Pages 67-77]
-
Data Mining
Hybrid Anomaly detection method using community detection in graph and feature selection [Volume 8, Issue 1, 2020, Pages 17-24]
-
Data Mining
The enhancement of online social network security by detecting and preventing fake accounts through machine learning [Volume 10, Issue 1, 2022, Pages 85-97]
-
Data Mining
A Trust Evaluation Model for Cloud Computing Using Bayesian Network [Volume 10, Issue 4, 2022, Pages 53-61]
-
Dataset
Improvement in the Ransomwares Detection Method With New API
Calls Features [Volume 8, Issue 4, 2020, Pages 107-118]
-
DDOS
Detect Web Denial of Service Attacks Using Entropy and Support Vector Machine Algorithm [Volume 6, Issue 4, 2018, Pages 79-89]
-
DDoS attack detection
DDoS Attack Detection System Using Ensemble Method Classification and Active Learning Approach [Volume 11, Issue 3, 2023, Pages 101-118]
-
Decentralize POMDPs
Online Collaborative Planning in Complex Environment [Volume 2, Issue 4, 2014, Pages 15-23]
-
Deception
Investigating The Effect of Social Engineering Techniques on Employees Vulnerability
(Case study: Tehran Municipality Employees) [Volume 11, Issue 1, 2023, Pages 31-46]
-
Decision-making Process
The Presentation of a Model for Analyzing the Behavior of the Enemy Using Hidden Markov Models Based on Electronic Warfare Observations in Complex War Scenes [Volume 7, Issue 1, 2019, Pages 113-128]
-
Decision Theory
Online Collaborative Planning in Complex Environment [Volume 2, Issue 4, 2014, Pages 15-23]
-
Decision Tree
Intrusion Detection in Computer Networks using Decision Tree and Feature Reduction [Volume 9, Issue 3, 2021, Pages 99-108]
-
Decoding
Finite Frame as Code: Some Characterizations for Error Correction Codes and Three Algorithms for Troubleshooting in Data Transfer [Volume 7, Issue 2, 2019, Pages 1-12]
-
Deep Autoencoder Neural Network
Detecting of Botnets’ Malicious Domains with Deep Autoencoder Neural Network [Volume 9, Issue 1, 2021, Pages 61-74]
-
Deep Convolutional Neural Networks (CNN)
Fast Detection of Vehicle Type and Position in Images Based on Deep Neural Network [Volume 10, Issue 2, 2022, Pages 117-127]
-
Deep Neural Network
Detecting of Botnets’ Malicious Domains with Deep Autoencoder Neural Network [Volume 9, Issue 1, 2021, Pages 61-74]
-
Deep Neural Networks
Classification of High Dimensional Imbalanced Dataset via Game Theory-based Generative Adversarial Networks [Volume 9, Issue 2, 2021, Pages 63-74]
-
Delay
A cross layer approach for improving the TCP quality-of-service parameters over the IEEE 802.11.ac wireless networks [Volume 10, Issue 1, 2022, Pages 109-117]
-
Delay Lock Loop
GPS Spoofing Mitigation using Adaptive Estimator in Tracking Loop [Volume 6, Issue 3, 2018, Pages 65-80]
-
DEMATEL-Based Analytic Network Process (DANP)
The Course of Action Selection Model in Network Centric Operation [Volume 7, Issue 2, 2019, Pages 133-155]
-
DEMATEL method
Evaluation of Network-Based Operation Criteria Based on DEMATEL Method [Volume 7, Issue 1, 2019, Pages 139-153]
-
Dempster-Shefer Evidences Theory
The Distributed Denial of Service Attacks Situation Awareness Based on The Prediction of Battle Scene Using Dempster-Shefer Evidences Theories and Bayesian Rules [Volume 7, Issue 1, 2019, Pages 77-94]
-
Design Structure Matrix
The Design Process Reform of the Gama-ray Imaging System by using the Design Structure Matrix [Volume 6, Issue 3, 2018, Pages 95-106]
-
Detection
Detection of Spoofing Attack Based on Multi-Layer Neural Network in Single-Frequency GPS Receivers [Volume 3, Issue 1, 2015, Pages 69-80]
-
Detection
Defense Against Spoofing in GPS Receiver using Correlation and Least Mean Squares Method Based on Sign-Data Algorithm [Volume 3, Issue 4, 2015, Pages 11-22]
-
Detection
Detection and Prevention of SQL Injection Attacks at Runtime Using Decision Tree Classification [Volume 8, Issue 4, 2020, Pages 75-93]
-
Detection
Providing an Improved Unmanned Aerial Vehicle Detection System to Increase Detection speed Using Deep Learning [Volume 11, Issue 1, 2023, Pages 81-96]
-
Detection accuracy rate
Improvement in the Ransomwares Detection Method With New API
Calls Features [Volume 8, Issue 4, 2020, Pages 107-118]
-
Detection-Independent and deductive evidence
The Improvement of the GMCR Model Based on Statistical Analysis of the Game’ Graph (Case Study: Malwares and Countermeasures Actions Based on Detection-Independent and Deductive Evidence) [Volume 9, Issue 4, 2021, Pages 99-123]
-
Detector
Smart Detection of Covert Worms in Computer Networks [Volume 7, Issue 4, 2019, Pages 67-77]
-
Differential
Upper Bounds for the Probability of Differential Characteristics of Five Block Cipher
Constructions Functions [Volume 8, Issue 4, 2020, Pages 129-137]
-
Differential Characteristic
Upper Bounds for the Probability of Differential Characteristics of Five Block Cipher
Constructions Functions [Volume 8, Issue 4, 2020, Pages 129-137]
-
Differential game
Developing a Threat-Tolerability Bilateral Concept within a Differential Game for the Analysis of the Insider/Adversary Behavior in Operational environment [Volume 11, Issue 2, 2023, Pages 15-29]
-
Differential privacy
Trajectory Database Release with Differential Privacy Guarantee [Volume 9, Issue 1, 2021, Pages 29-42]
-
Diffusion model
A Dynamic Metaheuristic Algorithm for Influence Maximization in Social Networks [Volume 11, Issue 2, 2023, Pages 57-69]
-
Digital Signature
A New Mechanism for Enhancing the Security of Military Internet of Things by Using Quantum and Classic Cryptography [Volume 9, Issue 2, 2021, Pages 29-49]
-
Dimensionality reduction
Fixing Security Defects of Video Authentication Systems with Face Recognition, Based on 3D Structure and Shape Evaluation [Volume 9, Issue 4, 2021, Pages 141-145]
-
Directional Modulation
Improvement of Security in Wireless Communication Networks with Directional Modulation and Artificial Noise [Volume 10, Issue 4, 2022, Pages 11-18]
-
Direction finding
Coherent Acoustic source DOA estimation by nested array based on sparse solution [Volume 8, Issue 1, 2020, Pages 79-88]
-
Direct Trust
A Fuzzy Trust Evaluation Model to Enhance Security of cloud System Entities with Petri Net [Volume 4, Issue 1, 2016, Pages 19-34]
-
Discrete Cosine Transform
Enhancing E-Security by Inserting a Watermark Using the Combination of Genetic Algorithm and Tabu Search [Volume 8, Issue 3, 2020, Pages 25-37]
-
Discrete Cosine Transform(DCT)
Transparent and Robust Audio Watermarking Using Synergy LU Decomposition and the Fibonacci Sequence in GBT-DCT-DWT Transforms [Volume 9, Issue 1, 2021, Pages 101-113]
-
Discrete wavelet transform (DWT) LU decomposition
Transparent and Robust Audio Watermarking Using Synergy LU Decomposition and the Fibonacci Sequence in GBT-DCT-DWT Transforms [Volume 9, Issue 1, 2021, Pages 101-113]
-
Distributed Algorithm
Real-time Topology-based Tracking of Microscopic Objects [Volume 9, Issue 3, 2021, Pages 1-20]
-
Distributed command and control
Guidance and distributed control of the networked UAVs [Volume 7, Issue 4, 2019, Pages 117-129]
-
Distributed Denial of Service
The Distributed Denial of Service Attacks Situation Awareness Based on The Prediction of Battle Scene Using Dempster-Shefer Evidences Theories and Bayesian Rules [Volume 7, Issue 1, 2019, Pages 77-94]
-
Distributed Denial of Service
Distributed Denial of Service Attacks Detection in Software Defined Networks [Volume 9, Issue 1, 2021, Pages 43-59]
-
Distributed problems
Distributed Solving of Weapon Target Assignment Problem using Learning Automata [Volume 11, Issue 1, 2023, Pages 47-55]
-
Distributed Processing
A Distributed Approach to Community Detection in Large Social Networks Based on Label Propagation [Volume 8, Issue 4, 2020, Pages 1-15]
-
Distributed Simulation
A Software System for Large-Scale Simulation of Malware Propagation
in Computer Networks [Volume 7, Issue 2, 2019, Pages 53-67]
-
Distribution
Presentation and Performance Evaluation of an Efficient Algorithm for a Distributed Controller in SDN [Volume 9, Issue 1, 2021, Pages 175-183]
-
DNS data
Malicious Domain Detection using DNS Records [Volume 9, Issue 3, 2021, Pages 83-97]
-
DOA estimation error
Robust Adaptive Beamforming Against Interferer’s Direction Of Arrival Estimation Error [Volume 7, Issue 3, 2019, Pages 27-36]
-
Dolphin Whistle
Covert and Secure Underwater Acoustic Communication using Merkle Hash Tree and Dolphin Whistle [Volume 6, Issue 2, 2018, Pages 135-146]
-
Domain Generation Algorithms (DGAs)
Comparison of Supervised Machine Learning Algorithms in Detection of Botnets Domain Generation Algorithms [Volume 8, Issue 4, 2020, Pages 17-29]
-
Domain Generation Algorithms (DGAs)
Detecting of Botnets’ Malicious Domains with Deep Autoencoder Neural Network [Volume 9, Issue 1, 2021, Pages 61-74]
-
Dominating set
k-Adjacency Domination in Graphs [Volume 9, Issue 3, 2021, Pages 125-131]
-
Domination number
k-Adjacency Domination in Graphs [Volume 9, Issue 3, 2021, Pages 125-131]
-
DoS attack
Intrusion Detection in Computer Networks using Decision Tree and Feature Reduction [Volume 9, Issue 3, 2021, Pages 99-108]
-
DoS attacks
Cyber disruption in the hierarchical control of intelligent microgrid power sharing [Volume 11, Issue 4, 2023]
-
Doubleround(x) Function
An Efficient Visual Multi-Secret Sharing Scheme [Volume 3, Issue 4, 2015, Pages 1-9]
-
Double-slit Experiment
A New Approach for Estimating the Rate of Emission in Quantum Bit Exchange Systems Using Binomial Distribution [Volume 7, Issue 1, 2019, Pages 105-112]
-
Dragonfly Algorithm
A model for Multi-Class Intrusion Detection Using the Dragonfly Feature Selection by Learning on the KDD-CUP99 Dataset [Volume 10, Issue 3, 2022, Pages 33-42]
-
Dragonfly Optimization Algorithm
Providing a behavioral malware detection system based on the function of hardware counters using a neural network optimized with a dragonfly algorithm [Volume 9, Issue 2, 2021, Pages 9-16]
-
Drone . Deep learnings
Providing an Improved Unmanned Aerial Vehicle Detection System to Increase Detection speed Using Deep Learning [Volume 11, Issue 1, 2023, Pages 81-96]
-
Drones
Motion-encoded Gravitational Search Algorithm for moving target search using UAVs [Volume 10, Issue 4, 2022, Pages 63-73]
-
DS/CDMA
Using Generalized Entropy Approach for Blind Estimation of the Length of Spreading Sequences in Code Division Multiple Access Systems [Volume 8, Issue 3, 2020, Pages 53-61]
-
Dynamic Differential Logic
Side-Channel Attack Resistance Approaches Through Dynamic Differential Logic [Volume 7, Issue 3, 2019, Pages 93-104]
-
Dynamic Graph
Anomaly Detection in Dynamic Social Networks Based on Behavioral Measurements [Volume 9, Issue 1, 2021, Pages 115-123]
-
Dynamic priority
A New Scheduling Algorithm to Reduce Computation Time in Hadoop Environment [Volume 8, Issue 2, 2020, Pages 51-59]
-
Dynamic Query
Syntax and Semantic Analysis for SQL-Injection Attacks [Volume 2, Issue 1, 2014, Pages 83-97]
E
-
EAP Protocol
Secure and Fast Re-authentication Protocol to Support Extensive Movement of Users in IEEE 802.1X Wireless Networks [Volume 3, Issue 4, 2015, Pages 71-80]
-
Eclipsing Pulse
An Integrated Algorithm for Optimal Detection of Weak Radar Targets Masked by the Sidelobes of a Strong Target [Volume 6, Issue 4, 2018, Pages 91-104]
-
Edge dominating set
Generating Tree Decomposition of Graphs with Imperialist Competitive Algorithm for Use in Secret Sharing Scheme [Volume 7, Issue 3, 2019, Pages 105-111]
-
Effective Base Approach
Evaluation of Network-Based Operation Criteria Based on DEMATEL Method [Volume 7, Issue 1, 2019, Pages 139-153]
-
Effective Options
The Improvement of the GMCR Model Based on Statistical Analysis of the Game’ Graph (Case Study: Malwares and Countermeasures Actions Based on Detection-Independent and Deductive Evidence) [Volume 9, Issue 4, 2021, Pages 99-123]
-
Effective Test Cases
A novel way to identify effective test-case in software testing [Volume 11, Issue 2, 2023, Pages 103-116]
-
EGSO algorithm
Providing a Method for the Optimal Detection of Software Testing Paths Using Meta-Algorithms [Volume 6, Issue 4, 2018, Pages 13-22]
-
E-Health
A secure three factor authentication scheme for wireless
healthcare sensor networks based on elliptic curve [Volume 8, Issue 1, 2020, Pages 147-167]
-
Elasticity
Resource Elasticity Management using Fuzzy Controller Based on Threshold Changes in the Cloud Computing Environment [Volume 8, Issue 3, 2020, Pages 63-81]
-
Electroencephalogram
Guilty Knowledge Test by Chaotic Processing of Electroencephalogram Signals Based on Fuzzy Recurrence Plot [Volume 10, Issue 2, 2022, Pages 87-104]
-
Electronic health
A Novel and Secure Model for Sharing Protected Health Record (PHR) Based on Blockchain and Attribute Based Encryption [Volume 8, Issue 1, 2020, Pages 101-124]
-
Electronic Payment
Design a Blockchain based Electronic Payment with Users’ Anonymity [Volume 9, Issue 2, 2021, Pages 85-100]
-
Electronic voting
A Fast Method for Computation of Scalar Multiplication of Elliptic Curve Suitable for Elliptic Curve Cryptography System [Volume 3, Issue 3, 2015, Pages 9-17]
-
Electronic Warfare
The Presentation of a Model for Analyzing the Behavior of the Enemy Using Hidden Markov Models Based on Electronic Warfare Observations in Complex War Scenes [Volume 7, Issue 1, 2019, Pages 113-128]
-
Elliptic Curve Cryptography
A Fast Method for Computation of Scalar Multiplication of Elliptic Curve Suitable for Elliptic Curve Cryptography System [Volume 3, Issue 3, 2015, Pages 9-17]
-
Embed Capacity
Increasing Insertion Capacity and Resistance in Image Steganography Based on Mapping and Bits Reduction [Volume 7, Issue 2, 2019, Pages 33-39]
-
Embedding Data
Robust Steganography Algorithm Text in the Image Using A Spread Spectrum Method [Volume 2, Issue 3, 2014, Pages 77-83]
-
Encoding
Finite Frame as Code: Some Characterizations for Error Correction Codes and Three Algorithms for Troubleshooting in Data Transfer [Volume 7, Issue 2, 2019, Pages 1-12]
-
Encryption
A New Method for Combining the Channel Coding with Polar Coding-Based Encryption [Volume 4, Issue 1, 2016, Pages 1-8]
-
Encryption
Hierarchical Fuzzy Identity-Based Encryption [Volume 6, Issue 3, 2018, Pages 35-44]
-
End to end delay
A new analytical model for enhancing performance of cognitive radio user’s transmissions in the internet of things [Volume 9, Issue 3, 2021, Pages 73-82]
-
Enemy’s Behavior Analysis Model
The Presentation of a Model for Analyzing the Behavior of the Enemy Using Hidden Markov Models Based on Electronic Warfare Observations in Complex War Scenes [Volume 7, Issue 1, 2019, Pages 113-128]
-
Energy Detector
Frequency Spectrum Sensing by Multi-Stage Adaptive Optimization Algorithm with the Efficient Non-Cooperative Technique in Cognitive radios with hardware implementation [Volume 8, Issue 3, 2020, Pages 39-51]
-
Energy harvesting
Energy-Harvesting Aware Multi-Hop Routing in Wireless Sensor Networks for Defense Applications [Volume 8, Issue 4, 2020, Pages 63-73]
-
Ensemble Learning
Detection of Unknown Malicious Network Streams using Ensemble Learning [Volume 6, Issue 2, 2018, Pages 93-108]
-
Ensemble Learning
Developing an Improved Method for Malware Attack Detection in Cloud Computing using Ensemble Learning [Volume 10, Issue 4, 2022, Pages 33-39]
-
Ensemble method
DDoS Attack Detection System Using Ensemble Method Classification and Active Learning Approach [Volume 11, Issue 3, 2023, Pages 101-118]
-
Environmental Evidence
A Framework for Evaluating Malware and Countermeasures with an Analytical Approach based on the Game Theory
Case Study: Actors' Actions Based on Environmental Evidence [Volume 10, Issue 1, 2022, Pages 47-71]
-
Environment-aware malware
An Effective Method to Detect Environment-Aware Malware Based on the Behavioral Distances Comparison [Volume 6, Issue 4, 2018, Pages 123-133]
-
Epidemic Phenomena Modeling
A Software System for Large-Scale Simulation of Malware Propagation
in Computer Networks [Volume 7, Issue 2, 2019, Pages 53-67]
-
Error Bit Rate
Steganography on raw video based on proper detection and compromise between the parameters of transparency, resistance and capacity [Volume 8, Issue 1, 2020, Pages 51-65]
-
ESM
Robust Adaptive Beamforming Against Interferer’s Direction Of Arrival Estimation Error [Volume 7, Issue 3, 2019, Pages 27-36]
-
ESprite
A Combined Improved Algorithm to Estimating The delay of Sky waves In Loran c Receiver [Volume 2, Issue 4, 2014, Pages 55-63]
-
Euclidean Distance
Modular human face recognition method based on principal component analysis and Mahalanobis distance [Volume 11, Issue 4, 2023]
-
Evaluation
A method for quantitative evaluation of security risk in cyber-physical systems [Volume 11, Issue 2, 2023, Pages 71-80]
-
Event Detection
Presentation of a model for feasibility assessment of implementing the IoT social network projects using the existing public social networks as the infrastructure [Volume 10, Issue 1, 2022, Pages 73-84]
-
Event prediction
Presentation of a model for feasibility assessment of implementing the IoT social network projects using the existing public social networks as the infrastructure [Volume 10, Issue 1, 2022, Pages 73-84]
-
Evolutionary Algorithm
Reducing Interference Effect on GPS Navigation System Using Evolutionary Notch Filter [Volume 8, Issue 4, 2020, Pages 95-106]
-
Executable file
Kashef: A Two-step detector of Windows-based Malicious executable files [Volume 10, Issue 2, 2022, Pages 143-156]
-
Expected Number of Transmissions
Performance Analysis of Hybrid FSO/RF Systems Using the ℳ Distribution and Markov Function [Volume 10, Issue 2, 2022, Pages 1-10]
-
Expert
The Distributed Denial of Service Attacks Situation Awareness Based on The Prediction of Battle Scene Using Dempster-Shefer Evidences Theories and Bayesian Rules [Volume 7, Issue 1, 2019, Pages 77-94]
-
Exploit
Automated Exploit Generation For Application’s Vulnerability [Volume 4, Issue 1, 2016, Pages 35-50]
-
Exploitation
Automatic XSS Exploit Generation Using Grammatical Evolution [Volume 9, Issue 2, 2021, Pages 101-119]
-
Exposed
SCEIRS information dissemination model based on rumor spreading in complex networks [Volume 9, Issue 2, 2021, Pages 121-134]
-
Extended Kalman Filter
Target Tracking Algorithm in Wireless Sensor Networks with Optimum Power Consumption Using Quantized Observation [Volume 6, Issue 2, 2018, Pages 109-121]
