Keyword Index

A

  • Analyzer Environment A Secure Environment for Behavioral Malware Analysis [Volume 2, Issue 3, 2014, Pages 65-76]
  • Anonymous Networks Designing Anonymous Communication System by Lattice-Based Cryptography [Volume 2, Issue 3, 2014, Pages 13-22]
  • Authentication Utilizing Port-Knocking as first defensive layer at defense-in-depth strategies using hybrid of the Internet Control Message Protocol features, Internet Addresses and Tunneling [Volume 2, Issue 4, 2014, Pages 25-40]
  • Autotracking Simulation the modify FSM , in autotracking systems to Stabilization secure links of free space optical communications [Volume 2, Issue 1, 2014, Pages 61-69]

B

  • Beam Steerer Simulation the modify FSM , in autotracking systems to Stabilization secure links of free space optical communications [Volume 2, Issue 1, 2014, Pages 61-69]
  • Behavioral Model Implementing a Novel Malware Detection System in Virtual Machines [Volume 2, Issue 3, 2014, Pages 23-33]
  • BER Simulation the modify FSM , in autotracking systems to Stabilization secure links of free space optical communications [Volume 2, Issue 1, 2014, Pages 61-69]
  • Bilinear Pairing A New (t,n) Designated Verifier Threshold Proxy Signature Scheme in the Standard Model [Volume 2, Issue 1, 2014, Pages 25-35]
  • Buffer Overflow Error The Impact of Security Mechanisms on Software Vulnerabilities [Volume 2, Issue 1, 2014, Pages 49-60]

C

  • CEP Optimization of Site Topologies and Delay Extraction in Radar Emitter Location [Volume 2, Issue 2, 2014, Pages 41-51]
  • Classification of Malware Implementing a Novel Malware Detection System in Virtual Machines [Volume 2, Issue 3, 2014, Pages 23-33]
  • Content rating Spam Management in Social Networks by Content Rating [Volume 2, Issue 2, 2014, Pages 53-62]
  • Covert Timing Channel Simulation and Evaluation of Jitter and Packet Loss Noises Influence on Covert Timing Channel Performance [Volume 2, Issue 3, 2014, Pages 35-49]
  • Cyber Defense A new architecture for impact projection of cyber-attacks based on high level information fusion in cyber command and control [Volume 2, Issue 4, 2014, Pages 1-14]

D

  • Data classification A novel architecture for database outsourcing in cloud computing with regard to data life cycle [Volume 2, Issue 4, 2014, Pages 41-54]
  • Data Life Cycle A novel architecture for database outsourcing in cloud computing with regard to data life cycle [Volume 2, Issue 4, 2014, Pages 41-54]
  • Decentralize POMDPs Online Collaborative Planning in Complex Environment [Volume 2, Issue 4, 2014, Pages 15-23]
  • Decision Theory Online Collaborative Planning in Complex Environment [Volume 2, Issue 4, 2014, Pages 15-23]
  • Dynamic Query Syntax and Semantic Analysis for SQL-Injection Attacks [Volume 2, Issue 1, 2014, Pages 83-97]

E

  • Embedding Data Robust Steganography Algorithm Text in the Image Using A Spread Spectrum Method [Volume 2, Issue 3, 2014, Pages 77-83]
  • ESprite A Combined Improved Algorithm to Estimating The delay of Sky waves In Loran c Receiver [Volume 2, Issue 4, 2014, Pages 55-63]

F

  • Farsnet An Approach Based on Semantic Similarity in Persian Query-Based Summarization [Volume 2, Issue 3, 2014, Pages 51-63]
  • Format String Errors The Impact of Security Mechanisms on Software Vulnerabilities [Volume 2, Issue 1, 2014, Pages 49-60]
  • FSM Simulation the modify FSM , in autotracking systems to Stabilization secure links of free space optical communications [Volume 2, Issue 1, 2014, Pages 61-69]
  • FSO Simulation the modify FSM , in autotracking systems to Stabilization secure links of free space optical communications [Volume 2, Issue 1, 2014, Pages 61-69]

H

  • Hooking A Secure Environment for Behavioral Malware Analysis [Volume 2, Issue 3, 2014, Pages 65-76]

