A
-
Analyzer Environment
A Secure Environment for Behavioral Malware Analysis [Volume 2, Issue 3, 2014, Pages 65-76]
-
Anonymous Networks
Designing Anonymous Communication System by Lattice-Based Cryptography [Volume 2, Issue 3, 2014, Pages 13-22]
-
Authentication
Utilizing Port-Knocking as first defensive layer at defense-in-depth strategies using hybrid of the Internet Control Message Protocol features, Internet Addresses and Tunneling [Volume 2, Issue 4, 2014, Pages 25-40]
-
Autotracking
Simulation the modify FSM , in autotracking systems to Stabilization secure links of free space optical communications [Volume 2, Issue 1, 2014, Pages 61-69]
B
-
Beam Steerer
Simulation the modify FSM , in autotracking systems to Stabilization secure links of free space optical communications [Volume 2, Issue 1, 2014, Pages 61-69]
-
Behavioral Model
Implementing a Novel Malware Detection System in Virtual Machines [Volume 2, Issue 3, 2014, Pages 23-33]
-
BER
Simulation the modify FSM , in autotracking systems to Stabilization secure links of free space optical communications [Volume 2, Issue 1, 2014, Pages 61-69]
-
Bilinear Pairing
A New (t,n) Designated Verifier Threshold Proxy Signature Scheme in the Standard Model [Volume 2, Issue 1, 2014, Pages 25-35]
-
Buffer Overflow Error
The Impact of Security Mechanisms on Software Vulnerabilities [Volume 2, Issue 1, 2014, Pages 49-60]
C
-
CEP
Optimization of Site Topologies and Delay Extraction in Radar Emitter Location [Volume 2, Issue 2, 2014, Pages 41-51]
-
Classification of Malware
Implementing a Novel Malware Detection System in Virtual Machines [Volume 2, Issue 3, 2014, Pages 23-33]
-
Content rating
Spam Management in Social Networks by Content Rating [Volume 2, Issue 2, 2014, Pages 53-62]
-
Covert Timing Channel
Simulation and Evaluation of Jitter and Packet Loss Noises Influence on Covert Timing Channel Performance [Volume 2, Issue 3, 2014, Pages 35-49]
-
Cyber Defense
A new architecture for impact projection of cyber-attacks based on high level information fusion in cyber command and control [Volume 2, Issue 4, 2014, Pages 1-14]
D
-
Data classification
A novel architecture for database outsourcing in cloud computing with regard to data life cycle [Volume 2, Issue 4, 2014, Pages 41-54]
-
Data Life Cycle
A novel architecture for database outsourcing in cloud computing with regard to data life cycle [Volume 2, Issue 4, 2014, Pages 41-54]
-
Decentralize POMDPs
Online Collaborative Planning in Complex Environment [Volume 2, Issue 4, 2014, Pages 15-23]
-
Decision Theory
Online Collaborative Planning in Complex Environment [Volume 2, Issue 4, 2014, Pages 15-23]
-
Dynamic Query
Syntax and Semantic Analysis for SQL-Injection Attacks [Volume 2, Issue 1, 2014, Pages 83-97]
E
-
Embedding Data
Robust Steganography Algorithm Text in the Image Using A Spread Spectrum Method [Volume 2, Issue 3, 2014, Pages 77-83]
-
ESprite
A Combined Improved Algorithm to Estimating The delay of Sky waves In Loran c Receiver [Volume 2, Issue 4, 2014, Pages 55-63]
F
-
Farsnet
An Approach Based on Semantic Similarity in Persian Query-Based Summarization [Volume 2, Issue 3, 2014, Pages 51-63]
-
Format String Errors
The Impact of Security Mechanisms on Software Vulnerabilities [Volume 2, Issue 1, 2014, Pages 49-60]
-
FSM
Simulation the modify FSM , in autotracking systems to Stabilization secure links of free space optical communications [Volume 2, Issue 1, 2014, Pages 61-69]
-
FSO