F
-
Face recognition
Fixing Security Defects of Video Authentication Systems with Face Recognition, Based on 3D Structure and Shape Evaluation [Volume 9, Issue 4, 2021, Pages 141-145]
-
Face recognition
Modular human face recognition method based on principal component analysis and Mahalanobis distance [Volume 11, Issue 4, 2023]
-
Face recongnition
Applying weighted smoothed norm in sparse representation classification for face recognition [Volume 11, Issue 3, 2023, Pages 57-65]
-
Fake accounts
The enhancement of online social network security by detecting and preventing fake accounts through machine learning [Volume 10, Issue 1, 2022, Pages 85-97]
-
False Alarm Rate
A New Hybrid Approach for Traffic Identification and Classification in Wireless Networks [Volume 10, Issue 2, 2022, Pages 31-41]
-
False data
A survey on detecting false data injection in power systems with auto-encoder based deep learning methods [Volume 10, Issue 2, 2022, Pages 11-17]
-
False Hit
An Approach to Dependability Enhancement of Cache Memories [Volume 10, Issue 1, 2022, Pages 1-10]
-
FA-MABC Algorithm
A novel way to identify effective test-case in software testing [Volume 11, Issue 2, 2023, Pages 103-116]
-
Fano Algorithm
Sequential Decoding Algorithms of Convolutional Codes: Implementation, Improvement and Comparison [Volume 3, Issue 2, 2015, Pages 61-73]
-
Farsnet
An Approach Based on Semantic Similarity in Persian Query-Based Summarization [Volume 2, Issue 3, 2014, Pages 51-63]
-
Fault Tolerance
A Fault Tolerant Task Scheduling Method for Optimal use of Resources in Cloud Computing Environment [Volume 8, Issue 2, 2020, Pages 95-103]
-
Feature Extraction
Detecting of Botnets’ Malicious Domains with Deep Autoencoder Neural Network [Volume 9, Issue 1, 2021, Pages 61-74]
-
Feature Extraction
Kavosh: Offering an Analysis Method and the Impact of Normal Network Traffic on Selection and Extraction Based on the Minkowski Distance [Volume 9, Issue 1, 2021, Pages 137-147]
-
Feature Extraction
Providing a new solution to botnet detection in a Markov chain-based network [Volume 9, Issue 3, 2021, Pages 59-71]
-
Feature Extraction
Identify malicious traffic on IoT infrastructure using neural networks and deep learning [Volume 11, Issue 2, 2023, Pages 1-13]
-
Feature Extraction
Applying weighted smoothed norm in sparse representation classification for face recognition [Volume 11, Issue 3, 2023, Pages 57-65]
-
Feature Vector
An Optimized Unsupervised Feature Selection Algorithm [Volume 3, Issue 3, 2015, Pages 1-7]
-
Feature Vector Selection
An Optimized Unsupervised Feature Selection Algorithm [Volume 3, Issue 3, 2015, Pages 1-7]
-
Fire launching sites
Modelling and Solving the Location Problem of Fire Launching Sites [Volume 6, Issue 3, 2018, Pages 45-57]
-
Fire launching sites
Modelling and Solving the Location Problem of Fire Launching Sites [Volume 6, Issue 3, 2018, Pages 59-64]
-
Flow-level features
DDoS Attack Detection System Using Ensemble Method Classification and Active Learning Approach [Volume 11, Issue 3, 2023, Pages 101-118]
-
Flow Rules
An Accelerated Method for Rules Anomaly Detection in Software Defined Networks [Volume 8, Issue 4, 2020, Pages 31-39]
-
Flow Tables
An Accelerated Method for Rules Anomaly Detection in Software Defined Networks [Volume 8, Issue 4, 2020, Pages 31-39]
-
Fog Computing
The Presentation of a Hybrid Anomaly Detection Model Using Inverse Weight Clustering and Machine Learning in Cloud Environments [Volume 9, Issue 4, 2021, Pages 21-29]
-
Fog Computing
The IoT Resource Allocation Improvement in Fog Computing Using Non-Cooperative Game Theory [Volume 9, Issue 4, 2021, Pages 147-158]
-
Foresight
A Foresight Framework for Intrusion Response Systems in Computer Networks [Volume 6, Issue 3, 2018, Pages 13-34]
-
Forest Optimization Algorithm
Improving mobile mass monitoring in the IoT environment based on Chaotic Fog Algorithm [Volume 11, Issue 3, 2023, Pages 77-88]
-
Forgeability
Security Analysis and Improvement of an Intelligent Transportation System based on Certificateless Aggregate Signature [Volume 8, Issue 1, 2020, Pages 25-33]
-
Format String Errors
The Impact of Security Mechanisms on Software Vulnerabilities [Volume 2, Issue 1, 2014, Pages 49-60]
-
Fourier Transform
Enhancing E-Security by Inserting a Watermark Using the Combination of Genetic Algorithm and Tabu Search [Volume 8, Issue 3, 2020, Pages 25-37]
-
Fourth Generation (4G) Mobile Network
Analyzing Security Challenges of LTE Networks, Obstacles and Opportunities of Network Localization
Based on the Standard Platform [Volume 7, Issue 2, 2019, Pages 121-132]
-
FPGA Implementation
Design and Implementation of a Physically Unclonable Function on FPGA [Volume 6, Issue 4, 2018, Pages 23-32]
-
FPGA Implementation
Design and Production of Hardware Authentication Code Using Physically Unclonable Functions and a Random Number Generator on FPGA [Volume 7, Issue 4, 2019, Pages 37-50]
-
Fractional optimal control problem of time delay
Cardinal Hermit functions and their application in solving the time-delay fractional optimal control problems [Volume 8, Issue 4, 2020, Pages 153-160]
-
Frame
Finite Frame as Code: Some Characterizations for Error Correction Codes and Three Algorithms for Troubleshooting in Data Transfer [Volume 7, Issue 2, 2019, Pages 1-12]
-
Free-Space Optical Communication
Introducing an Optimal Modulation Constellation, Resistant to Atmospheric Turbulence [Volume 8, Issue 2, 2020, Pages 115-124]
-
Free-Space Optical Communications (FSO)
Performance Analysis of Free Space Optical Communication Links under M-PAM and M-PSK Modulations using Adaptive Power and Modulation Techniques [Volume 7, Issue 1, 2019, Pages 63-75]
-
Frequency Offset
Blind Frequency Offset Estimation using Adaptive Algorithms in Non-Coherent OFDM Systems [Volume 3, Issue 4, 2015, Pages 61-70]
-
Frequency Selective Fading
Blind symbol Rate estimation in multipath channels [Volume 10, Issue 3, 2022, Pages 59-66]
-
Frequency-Selective Multipath Channel
Blind Frequency Offset Estimation using Adaptive Algorithms in Non-Coherent OFDM Systems [Volume 3, Issue 4, 2015, Pages 61-70]
-
Friendly jammer
The Analysis and Design of Secure Wireless Networks in the Presence of Users with Different Security Needs Based on Covert Communication and Secure Transmission of Information Theory in the Presence of a Friendly Jammer [Volume 9, Issue 4, 2021, Pages 67-76]
-
FSM
Simulation the modify FSM , in autotracking systems to Stabilization secure links of free space optical communications [Volume 2, Issue 1, 2014, Pages 61-69]
-
FSO
Simulation the modify FSM , in autotracking systems to Stabilization secure links of free space optical communications [Volume 2, Issue 1, 2014, Pages 61-69]
-
FTTx
A Techno-Economic Model of Sustainable Communication Infrastructure in the Smart City; using WDM-PON FTTx [Volume 9, Issue 1, 2021, Pages 149-156]
-
Fusion Evaluation Criterion
Improving the Quality of Millimeter Wave Images by Fusion with Visible Images [Volume 9, Issue 4, 2021, Pages 77-86]
-
Fuzzer
Automatic XSS Exploit Generation Using Grammatical Evolution [Volume 9, Issue 2, 2021, Pages 101-119]
-
Fuzzing
Evaluating Deep Learning Models for Test Data Generation In File Based Fuzzers [Volume 10, Issue 2, 2022, Pages 57-73]
-
Fuzz Testing
Automatic Test Data Generation in File Format Fuzzers [Volume 8, Issue 1, 2020, Pages 1-16]
-
Fuzz Testing
Automatic XSS Exploit Generation Using Grammatical Evolution [Volume 9, Issue 2, 2021, Pages 101-119]
-
Fuzzy and Probabilistic uncertainty
Target Threat Assessment using Rule-Based Joint Fuzzy and Probabilistic Networks [Volume 6, Issue 4, 2018, Pages 61-78]
-
Fuzzy Best-Worst Multi-Criteria method
A framework for assessing cyber security and privacy threats and investigating their impact on smart city performance [Volume 10, Issue 3, 2022, Pages 77-91]
-
Fuzzy Cognitive Map
Target Threat Assessment using Rule-Based Joint Fuzzy and Probabilistic Networks [Volume 6, Issue 4, 2018, Pages 61-78]
-
Fuzzy Cognitive Map
Effects of Cyber Threats in IT Projects Using the Fuzzy Cognitive Mapping Approach [Volume 7, Issue 2, 2019, Pages 41-51]
-
Fuzzy control system
Resource Elasticity Management using Fuzzy Controller Based on Threshold Changes in the Cloud Computing Environment [Volume 8, Issue 3, 2020, Pages 63-81]
-
Fuzzy Correlator
A Comprehensive Semi-Suprvised Model for Collaborative Intrusion Detection Based on Network Behavior Profiling Using The Concept of Deep Learning and Fuzzy Correlation of Alerts along [Volume 9, Issue 3, 2021, Pages 165-186]
-
Fuzzy Delphi Method
A framework for assessing cyber security and privacy threats and investigating their impact on smart city performance [Volume 10, Issue 3, 2022, Pages 77-91]
-
Fuzzy Identity-Based
Hierarchical Fuzzy Identity-Based Encryption [Volume 6, Issue 3, 2018, Pages 35-44]
-
Fuzzy Inference
Projection of Muli Stage Cyber Attack Based on Belief Model and Fuzzy Inference [Volume 3, Issue 2, 2015, Pages 13-28]
-
Fuzzy Logic
A Fuzzy Trust Evaluation Model to Enhance Security of cloud System Entities with Petri Net [Volume 4, Issue 1, 2016, Pages 19-34]
-
Fuzzy Logic
A model for feature selection in software fault prediction based on memetic algorithm and fuzzy logic [Volume 9, Issue 3, 2021, Pages 143-163]
-
Fuzzy Logic
Energy Aware Routing in the Internet of Things using improved Grasshopper Metaheuristic Algorithm [Volume 11, Issue 1, 2023, Pages 15-29]
-
Fuzzy Logic
Providing a routing method in Internet of Things networks based on fuzzy logic and clustering
For use in smart transportatio [Volume 11, Issue 4, 2023]
-
Fuzzy Recurrence Plot
Guilty Knowledge Test by Chaotic Processing of Electroencephalogram Signals Based on Fuzzy Recurrence Plot [Volume 10, Issue 2, 2022, Pages 87-104]
-
Fuzzy Search
Fuzzy Keyword Search Scheme on an Encrypted Database in Cloud Computing Using Word Clustering [Volume 8, Issue 3, 2020, Pages 151-165]
-
Fuzzy System
Improving mobile mass monitoring in the IoT environment based on Chaotic Fog Algorithm [Volume 11, Issue 3, 2023, Pages 77-88]
G
-
Gait Energy Image (GEI)
An Improvement on the Identification via Gait Using the Genetic Algorithm [Volume 9, Issue 4, 2021, Pages 31-42]
-
Gama-Ray Imaging System
The Design Process Reform of the Gama-ray Imaging System by using the Design Structure Matrix [Volume 6, Issue 3, 2018, Pages 95-106]
-
Game Theory
A Decision-Making Model in a Cyber Conflicts Acted Upon Vulnerability, Based on Game Theoretic Analysis [Volume 6, Issue 2, 2018, Pages 21-28]
-
Game Theory
Designing a combinatorial Image Steganography algorithm based on game theory [Volume 8, Issue 1, 2020, Pages 133-145]
-
Game Theory
Classification of High Dimensional Imbalanced Dataset via Game Theory-based Generative Adversarial Networks [Volume 9, Issue 2, 2021, Pages 63-74]
-
Game Theory
A Framework for Evaluating Malware and Countermeasures with an Analytical Approach based on the Game Theory
Case Study: Actors' Actions Based on Environmental Evidence [Volume 10, Issue 1, 2022, Pages 47-71]
-
Game Theory
The Improvement of the GMCR Model Based on Statistical Analysis of the Game’ Graph (Case Study: Malwares and Countermeasures Actions Based on Detection-Independent and Deductive Evidence) [Volume 9, Issue 4, 2021, Pages 99-123]
-
Game Theory
A method to detect intrusion into the Internet of Things using the game theory [Volume 10, Issue 1, 2022, Pages 21-31]
-
Game Theory
Clustering and Routing in Wireless Sensor Networks Using Multi-Objective Cuckoo Search and Game Theory [Volume 10, Issue 3, 2022, Pages 11-20]
-
Game Theory
Routing and Buffer managment based on game theory in delay tolerant network [Volume 11, Issue 4, 2023, Pages 35-43]
-
Gamma-Gamma Distribution
Introducing an Optimal Modulation Constellation, Resistant to Atmospheric Turbulence [Volume 8, Issue 2, 2020, Pages 115-124]
-
General Access Structure
A Hash-Based Multi-Use Multi-Stage Secret Sharing Scheme with General Access Structure [Volume 6, Issue 3, 2018, Pages 107-115]
-
Generating Function
An Efficient Visual Multi-Secret Sharing Scheme [Volume 3, Issue 4, 2015, Pages 1-9]
-
Generative Adversarial Networks
Classification of High Dimensional Imbalanced Dataset via Game Theory-based Generative Adversarial Networks [Volume 9, Issue 2, 2021, Pages 63-74]
-
Genetic Algorithm (GA)
An Improvement on the Identification via Gait Using the Genetic Algorithm [Volume 9, Issue 4, 2021, Pages 31-42]
-
Geometric methods
Fixing Security Defects of Video Authentication Systems with Face Recognition, Based on 3D Structure and Shape Evaluation [Volume 9, Issue 4, 2021, Pages 141-145]
-
Geometric secrecy
Security Evaluation of Mutual Random Phase Injection Scheme for Secret Key Generation over Static Point-to-Point Communications [Volume 10, Issue 2, 2022, Pages 19-30]
-
Geometric spanners
A Greedy Algorithm for Constructing Region-Fault Tolerant Geometric Spanners [Volume 10, Issue 4, 2022, Pages 75-80]
-
Global Positioning System
Reducing the Effects of Deception Attack on GPS Receivers of Phasor Measurement Units using Neural Networks [Volume 11, Issue 1, 2023, Pages 97-105]
-
GPS
Detection of Spoofing Attack Based on Multi-Layer Neural Network in Single-Frequency GPS Receivers [Volume 3, Issue 1, 2015, Pages 69-80]
-
GPS
Enhancing Vector Tracking Accuracy of GPS in Weak Signal
Condition Based on Adaptive Strong Tracking Kalman Filter [Volume 6, Issue 3, 2018, Pages 1-12]
-
GPS
Reducing Interference Effect on GPS Navigation System Using Evolutionary Notch Filter [Volume 8, Issue 4, 2020, Pages 95-106]
-
GPS
Improving INS/GPS Integration with Artificial Intelligence during GPS Outage [Volume 9, Issue 2, 2021, Pages 143-157]
-
GPS Receiver
A New Method for Cancelling CW Jamming in GPS Receivers [Volume 4, Issue 1, 2016, Pages 69-79]
-
GPS Receiver
GPS Spoofing Mitigation using Adaptive Estimator in Tracking Loop [Volume 6, Issue 3, 2018, Pages 65-80]
-
GPS Receiver
Reducing Interference Effect on GPS Receiver by Using Multi-correlation Architecture [Volume 9, Issue 3, 2021, Pages 49-57]
-
GPS Spoofing
Defense Against Spoofing in GPS Receiver using Correlation and Least Mean Squares Method Based on Sign-Data Algorithm [Volume 3, Issue 4, 2015, Pages 11-22]
-
Grammatical Evolution
Automatic XSS Exploit Generation Using Grammatical Evolution [Volume 9, Issue 2, 2021, Pages 101-119]
-
Graph
k-Adjacency Domination in Graphs [Volume 9, Issue 3, 2021, Pages 125-131]
-
Graph Analysis
Detecting Fake Accounts in Social Networks Using Principal Components
Analysis and Kernel
Density Estimation Algorithm (A Case Study on the Twitter Social Network) [Volume 9, Issue 3, 2021, Pages 109-123]
-
Graph Anonymization
An Improved Method for Graph Data Anonymization with Emphasis on Preserving the Average Path length [Volume 7, Issue 2, 2019, Pages 25-32]
-
Graph-based Transform(GBT)
Transparent and Robust Audio Watermarking Using Synergy LU Decomposition and the Fibonacci Sequence in GBT-DCT-DWT Transforms [Volume 9, Issue 1, 2021, Pages 101-113]
-
Graph mining
Hybrid Anomaly detection method using community detection in graph and feature selection [Volume 8, Issue 1, 2020, Pages 17-24]
-
Graph Model
A Framework for Evaluating Malware and Countermeasures with an Analytical Approach based on the Game Theory
Case Study: Actors' Actions Based on Environmental Evidence [Volume 10, Issue 1, 2022, Pages 47-71]
-
Graph Model
The Improvement of the GMCR Model Based on Statistical Analysis of the Game’ Graph (Case Study: Malwares and Countermeasures Actions Based on Detection-Independent and Deductive Evidence) [Volume 9, Issue 4, 2021, Pages 99-123]
-
Graph Theory
Concurrent Detection of Compact Anomalous Subgraphs in Large Social Networks [Volume 9, Issue 2, 2021, Pages 179-194]
-
Grasshopper Optimization Algorithm
Energy Aware Routing in the Internet of Things using improved Grasshopper Metaheuristic Algorithm [Volume 11, Issue 1, 2023, Pages 15-29]
-
Gravitational Search Algorithm
Motion-encoded Gravitational Search Algorithm for moving target search using UAVs [Volume 10, Issue 4, 2022, Pages 63-73]
-
Greedy algorithm
A Greedy Algorithm for Constructing Region-Fault Tolerant Geometric Spanners [Volume 10, Issue 4, 2022, Pages 75-80]
-
Grey Wolf Optimization Algorithm
An Optimized Compound Deep Neural Network Integrating With Feature Selection for Intrusion Detection System in Cyber Attacks [Volume 10, Issue 4, 2022, Pages 41-51]
-
GSM Network
Prediction of Plaintext in GSM Network using SDCCH Logical Channel [Volume 9, Issue 3, 2021, Pages 39-47]
-
Guilty Knowledge Test
Guilty Knowledge Test by Chaotic Processing of Electroencephalogram Signals Based on Fuzzy Recurrence Plot [Volume 10, Issue 2, 2022, Pages 87-104]
H
-
Hadoop scheduling
A New Scheduling Algorithm to Reduce Computation Time in Hadoop Environment [Volume 8, Issue 2, 2020, Pages 51-59]
-
Hamming distance
An Approach to Dependability Enhancement of Cache Memories [Volume 10, Issue 1, 2022, Pages 1-10]
-
Hamming distance
Presenting A Method Based on Nearest Neighbors and Hamming Distance in Order to Identify Malicious Applications [Volume 11, Issue 2, 2023, Pages 81-90]
-
Handshake
Secure and Efficient 4-way Handshake in Smart Grid to DoS Attacks Mitigation [Volume 4, Issue 1, 2016, Pages 9-17]
-
Hard and Soft Data Fusion
A New Method for Image Steganography Using Discrete Wavelet Transforms [Volume 7, Issue 4, 2019, Pages 79-89]
-
Hardware Chips
Side Channel Analysis of International Data Encryption Algorithm (IDEA) [Volume 7, Issue 4, 2019, Pages 51-57]
-
Hardware Counters
Providing a behavioral malware detection system based on the function of hardware counters using a neural network optimized with a dragonfly algorithm [Volume 9, Issue 2, 2021, Pages 9-16]
-
Hardware Security
Design and Implementation of a Physically Unclonable Function on FPGA [Volume 6, Issue 4, 2018, Pages 23-32]
-
Hardware Security
Design and Production of Hardware Authentication Code Using Physically Unclonable Functions and a Random Number Generator on FPGA [Volume 7, Issue 4, 2019, Pages 37-50]
-
Harmony search algorithm
Optimal Placement of Cameras to Maximize Visual Coverage using Genetic Algorithm and Harmony Search [Volume 7, Issue 1, 2019, Pages 49-61]
-
Hash Function
Secure and Efficient 4-way Handshake in Smart Grid to DoS Attacks Mitigation [Volume 4, Issue 1, 2016, Pages 9-17]
-