I

  • IFFT A Combined Improved Algorithm to Estimating The delay of Sky waves In Loran c Receiver [Volume 2, Issue 4, 2014, Pages 55-63]
  • Image Processing Robust Steganography Algorithm Text in the Image Using A Spread Spectrum Method [Volume 2, Issue 3, 2014, Pages 77-83]
  • Impact projection A new architecture for impact projection of cyber-attacks based on high level information fusion in cyber command and control [Volume 2, Issue 4, 2014, Pages 1-14]
  • Information Fusion A new architecture for impact projection of cyber-attacks based on high level information fusion in cyber command and control [Volume 2, Issue 4, 2014, Pages 1-14]

J

  • Jitter Simulation and Evaluation of Jitter and Packet Loss Noises Influence on Covert Timing Channel Performance [Volume 2, Issue 3, 2014, Pages 35-49]

M

  • Malware Analysis A Secure Environment for Behavioral Malware Analysis [Volume 2, Issue 3, 2014, Pages 65-76]
  • MultiAgent Systems Online Collaborative Planning in Complex Environment [Volume 2, Issue 4, 2014, Pages 15-23]
  • Music A Combined Improved Algorithm to Estimating The delay of Sky waves In Loran c Receiver [Volume 2, Issue 4, 2014, Pages 55-63]
  • Mutipath Channel A New Metric for Estimation the User Position in the Multi User OFDMA Networks [Volume 2, Issue 3, 2014, Pages 1-11]

N

  • Network Noise Simulation and Evaluation of Jitter and Packet Loss Noises Influence on Covert Timing Channel Performance [Volume 2, Issue 3, 2014, Pages 35-49]
  • NSS Digital Signature Designing Anonymous Communication System by Lattice-Based Cryptography [Volume 2, Issue 3, 2014, Pages 13-22]
  • NTRU Cryptography System Designing Anonymous Communication System by Lattice-Based Cryptography [Volume 2, Issue 3, 2014, Pages 13-22]
  • Number Errors The Impact of Security Mechanisms on Software Vulnerabilities [Volume 2, Issue 1, 2014, Pages 49-60]

O

  • OFDMA A New Metric for Estimation the User Position in the Multi User OFDMA Networks [Volume 2, Issue 3, 2014, Pages 1-11]
  • Online Collaborative Planning Online Collaborative Planning in Complex Environment [Volume 2, Issue 4, 2014, Pages 15-23]
  • Ontology Syntax and Semantic Analysis for SQL-Injection Attacks [Volume 2, Issue 1, 2014, Pages 83-97]
  • Outsourcing A novel architecture for database outsourcing in cloud computing with regard to data life cycle [Volume 2, Issue 4, 2014, Pages 41-54]
  • Outsourcing Architecture A novel architecture for database outsourcing in cloud computing with regard to data life cycle [Volume 2, Issue 4, 2014, Pages 41-54]
  • Outsourcing Security A novel architecture for database outsourcing in cloud computing with regard to data life cycle [Volume 2, Issue 4, 2014, Pages 41-54]

P

  • Packet Loss Simulation and Evaluation of Jitter and Packet Loss Noises Influence on Covert Timing Channel Performance [Volume 2, Issue 3, 2014, Pages 35-49]
  • Passive Radars Optimization of Site Topologies and Delay Extraction in Radar Emitter Location [Volume 2, Issue 2, 2014, Pages 41-51]
  • Pizerenco A Combined Improved Algorithm to Estimating The delay of Sky waves In Loran c Receiver [Volume 2, Issue 4, 2014, Pages 55-63]
  • Policy Tree Online Collaborative Planning in Complex Environment [Volume 2, Issue 4, 2014, Pages 15-23]
  • Port-Knocking Utilizing Port-Knocking as first defensive layer at defense-in-depth strategies using hybrid of the Internet Control Message Protocol features, Internet Addresses and Tunneling [Volume 2, Issue 4, 2014, Pages 25-40]
  • Port Security Utilizing Port-Knocking as first defensive layer at defense-in-depth strategies using hybrid of the Internet Control Message Protocol features, Internet Addresses and Tunneling [Volume 2, Issue 4, 2014, Pages 25-40]
  • Position Estimation A New Metric for Estimation the User Position in the Multi User OFDMA Networks [Volume 2, Issue 3, 2014, Pages 1-11]
  • Power Spectral Density A New Metric for Estimation the User Position in the Multi User OFDMA Networks [Volume 2, Issue 3, 2014, Pages 1-11]
  • Probable Data Flow Analysis A new approach for static detection of security vulnerabilities in web applications [Volume 2, Issue 4, 2014, Pages 65-74]
  • Provable Security A New (t,n) Designated Verifier Threshold Proxy Signature Scheme in the Standard Model [Volume 2, Issue 1, 2014, Pages 25-35]
  • Proxy signature scheme A New (t,n) Designated Verifier Threshold Proxy Signature Scheme in the Standard Model [Volume 2, Issue 1, 2014, Pages 25-35]