Hash Function
A Hash-Based Multi-Use Multi-Stage Secret Sharing Scheme with General Access Structure [Volume 6, Issue 3, 2018, Pages 107-115]
-
Hash Function
Improvement of Rotational Cryptanalysis of Shabal and Cubehash Hash Functions [Volume 9, Issue 1, 2021, Pages 91-100]
-
Heap
Automated Exploit Generation For Application’s Vulnerability [Volume 4, Issue 1, 2016, Pages 35-50]
-
Hermite pulse shaping filter
A new method for data transmission in shallow water channel based on offset multi-carrier filter bank [Volume 11, Issue 3, 2023, Pages 25-34]
-
Hidden Markov Models
The Presentation of a Model for Analyzing the Behavior of the Enemy Using Hidden Markov Models Based on Electronic Warfare Observations in Complex War Scenes [Volume 7, Issue 1, 2019, Pages 113-128]
-
Hidden State
Hellman Chains Analysis Base on Graph of Random Function [Volume 4, Issue 1, 2016, Pages 81-89]
-
Hierarchical
Hierarchical Fuzzy Identity-Based Encryption [Volume 6, Issue 3, 2018, Pages 35-44]
-
High Maneuvering Target Tracking
High Maneuvering Target Tracking Based on Augmented State Method using Adaptive Unscented Kalman Filter [Volume 7, Issue 2, 2019, Pages 93-108]
-
Homogeneous linear recursion
A novel lossless color secret image sharing based on homogeneous linear recursion [Volume 10, Issue 3, 2022, Pages 107-118]
-
Honeynet
Detection of Unknown Malicious Network Streams using Ensemble Learning [Volume 6, Issue 2, 2018, Pages 93-108]
-
Honeypot
A cooperative and independent deception system in the active cyber defense system [Volume 10, Issue 2, 2022, Pages 129-142]
-
Hooking
A Secure Environment for Behavioral Malware Analysis [Volume 2, Issue 3, 2014, Pages 65-76]
-
Hybrid algorithm
A New Scheduling Algorithm to Reduce Computation Time in Hadoop Environment [Volume 8, Issue 2, 2020, Pages 51-59]
-
Hybrid Approach in Machine Learning
A New Hybrid Approach for Traffic Identification and Classification in Wireless Networks [Volume 10, Issue 2, 2022, Pages 31-41]
-
Hybrid cloud
Secure and confidential workflow scheduling in hybrid cloud using improved particle swarm optimization algorithm [Volume 7, Issue 4, 2019, Pages 131-145]
-
Hybrid FSO/RF
Performance Analysis of Hybrid FSO/RF Systems Using the ℳ Distribution and Markov Function [Volume 10, Issue 2, 2022, Pages 1-10]
-
Hyper-parameter Optimization
An Optimized Compound Deep Neural Network Integrating With Feature Selection for Intrusion Detection System in Cyber Attacks [Volume 10, Issue 4, 2022, Pages 41-51]
I
-
Identifying Misbehaving Users
Reducing the Destructive Effect of Misbehaving Users in Cooperative Spectrum Sensing using Reinforcement Learning [Volume 10, Issue 4, 2022, Pages 1-9]
-
IDS
The Presentation of a Hybrid Anomaly Detection Model Using Inverse Weight Clustering and Machine Learning in Cloud Environments [Volume 9, Issue 4, 2021, Pages 21-29]
-
IEEE 802.15.4
Enhance Media Access Control in IEEE 802.15.4 Based Smart Grids using Swarm Intelligence Algorithms [Volume 7, Issue 3, 2019, Pages 9-20]
-
IFFT
A Combined Improved Algorithm to Estimating The delay of Sky waves In Loran c Receiver [Volume 2, Issue 4, 2014, Pages 55-63]
-
Image authentication
Detection of Median Filtering Manipulation in Compressed Images [Volume 7, Issue 3, 2019, Pages 121-129]
-
Image Classification
Classification of High Dimensional Imbalanced Dataset via Game Theory-based Generative Adversarial Networks [Volume 9, Issue 2, 2021, Pages 63-74]
-
Image Compressing Standard
An Optimized Unsupervised Feature Selection Algorithm [Volume 3, Issue 3, 2015, Pages 1-7]
-
Image Encryption
Non-Performance of Pearson Correlation Coefficient for Evaluating Image Encryption Security [Volume 6, Issue 2, 2018, Pages 83-91]
-
Image Encryption
An Image Encryption Algorithm Based on the Sn Permutation Group and Chaotic Functions [Volume 8, Issue 3, 2020, Pages 139-150]
-
Image Forensics
Detection of Median Filtering Manipulation in Compressed Images [Volume 7, Issue 3, 2019, Pages 121-129]
-
Image forgery detection
Forgery detection in digital images using the hybrid deep learning method [Volume 11, Issue 4, 2023]
-
Image Fusion
Improving the Quality of Millimeter Wave Images by Fusion with Visible Images [Volume 9, Issue 4, 2021, Pages 77-86]
-
Image Processing
Robust Steganography Algorithm Text in the Image Using A Spread Spectrum Method [Volume 2, Issue 3, 2014, Pages 77-83]
-
Image Processing
Real-time Topology-based Tracking of Microscopic Objects [Volume 9, Issue 3, 2021, Pages 1-20]
-
Image Processing
Improve the detection of dangerous objects in x-ray images in security and military inspections using image processing approaches [Volume 10, Issue 4, 2022, Pages 81-89]
-
Imbalanced Data
Detection of Unknown Malicious Network Streams using Ensemble Learning [Volume 6, Issue 2, 2018, Pages 93-108]
-
Imbalanced Dataset
Classification of High Dimensional Imbalanced Dataset via Game Theory-based Generative Adversarial Networks [Volume 9, Issue 2, 2021, Pages 63-74]
-
Impact projection
A new architecture for impact projection of cyber-attacks based on high level information fusion in cyber command and control [Volume 2, Issue 4, 2014, Pages 1-14]
-
Imperialist Competitive Algorithm (ICA)
Generating Tree Decomposition of Graphs with Imperialist Competitive Algorithm for Use in Secret Sharing Scheme [Volume 7, Issue 3, 2019, Pages 105-111]
-
Impossible Differential Attack
Analysis of Impossible Differential on LowMC Block Cipher [Volume 7, Issue 2, 2019, Pages 69-79]
-
IMU
Three-Dimensional Angles Measurement using IME based on MEMS Technology by Adaptive Kalman Filter [Volume 7, Issue 2, 2019, Pages 81-91]
-
Incremental Online Learning
A Comprehensive Semi-Suprvised Model for Collaborative Intrusion Detection Based on Network Behavior Profiling Using The Concept of Deep Learning and Fuzzy Correlation of Alerts along [Volume 9, Issue 3, 2021, Pages 165-186]
-
Index Search
Optimum Parameter Selection for Rainbow Table TMTO Attack Considering Breaking Time and Using Sequential and Index Search Methods [Volume 3, Issue 3, 2015, Pages 49-57]
-
Industrial Control Systems Security
Prioritizing Obstacles to Industrial Control Systems Security Management Implementation, using Interpretive Structural Modeling (ISM) Approach [Volume 7, Issue 2, 2019, Pages 109-119]
-
Influence
Identifying Influential Nodes in Social Networks by Integrating the Centrality Method and Node Activity [Volume 8, Issue 3, 2020, Pages 1-11]
-
Influence maximization
A Dynamic Metaheuristic Algorithm for Influence Maximization in Social Networks [Volume 11, Issue 2, 2023, Pages 57-69]
-
Influence Maximization (IM)
Identifying Influential Nodes in Social Networks by Integrating the Centrality Method and Node Activity [Volume 8, Issue 3, 2020, Pages 1-11]
-
Influential Nodes
Identifying Influential Nodes in Social Networks by Integrating the Centrality Method and Node Activity [Volume 8, Issue 3, 2020, Pages 1-11]
-
Information Fusion
A new architecture for impact projection of cyber-attacks based on high level information fusion in cyber command and control [Volume 2, Issue 4, 2014, Pages 1-14]
-
Information Hiding
Side-Channel Attack Resistance Approaches Through Dynamic Differential Logic [Volume 7, Issue 3, 2019, Pages 93-104]
-
Information Index
Non-Performance of Pearson Correlation Coefficient for Evaluating Image Encryption Security [Volume 6, Issue 2, 2018, Pages 83-91]
-
Information Ratio
Some New Bounds on the Information Ratio of the Cartesian Product of Some Classes of Graphs [Volume 6, Issue 4, 2018, Pages 135-142]
-
Information Security
Web Covert Timing Channel Detection based on Entropy [Volume 8, Issue 3, 2020, Pages 13-23]
-
Information Technology Project
Effects of Cyber Threats in IT Projects Using the Fuzzy Cognitive Mapping Approach [Volume 7, Issue 2, 2019, Pages 41-51]
-
Information theoretic secrecy
Information Theoretic Secret Key Agreement Based on Localization [Volume 8, Issue 2, 2020, Pages 35-49]
-
Information theory
Using Generalized Entropy Approach for Blind Estimation of the Length of Spreading Sequences in Code Division Multiple Access Systems [Volume 8, Issue 3, 2020, Pages 53-61]
-
Initial State
A New Method for Blind Recognition of the Initial State of Synchronous Scramblers When Located after the Channel Encoder [Volume 9, Issue 1, 2021, Pages 19-27]
-
INS
Improving INS/GPS Integration with Artificial Intelligence during GPS Outage [Volume 9, Issue 2, 2021, Pages 143-157]
-
Integral characteristic
Structural Analysis based on Integral Characteristic of a Reduced Round Block Cipher with Making an Improvement [Volume 7, Issue 3, 2019, Pages 1-8]
-
Intelligence Mobile Advertising and Electronic Commerce
An Anti-Spam Framework for Advertising Targeting Smart Mobile Devices on IoT [Volume 6, Issue 2, 2018, Pages 65-81]
-
Intentional Interference
Interference Mitigation in Cognitive Radio Communication Systems Based on the Wavelet Transform [Volume 9, Issue 4, 2021, Pages 55-66]
-
Inter-cluster routing
Energy-Harvesting Aware Multi-Hop Routing in Wireless Sensor Networks for Defense Applications [Volume 8, Issue 4, 2020, Pages 63-73]
-
Interference Mitigation
Interference Mitigation in Cognitive Radio Communication Systems Based on the Wavelet Transform [Volume 9, Issue 4, 2021, Pages 55-66]
-
Interfering Signals Detection
Detection of Interfering Signals and Estimation of Their Carrier Frequency in CNC Satellite Communications using Cyclic Spectrum Density [Volume 11, Issue 2, 2023, Pages 91-101]
-
Intermediate Frequency Coefficients of the Wavelet
Steganography on raw video based on proper detection and compromise between the parameters of transparency, resistance and capacity [Volume 8, Issue 1, 2020, Pages 51-65]
-
International Data Encryption Algorithm (IDEA)
Side Channel Analysis of International Data Encryption Algorithm (IDEA) [Volume 7, Issue 4, 2019, Pages 51-57]
-
Internet of Things
A Mutual Authentication Protocol for IoT Users in Cloud Environment [Volume 9, Issue 2, 2021, Pages 17-28]
-
Internet of Things
A new analytical model for enhancing performance of cognitive radio user’s transmissions in the internet of things [Volume 9, Issue 3, 2021, Pages 73-82]
-
Internet of Things
Presentation of a model for feasibility assessment of implementing the IoT social network projects using the existing public social networks as the infrastructure [Volume 10, Issue 1, 2022, Pages 73-84]
-
Internet of Things
Energy Aware Routing in the Internet of Things using improved Grasshopper Metaheuristic Algorithm [Volume 11, Issue 1, 2023, Pages 15-29]
-
Internet of Things
Improving mobile mass monitoring in the IoT environment based on Chaotic Fog Algorithm [Volume 11, Issue 3, 2023, Pages 77-88]
-
Internet of Things
A recommender system using a support vector machine and the TOPSIS model in the Internet of Things [Volume 11, Issue 4, 2023]
-
Internet of Things
Providing a routing method in Internet of Things networks based on fuzzy logic and clustering
For use in smart transportatio [Volume 11, Issue 4, 2023]
-
Internet of Things (IoT)
Real-time Topology-based Tracking of Microscopic Objects [Volume 9, Issue 3, 2021, Pages 1-20]
-
Internet service
A recommender system using a support vector machine and the TOPSIS model in the Internet of Things [Volume 11, Issue 4, 2023]
-
Intra-pulse modulation
Intra-pulse Modulation Recognition Using Time-Frequency Features Based on Modified-B Distribution [Volume 7, Issue 1, 2019, Pages 129-138]
-
Intrusion detection
Web-based Military Management Systems Security Using Combination of One-class Classifiers [Volume 3, Issue 3, 2015, Pages 19-30]
-
Intrusion detection
Improving Intrusion Detection System Using a New Feature Selection Technique [Volume 6, Issue 4, 2018, Pages 143-152]
-
Intrusion detection
Intrusion Detection in Computer Networks using Decision Tree and Feature Reduction [Volume 9, Issue 3, 2021, Pages 99-108]
-
Intrusion detection
A method to detect intrusion into the Internet of Things using the game theory [Volume 10, Issue 1, 2022, Pages 21-31]
-
Intrusion detection
A model for Multi-Class Intrusion Detection Using the Dragonfly Feature Selection by Learning on the KDD-CUP99 Dataset [Volume 10, Issue 3, 2022, Pages 33-42]
-
Intrusion Detection System
Sequential Forward Feature Selection for Intrusion Detection System, Using Ant Colony Algorithm [Volume 6, Issue 2, 2018, Pages 49-63]
-
Intrusion Detection System
Network Intrusion Detection using a combination of artificial neural networks in a hierarchical manner [Volume 8, Issue 1, 2020, Pages 89-99]
-
Intrusion Detection System
Detection of the Remote Code Execution Attacks Using the PHP Web Application Intrusion Detection System [Volume 10, Issue 2, 2022, Pages 75-85]
-
Intrusion Detection System
Investigation of a new ensemble method of intrusion detection system on different data sets [Volume 10, Issue 3, 2022, Pages 43-57]
-
Intrusion Detection System
An Optimized Compound Deep Neural Network Integrating With Feature Selection for Intrusion Detection System in Cyber Attacks [Volume 10, Issue 4, 2022, Pages 41-51]
-
Intrusion Response System
A Foresight Framework for Intrusion Response Systems in Computer Networks [Volume 6, Issue 3, 2018, Pages 13-34]
-
Inverse Synthetic Aperture Radar (ISAR)
Inverse Synthetic Aperture Radar (ISAR) Imaging of Targets with Non-Uniform Motion and Constant Acceleration based on Compressed Sensing [Volume 9, Issue 2, 2021, Pages 51-62]
-
IoT
An Anti-Spam Framework for Advertising Targeting Smart Mobile Devices on IoT [Volume 6, Issue 2, 2018, Pages 65-81]
-
IoT
The Presentation of a Hybrid Anomaly Detection Model Using Inverse Weight Clustering and Machine Learning in Cloud Environments [Volume 9, Issue 4, 2021, Pages 21-29]
-
IoT
The IoT Resource Allocation Improvement in Fog Computing Using Non-Cooperative Game Theory [Volume 9, Issue 4, 2021, Pages 147-158]
-
IoT
A method to detect intrusion into the Internet of Things using the game theory [Volume 10, Issue 1, 2022, Pages 21-31]
-
IoT
Identify malicious traffic on IoT infrastructure using neural networks and deep learning [Volume 11, Issue 2, 2023, Pages 1-13]
-
ISCM Neural Network
Improving the Quality of Millimeter Wave Images by Fusion with Visible Images [Volume 9, Issue 4, 2021, Pages 77-86]
J
-
Jitter
Simulation and Evaluation of Jitter and Packet Loss Noises Influence on Covert Timing Channel Performance [Volume 2, Issue 3, 2014, Pages 35-49]
-
Jitter
A cross layer approach for improving the TCP quality-of-service parameters over the IEEE 802.11.ac wireless networks [Volume 10, Issue 1, 2022, Pages 109-117]
-
Joint channel and data detection
A New Method for Detection of Discrete Data Transmitted over Non-Linear Dynamic Wireless Channels [Volume 3, Issue 2, 2015, Pages 75-85]
K
-
KDD-CUP99
A model for Multi-Class Intrusion Detection Using the Dragonfly Feature Selection by Learning on the KDD-CUP99 Dataset [Volume 10, Issue 3, 2022, Pages 33-42]
-
KDD Cup99 dataset
Intrusion Detection in Computer Networks using Decision Tree and Feature Reduction [Volume 9, Issue 3, 2021, Pages 99-108]
-
Key Agreement
A secure three factor authentication scheme for wireless
healthcare sensor networks based on elliptic curve [Volume 8, Issue 1, 2020, Pages 147-167]
-
Key exchange
Secure and Efficient 4-way Handshake in Smart Grid to DoS Attacks Mitigation [Volume 4, Issue 1, 2016, Pages 9-17]
-
Key Management
Analyzing Security Challenges of LTE Networks, Obstacles and Opportunities of Network Localization
Based on the Standard Platform [Volume 7, Issue 2, 2019, Pages 121-132]
-
Key Rate
A New Approach for Estimating the Rate of Emission in Quantum Bit Exchange Systems Using Binomial Distribution [Volume 7, Issue 1, 2019, Pages 105-112]
-
Keyword Extraction
Automatic Keyword Extraction from Persian short Text Using word2vec [Volume 8, Issue 2, 2020, Pages 105-114]
-
K-Nearest Neighbors
Guilty Knowledge Test by Chaotic Processing of Electroencephalogram Signals Based on Fuzzy Recurrence Plot [Volume 10, Issue 2, 2022, Pages 87-104]
L
-
L1-norm
Collusive Fraud Classification in Network of Online Auction Using Similarity Measure in Collective Classification [Volume 7, Issue 1, 2019, Pages 95-103]
-
Label Propagation Algorithm
A Distributed Approach to Community Detection in Large Social Networks Based on Label Propagation [Volume 8, Issue 4, 2020, Pages 1-15]
-
Lanchester equation
Developing a Threat-Tolerability Bilateral Concept within a Differential Game for the Analysis of the Insider/Adversary Behavior in Operational environment [Volume 11, Issue 2, 2023, Pages 15-29]
-
Large Scale Data
Providing an Agent-Based Architecture for Semantic Mining From Large-Scale Data in Distributed Environments [Volume 8, Issue 3, 2020, Pages 83-99]
-
Latin square
Quasi-transversals in Latin squares and k-domination in graphs [Volume 10, Issue 3, 2022, Pages 67-75]
-
Lattice
Two Verifiable Multi-Secret Sharing Schemes: A Linear Scheme with Standard Security and A Lattice-Based Scheme [Volume 8, Issue 3, 2020, Pages 101-115]
-
Launch Pad
A New Method to Evaluate the Launch Pad Lightning Protection
System Performance by Using LPM in 3-D [Volume 3, Issue 1, 2015, Pages 15-27]
-
Layered approach
Detection of the Remote Code Execution Attacks Using the PHP Web Application Intrusion Detection System [Volume 10, Issue 2, 2022, Pages 75-85]
-
Leader Progression Model
A New Method to Evaluate the Launch Pad Lightning Protection
System Performance by Using LPM in 3-D [Volume 3, Issue 1, 2015, Pages 15-27]
-
Learning Automata
Reducing the Destructive Effect of Misbehaving Users in Cooperative Spectrum Sensing using Reinforcement Learning [Volume 10, Issue 4, 2022, Pages 1-9]
-
Learning Automata
Distributed Solving of Weapon Target Assignment Problem using Learning Automata [Volume 11, Issue 1, 2023, Pages 47-55]
-
Level Crossing Rate
Performance Analysis of Hybrid FSO/RF Systems Using the ℳ Distribution and Markov Function [Volume 10, Issue 2, 2022, Pages 1-10]
-
Lifi
Optimal Design of Wireless Visible Light Communication Network with the Aim of Minimizing the Outage Probability at the Location of the Mobile Receiver [Volume 10, Issue 3, 2022, Pages 1-9]
-
Linear discriminant analysis (LDA)
Fixing Security Defects of Video Authentication Systems with Face Recognition, Based on 3D Structure and Shape Evaluation [Volume 9, Issue 4, 2021, Pages 141-145]
-
Link prediction
An Improved New Link Prediction Method in Social Multilplex Networks Based on the Gravitational Search Algorithm [Volume 8, Issue 2, 2020, Pages 15-24]
-
LMS and Sign-Data Algorithm
Defense Against Spoofing in GPS Receiver using Correlation and Least Mean Squares Method Based on Sign-Data Algorithm [Volume 3, Issue 4, 2015, Pages 11-22]
-
Load Balancing
Presentation and Performance Evaluation of an Efficient Algorithm for a Distributed Controller in SDN [Volume 9, Issue 1, 2021, Pages 175-183]
-
Localization
Information Theoretic Secret Key Agreement Based on Localization [Volume 8, Issue 2, 2020, Pages 35-49]
-
Localization
Wireless Target Localization Using Median Weighted Least Square Error Metric in the Presence of Non-Line of Sight Signals [Volume 8, Issue 2, 2020, Pages 125-133]
-
Localization Systems
A Novel Algorithm for Radar Jamming Resource Allocation [Volume 7, Issue 3, 2019, Pages 53-70]
-
Local Positioning System
Design and Simulation of a LORAN Signal Generator for LPS Transmitter Using Class I Amplifier [Volume 8, Issue 2, 2020, Pages 25-33]
-
Location
Modelling and Solving the Location Problem of Fire Launching Sites [Volume 6, Issue 3, 2018, Pages 45-57]
-
Location
Modelling and Solving the Location Problem of Fire Launching Sites [Volume 6, Issue 3, 2018, Pages 59-64]
-
Long Short Term Memory (LSTM)
P2P Botnet Detection Using Deep Learning Method [Volume 8, Issue 2, 2020, Pages 1-14]
-
Loopy Belief Propagation
Collusive Fraud Classification in Network of Online Auction Using Similarity Measure in Collective Classification [Volume 7, Issue 1, 2019, Pages 95-103]
-
LORAN signal
Design and Simulation of a LORAN Signal Generator for LPS Transmitter Using Class I Amplifier [Volume 8, Issue 2, 2020, Pages 25-33]
-
LORAN Transmitter
Reliability Analysis of Open-Loop Switching Loran Signal Generator Using Omoe Indicator [Volume 8, Issue 2, 2020, Pages 83-93]
-
Lossless recovery
A novel lossless color secret image sharing based on homogeneous linear recursion [Volume 10, Issue 3, 2022, Pages 107-118]
-
Low-distortion Topology
Optimal Design of Low-power High-resolution Unity-STF S-MASH Sigma Delta Modulator for Telecommunication Applications [Volume 7, Issue 2, 2019, Pages 13-24]
-
LowMC Block Cipher
Analysis of Impossible Differential on LowMC Block Cipher [Volume 7, Issue 2, 2019, Pages 69-79]
-
LPS
Design and Simulation of a LORAN Signal Generator for LPS Transmitter Using Class I Amplifier [Volume 8, Issue 2, 2020, Pages 25-33]
-
LSB
Speech Steganalysis of Least Significant Bits Based on the Percentage of Equal Adjacent Samples [Volume 9, Issue 1, 2021, Pages 75-90]
-
LSTM neural network
A way to predict the stock price of the Tehran Stock Exchange in relation to knowledge [Volume 10, Issue 4, 2022, Pages 91-100]
-
LTE Network
Analyzing Security Challenges of LTE Networks, Obstacles and Opportunities of Network Localization
Based on the Standard Platform [Volume 7, Issue 2, 2019, Pages 121-132]
-
LVQ
Radar data processing using a combination of principal component analysis methods and self-organizing and digitized neural networks of the learning vector [Volume 9, Issue 2, 2021, Pages 1-7]
-
LWE Problem
Two Verifiable Multi-Secret Sharing Schemes: A Linear Scheme with Standard Security and A Lattice-Based Scheme [Volume 8, Issue 3, 2020, Pages 101-115]
M
-
Machine Intelligence
A Practical Template Attack Against the Implementation of the Advanced Encryption Standard on ARM Processor [Volume 7, Issue 1, 2019, Pages 39-48]
-
Machine Learning
Introduction of the Entropy-Based Method for Finding Influential Nodes in Information Dissemination on Online Social Networks [Volume 6, Issue 2, 2018, Pages 1-10]
-
Machine Learning
Blind Estimation of Number of Users in TDMA Networks Using Redundancy of Adaptive Channel Coding [Volume 6, Issue 2, 2018, Pages 11-20]
-
Machine Learning
Improvement in the Ransomwares Detection Method With New API
Calls Features [Volume 8, Issue 4, 2020, Pages 107-118]
-
Machine Learning
Classification of High Dimensional Imbalanced Dataset via Game Theory-based Generative Adversarial Networks [Volume 9, Issue 2, 2021, Pages 63-74]
-
Machine Learning
A method to prediction of software system’s code smells using neural network [Volume 11, Issue 3, 2023, Pages 67-76]
-
Machine Learning Algorithms
Comparison of Supervised Machine Learning Algorithms in Detection of Botnets Domain Generation Algorithms [Volume 8, Issue 4, 2020, Pages 17-29]
-
MAG Architecture
The Improvement of the GMCR Model Based on Statistical Analysis of the Game’ Graph (Case Study: Malwares and Countermeasures Actions Based on Detection-Independent and Deductive Evidence) [Volume 9, Issue 4, 2021, Pages 99-123]
-
Mahalanobis Distance
Modular human face recognition method based on principal component analysis and Mahalanobis distance [Volume 11, Issue 4, 2023]
-
Malicious Attacks
Covert and Secure Underwater Acoustic Communication using Merkle Hash Tree and Dolphin Whistle [Volume 6, Issue 2, 2018, Pages 135-146]
-
Malicious domain detection
Malicious Domain Detection using DNS Records [Volume 9, Issue 3, 2021, Pages 83-97]
-
Malware
A New Method For Gradual Detection of Environmental Conditions and Resources Required by Smart Malware [Volume 6, Issue 4, 2018, Pages 33-44]
-
Malware
Providing a behavioral malware detection system based on the function of hardware counters using a neural network optimized with a dragonfly algorithm [Volume 9, Issue 2, 2021, Pages 9-16]
-
Malware
Kashef: A Two-step detector of Windows-based Malicious executable files [Volume 10, Issue 2, 2022, Pages 143-156]
-
Malware
Identify malicious traffic on IoT infrastructure using neural networks and deep learning [Volume 11, Issue 2, 2023, Pages 1-13]
-
Malware
Presenting A Method Based on Nearest Neighbors and Hamming Distance in Order to Identify Malicious Applications [Volume 11, Issue 2, 2023, Pages 81-90]
-
Malware
dentifying Zero Day Android Daily through Neural Networks [Volume 11, Issue 3, 2023, Pages 49-55]
-
Malware Analysis
A Secure Environment for Behavioral Malware Analysis [Volume 2, Issue 3, 2014, Pages 65-76]
-
Malware Analysis
A New Method For Gradual Detection of Environmental Conditions and Resources Required by Smart Malware [Volume 6, Issue 4, 2018, Pages 33-44]
-
Malware Analysis
A Framework for Evaluating Malware and Countermeasures with an Analytical Approach based on the Game Theory
Case Study: Actors' Actions Based on Environmental Evidence [Volume 10, Issue 1, 2022, Pages 47-71]
-
Malware Analysis
The Improvement of the GMCR Model Based on Statistical Analysis of the Game’ Graph (Case Study: Malwares and Countermeasures Actions Based on Detection-Independent and Deductive Evidence) [Volume 9, Issue 4, 2021, Pages 99-123]
-
Malware attacks
Developing an Improved Method for Malware Attack Detection in Cloud Computing using Ensemble Learning [Volume 10, Issue 4, 2022, Pages 33-39]
-
Malware Detection
Kashef: A Two-step detector of Windows-based Malicious executable files [Volume 10, Issue 2, 2022, Pages 143-156]
-
Malware Detection
A Malware Classification Method Using visualization and Word Embedding Features [Volume 11, Issue 1, 2023, Pages 1-13]
-
Malware Embedding
A Malware Classification Method Using visualization and Word Embedding Features [Volume 11, Issue 1, 2023, Pages 1-13]
-
Malware Propagation
Malware Propagation Modeling Considering Software Diversity Approach in Weighted Scale-Free Network [Volume 6, Issue 3, 2018, Pages 131-140]
-
Malware Propagation
A Software System for Large-Scale Simulation of Malware Propagation
in Computer Networks [Volume 7, Issue 2, 2019, Pages 53-67]
-
Malware Visualization
A Malware Classification Method Using visualization and Word Embedding Features [Volume 11, Issue 1, 2023, Pages 1-13]
-
Mapping-Reduction
Providing an Ontology-Based Method for Exploring the Association Rules in
Multi-Agent Distributed Environments [Volume 9, Issue 1, 2021, Pages 1-17]
-
MapReduce scheduling
A New Scheduling Algorithm to Reduce Computation Time in Hadoop Environment [Volume 8, Issue 2, 2020, Pages 51-59]
-
Markov
Interference Mitigation in Cognitive Radio Communication Systems Based on the Wavelet Transform [Volume 9, Issue 4, 2021, Pages 55-66]
-
Markov Chain
A new analytical model for enhancing performance of cognitive radio user’s transmissions in the internet of things [Volume 9, Issue 3, 2021, Pages 73-82]
-
Markov Chain
Providing a new solution to botnet detection in a Markov chain-based network [Volume 9, Issue 3, 2021, Pages 59-71]
-
Markov Chain
The Presentation of an Active Cyber Defense Model for Application in Cyber Deception Technology [Volume 9, Issue 4, 2021, Pages 125-140]
-
Markov Chaining
Improvement of Rotational Cryptanalysis of Shabal and Cubehash Hash Functions [Volume 9, Issue 1, 2021, Pages 91-100]
-
Markov Decision Process
A Foresight Framework for Intrusion Response Systems in Computer Networks [Volume 6, Issue 3, 2018, Pages 13-34]
-
Markov Random Field
Collusive Fraud Classification in Network of Online Auction Using Similarity Measure in Collective Classification [Volume 7, Issue 1, 2019, Pages 95-103]
-
Masking
A New And Efficient Method of Mass Masking and its Resistance Assessment to Power Analysis [Volume 6, Issue 2, 2018, Pages 123-134]
-
Matched Filter
An Integrated Algorithm for Optimal Detection of Weak Radar Targets Masked by the Sidelobes of a Strong Target [Volume 6, Issue 4, 2018, Pages 91-104]
-
Matrix
Finite Frame as Code: Some Characterizations for Error Correction Codes and Three Algorithms for Troubleshooting in Data Transfer [Volume 7, Issue 2, 2019, Pages 1-12]
-
Mean Squared Error
Blind Frequency Offset Estimation using Adaptive Algorithms in Non-Coherent OFDM Systems [Volume 3, Issue 4, 2015, Pages 61-70]
-
Media Access Control
Enhance Media Access Control in IEEE 802.15.4 Based Smart Grids using Swarm Intelligence Algorithms [Volume 7, Issue 3, 2019, Pages 9-20]
-
Median filter
Detection of Median Filtering Manipulation in Compressed Images [Volume 7, Issue 3, 2019, Pages 121-129]
-
MEMS
Three-Dimensional Angles Measurement using IME based on MEMS Technology by Adaptive Kalman Filter [Volume 7, Issue 2, 2019, Pages 81-91]
-
Merkle Hash Tree
Covert and Secure Underwater Acoustic Communication using Merkle Hash Tree and Dolphin Whistle [Volume 6, Issue 2, 2018, Pages 135-146]
-
Meta- heuristic
Security-aware Task Scheduling Algorithm based on Multi Adaptive Learning and PSO Technique [Volume 9, Issue 2, 2021, Pages 159-178]
-
Metaheuristic Algorithm
Feature selection using a combination of Genetic-Whale-Ant colony algorithms for software fault prediction by machine learning [Volume 10, Issue 1, 2022, Pages 33-45]
-
Meta-Heuristic Algorithms
Sonar Dataset Classification using Multi-Layer Perceptron Neural Network Based on Dragonfly and Moth Algorithms [Volume 10, Issue 3, 2022, Pages 21-31]
-
MICMAC
Prioritizing Obstacles to Industrial Control Systems Security Management Implementation, using Interpretive Structural Modeling (ISM) Approach [Volume 7, Issue 2, 2019, Pages 109-119]
-
Microscopic Objects
Real-time Topology-based Tracking of Microscopic Objects [Volume 9, Issue 3, 2021, Pages 1-20]
-
Middle Band
Enhancing E-Security by Inserting a Watermark Using the Combination of Genetic Algorithm and Tabu Search [Volume 8, Issue 3, 2020, Pages 25-37]
-
Military Internet of Things
A New Mechanism for Enhancing the Security of Military Internet of Things by Using Quantum and Classic Cryptography [Volume 9, Issue 2, 2021, Pages 29-49]
-
MILP
A Techno-Economic Model of Sustainable Communication Infrastructure in the Smart City; using WDM-PON FTTx [Volume 9, Issue 1, 2021, Pages 149-156]
-
MIMO
Identification of STBC-OFDM Signals by Second-Order Cyclostationarity Method [Volume 7, Issue 4, 2019, Pages 27-36]
-
MIMO interference channel
Enhancing Communication Security in Cellular Communications Networks by using Interference Alignment Technique [Volume 3, Issue 2, 2015, Pages 49-60]
-
Minkowski Distance
Kavosh: Offering an Analysis Method and the Impact of Normal Network Traffic on Selection and Extraction Based on the Minkowski Distance [Volume 9, Issue 1, 2021, Pages 137-147]
-
Mitigation
Defense Against Spoofing in GPS Receiver using Correlation and Least Mean Squares Method Based on Sign-Data Algorithm [Volume 3, Issue 4, 2015, Pages 11-22]
-
Mixed Integer Linear Programming
Upper Bounds for the Probability of Differential Characteristics of Five Block Cipher
Constructions Functions [Volume 8, Issue 4, 2020, Pages 129-137]
-
Mobile Health
A Scheme for Improvement of Security and Privacy in Mobile Health Systems by Using SIM Card [Volume 7, Issue 1, 2019, Pages 11-24]
-
Mobile Sink
A Heuristic Data Diffusion and Gathering Scheme Using Virtual Line for Wireless Sensor Networks with Mobile Sink [Volume 9, Issue 2, 2021, Pages 195-207]
-
Mobile User
Optimal Design of Wireless Visible Light Communication Network with the Aim of Minimizing the Outage Probability at the Location of the Mobile Receiver [Volume 10, Issue 3, 2022, Pages 1-9]
-
Mobile AD hoc Networks
Performance Improvement of the ODMRP Protocol using Analysis of the Received Signal Strength Level [Volume 7, Issue 3, 2019, Pages 21-26]
-
Modeling of cyber-attacks
Modeling of cyber-attacks obfuscation, based on alteration technique of attack [Volume 8, Issue 1, 2020, Pages 67-77]
-
Modified-B distribution
Intra-pulse Modulation Recognition Using Time-Frequency Features Based on Modified-B Distribution [Volume 7, Issue 1, 2019, Pages 129-138]
-
Modular Addition
Improvement of Rotational Cryptanalysis of Shabal and Cubehash Hash Functions [Volume 9, Issue 1, 2021, Pages 91-100]
-
Monitoring and electronic action
A New Method in Wide Band Adaptive Beam Forming By Deep Learning Method In An Array System [Volume 11, Issue 3, 2023, Pages 35-47]
-
Multi-agent systems
Distributed Solving of Weapon Target Assignment Problem using Learning Automata [Volume 11, Issue 1, 2023, Pages 47-55]
-
Multi Agent Systems
Providing an Ontology-Based Method for Exploring the Association Rules in
Multi-Agent Distributed Environments [Volume 9, Issue 1, 2021, Pages 1-17]
-
MultiAgent Systems
Online Collaborative Planning in Complex Environment [Volume 2, Issue 4, 2014, Pages 15-23]
-
Multi-class
A model for Multi-Class Intrusion Detection Using the Dragonfly Feature Selection by Learning on the KDD-CUP99 Dataset [Volume 10, Issue 3, 2022, Pages 33-42]
-
Multi-correlation Architecture
Reducing Interference Effect on GPS Receiver by Using Multi-correlation Architecture [Volume 9, Issue 3, 2021, Pages 49-57]
-
Multi-Criteria Decision Making
Evaluation of Network-Based Operation Criteria Based on DEMATEL Method [Volume 7, Issue 1, 2019, Pages 139-153]
-
Multi-Layer Perceptron Neural Network
Providing a behavioral malware detection system based on the function of hardware counters using a neural network optimized with a dragonfly algorithm [Volume 9, Issue 2, 2021, Pages 9-16]
-
Multi-level PWM
Reliability Analysis of Open-Loop Switching Loran Signal Generator Using Omoe Indicator [Volume 8, Issue 2, 2020, Pages 83-93]
-
Multimode fiber
Sensing and detecting changes due to displacement, pressure, or dynamic vibration in an optical fiber, based on fiber Specklegram [Volume 11, Issue 3, 2023, Pages 89-99]
-
Multi Path Channel
Blind symbol Rate estimation in multipath channels [Volume 10, Issue 3, 2022, Pages 59-66]
-
Multipath phenomena
Coherent Acoustic source DOA estimation by nested array based on sparse solution [Volume 8, Issue 1, 2020, Pages 79-88]
-
Multiple Antennas
Security of UAV Relay Networks based on Covert Communication in the Presence of an Eavesdropping UAV [Volume 11, Issue 2, 2023, Pages 45-56]
-
Multiple-Criteria/Attribute Decision-making
The Course of Action Selection Model in Network Centric Operation [Volume 7, Issue 2, 2019, Pages 133-155]
-
Multiplex networks
An Improved New Link Prediction Method in Social Multilplex Networks Based on the Gravitational Search Algorithm [Volume 8, Issue 2, 2020, Pages 15-24]
-
Multiplier
The residue number system component design based on OneHot coding [Volume 10, Issue 1, 2022, Pages 119-133]
-
Multi-stage
A Hash-Based Multi-Use Multi-Stage Secret Sharing Scheme with General Access Structure [Volume 6, Issue 3, 2018, Pages 107-115]
-
Multi-Step Attacks
A Security Model Based Approach for Dynamic Risk Assessment of Multi-Step Attacks in Computer Networks [Volume 9, Issue 1, 2021, Pages 157-173]
-
Multitarget tracking
On Improvement of Cardinalized Probability Hypothesis Density Filter Implementation by using Auxiliary Particle Filter [Volume 3, Issue 4, 2015, Pages 23-41]
-
Multi-use
A Hash-Based Multi-Use Multi-Stage Secret Sharing Scheme with General Access Structure [Volume 6, Issue 3, 2018, Pages 107-115]
-
Multi – Stage
Modeling of Obfuscated Multi- Stage cyber Attacks [Volume 8, Issue 2, 2020, Pages 61-73]
-
Music
A Combined Improved Algorithm to Estimating The delay of Sky waves In Loran c Receiver [Volume 2, Issue 4, 2014, Pages 55-63]
-
Mutation Testing
A novel way to identify effective test-case in software testing [Volume 11, Issue 2, 2023, Pages 103-116]
-
Mutipath Channel
A New Metric for Estimation the User Position in the Multi User OFDMA Networks [Volume 2, Issue 3, 2014, Pages 1-11]
-
Mutual Authentication
A Mutual Anonymity Private Authentication Protocol to Use in Radio-Frequency Identification Systems [Volume 6, Issue 4, 2018, Pages 45-59]
-
Mutual Information
An Optimized Compound Deep Neural Network Integrating With Feature Selection for Intrusion Detection System in Cyber Attacks [Volume 10, Issue 4, 2022, Pages 41-51]
N
-
Nanotechnology
Design of Content-Addressable Memory in Quantum-Dot Cellular Automata [Volume 8, Issue 4, 2020, Pages 53-61]
-
Narrow Band Correlator
GPS Spoofing Mitigation using Adaptive Estimator in Tracking Loop [Volume 6, Issue 3, 2018, Pages 65-80]
-
Nash Equilibrium
Self-stabilizing Grundy Coloring Using Game Theory and Heuristics Ordering [Volume 6, Issue 2, 2018, Pages 39-48]
-
Nash Equilibrium
The IoT Resource Allocation Improvement in Fog Computing Using Non-Cooperative Game Theory [Volume 9, Issue 4, 2021, Pages 147-158]
-
Natural Language Generation
Automatic Persian Text Generation Using Rule-Based Models and Word Embedding [Volume 9, Issue 4, 2021, Pages 43-54]
-
Natural Language Processing