Q

  • Query An Approach Based on Semantic Similarity in Persian Query-Based Summarization [Volume 2, Issue 3, 2014, Pages 51-63]
  • Query-Based Suummarization An Approach Based on Semantic Similarity in Persian Query-Based Summarization [Volume 2, Issue 3, 2014, Pages 51-63]

S

  • Sandbox A Secure Environment for Behavioral Malware Analysis [Volume 2, Issue 3, 2014, Pages 65-76]
  • Securing the Virtual Machine Implementing a Novel Malware Detection System in Virtual Machines [Volume 2, Issue 3, 2014, Pages 23-33]
  • Security in Linux Implementing a Novel Malware Detection System in Virtual Machines [Volume 2, Issue 3, 2014, Pages 23-33]
  • Security Mechanism The Impact of Security Mechanisms on Software Vulnerabilities [Volume 2, Issue 1, 2014, Pages 49-60]
  • Semantic Analysis Syntax and Semantic Analysis for SQL-Injection Attacks [Volume 2, Issue 1, 2014, Pages 83-97]
  • Semantic Similarity An Approach Based on Semantic Similarity in Persian Query-Based Summarization [Volume 2, Issue 3, 2014, Pages 51-63]
  • Service Security Utilizing Port-Knocking as first defensive layer at defense-in-depth strategies using hybrid of the Internet Control Message Protocol features, Internet Addresses and Tunneling [Volume 2, Issue 4, 2014, Pages 25-40]
  • Simulation Simulation and Evaluation of Jitter and Packet Loss Noises Influence on Covert Timing Channel Performance [Volume 2, Issue 3, 2014, Pages 35-49]
  • Social network Spam Management in Social Networks by Content Rating [Volume 2, Issue 2, 2014, Pages 53-62]
  • Software Verification A Secure Environment for Behavioral Malware Analysis [Volume 2, Issue 3, 2014, Pages 65-76]
  • Spam Spam Management in Social Networks by Content Rating [Volume 2, Issue 2, 2014, Pages 53-62]
  • Spread Spectrum Communication Robust Steganography Algorithm Text in the Image Using A Spread Spectrum Method [Volume 2, Issue 3, 2014, Pages 77-83]
  • SQL injection Syntax and Semantic Analysis for SQL-Injection Attacks [Volume 2, Issue 1, 2014, Pages 83-97]
  • Standard model A New (t,n) Designated Verifier Threshold Proxy Signature Scheme in the Standard Model [Volume 2, Issue 1, 2014, Pages 25-35]
  • Static and Dynamic Analysis Syntax and Semantic Analysis for SQL-Injection Attacks [Volume 2, Issue 1, 2014, Pages 83-97]
  • Steganography Robust Steganography Algorithm Text in the Image Using A Spread Spectrum Method [Volume 2, Issue 3, 2014, Pages 77-83]
  • System Call Tracking A Secure Environment for Behavioral Malware Analysis [Volume 2, Issue 3, 2014, Pages 65-76]

T

  • TDOA Optimization of Site Topologies and Delay Extraction in Radar Emitter Location [Volume 2, Issue 2, 2014, Pages 41-51]
  • Threshold proxy signature scheme A New (t,n) Designated Verifier Threshold Proxy Signature Scheme in the Standard Model [Volume 2, Issue 1, 2014, Pages 25-35]
  • TOA ، TDOA ،Loran C A Combined Improved Algorithm to Estimating The delay of Sky waves In Loran c Receiver [Volume 2, Issue 4, 2014, Pages 55-63]

V

  • Vulnerabilities Static detection A new approach for static detection of security vulnerabilities in web applications [Volume 2, Issue 4, 2014, Pages 65-74]
  • Vulnerability The Impact of Security Mechanisms on Software Vulnerabilities [Volume 2, Issue 1, 2014, Pages 49-60]
  • Vulnerability Probability Graph A new approach for static detection of security vulnerabilities in web applications [Volume 2, Issue 4, 2014, Pages 65-74]

W

  • Web Applications A new approach for static detection of security vulnerabilities in web applications [Volume 2, Issue 4, 2014, Pages 65-74]
  • Word Sense Disambiguation An Approach Based on Semantic Similarity in Persian Query-Based Summarization [Volume 2, Issue 3, 2014, Pages 51-63]