Detection of advanced Cyber Attacks, Using Behavior Modeling Based on Natural Language Processing [Volume 6, Issue 3, 2018, Pages 141-151]
-
Navigation
Design and Simulation of a LORAN Signal Generator for LPS Transmitter Using Class I Amplifier [Volume 8, Issue 2, 2020, Pages 25-33]
-
Navigation
Improving INS/GPS Integration with Artificial Intelligence during GPS Outage [Volume 9, Issue 2, 2021, Pages 143-157]
-
Nearest neighbor
Presenting A Method Based on Nearest Neighbors and Hamming Distance in Order to Identify Malicious Applications [Volume 11, Issue 2, 2023, Pages 81-90]
-
Network Attack
A Trust Model Based on Swarm Intelligence Algorithms in WSNs [Volume 7, Issue 1, 2019, Pages 1-10]
-
Network Centric Operation
The Course of Action Selection Model in Network Centric Operation [Volume 7, Issue 2, 2019, Pages 133-155]
-
Network-centric warfare
Evaluation of Network-Based Operation Criteria Based on DEMATEL Method [Volume 7, Issue 1, 2019, Pages 139-153]
-
Network Dependency Graph
A Foresight Framework for Intrusion Response Systems in Computer Networks [Volume 6, Issue 3, 2018, Pages 13-34]
-
Network dynamicity
A Dynamic Metaheuristic Algorithm for Influence Maximization in Social Networks [Volume 11, Issue 2, 2023, Pages 57-69]
-
Networked UAVs
Guidance and distributed control of the networked UAVs [Volume 7, Issue 4, 2019, Pages 117-129]
-
Network Flow
Kavosh: Offering an Analysis Method and the Impact of Normal Network Traffic on Selection and Extraction Based on the Minkowski Distance [Volume 9, Issue 1, 2021, Pages 137-147]
-
Network Flow
Providing a new solution to botnet detection in a Markov chain-based network [Volume 9, Issue 3, 2021, Pages 59-71]
-
Network Flow Analysis
Botnet Detection for Peer to Peer Networks [Volume 3, Issue 4, 2015, Pages 43-60]
-
Network Forensics
Improving Payload Attribution Techniques in Computer Network Criminology with Time based Hierarchical Bloom Filter [Volume 7, Issue 3, 2019, Pages 71-81]
-
Network Noise
Simulation and Evaluation of Jitter and Packet Loss Noises Influence on Covert Timing Channel Performance [Volume 2, Issue 3, 2014, Pages 35-49]
-
Network Traffic
A New Hybrid Approach for Traffic Identification and Classification in Wireless Networks [Volume 10, Issue 2, 2022, Pages 31-41]
-
Network Traffic
Identify malicious traffic on IoT infrastructure using neural networks and deep learning [Volume 11, Issue 2, 2023, Pages 1-13]
-
Network traffic classification
DDoS Attack Detection System Using Ensemble Method Classification and Active Learning Approach [Volume 11, Issue 3, 2023, Pages 101-118]
-
Neural Networks
Increasing the Accuracy of Locating in Wireless Communication Systems Based on Neural Networks [Volume 3, Issue 3, 2015, Pages 31-38]
-
Neural Networks MLP
Energy-aware routing in wireless sensor networks using MLP and simulated annealing algorithms [Volume 9, Issue 3, 2021, Pages 133-142]
-
Neural Networks VGG
Fast Detection of Vehicle Type and Position in Images Based on Deep Neural Network [Volume 10, Issue 2, 2022, Pages 117-127]
-
N-gram properties
Design the Model of CSRF Attack Tree for Immunization the Web Application in Development Process [Volume 3, Issue 1, 2015, Pages 41-52]
-
NIST Tests
Design and Analysis of a Novel Synchronous Stream Cipher Using Secure Pseudo Random Number Generator [Volume 4, Issue 1, 2016, Pages 59-68]
-
Noise Reduction
Novel Spoofing Mitigation Method using Wavelet Transform Based on PSO Algorithm in the Acquisition Stage of GPS Receiver [Volume 10, Issue 4, 2022, Pages 19-31]
-
Noisy path tree
Trajectory Database Release with Differential Privacy Guarantee [Volume 9, Issue 1, 2021, Pages 29-42]
-
Non-line of sight signals
Wireless Target Localization Using Median Weighted Least Square Error Metric in the Presence of Non-Line of Sight Signals [Volume 8, Issue 2, 2020, Pages 125-133]
-
Non-orthogonal multiple access (NOMA)
Improving the Security in Cellular Communications Networks with adding Artificial Noise by method Non-Orthogonal Resource Allocation Techniques [Volume 9, Issue 2, 2021, Pages 135-142]
-
Non-uniform motion
Inverse Synthetic Aperture Radar (ISAR) Imaging of Targets with Non-Uniform Motion and Constant Acceleration based on Compressed Sensing [Volume 9, Issue 2, 2021, Pages 51-62]
-
Normal Distribution
Distributed Denial of Service Attacks Detection in Software Defined Networks [Volume 9, Issue 1, 2021, Pages 43-59]
-
Notch Filter
A New Method for Cancelling CW Jamming in GPS Receivers [Volume 4, Issue 1, 2016, Pages 69-79]
-
NSS Digital Signature
Designing Anonymous Communication System by Lattice-Based Cryptography [Volume 2, Issue 3, 2014, Pages 13-22]
-
NTRU Cryptography System
Designing Anonymous Communication System by Lattice-Based Cryptography [Volume 2, Issue 3, 2014, Pages 13-22]
-
NTT
Speeding up the execution-time of Crystals-Kyber PQC Algorithm on FPGA [Volume 10, Issue 4, 2022, Pages 101-110]
-
Number Errors
The Impact of Security Mechanisms on Software Vulnerabilities [Volume 2, Issue 1, 2014, Pages 49-60]
O
-
Obstacles to Implementing Security
Prioritizing Obstacles to Industrial Control Systems Security Management Implementation, using Interpretive Structural Modeling (ISM) Approach [Volume 7, Issue 2, 2019, Pages 109-119]
-
ODMRP protocol
Performance Improvement of the ODMRP Protocol using Analysis of the Received Signal Strength Level [Volume 7, Issue 3, 2019, Pages 21-26]
-
OFDM
Blind Frequency Offset Estimation using Adaptive Algorithms in Non-Coherent OFDM Systems [Volume 3, Issue 4, 2015, Pages 61-70]
-
OFDM
Identification of STBC-OFDM Signals by Second-Order Cyclostationarity Method [Volume 7, Issue 4, 2019, Pages 27-36]
-
OFDMA
A New Metric for Estimation the User Position in the Multi User OFDMA Networks [Volume 2, Issue 3, 2014, Pages 1-11]
-
OMOE indicator
Reliability Analysis of Open-Loop Switching Loran Signal Generator Using Omoe Indicator [Volume 8, Issue 2, 2020, Pages 83-93]
-
OneHot coding
The residue number system component design based on OneHot coding [Volume 10, Issue 1, 2022, Pages 119-133]
-
One-knownsecret Attack
A Hash-Based Multi-Use Multi-Stage Secret Sharing Scheme with General Access Structure [Volume 6, Issue 3, 2018, Pages 107-115]
-
Online Collaborative Planning
Online Collaborative Planning in Complex Environment [Volume 2, Issue 4, 2014, Pages 15-23]
-
Online social network (OSN)
a conceptual model for computational evaluation of influence operations in online social networks [Volume 11, Issue 4, 2023, Pages 1-17]
-
Ontology
Syntax and Semantic Analysis for SQL-Injection Attacks [Volume 2, Issue 1, 2014, Pages 83-97]
-
Ontology
A New Method for Image Steganography Using Discrete Wavelet Transforms [Volume 7, Issue 4, 2019, Pages 79-89]
-
Ontology
Providing an Agent-Based Architecture for Semantic Mining From Large-Scale Data in Distributed Environments [Volume 8, Issue 3, 2020, Pages 83-99]
-
Ontology
Providing an Ontology-Based Method for Exploring the Association Rules in
Multi-Agent Distributed Environments [Volume 9, Issue 1, 2021, Pages 1-17]
-
Operational matrices
Cardinal Hermit functions and their application in solving the time-delay fractional optimal control problems [Volume 8, Issue 4, 2020, Pages 153-160]
-
Operator
Finite Frame as Code: Some Characterizations for Error Correction Codes and Three Algorithms for Troubleshooting in Data Transfer [Volume 7, Issue 2, 2019, Pages 1-12]
-
Opportunity
Projection of Cyber Attacks using Damage Estimation and Combination of Attacker’s Capability and Opportunity based on Transferable Belief Model [Volume 6, Issue 4, 2018, Pages 1-12]
-
Optical Fiber Sensor
Sensing and detecting changes due to displacement, pressure, or dynamic vibration in an optical fiber, based on fiber Specklegram [Volume 11, Issue 3, 2023, Pages 89-99]
-
Optimal LED Placement
Optimal Design of Wireless Visible Light Communication Network with the Aim of Minimizing the Outage Probability at the Location of the Mobile Receiver [Volume 10, Issue 3, 2022, Pages 1-9]
-
Optimization
Guidance and distributed control of the networked UAVs [Volume 7, Issue 4, 2019, Pages 117-129]
-
Optimization
Motion-encoded Gravitational Search Algorithm for moving target search using UAVs [Volume 10, Issue 4, 2022, Pages 63-73]
-
Organized Crime
Analysis of exchange market disruptors using graph-based social network analysis [Volume 11, Issue 1, 2023, Pages 107-116]
-
Outage
Improving INS/GPS Integration with Artificial Intelligence during GPS Outage [Volume 9, Issue 2, 2021, Pages 143-157]
-
Outage Probability
Optimal Design of Wireless Visible Light Communication Network with the Aim of Minimizing the Outage Probability at the Location of the Mobile Receiver [Volume 10, Issue 3, 2022, Pages 1-9]
-
Outsourcing
A novel architecture for database outsourcing in cloud computing with regard to data life cycle [Volume 2, Issue 4, 2014, Pages 41-54]
-
Outsourcing Architecture
A novel architecture for database outsourcing in cloud computing with regard to data life cycle [Volume 2, Issue 4, 2014, Pages 41-54]
-
Outsourcing Security
A novel architecture for database outsourcing in cloud computing with regard to data life cycle [Volume 2, Issue 4, 2014, Pages 41-54]
-
Overlapping Community Detection
A Distributed Approach to Community Detection in Large Social Networks Based on Label Propagation [Volume 8, Issue 4, 2020, Pages 1-15]
-
Overselling
A New Approach for Estimating the Rate of Emission in Quantum Bit Exchange Systems Using Binomial Distribution [Volume 7, Issue 1, 2019, Pages 105-112]
P
-
Packet Loss
Simulation and Evaluation of Jitter and Packet Loss Noises Influence on Covert Timing Channel Performance [Volume 2, Issue 3, 2014, Pages 35-49]
-
Packet Loss
A cross layer approach for improving the TCP quality-of-service parameters over the IEEE 802.11.ac wireless networks [Volume 10, Issue 1, 2022, Pages 109-117]
-
Packet loss probability
A new analytical model for enhancing performance of cognitive radio user’s transmissions in the internet of things [Volume 9, Issue 3, 2021, Pages 73-82]
-
Part Algorithm
Sequential Forward Feature Selection for Intrusion Detection System, Using Ant Colony Algorithm [Volume 6, Issue 2, 2018, Pages 49-63]
-
Partial Least Squares approach
A framework for assessing cyber security and privacy threats and investigating their impact on smart city performance [Volume 10, Issue 3, 2022, Pages 77-91]
-
Particle Fil-ter؛ Posterior Cramer-Rao Lower Bound
Target Tracking Algorithm in Wireless Sensor Networks with Optimum Power Consumption Using Quantized Observation [Volume 6, Issue 2, 2018, Pages 109-121]
-
Passive Defense
Energy-Harvesting Aware Multi-Hop Routing in Wireless Sensor Networks for Defense Applications [Volume 8, Issue 4, 2020, Pages 63-73]
-
Passive Millimeter Wave Imaging
Improving the Quality of Millimeter Wave Images by Fusion with Visible Images [Volume 9, Issue 4, 2021, Pages 77-86]
-
Passive Radars
Optimization of Site Topologies and Delay Extraction in Radar Emitter Location [Volume 2, Issue 2, 2014, Pages 41-51]
-
Payload Attribution
Improving Payload Attribution Techniques in Computer Network Criminology with Time based Hierarchical Bloom Filter [Volume 7, Issue 3, 2019, Pages 71-81]
-
PCA
Radar data processing using a combination of principal component analysis methods and self-organizing and digitized neural networks of the learning vector [Volume 9, Issue 2, 2021, Pages 1-7]
-
Pearson Correlation Coefficient
Non-Performance of Pearson Correlation Coefficient for Evaluating Image Encryption Security [Volume 6, Issue 2, 2018, Pages 83-91]
-
Peer to Peer Botnet
Botnet Detection for Peer to Peer Networks [Volume 3, Issue 4, 2015, Pages 43-60]
-
PendingIntent
PIVATool- a fast and precise tool for analysis and detection of PendingIntent vulnerabilities [Volume 9, Issue 2, 2021, Pages 75-83]
-
Persian Language
Automatic Keyword Extraction from Persian short Text Using word2vec [Volume 8, Issue 2, 2020, Pages 105-114]
-
Personal Data
An Improved Method for Graph Data Anonymization with Emphasis on Preserving the Average Path length [Volume 7, Issue 2, 2019, Pages 25-32]
-
Per survivor processing (PSP) Technique
A New Method for Detection of Discrete Data Transmitted over Non-Linear Dynamic Wireless Channels [Volume 3, Issue 2, 2015, Pages 75-85]
-
Petri Nets
The Automated Security Evaluation of Threat Paths Based on Petri Nets [Volume 9, Issue 4, 2021, Pages 87-98]
-
Phase Noise
The New Algorithm for The Blind Extraction of The Radio Frequency Fingerprint Using the Specific Features of High-Power Amplifier and Local Oscillator [Volume 11, Issue 1, 2023, Pages 57-65]
-
Phase Shift Keying Modulation (PSK)
Performance Analysis of Free Space Optical Communication Links under M-PAM and M-PSK Modulations using Adaptive Power and Modulation Techniques [Volume 7, Issue 1, 2019, Pages 63-75]
-
Phasor Mesurement Units
Reducing the Effects of Deception Attack on GPS Receivers of Phasor Measurement Units using Neural Networks [Volume 11, Issue 1, 2023, Pages 97-105]
-
Phishing
Malicious Domain Detection using DNS Records [Volume 9, Issue 3, 2021, Pages 83-97]
-
Phisical Layer Security and Artificial Noise
Improvement of Security in Wireless Communication Networks with Directional Modulation and Artificial Noise [Volume 10, Issue 4, 2022, Pages 11-18]
-
PHP server side language
Detection of the Remote Code Execution Attacks Using the PHP Web Application Intrusion Detection System [Volume 10, Issue 2, 2022, Pages 75-85]
-
Physically Unclonable Function
Design and Implementation of a Physically Unclonable Function on FPGA [Volume 6, Issue 4, 2018, Pages 23-32]
-
Physically Unclonable Function
Design and Production of Hardware Authentication Code Using Physically Unclonable Functions and a Random Number Generator on FPGA [Volume 7, Issue 4, 2019, Pages 37-50]
-
Physical security systems
Cyber disruption in the hierarchical control of intelligent microgrid power sharing [Volume 11, Issue 4, 2023]
-
PIAnalyzer
PIVATool- a fast and precise tool for analysis and detection of PendingIntent vulnerabilities [Volume 9, Issue 2, 2021, Pages 75-83]
-
PIC Microcontroller
Side Channel Analysis of International Data Encryption Algorithm (IDEA) [Volume 7, Issue 4, 2019, Pages 51-57]
-
PIVATool
PIVATool- a fast and precise tool for analysis and detection of PendingIntent vulnerabilities [Volume 9, Issue 2, 2021, Pages 75-83]
-
Pixel Cost
Relating the Detection Rate, Capacity and the Cost of Steganography by Steganographer Modeling [Volume 6, Issue 3, 2018, Pages 81-94]
-
Pixel forgery detection
Forgery detection in digital images using the hybrid deep learning method [Volume 11, Issue 4, 2023]
-
Pizerenco
A Combined Improved Algorithm to Estimating The delay of Sky waves In Loran c Receiver [Volume 2, Issue 4, 2014, Pages 55-63]
-
Polar Code
A New Method for Combining the Channel Coding with Polar Coding-Based Encryption [Volume 4, Issue 1, 2016, Pages 1-8]
-
Polarization Shift Keying
Introducing an Optimal Modulation Constellation, Resistant to Atmospheric Turbulence [Volume 8, Issue 2, 2020, Pages 115-124]
-
Policy Tree
Online Collaborative Planning in Complex Environment [Volume 2, Issue 4, 2014, Pages 15-23]
-
Port-Knocking
Utilizing Port-Knocking as first defensive layer at defense-in-depth strategies using hybrid of the Internet Control Message Protocol features, Internet Addresses and Tunneling [Volume 2, Issue 4, 2014, Pages 25-40]
-
Port-Knocking
Phishing Website Detection for e-Banking by Inclined Planes Optimization Algorithm [Volume 3, Issue 1, 2015, Pages 29-39]
-
Port Security
Utilizing Port-Knocking as first defensive layer at defense-in-depth strategies using hybrid of the Internet Control Message Protocol features, Internet Addresses and Tunneling [Volume 2, Issue 4, 2014, Pages 25-40]
-
Port Security
Phishing Website Detection for e-Banking by Inclined Planes Optimization Algorithm [Volume 3, Issue 1, 2015, Pages 29-39]
-
Position Estimation
A New Metric for Estimation the User Position in the Multi User OFDMA Networks [Volume 2, Issue 3, 2014, Pages 1-11]
-
Post-Quantum
Two Verifiable Multi-Secret Sharing Schemes: A Linear Scheme with Standard Security and A Lattice-Based Scheme [Volume 8, Issue 3, 2020, Pages 101-115]
-
Post-quantum cryptography
Speeding up the execution-time of Crystals-Kyber PQC Algorithm on FPGA [Volume 10, Issue 4, 2022, Pages 101-110]
-
Power amplifier
The New Algorithm for The Blind Extraction of The Radio Frequency Fingerprint Using the Specific Features of High-Power Amplifier and Local Oscillator [Volume 11, Issue 1, 2023, Pages 57-65]
-
Power Analysis Attacks
A New And Efficient Method of Mass Masking and its Resistance Assessment to Power Analysis [Volume 6, Issue 2, 2018, Pages 123-134]
-
Power Spectral Density
A New Metric for Estimation the User Position in the Multi User OFDMA Networks [Volume 2, Issue 3, 2014, Pages 1-11]
-
Practical properties
Design the Model of CSRF Attack Tree for Immunization the Web Application in Development Process [Volume 3, Issue 1, 2015, Pages 41-52]
-
Prevention
Detection and Prevention of SQL Injection Attacks at Runtime Using Decision Tree Classification [Volume 8, Issue 4, 2020, Pages 75-93]
-
Primary user
A new analytical model for enhancing performance of cognitive radio user’s transmissions in the internet of things [Volume 9, Issue 3, 2021, Pages 73-82]
-
Principal Component Analysis (PCA)
An Improvement on the Identification via Gait Using the Genetic Algorithm [Volume 9, Issue 4, 2021, Pages 31-42]
-
Principal Component Analysis (PCA)
Fixing Security Defects of Video Authentication Systems with Face Recognition, Based on 3D Structure and Shape Evaluation [Volume 9, Issue 4, 2021, Pages 141-145]
-
Principal Component Analysis (PCA)
Modular human face recognition method based on principal component analysis and Mahalanobis distance [Volume 11, Issue 4, 2023]
-
Privacy
A Mutual Anonymity Private Authentication Protocol to Use in Radio-Frequency Identification Systems [Volume 6, Issue 4, 2018, Pages 45-59]
-
Privacy
A Scheme for Improvement of Security and Privacy in Mobile Health Systems by Using SIM Card [Volume 7, Issue 1, 2019, Pages 11-24]
-
Privacy
An Improved Method for Graph Data Anonymization with Emphasis on Preserving the Average Path length [Volume 7, Issue 2, 2019, Pages 25-32]
-
Privacy
A secure three factor authentication scheme for wireless
healthcare sensor networks based on elliptic curve [Volume 8, Issue 1, 2020, Pages 147-167]
-
Privacy-preserving
Security Analysis and Improvement of an Intelligent Transportation System based on Certificateless Aggregate Signature [Volume 8, Issue 1, 2020, Pages 25-33]
-
Probabilistic modeling
Modeling of Obfuscated Multi- Stage cyber Attacks [Volume 8, Issue 2, 2020, Pages 61-73]
-
Probabilistic Spectrum Access Function
Joint Spectrum Sensing and Power Allocation for Multiband Cognitive Radio Networks Using Probabilistic Spectrum Access [Volume 6, Issue 3, 2018, Pages 117-130]
-
Probability hypothesis density filter
On Improvement of Cardinalized Probability Hypothesis Density Filter Implementation by using Auxiliary Particle Filter [Volume 3, Issue 4, 2015, Pages 23-41]
-
Probability of Detection
A New Hybrid Approach for Traffic Identification and Classification in Wireless Networks [Volume 10, Issue 2, 2022, Pages 31-41]
-
Probability of successful recognition
Intra-pulse Modulation Recognition Using Time-Frequency Features Based on Modified-B Distribution [Volume 7, Issue 1, 2019, Pages 129-138]
-
Probable Data Flow Analysis
A new approach for static detection of security vulnerabilities in web applications [Volume 2, Issue 4, 2014, Pages 65-74]
-
Projection of Future
The Distributed Denial of Service Attacks Situation Awareness Based on The Prediction of Battle Scene Using Dempster-Shefer Evidences Theories and Bayesian Rules [Volume 7, Issue 1, 2019, Pages 77-94]
-
Proper Detection
Steganography on raw video based on proper detection and compromise between the parameters of transparency, resistance and capacity [Volume 8, Issue 1, 2020, Pages 51-65]
-
Provable Security
A New (t,n) Designated Verifier Threshold Proxy Signature Scheme in the Standard Model [Volume 2, Issue 1, 2014, Pages 25-35]
-
ProVerif
A secure three factor authentication scheme for wireless
healthcare sensor networks based on elliptic curve [Volume 8, Issue 1, 2020, Pages 147-167]
-
Proxy signature scheme
A New (t,n) Designated Verifier Threshold Proxy Signature Scheme in the Standard Model [Volume 2, Issue 1, 2014, Pages 25-35]
-
Pulse Amplitude Modulation (PAM)
Performance Analysis of Free Space Optical Communication Links under M-PAM and M-PSK Modulations using Adaptive Power and Modulation Techniques [Volume 7, Issue 1, 2019, Pages 63-75]
-
Pure Adaptive steganography
Designing a combinatorial Image Steganography algorithm based on game theory [Volume 8, Issue 1, 2020, Pages 133-145]
-
PWM
Design and Simulation of a LORAN Signal Generator for LPS Transmitter Using Class I Amplifier [Volume 8, Issue 2, 2020, Pages 25-33]
Q
-
Quality of service. Network Bandwidth
A cross layer approach for improving the TCP quality-of-service parameters over the IEEE 802.11.ac wireless networks [Volume 10, Issue 1, 2022, Pages 109-117]
-
Quantization
Target Tracking Algorithm in Wireless Sensor Networks with Optimum Power Consumption Using Quantized Observation [Volume 6, Issue 2, 2018, Pages 109-121]
-
Quantum computing
Proposing a New and Comprehensive Method for Quantum Representation of Digital Audio Signals [Volume 8, Issue 4, 2020, Pages 139-152]
-
Quantum-dot Cellular Automata (QCA)
Design of Content-Addressable Memory in Quantum-Dot Cellular Automata [Volume 8, Issue 4, 2020, Pages 53-61]
-
Quantum Fourier transform
Steganalysis of Quantum Audio Signal using Quantum Support Vector Machine Algorithm [Volume 11, Issue 3, 2023, Pages 1-14]
-
Quantum Key Distribution
A New Approach for Estimating the Rate of Emission in Quantum Bit Exchange Systems Using Binomial Distribution [Volume 7, Issue 1, 2019, Pages 105-112]
-
Quantum Secret Sharing
A New Mechanism for Enhancing the Security of Military Internet of Things by Using Quantum and Classic Cryptography [Volume 9, Issue 2, 2021, Pages 29-49]
-
Quantum Spectrum Bandwidth
Steganalysis of Quantum Audio Signal using Quantum Support Vector Machine Algorithm [Volume 11, Issue 3, 2023, Pages 1-14]
-
Quantum Spectrum Centroid
Steganalysis of Quantum Audio Signal using Quantum Support Vector Machine Algorithm [Volume 11, Issue 3, 2023, Pages 1-14]
-
Quantum steganalysis
Steganalysis of Quantum Audio Signal using Quantum Support Vector Machine Algorithm [Volume 11, Issue 3, 2023, Pages 1-14]
-
Query
An Approach Based on Semantic Similarity in Persian Query-Based Summarization [Volume 2, Issue 3, 2014, Pages 51-63]
-
Query-Based Suummarization
An Approach Based on Semantic Similarity in Persian Query-Based Summarization [Volume 2, Issue 3, 2014, Pages 51-63]
R
-
Radar
Recognition Chaff from target by determining the optimal waveform in the radar detector using artificial neural network [Volume 11, Issue 2, 2023, Pages 117-132]
-
Radar Processing
Radar data processing using a combination of principal component analysis methods and self-organizing and digitized neural networks of the learning vector [Volume 9, Issue 2, 2021, Pages 1-7]
-
Radio Frequency Fingerprint
The New Algorithm for The Blind Extraction of The Radio Frequency Fingerprint Using the Specific Features of High-Power Amplifier and Local Oscillator [Volume 11, Issue 1, 2023, Pages 57-65]
-
Radio Resource Allocation
Joint Spectrum Sensing and Power Allocation for Multiband Cognitive Radio Networks Using Probabilistic Spectrum Access [Volume 6, Issue 3, 2018, Pages 117-130]
-
RainbowTables
Hellman Chains Analysis Base on Graph of Random Function [Volume 4, Issue 1, 2016, Pages 81-89]
-
Random Finite Set
On Improvement of Cardinalized Probability Hypothesis Density Filter Implementation by using Auxiliary Particle Filter [Volume 3, Issue 4, 2015, Pages 23-41]
-
Random forest
A model for Multi-Class Intrusion Detection Using the Dragonfly Feature Selection by Learning on the KDD-CUP99 Dataset [Volume 10, Issue 3, 2022, Pages 33-42]
-
Random Forest Algorithm
Kashef: A Two-step detector of Windows-based Malicious executable files [Volume 10, Issue 2, 2022, Pages 143-156]
-
Random Functional Graph
Hellman Chains Analysis Base on Graph of Random Function [Volume 4, Issue 1, 2016, Pages 81-89]
-
Random Number Generator
Design and Production of Hardware Authentication Code Using Physically Unclonable Functions and a Random Number Generator on FPGA [Volume 7, Issue 4, 2019, Pages 37-50]
-
Ransomware
Improvement in the Ransomwares Detection Method With New API
Calls Features [Volume 8, Issue 4, 2020, Pages 107-118]
-
Rate of detection speed
Improvement in the Ransomwares Detection Method With New API
Calls Features [Volume 8, Issue 4, 2020, Pages 107-118]
-
Rate of Emission
A New Approach for Estimating the Rate of Emission in Quantum Bit Exchange Systems Using Binomial Distribution [Volume 7, Issue 1, 2019, Pages 105-112]
-
Reachability graph
The Automated Security Evaluation of Threat Paths Based on Petri Nets [Volume 9, Issue 4, 2021, Pages 87-98]
-
Real-time
An Improved Method of Incident Detection due to Cyber Attacks [Volume 7, Issue 4, 2019, Pages 105-116]
-
Real-time algorithm
Fast Detection of Vehicle Type and Position in Images Based on Deep Neural Network [Volume 10, Issue 2, 2022, Pages 117-127]
-
Real-time Topology-based Tracking
Real-time Topology-based Tracking of Microscopic Objects [Volume 9, Issue 3, 2021, Pages 1-20]
-
Recommendation Trust
A Fuzzy Trust Evaluation Model to Enhance Security of cloud System Entities with Petri Net [Volume 4, Issue 1, 2016, Pages 19-34]
-
Recommender System
A recommender system using a support vector machine and the TOPSIS model in the Internet of Things [Volume 11, Issue 4, 2023]
-
Reconfigurable Chips
Side-Channel Attack Resistance Approaches Through Dynamic Differential Logic [Volume 7, Issue 3, 2019, Pages 93-104]
-
Recurrent Neural Network (RNN)
P2P Botnet Detection Using Deep Learning Method [Volume 8, Issue 2, 2020, Pages 1-14]
-
Reiterative Minimum Mean Square Error
An Integrated Algorithm for Optimal Detection of Weak Radar Targets Masked by the Sidelobes of a Strong Target [Volume 6, Issue 4, 2018, Pages 91-104]
-
Relay Cluster-Head
Energy-Harvesting Aware Multi-Hop Routing in Wireless Sensor Networks for Defense Applications [Volume 8, Issue 4, 2020, Pages 63-73]
-
Reliability
Reliability Analysis of Open-Loop Switching Loran Signal Generator Using Omoe Indicator [Volume 8, Issue 2, 2020, Pages 83-93]
-
Reliability
An Approach to Dependability Enhancement of Cache Memories [Volume 10, Issue 1, 2022, Pages 1-10]
-
Remote code execution attack
Detection of the Remote Code Execution Attacks Using the PHP Web Application Intrusion Detection System [Volume 10, Issue 2, 2022, Pages 75-85]
-
Residue number system
The residue number system component design based on OneHot coding [Volume 10, Issue 1, 2022, Pages 119-133]
-
Resistance
Increasing Insertion Capacity and Resistance in Image Steganography Based on Mapping and Bits Reduction [Volume 7, Issue 2, 2019, Pages 33-39]
-
Resource Allocation
A Novel Algorithm for Radar Jamming Resource Allocation [Volume 7, Issue 3, 2019, Pages 53-70]
-
Resource Allocation
Improving the Security in Cellular Communications Networks with adding Artificial Noise by method Non-Orthogonal Resource Allocation Techniques [Volume 9, Issue 2, 2021, Pages 135-142]
-
Resource Allocation
The IoT Resource Allocation Improvement in Fog Computing Using Non-Cooperative Game Theory [Volume 9, Issue 4, 2021, Pages 147-158]
-
Resource Assignment
Modelling and optimal solving of dependent sensor-weapon/threat assignment and scheduling problem by a metaheuristic algorithm based on GRASP [Volume 8, Issue 1, 2020, Pages 35-50]
-
Resource Assignment
Developing a Threat-Tolerability Bilateral Concept within a Differential Game for the Analysis of the Insider/Adversary Behavior in Operational environment [Volume 11, Issue 2, 2023, Pages 15-29]
-
Resource provisioning
Resource Elasticity Management using Fuzzy Controller Based on Threshold Changes in the Cloud Computing Environment [Volume 8, Issue 3, 2020, Pages 63-81]
-
Revocation
Design a Blockchain based Electronic Payment with Users’ Anonymity [Volume 9, Issue 2, 2021, Pages 85-100]
-
RFID
A Mutual Anonymity Private Authentication Protocol to Use in Radio-Frequency Identification Systems [Volume 6, Issue 4, 2018, Pages 45-59]
-
RFID Authentication Protocols
Weaknesses of SPRS Authentication Protocol and Present a Developed Protocol for RFID Systems [Volume 3, Issue 3, 2015, Pages 39-48]
-
RFID (Radio Frequency Identification)
An Anti-Spam Framework for Advertising Targeting Smart Mobile Devices on IoT [Volume 6, Issue 2, 2018, Pages 65-81]
-
RFID System
Introduction of An Anti-Collision Protocol in RFID Systems [Volume 8, Issue 4, 2020, Pages 119-128]
-
Risk
A method for quantitative evaluation of security risk in cyber-physical systems [Volume 11, Issue 2, 2023, Pages 71-80]
-
Risk Creating Payoff Function
Deterrence Model in Cyberspace Based on Bayesian Belief Attack Graph by using Risk Creating Payoff Function [Volume 7, Issue 1, 2019, Pages 25-38]
-
Road Safety
Detection of Slippery Road Conditions using the Road CCTV Images based on the Convolutional Neural Networks and Transfer Learning [Volume 10, Issue 2, 2022, Pages 105-116]
-
Rotational Cryptanalysis
Improvement of Rotational Cryptanalysis of Shabal and Cubehash Hash Functions [Volume 9, Issue 1, 2021, Pages 91-100]
-
Routing protocol
Providing a routing method in Internet of Things networks based on fuzzy logic and clustering
For use in smart transportatio [Volume 11, Issue 4, 2023]
-
Routing protocols
Performance Improvement of the ODMRP Protocol using Analysis of the Received Signal Strength Level [Volume 7, Issue 3, 2019, Pages 21-26]
-
Rule-Based Method
Automatic Persian Text Generation Using Rule-Based Models and Word Embedding [Volume 9, Issue 4, 2021, Pages 43-54]
-
Rules
Target Threat Assessment using Rule-Based Joint Fuzzy and Probabilistic Networks [Volume 6, Issue 4, 2018, Pages 61-78]
-
Rumor
SCEIRS information dissemination model based on rumor spreading in complex networks [Volume 9, Issue 2, 2021, Pages 121-134]
-
Rumor
Rumor Detection on Social Networks Based on the Degree Distribution Analysis in Step-by-Step Propagation Subgraphs [Volume 10, Issue 3, 2022, Pages 93-105]
S
-
Sandbox
A Secure Environment for Behavioral Malware Analysis [Volume 2, Issue 3, 2014, Pages 65-76]
-
Sandbox
A New Method For Gradual Detection of Environmental Conditions and Resources Required by Smart Malware [Volume 6, Issue 4, 2018, Pages 33-44]
-
S-box
An Image Encryption Algorithm Based on the Sn Permutation Group and Chaotic Functions [Volume 8, Issue 3, 2020, Pages 139-150]
-
Scalability
Presentation and Performance Evaluation of an Efficient Algorithm for a Distributed Controller in SDN [Volume 9, Issue 1, 2021, Pages 175-183]
-
Scalar Multiplication
A Fast Method for Computation of Scalar Multiplication of Elliptic Curve Suitable for Elliptic Curve Cryptography System [Volume 3, Issue 3, 2015, Pages 9-17]
-
Scan
Smart Detection of Covert Worms in Computer Networks [Volume 7, Issue 4, 2019, Pages 67-77]
-
Scheduling
Modelling and optimal solving of dependent sensor-weapon/threat assignment and scheduling problem by a metaheuristic algorithm based on GRASP [Volume 8, Issue 1, 2020, Pages 35-50]
-
SDCCH logical channel
Prediction of Plaintext in GSM Network using SDCCH Logical Channel [Volume 9, Issue 3, 2021, Pages 39-47]
-
Searchable encryption
Fuzzy Keyword Search Scheme on an Encrypted Database in Cloud Computing Using Word Clustering [Volume 8, Issue 3, 2020, Pages 151-165]
-
Secondary User
A new analytical model for enhancing performance of cognitive radio user’s transmissions in the internet of things [Volume 9, Issue 3, 2021, Pages 73-82]
-
Secondary Users
Interference Mitigation in Cognitive Radio Communication Systems Based on the Wavelet Transform [Volume 9, Issue 4, 2021, Pages 55-66]
-
Secrecy Sum Rate (SSR)
Improving the Security in Cellular Communications Networks with adding Artificial Noise by method Non-Orthogonal Resource Allocation Techniques [Volume 9, Issue 2, 2021, Pages 135-142]
-
Secret image
An Efficient Visual Multi-Secret Sharing Scheme [Volume 3, Issue 4, 2015, Pages 1-9]
-
Secret image sharing
A novel lossless color secret image sharing based on homogeneous linear recursion [Volume 10, Issue 3, 2022, Pages 107-118]
-
Secret key agreement
Information Theoretic Secret Key Agreement Based on Localization [Volume 8, Issue 2, 2020, Pages 35-49]
-
Secret key capacity
Information Theoretic Secret Key Agreement Based on Localization [Volume 8, Issue 2, 2020, Pages 35-49]
-
Secret key generation
Security Evaluation of Mutual Random Phase Injection Scheme for Secret Key Generation over Static Point-to-Point Communications [Volume 10, Issue 2, 2022, Pages 19-30]
-
Secret Sharing
Generating Tree Decomposition of Graphs with Imperialist Competitive Algorithm for Use in Secret Sharing Scheme [Volume 7, Issue 3, 2019, Pages 105-111]
-
Secret Sharing
A new attack on Jakobsson Hybrid Mix-Net [Volume 7, Issue 3, 2019, Pages 113-119]
-
Secret Sharing
Two Verifiable Multi-Secret Sharing Schemes: A Linear Scheme with Standard Security and A Lattice-Based Scheme [Volume 8, Issue 3, 2020, Pages 101-115]
-
Secret Sharing Scheme
A Hash-Based Multi-Use Multi-Stage Secret Sharing Scheme with General Access Structure [Volume 6, Issue 3, 2018, Pages 107-115]
-
Secret Sharing Scheme
Some New Bounds on the Information Ratio of the Cartesian Product of Some Classes of Graphs [Volume 6, Issue 4, 2018, Pages 135-142]
-
Secure transmission
The Analysis and Design of Secure Wireless Networks in the Presence of Users with Different Security Needs Based on Covert Communication and Secure Transmission of Information Theory in the Presence of a Friendly Jammer [Volume 9, Issue 4, 2021, Pages 67-76]
-
Securing the Virtual Machine
Implementing a Novel Malware Detection System in Virtual Machines [Volume 2, Issue 3, 2014, Pages 23-33]
-
Security and Privacy
Weaknesses of SPRS Authentication Protocol and Present a Developed Protocol for RFID Systems [Volume 3, Issue 3, 2015, Pages 39-48]
-
Security Bound
Upper Bounds for the Probability of Differential Characteristics of Five Block Cipher
Constructions Functions [Volume 8, Issue 4, 2020, Pages 129-137]
-
Security in cyberspace
Improving Intrusion Detection System Using a New Feature Selection Technique [Volume 6, Issue 4, 2018, Pages 143-152]
-
Security in Linux
Implementing a Novel Malware Detection System in Virtual Machines [Volume 2, Issue 3, 2014, Pages 23-33]
-
Security Mechanism
The Impact of Security Mechanisms on Software Vulnerabilities [Volume 2, Issue 1, 2014, Pages 49-60]
-
Security Metric
A Security Model Based Approach for Dynamic Risk Assessment of Multi-Step Attacks in Computer Networks [Volume 9, Issue 1, 2021, Pages 157-173]
-
Security Operation Center
An Improved Method of Incident Detection due to Cyber Attacks [Volume 7, Issue 4, 2019, Pages 105-116]
-
Security Policy
TNAC: A Novel Trust Negotiation Based Access Control Model Using XACML Architecture [Volume 3, Issue 1, 2015, Pages 53-67]
-
Security requirements
The Automated Security Evaluation of Threat Paths Based on Petri Nets [Volume 9, Issue 4, 2021, Pages 87-98]
-
Security requirements of task and data
Secure and confidential workflow scheduling in hybrid cloud using improved particle swarm optimization algorithm [Volume 7, Issue 4, 2019, Pages 131-145]
-
Security risk
Presenting A Method Based on Nearest Neighbors and Hamming Distance in Order to Identify Malicious Applications [Volume 11, Issue 2, 2023, Pages 81-90]
-
Security strength of resource and communication paths
Secure and confidential workflow scheduling in hybrid cloud using improved particle swarm optimization algorithm [Volume 7, Issue 4, 2019, Pages 131-145]
-
Semantic Analysis
Syntax and Semantic Analysis for SQL-Injection Attacks [Volume 2, Issue 1, 2014, Pages 83-97]
-
Semantic Mining
Providing an Agent-Based Architecture for Semantic Mining From Large-Scale Data in Distributed Environments [Volume 8, Issue 3, 2020, Pages 83-99]
-
Semantic Segmentation
The Semantic Segmentation of Autonomous Vehicles Images with the Teacher-Student Technique [Volume 9, Issue 4, 2021, Pages 1-19]
-
Semantic Similarity
An Approach Based on Semantic Similarity in Persian Query-Based Summarization [Volume 2, Issue 3, 2014, Pages 51-63]
-
Semi-blind separation
Semi-Blind Separation of Multiple Synchronous Wideband Frequency Hopping Signals Using a Band-Limited Receiver and Space-Time- Frequency Distributions [Volume 11, Issue 4, 2023]
-
Sensor Fusion
Three-Dimensional Angles Measurement using IME based on MEMS Technology by Adaptive Kalman Filter [Volume 7, Issue 2, 2019, Pages 81-91]
-
Sentence Concept Extraction
Investigation of the Semantic Similarity of Persian Sentences Using Vector Space Adaptation And Deep Learning [Volume 10, Issue 2, 2022, Pages 43-56]
-
Sentence Similarity Extraction
Investigation of the Semantic Similarity of Persian Sentences Using Vector Space Adaptation And Deep Learning [Volume 10, Issue 2, 2022, Pages 43-56]
-
Sentiment Analysis
Presenting a new sentiment analysis method based on multi-objective Archimedes optimization algorithm and machine learning [Volume 11, Issue 4, 2023]
-
Sequential Decoding of Convolutional Codes
Sequential Decoding Algorithms of Convolutional Codes: Implementation, Improvement and Comparison [Volume 3, Issue 2, 2015, Pages 61-73]
-
Sequential Search
Optimum Parameter Selection for Rainbow Table TMTO Attack Considering Breaking Time and Using Sequential and Index Search Methods [Volume 3, Issue 3, 2015, Pages 49-57]
-
Service Quality
A Trust Evaluation Model for Cloud Computing Using Bayesian Network [Volume 10, Issue 4, 2022, Pages 53-61]
-
Service Security
Utilizing Port-Knocking as first defensive layer at defense-in-depth strategies using hybrid of the Internet Control Message Protocol features, Internet Addresses and Tunneling [Volume 2, Issue 4, 2014, Pages 25-40]
-
Service Security
Phishing Website Detection for e-Banking by Inclined Planes Optimization Algorithm [Volume 3, Issue 1, 2015, Pages 29-39]
-
Shadow image
An Efficient Visual Multi-Secret Sharing Scheme [Volume 3, Issue 4, 2015, Pages 1-9]
-
Shadow image
A novel lossless color secret image sharing based on homogeneous linear recursion [Volume 10, Issue 3, 2022, Pages 107-118]
-
Shearlet Transform
Improving the Quality of Millimeter Wave Images by Fusion with Visible Images [Volume 9, Issue 4, 2021, Pages 77-86]
-
Shellcode
Automated Exploit Generation For Application’s Vulnerability [Volume 4, Issue 1, 2016, Pages 35-50]
-
Short Burst
Blind symbol Rate estimation in multipath channels [Volume 10, Issue 3, 2022, Pages 59-66]
-
Side Channel Attack
Side-Channel Attack Resistance Approaches Through Dynamic Differential Logic [Volume 7, Issue 3, 2019, Pages 93-104]
-
Side Channel Attacks
Side Channel Analysis of International Data Encryption Algorithm (IDEA) [Volume 7, Issue 4, 2019, Pages 51-57]
-
Sigma Delta Modulator
Optimal Design of Low-power High-resolution Unity-STF S-MASH Sigma Delta Modulator for Telecommunication Applications [Volume 7, Issue 2, 2019, Pages 13-24]
-
Signal identification
Identification of STBC-OFDM Signals by Second-Order Cyclostationarity Method [Volume 7, Issue 4, 2019, Pages 27-36]
-
Signaling Game
Deterrence Model in Cyberspace Based on Bayesian Belief Attack Graph by using Risk Creating Payoff Function [Volume 7, Issue 1, 2019, Pages 25-38]
-
Signal Processing
Concurrent Detection of Compact Anomalous Subgraphs in Large Social Networks [Volume 9, Issue 2, 2021, Pages 179-194]
-
Signal to Interference plus Noise Ratio
Robust Adaptive Beamforming Against Interferer’s Direction Of Arrival Estimation Error [Volume 7, Issue 3, 2019, Pages 27-36]
-
SIM card
A Scheme for Improvement of Security and Privacy in Mobile Health Systems by Using SIM Card [Volume 7, Issue 1, 2019, Pages 11-24]
-
Similarity Matrix
Detecting Botnets with Timing-Based Covert Command and Control Channels [Volume 7, Issue 4, 2019, Pages 1-15]
-
Similarity Measure
Collusive Fraud Classification in Network of Online Auction Using Similarity Measure in Collective Classification [Volume 7, Issue 1, 2019, Pages 95-103]
-
Simulated Annealing
Energy-aware routing in wireless sensor networks using MLP and simulated annealing algorithms [Volume 9, Issue 3, 2021, Pages 133-142]
-
Simulation
Simulation and Evaluation of Jitter and Packet Loss Noises Influence on Covert Timing Channel Performance [Volume 2, Issue 3, 2014, Pages 35-49]
-
Simulation
Designing Systolic Array for SL0 Algorithm Implementation [Volume 7, Issue 4, 2019, Pages 59-65]
-
Simulation Environment
A Software System for Large-Scale Simulation of Malware Propagation
in Computer Networks [Volume 7, Issue 2, 2019, Pages 53-67]
-
Situationa Awareness
Projection of Muli Stage Cyber Attack Based on Belief Model and Fuzzy Inference [Volume 3, Issue 2, 2015, Pages 13-28]
-
Situation Awareness
Projection of Cyber Attacks using Damage Estimation and Combination of Attacker’s Capability and Opportunity based on Transferable Belief Model [Volume 6, Issue 4, 2018, Pages 1-12]
-
Situation Awareness
The Distributed Denial of Service Attacks Situation Awareness Based on The Prediction of Battle Scene Using Dempster-Shefer Evidences Theories and Bayesian Rules [Volume 7, Issue 1, 2019, Pages 77-94]
-
SL0 algorithm
Designing Systolic Array for SL0 Algorithm Implementation [Volume 7, Issue 4, 2019, Pages 59-65]
-
Smart City
A Techno-Economic Model of Sustainable Communication Infrastructure in the Smart City; using WDM-PON FTTx [Volume 9, Issue 1, 2021, Pages 149-156]
-
Smart City
A framework for assessing cyber security and privacy threats and investigating their impact on smart city performance [Volume 10, Issue 3, 2022, Pages 77-91]
-
Smart Grid
Secure and Efficient 4-way Handshake in Smart Grid to DoS Attacks Mitigation [Volume 4, Issue 1, 2016, Pages 9-17]
-
Smart Grid
Enhance Media Access Control in IEEE 802.15.4 Based Smart Grids using Swarm Intelligence Algorithms [Volume 7, Issue 3, 2019, Pages 9-20]
-
Smart Malware
A New Method For Gradual Detection of Environmental Conditions and Resources Required by Smart Malware [Volume 6, Issue 4, 2018, Pages 33-44]
-
S-MASH
Optimal Design of Low-power High-resolution Unity-STF S-MASH Sigma Delta Modulator for Telecommunication Applications [Volume 7, Issue 2, 2019, Pages 13-24]
-
SM-OFDM
Identification of STBC-OFDM Signals by Second-Order Cyclostationarity Method [Volume 7, Issue 4, 2019, Pages 27-36]
-
Social network
Spam Management in Social Networks by Content Rating [Volume 2, Issue 2, 2014, Pages 53-62]
-
Social network
SCEIRS information dissemination model based on rumor spreading in complex networks [Volume 9, Issue 2, 2021, Pages 121-134]
-
Social network
Rumor Detection on Social Networks Based on the Degree Distribution Analysis in Step-by-Step Propagation Subgraphs [Volume 10, Issue 3, 2022, Pages 93-105]
-
Social network analysis
An Improved New Link Prediction Method in Social Multilplex Networks Based on the Gravitational Search Algorithm [Volume 8, Issue 2, 2020, Pages 15-24]
-
Social network analysis
Analysis of exchange market disruptors using graph-based social network analysis [Volume 11, Issue 1, 2023, Pages 107-116]
-
Software basis path
Providing a Method for the Optimal Detection of Software Testing Paths Using Meta-Algorithms [Volume 6, Issue 4, 2018, Pages 13-22]
-
Software Defined Network
An Accelerated Method for Rules Anomaly Detection in Software Defined Networks [Volume 8, Issue 4, 2020, Pages 31-39]
-
Software Defined Network
Distributed Denial of Service Attacks Detection in Software Defined Networks [Volume 9, Issue 1, 2021, Pages 43-59]
-
Software Defined Network
Presentation and Performance Evaluation of an Efficient Algorithm for a Distributed Controller in SDN [Volume 9, Issue 1, 2021, Pages 175-183]
-
Software Diversity
Malware Propagation Modeling Considering Software Diversity Approach in Weighted Scale-Free Network [Volume 6, Issue 3, 2018, Pages 131-140]
-
Software Quality
Fault Proness Estimation of Software Modules Using Machine learning [Volume 11, Issue 4, 2023]
-
Software Verification
A Secure Environment for Behavioral Malware Analysis [Volume 2, Issue 3, 2014, Pages 65-76]
-
Software vulnerability
The relationship of software vulnerabilities and workarounds [Volume 8, Issue 2, 2020, Pages 75-81]
-
SOM
Radar data processing using a combination of principal component analysis methods and self-organizing and digitized neural networks of the learning vector [Volume 9, Issue 2, 2021, Pages 1-7]
-
Sonar targets
Sonar Dataset Classification using Multi-Layer Perceptron Neural Network Based on Dragonfly and Moth Algorithms [Volume 10, Issue 3, 2022, Pages 21-31]
-
S-OWA Operator
Web-based Military Management Systems Security Using Combination of One-class Classifiers [Volume 3, Issue 3, 2015, Pages 19-30]
-
Spam
Spam Management in Social Networks by Content Rating [Volume 2, Issue 2, 2014, Pages 53-62]
-
Sparse
Coherent Acoustic source DOA estimation by nested array based on sparse solution [Volume 8, Issue 1, 2020, Pages 79-88]
-
Sparse representation classification
Applying weighted smoothed norm in sparse representation classification for face recognition [Volume 11, Issue 3, 2023, Pages 57-65]
-
Specific Values
Frequency Spectrum Sensing by Multi-Stage Adaptive Optimization Algorithm with the Efficient Non-Cooperative Technique in Cognitive radios with hardware implementation [Volume 8, Issue 3, 2020, Pages 39-51]
-
Spectral Efficiency
Performance Analysis of Hybrid FSO/RF Systems Using the ℳ Distribution and Markov Function [Volume 10, Issue 2, 2022, Pages 1-10]
-
Spectral Holes
Frequency Spectrum Sensing by Multi-Stage Adaptive Optimization Algorithm with the Efficient Non-Cooperative Technique in Cognitive radios with hardware implementation [Volume 8, Issue 3, 2020, Pages 39-51]
-
Spectral Sensors
Frequency Spectrum Sensing by Multi-Stage Adaptive Optimization Algorithm with the Efficient Non-Cooperative Technique in Cognitive radios with hardware implementation [Volume 8, Issue 3, 2020, Pages 39-51]
-
Spectrum Efficiency
Performance analysis of adaptive modulation and coding methods in the wireless telecommunication channels [Volume 10, Issue 1, 2022, Pages 99-108]
-
Spectrum Sensing
Joint Spectrum Sensing and Power Allocation for Multiband Cognitive Radio Networks Using Probabilistic Spectrum Access [Volume 6, Issue 3, 2018, Pages 117-130]
-
Speech steganalysis
Speech Steganalysis of Least Significant Bits Based on the Percentage of Equal Adjacent Samples [Volume 9, Issue 1, 2021, Pages 75-90]
-
Spoofing
Reducing Interference Effect on GPS Receiver by Using Multi-correlation Architecture [Volume 9, Issue 3, 2021, Pages 49-57]
-
Spoofing Attack
Detection of Spoofing Attack Based on Multi-Layer Neural Network in Single-Frequency GPS Receivers [Volume 3, Issue 1, 2015, Pages 69-80]
-
Spoofing Attack
GPS Spoofing Mitigation using Adaptive Estimator in Tracking Loop [Volume 6, Issue 3, 2018, Pages 65-80]
-
Spoofing Attack
Novel Spoofing Mitigation Method using Wavelet Transform Based on PSO Algorithm in the Acquisition Stage of GPS Receiver [Volume 10, Issue 4, 2022, Pages 19-31]
-
Spoofing Attacks
Reducing the Effects of Deception Attack on GPS Receivers of Phasor Measurement Units using Neural Networks [Volume 11, Issue 1, 2023, Pages 97-105]
-
Spread Spectrum
Steganography on raw video based on proper detection and compromise between the parameters of transparency, resistance and capacity [Volume 8, Issue 1, 2020, Pages 51-65]
-
Spread Spectrum Communication
Robust Steganography Algorithm Text in the Image Using A Spread Spectrum Method [Volume 2, Issue 3, 2014, Pages 77-83]
-
SPRS Protocol
Weaknesses of SPRS Authentication Protocol and Present a Developed Protocol for RFID Systems [Volume 3, Issue 3, 2015, Pages 39-48]
-
SQL injection
Syntax and Semantic Analysis for SQL-Injection Attacks [Volume 2, Issue 1, 2014, Pages 83-97]
-
SQL Injection Attacks
Detection and Prevention of SQL Injection Attacks at Runtime Using Decision Tree Classification [Volume 8, Issue 4, 2020, Pages 75-93]
-
Stack
Automated Exploit Generation For Application’s Vulnerability [Volume 4, Issue 1, 2016, Pages 35-50]
-
Stack Algorithm
Sequential Decoding Algorithms of Convolutional Codes: Implementation, Improvement and Comparison [Volume 3, Issue 2, 2015, Pages 61-73]
-
Standard model
A New (t,n) Designated Verifier Threshold Proxy Signature Scheme in the Standard Model [Volume 2, Issue 1, 2014, Pages 25-35]
-
Standard Security
Two Verifiable Multi-Secret Sharing Schemes: A Linear Scheme with Standard Security and A Lattice-Based Scheme [Volume 8, Issue 3, 2020, Pages 101-115]
-
Static Analysis
An Improved New Link Prediction Method in Social Multilplex Networks Based on the Gravitational Search Algorithm [Volume 8, Issue 2, 2020, Pages 15-24]
-
Static Analysis
A Malware Classification Method Using visualization and Word Embedding Features [Volume 11, Issue 1, 2023, Pages 1-13]
-
Static and Dynamic Analysis
Syntax and Semantic Analysis for SQL-Injection Attacks [Volume 2, Issue 1, 2014, Pages 83-97]
-
Statistical Detectability
Relating the Detection Rate, Capacity and the Cost of Steganography by Steganographer Modeling [Volume 6, Issue 3, 2018, Pages 81-94]
-
Statistical Tests
Detection of Unknown Malicious Network Streams using Ensemble Learning [Volume 6, Issue 2, 2018, Pages 93-108]
-
STBC
Identification of STBC-OFDM Signals by Second-Order Cyclostationarity Method [Volume 7, Issue 4, 2019, Pages 27-36]
-
Steganalysis Model
Relating the Detection Rate, Capacity and the Cost of Steganography by Steganographer Modeling [Volume 6, Issue 3, 2018, Pages 81-94]
-
Steganlysis
Increasing Insertion Capacity and Resistance in Image Steganography Based on Mapping and Bits Reduction [Volume 7, Issue 2, 2019, Pages 33-39]
-
Steganography
Robust Steganography Algorithm Text in the Image Using A Spread Spectrum Method [Volume 2, Issue 3, 2014, Pages 77-83]
-
Steganography
Relating the Detection Rate, Capacity and the Cost of Steganography by Steganographer Modeling [Volume 6, Issue 3, 2018, Pages 81-94]
-
Steganography
Increasing Insertion Capacity and Resistance in Image Steganography Based on Mapping and Bits Reduction [Volume 7, Issue 2, 2019, Pages 33-39]
-
Steganography
Speech Steganalysis of Least Significant Bits Based on the Percentage of Equal Adjacent Samples [Volume 9, Issue 1, 2021, Pages 75-90]
-
Strategy
A Decision-Making Model in a Cyber Conflicts Acted Upon Vulnerability, Based on Game Theoretic Analysis [Volume 6, Issue 2, 2018, Pages 21-28]
-
Stream Cipher Algorithm
Time Analysis Attack on a Stream Cipher Algorithm’s [Volume 4, Issue 1, 2016, Pages 51-57]
-
Stream Ciphers
Design and Analysis of a Novel Synchronous Stream Cipher Using Secure Pseudo Random Number Generator [Volume 4, Issue 1, 2016, Pages 59-68]
-
Strong Tracking Kalman Filter
Enhancing Vector Tracking Accuracy of GPS in Weak Signal
Condition Based on Adaptive Strong Tracking Kalman Filter [Volume 6, Issue 3, 2018, Pages 1-12]
-
Structural analysis
Structural Analysis based on Integral Characteristic of a Reduced Round Block Cipher with Making an Improvement [Volume 7, Issue 3, 2019, Pages 1-8]
-
Structural Equation Modelling
A framework for assessing cyber security and privacy threats and investigating their impact on smart city performance [Volume 10, Issue 3, 2022, Pages 77-91]
-
Subtractor
The residue number system component design based on OneHot coding [Volume 10, Issue 1, 2022, Pages 119-133]
-
Support Vectore machin(SVM)
Detect Web Denial of Service Attacks Using Entropy and Support Vector Machine Algorithm [Volume 6, Issue 4, 2018, Pages 79-89]
-
Support Vector Machines
An Effective Method to Detect Environment-Aware Malware Based on the Behavioral Distances Comparison [Volume 6, Issue 4, 2018, Pages 123-133]
-
Support Vector Machines
Investigation of a new ensemble method of intrusion detection system on different data sets [Volume 10, Issue 3, 2022, Pages 43-57]
-
Support Vector Machine (SVM)
A recommender system using a support vector machine and the TOPSIS model in the Internet of Things [Volume 11, Issue 4, 2023]
-
SURF algorithm
Improve the detection of dangerous objects in x-ray images in security and military inspections using image processing approaches [Volume 10, Issue 4, 2022, Pages 81-89]
-
Switching amplifier
Reliability Analysis of Open-Loop Switching Loran Signal Generator Using Omoe Indicator [Volume 8, Issue 2, 2020, Pages 83-93]
-
Switching state space mode (SSSM)
A New Method for Detection of Discrete Data Transmitted over Non-Linear Dynamic Wireless Channels [Volume 3, Issue 2, 2015, Pages 75-85]
-
Symbol Rate Estimation
Blind symbol Rate estimation in multipath channels [Volume 10, Issue 3, 2022, Pages 59-66]
-
Synchronous Scrambler
A New Method for Blind Recognition of the Initial State of Synchronous Scramblers When Located after the Channel Encoder [Volume 9, Issue 1, 2021, Pages 19-27]
-
Systematic Design Process
The Design Process Reform of the Gama-ray Imaging System by using the Design Structure Matrix [Volume 6, Issue 3, 2018, Pages 95-106]
-
System call
An Effective Method to Detect Environment-Aware Malware Based on the Behavioral Distances Comparison [Volume 6, Issue 4, 2018, Pages 123-133]
-
System Call Tracking
A Secure Environment for Behavioral Malware Analysis [Volume 2, Issue 3, 2014, Pages 65-76]
-
Systolic array
Designing Systolic Array for SL0 Algorithm Implementation [Volume 7, Issue 4, 2019, Pages 59-65]
T
-
Tabu Search
Enhancing E-Security by Inserting a Watermark Using the Combination of Genetic Algorithm and Tabu Search [Volume 8, Issue 3, 2020, Pages 25-37]
-
Tag Identification
Introduction of An Anti-Collision Protocol in RFID Systems [Volume 8, Issue 4, 2020, Pages 119-128]
-
Target Tracking
Target Tracking Algorithm in Wireless Sensor Networks with Optimum Power Consumption Using Quantized Observation [Volume 6, Issue 2, 2018, Pages 109-121]
-
Task scheduling
Secure and confidential workflow scheduling in hybrid cloud using improved particle swarm optimization algorithm [Volume 7, Issue 4, 2019, Pages 131-145]
-
Task scheduling
A Fault Tolerant Task Scheduling Method for Optimal use of Resources in Cloud Computing Environment [Volume 8, Issue 2, 2020, Pages 95-103]
-
Task scheduling
Security-aware Task Scheduling Algorithm based on Multi Adaptive Learning and PSO Technique [Volume 9, Issue 2, 2021, Pages 159-178]
-
TDMA networks
Introduction of the Entropy-Based Method for Finding Influential Nodes in Information Dissemination on Online Social Networks [Volume 6, Issue 2, 2018, Pages 1-10]
-
TDMA networks
Blind Estimation of Number of Users in TDMA Networks Using Redundancy of Adaptive Channel Coding [Volume 6, Issue 2, 2018, Pages 11-20]
-
TDOA
Optimization of Site Topologies and Delay Extraction in Radar Emitter Location [Volume 2, Issue 2, 2014, Pages 41-51]
-
Teacher-student technique
The Semantic Segmentation of Autonomous Vehicles Images with the Teacher-Student Technique [Volume 9, Issue 4, 2021, Pages 1-19]
-
Technique of Order Preference for Similarity to Ideal Solution (TOPSIS)
A recommender system using a support vector machine and the TOPSIS model in the Internet of Things [Volume 11, Issue 4, 2023]
-
Template Side-Channel Attack
A Practical Template Attack Against the Implementation of the Advanced Encryption Standard on ARM Processor [Volume 7, Issue 1, 2019, Pages 39-48]
-
Terminal Vertices
Hellman Chains Analysis Base on Graph of Random Function [Volume 4, Issue 1, 2016, Pages 81-89]
-
Text Mining
Automatic Keyword Extraction from Persian short Text Using word2vec [Volume 8, Issue 2, 2020, Pages 105-114]
-
Text Test Data Generation
Evaluating Deep Learning Models for Test Data Generation In File Based Fuzzers [Volume 10, Issue 2, 2022, Pages 57-73]
-
Texture analysis
Offline text-Independent Persian handwriting Forgery Detection using Texture Analysis [Volume 7, Issue 3, 2019, Pages 37-52]
-
The Combination of Encryption and Coding
A New Method for Combining the Channel Coding with Polar Coding-Based Encryption [Volume 4, Issue 1, 2016, Pages 1-8]
-
The EM approach
A New Method for Detection of Discrete Data Transmitted over Non-Linear Dynamic Wireless Channels [Volume 3, Issue 2, 2015, Pages 75-85]
-
The Viterbi algorithm
A New Method for Detection of Discrete Data Transmitted over Non-Linear Dynamic Wireless Channels [Volume 3, Issue 2, 2015, Pages 75-85]
-
Threat assessment
Target Threat Assessment using Rule-Based Joint Fuzzy and Probabilistic Networks [Volume 6, Issue 4, 2018, Pages 61-78]
-
Threat evaluation
Developing a Threat-Tolerability Bilateral Concept within a Differential Game for the Analysis of the Insider/Adversary Behavior in Operational environment [Volume 11, Issue 2, 2023, Pages 15-29]
-
Threat modelling
The Automated Security Evaluation of Threat Paths Based on Petri Nets [Volume 9, Issue 4, 2021, Pages 87-98]
-
Threat path
The Automated Security Evaluation of Threat Paths Based on Petri Nets [Volume 9, Issue 4, 2021, Pages 87-98]
-
Threshold
Resource Elasticity Management using Fuzzy Controller Based on Threshold Changes in the Cloud Computing Environment [Volume 8, Issue 3, 2020, Pages 63-81]
-
Threshold proxy signature scheme
A New (t,n) Designated Verifier Threshold Proxy Signature Scheme in the Standard Model [Volume 2, Issue 1, 2014, Pages 25-35]
-
Throughput
A new analytical model for enhancing performance of cognitive radio user’s transmissions in the internet of things [Volume 9, Issue 3, 2021, Pages 73-82]
-
Time Analysis Attack
Time Analysis Attack on a Stream Cipher Algorithm’s [Volume 4, Issue 1, 2016, Pages 51-57]
-
Time-Memory Trade-Off (TMTO) Attack
Optimum Parameter Selection for Rainbow Table TMTO Attack Considering Breaking Time and Using Sequential and Index Search Methods [Volume 3, Issue 3, 2015, Pages 49-57]
-
Time Synchronization Attacks
Reducing the Effects of Deception Attack on GPS Receivers of Phasor Measurement Units using Neural Networks [Volume 11, Issue 1, 2023, Pages 97-105]
-
Timing Channel
Web Covert Timing Channel Detection based on Entropy [Volume 8, Issue 3, 2020, Pages 13-23]
-
TOA ، TDOA ،Loran C
A Combined Improved Algorithm to Estimating The delay of Sky waves In Loran c Receiver [Volume 2, Issue 4, 2014, Pages 55-63]
-
Tolerability
Developing a Threat-Tolerability Bilateral Concept within a Differential Game for the Analysis of the Insider/Adversary Behavior in Operational environment [Volume 11, Issue 2, 2023, Pages 15-29]
-
Topic Models
Relating the Detection Rate, Capacity and the Cost of Steganography by Steganographer Modeling [Volume 6, Issue 3, 2018, Pages 81-94]
-
TOPSIS Method
The Course of Action Selection Model in Network Centric Operation [Volume 7, Issue 2, 2019, Pages 133-155]
-
Tor Network
Evaluation and proof of routing algorithm in Tor anonymity network [Volume 11, Issue 3, 2023, Pages 15-24]
-
Traceability
Design a Blockchain based Electronic Payment with Users’ Anonymity [Volume 9, Issue 2, 2021, Pages 85-100]
-
Trade-off Attacks
Hellman Chains Analysis Base on Graph of Random Function [Volume 4, Issue 1, 2016, Pages 81-89]
-
Trajectory database release
Trajectory Database Release with Differential Privacy Guarantee [Volume 9, Issue 1, 2021, Pages 29-42]
-
Trajectory pattern
Trajectory Database Release with Differential Privacy Guarantee [Volume 9, Issue 1, 2021, Pages 29-42]
-
Transferable Belief Model
Projection of Cyber Attacks using Damage Estimation and Combination of Attacker’s Capability and Opportunity based on Transferable Belief Model [Volume 6, Issue 4, 2018, Pages 1-12]
-
Transfer Learning
Detection of Slippery Road Conditions using the Road CCTV Images based on the Convolutional Neural Networks and Transfer Learning [Volume 10, Issue 2, 2022, Pages 105-116]
-
Transient Fault
Self-stabilizing Grundy Coloring Using Game Theory and Heuristics Ordering [Volume 6, Issue 2, 2018, Pages 39-48]
-
Transmission Control Protocol
A cross layer approach for improving the TCP quality-of-service parameters over the IEEE 802.11.ac wireless networks [Volume 10, Issue 1, 2022, Pages 109-117]
-
Transport protocol
A new analytical model for enhancing performance of cognitive radio user’s transmissions in the internet of things [Volume 9, Issue 3, 2021, Pages 73-82]
-
Tree-based Protocol
Introduction of An Anti-Collision Protocol in RFID Systems [Volume 8, Issue 4, 2020, Pages 119-128]
-
Tree decomposition
Generating Tree Decomposition of Graphs with Imperialist Competitive Algorithm for Use in Secret Sharing Scheme [Volume 7, Issue 3, 2019, Pages 105-111]
-
Trust
Hybrid Method for Detecting Trustworthy Cloud Service Providers using Analytical Hierarchical Process and Neural Network [Volume 6, Issue 4, 2018, Pages 105-122]
-
Trust
A Trust Model Based on Swarm Intelligence Algorithms in WSNs [Volume 7, Issue 1, 2019, Pages 1-10]
-
Trust
A Trust Evaluation Model for Cloud Computing Using Bayesian Network [Volume 10, Issue 4, 2022, Pages 53-61]
-
Trust Models
A Fuzzy Trust Evaluation Model to Enhance Security of cloud System Entities with Petri Net [Volume 4, Issue 1, 2016, Pages 19-34]
-
Trust Negotiation
TNAC: A Novel Trust Negotiation Based Access Control Model Using XACML Architecture [Volume 3, Issue 1, 2015, Pages 53-67]
-
T-Test Analysis
A New And Efficient Method of Mass Masking and its Resistance Assessment to Power Analysis [Volume 6, Issue 2, 2018, Pages 123-134]
U
-
UAV relay
Security of UAV Relay Networks based on Covert Communication in the Presence of an Eavesdropping UAV [Volume 11, Issue 2, 2023, Pages 45-56]
-
Uncertainty-aware Attack Graph
A Foresight Framework for Intrusion Response Systems in Computer Networks [Volume 6, Issue 3, 2018, Pages 13-34]
-
Uncertainty modeling
A New Method for Image Steganography Using Discrete Wavelet Transforms [Volume 7, Issue 4, 2019, Pages 79-89]
-
Underdetermined
Coherent Acoustic source DOA estimation by nested array based on sparse solution [Volume 8, Issue 1, 2020, Pages 79-88]
-
Underwater transmission
A new method for data transmission in shallow water channel based on offset multi-carrier filter bank [Volume 11, Issue 3, 2023, Pages 25-34]
-
Unity-STF
Optimal Design of Low-power High-resolution Unity-STF S-MASH Sigma Delta Modulator for Telecommunication Applications [Volume 7, Issue 2, 2019, Pages 13-24]
-
Unknown Attacks
Detection of Unknown Malicious Network Streams using Ensemble Learning [Volume 6, Issue 2, 2018, Pages 93-108]
-
Unknown Input Estimation
High Maneuvering Target Tracking Based on Augmented State Method using Adaptive Unscented Kalman Filter [Volume 7, Issue 2, 2019, Pages 93-108]
-
Upward leaders
A New Method to Evaluate the Launch Pad Lightning Protection
System Performance by Using LPM in 3-D [Volume 3, Issue 1, 2015, Pages 15-27]
-
User-association
Joint Optimization of User Association, Subchannel Allocation and Power Allocation in OFDMA Heterogeneous Networks [Volume 8, Issue 3, 2020, Pages 117-129]
V
-
Validation criteria
Target Threat Assessment using Rule-Based Joint Fuzzy and Probabilistic Networks [Volume 6, Issue 4, 2018, Pages 61-78]
-
VANET
An Improved Authentication Scheme with Conditional Privacy Preserving in VANETs [Volume 3, Issue 2, 2015, Pages 1-12]
-
VANET
Security Analysis and Improvement of an Intelligent Transportation System based on Certificateless Aggregate Signature [Volume 8, Issue 1, 2020, Pages 25-33]
-
VANET
Distributed Anonymity Based On the Integrated Block Chain in Vehicular Ad Hoc Network [Volume 8, Issue 4, 2020, Pages 41-52]
-
Variable Bit Rate
Quality enhancement of received video using secondary channel encoding in Joint Source and Channel Coding (JSCC) [Volume 3, Issue 2, 2015, Pages 29-48]
-
Variance
Detect Web Denial of Service Attacks Using Entropy and Support Vector Machine Algorithm [Volume 6, Issue 4, 2018, Pages 79-89]
-
Vector Space Adaptation
Investigation of the Semantic Similarity of Persian Sentences Using Vector Space Adaptation And Deep Learning [Volume 10, Issue 2, 2022, Pages 43-56]
-
Vector Tracking
Enhancing Vector Tracking Accuracy of GPS in Weak Signal
Condition Based on Adaptive Strong Tracking Kalman Filter [Volume 6, Issue 3, 2018, Pages 1-12]
-
Vehicle Detection
Fast Detection of Vehicle Type and Position in Images Based on Deep Neural Network [Volume 10, Issue 2, 2022, Pages 117-127]
-
Verifiability
Two Verifiable Multi-Secret Sharing Schemes: A Linear Scheme with Standard Security and A Lattice-Based Scheme [Volume 8, Issue 3, 2020, Pages 101-115]
-
Video Coding
Quality enhancement of received video using secondary channel encoding in Joint Source and Channel Coding (JSCC) [Volume 3, Issue 2, 2015, Pages 29-48]
-
Virtual line
A Heuristic Data Diffusion and Gathering Scheme Using Virtual Line for Wireless Sensor Networks with Mobile Sink [Volume 9, Issue 2, 2021, Pages 195-207]
-
Visible Light Communication
Optimal Design of Wireless Visible Light Communication Network with the Aim of Minimizing the Outage Probability at the Location of the Mobile Receiver [Volume 10, Issue 3, 2022, Pages 1-9]
-
Visual Multiple-Secret Sharing Scheme
An Efficient Visual Multi-Secret Sharing Scheme [Volume 3, Issue 4, 2015, Pages 1-9]
-
Visual Sensor Networks
Optimal Placement of Cameras to Maximize Visual Coverage using Genetic Algorithm and Harmony Search [Volume 7, Issue 1, 2019, Pages 49-61]
-
Viterbi Algorithm
Sequential Decoding Algorithms of Convolutional Codes: Implementation, Improvement and Comparison [Volume 3, Issue 2, 2015, Pages 61-73]
-
Vulnerabilities Static detection
A new approach for static detection of security vulnerabilities in web applications [Volume 2, Issue 4, 2014, Pages 65-74]
-
Vulnerability
The Impact of Security Mechanisms on Software Vulnerabilities [Volume 2, Issue 1, 2014, Pages 49-60]
-
Vulnerability
Automated Exploit Generation For Application’s Vulnerability [Volume 4, Issue 1, 2016, Pages 35-50]
-
Vulnerability
A Decision-Making Model in a Cyber Conflicts Acted Upon Vulnerability, Based on Game Theoretic Analysis [Volume 6, Issue 2, 2018, Pages 21-28]
-
Vulnerability
PIVATool- a fast and precise tool for analysis and detection of PendingIntent vulnerabilities [Volume 9, Issue 2, 2021, Pages 75-83]
-
Vulnerability
Automatic XSS Exploit Generation Using Grammatical Evolution [Volume 9, Issue 2, 2021, Pages 101-119]
-
Vulnerability
Investigating The Effect of Social Engineering Techniques on Employees Vulnerability
(Case study: Tehran Municipality Employees) [Volume 11, Issue 1, 2023, Pages 31-46]
-
Vulnerability Probability Graph
A new approach for static detection of security vulnerabilities in web applications [Volume 2, Issue 4, 2014, Pages 65-74]
-
VuWaDB database
The relationship of software vulnerabilities and workarounds [Volume 8, Issue 2, 2020, Pages 75-81]
W
-
Wavelet Conversion
Blind symbol Rate estimation in multipath channels [Volume 10, Issue 3, 2022, Pages 59-66]
-
Wavelet Transform
A New Method for Cancelling CW Jamming in GPS Receivers [Volume 4, Issue 1, 2016, Pages 69-79]
-
Wavelet Transform
A New Method for Image Steganography Using Discrete Wavelet Transforms [Volume 7, Issue 3, 2019, Pages 83-91]
-
Wavelet Transform
Interference Mitigation in Cognitive Radio Communication Systems Based on the Wavelet Transform [Volume 9, Issue 4, 2021, Pages 55-66]
-
Wavelet Transform
Novel Spoofing Mitigation Method using Wavelet Transform Based on PSO Algorithm in the Acquisition Stage of GPS Receiver [Volume 10, Issue 4, 2022, Pages 19-31]
-
WDM-PON
A Techno-Economic Model of Sustainable Communication Infrastructure in the Smart City; using WDM-PON FTTx [Volume 9, Issue 1, 2021, Pages 149-156]
-
Weak Signal
Enhancing Vector Tracking Accuracy of GPS in Weak Signal
Condition Based on Adaptive Strong Tracking Kalman Filter [Volume 6, Issue 3, 2018, Pages 1-12]
-
WEB
Web Covert Timing Channel Detection based on Entropy [Volume 8, Issue 3, 2020, Pages 13-23]
-
Web Applications
A new approach for static detection of security vulnerabilities in web applications [Volume 2, Issue 4, 2014, Pages 65-74]
-
Web Applications
Detection and Prevention of SQL Injection Attacks at Runtime Using Decision Tree Classification [Volume 8, Issue 4, 2020, Pages 75-93]
-
Web Applications
Detection of the Remote Code Execution Attacks Using the PHP Web Application Intrusion Detection System [Volume 10, Issue 2, 2022, Pages 75-85]
-
Web-Applications
Web-based Military Management Systems Security Using Combination of One-class Classifiers [Volume 3, Issue 3, 2015, Pages 19-30]
-
Weighted Least Square Eerror
Wireless Target Localization Using Median Weighted Least Square Error Metric in the Presence of Non-Line of Sight Signals [Volume 8, Issue 2, 2020, Pages 125-133]
-
Weighted Scale-Free Network
Malware Propagation Modeling Considering Software Diversity Approach in Weighted Scale-Free Network [Volume 6, Issue 3, 2018, Pages 131-140]
-
Weighted smoothed l0 norm
Applying weighted smoothed norm in sparse representation classification for face recognition [Volume 11, Issue 3, 2023, Pages 57-65]
-
Weighted Voting
Detection of Unknown Malicious Network Streams using Ensemble Learning [Volume 6, Issue 2, 2018, Pages 93-108]
-
Whale optimization algorithm
Feature selection using a combination of Genetic-Whale-Ant colony algorithms for software fault prediction by machine learning [Volume 10, Issue 1, 2022, Pages 33-45]
-
Whale optimization algorithm
An Optimized Compound Deep Neural Network Integrating With Feature Selection for Intrusion Detection System in Cyber Attacks [Volume 10, Issue 4, 2022, Pages 41-51]
-
Wideband Beamforming
A New Method in Wide Band Adaptive Beam Forming By Deep Learning Method In An Array System [Volume 11, Issue 3, 2023, Pages 35-47]
-
Wireless Ad hoc Networks
A New Hybrid Approach for Traffic Identification and Classification in Wireless Networks [Volume 10, Issue 2, 2022, Pages 31-41]
-
Wireless networks
Secure and Fast Re-authentication Protocol to Support Extensive Movement of Users in IEEE 802.1X Wireless Networks [Volume 3, Issue 4, 2015, Pages 71-80]
-
Wireless networks
Performance Improvement of the ODMRP Protocol using Analysis of the Received Signal Strength Level [Volume 7, Issue 3, 2019, Pages 21-26]
-
Wireless networks
Security of UAV Relay Networks based on Covert Communication in the Presence of an Eavesdropping UAV [Volume 11, Issue 2, 2023, Pages 45-56]
-
Wireless Networks Security
Secure and Fast Re-authentication Protocol to Support Extensive Movement of Users in IEEE 802.1X Wireless Networks [Volume 3, Issue 4, 2015, Pages 71-80]
-
Wireless Sensor Network
Target Tracking Algorithm in Wireless Sensor Networks with Optimum Power Consumption Using Quantized Observation [Volume 6, Issue 2, 2018, Pages 109-121]
-
Wireless Sensor Network
A Trust Model Based on Swarm Intelligence Algorithms in WSNs [Volume 7, Issue 1, 2019, Pages 1-10]
-
Wireless Sensor Network
Clustering and Routing in Wireless Sensor Networks Using Multi-Objective Cuckoo Search and Game Theory [Volume 10, Issue 3, 2022, Pages 11-20]
-
Wireless Sensor Networks
Enhance Media Access Control in IEEE 802.15.4 Based Smart Grids using Swarm Intelligence Algorithms [Volume 7, Issue 3, 2019, Pages 9-20]
-
Wireless Sensor Networks
Energy-Harvesting Aware Multi-Hop Routing in Wireless Sensor Networks for Defense Applications [Volume 8, Issue 4, 2020, Pages 63-73]
-
Wireless Sensor Networks
A Heuristic Data Diffusion and Gathering Scheme Using Virtual Line for Wireless Sensor Networks with Mobile Sink [Volume 9, Issue 2, 2021, Pages 195-207]
-
Wireless Sensor Networks
Energy-aware routing in wireless sensor networks using MLP and simulated annealing algorithms [Volume 9, Issue 3, 2021, Pages 133-142]
-
Word Embedding
Automatic Persian Text Generation Using Rule-Based Models and Word Embedding [Volume 9, Issue 4, 2021, Pages 43-54]
-
Word Embedding
Investigation of the Semantic Similarity of Persian Sentences Using Vector Space Adaptation And Deep Learning [Volume 10, Issue 2, 2022, Pages 43-56]
-
Word Sense Disambiguation
An Approach Based on Semantic Similarity in Persian Query-Based Summarization [Volume 2, Issue 3, 2014, Pages 51-63]
-
Word Similarity
Automatic Keyword Extraction from Persian short Text Using word2vec [Volume 8, Issue 2, 2020, Pages 105-114]
-
Workaround
The relationship of software vulnerabilities and workarounds [Volume 8, Issue 2, 2020, Pages 75-81]
-
Worm
Smart Detection of Covert Worms in Computer Networks [Volume 7, Issue 4, 2019, Pages 67-77]
X
-
XACML Architecture
TNAC: A Novel Trust Negotiation Based Access Control Model Using XACML Architecture [Volume 3, Issue 1, 2015, Pages 53-67]
-
X-ray images
Improve the detection of dangerous objects in x-ray images in security and military inspections using image processing approaches [Volume 10, Issue 4, 2022, Pages 81-89]
Z
-
Zero day
Smart Detection of Covert Worms in Computer Networks [Volume 7, Issue 4, 2019, Pages 67-77]
-
Zero-Day Attacks
A Security Model Based Approach for Dynamic Risk Assessment of Multi-Step Attacks in Computer Networks [Volume 9, Issue 1, 2021, Pages 157-173]
Your query does not match with any item