Simulation the modify FSM , in autotracking systems to Stabilization secure links of free space optical communications [Volume 2, Issue 1, 2014, Pages 61-69]
H
-
Hooking
A Secure Environment for Behavioral Malware Analysis [Volume 2, Issue 3, 2014, Pages 65-76]
I
-
IFFT
A Combined Improved Algorithm to Estimating The delay of Sky waves In Loran c Receiver [Volume 2, Issue 4, 2014, Pages 55-63]
-
Image Processing
Robust Steganography Algorithm Text in the Image Using A Spread Spectrum Method [Volume 2, Issue 3, 2014, Pages 77-83]
-
Impact projection
A new architecture for impact projection of cyber-attacks based on high level information fusion in cyber command and control [Volume 2, Issue 4, 2014, Pages 1-14]
-
Information Fusion
A new architecture for impact projection of cyber-attacks based on high level information fusion in cyber command and control [Volume 2, Issue 4, 2014, Pages 1-14]
J
-
Jitter
Simulation and Evaluation of Jitter and Packet Loss Noises Influence on Covert Timing Channel Performance [Volume 2, Issue 3, 2014, Pages 35-49]
M
-
Malware Analysis
A Secure Environment for Behavioral Malware Analysis [Volume 2, Issue 3, 2014, Pages 65-76]
-
MultiAgent Systems
Online Collaborative Planning in Complex Environment [Volume 2, Issue 4, 2014, Pages 15-23]
-
Music
A Combined Improved Algorithm to Estimating The delay of Sky waves In Loran c Receiver [Volume 2, Issue 4, 2014, Pages 55-63]
-
Mutipath Channel
A New Metric for Estimation the User Position in the Multi User OFDMA Networks [Volume 2, Issue 3, 2014, Pages 1-11]
N
-
Network Noise
Simulation and Evaluation of Jitter and Packet Loss Noises Influence on Covert Timing Channel Performance [Volume 2, Issue 3, 2014, Pages 35-49]
-
NSS Digital Signature
Designing Anonymous Communication System by Lattice-Based Cryptography [Volume 2, Issue 3, 2014, Pages 13-22]
-
NTRU Cryptography System
Designing Anonymous Communication System by Lattice-Based Cryptography [Volume 2, Issue 3, 2014, Pages 13-22]
-
Number Errors
The Impact of Security Mechanisms on Software Vulnerabilities [Volume 2, Issue 1, 2014, Pages 49-60]
O
-
OFDMA
A New Metric for Estimation the User Position in the Multi User OFDMA Networks [Volume 2, Issue 3, 2014, Pages 1-11]
-
Online Collaborative Planning
Online Collaborative Planning in Complex Environment [Volume 2, Issue 4, 2014, Pages 15-23]
-
Ontology
Syntax and Semantic Analysis for SQL-Injection Attacks [Volume 2, Issue 1, 2014, Pages 83-97]
-
Outsourcing
A novel architecture for database outsourcing in cloud computing with regard to data life cycle [Volume 2, Issue 4, 2014, Pages 41-54]
-
Outsourcing Architecture
A novel architecture for database outsourcing in cloud computing with regard to data life cycle [Volume 2, Issue 4, 2014, Pages 41-54]
-
Outsourcing Security
A novel architecture for database outsourcing in cloud computing with regard to data life cycle [Volume 2, Issue 4, 2014, Pages 41-54]
P
-
Packet Loss
Simulation and Evaluation of Jitter and Packet Loss Noises Influence on Covert Timing Channel Performance [Volume 2, Issue 3, 2014, Pages 35-49]
-
Passive Radars
Optimization of Site Topologies and Delay Extraction in Radar Emitter Location [Volume 2, Issue 2, 2014, Pages 41-51]
-
Pizerenco
A Combined Improved Algorithm to Estimating The delay of Sky waves In Loran c Receiver [Volume 2, Issue 4, 2014, Pages 55-63]
-
Policy Tree
Online Collaborative Planning in Complex Environment [Volume 2, Issue 4, 2014, Pages 15-23]
-
Port-Knocking
Utilizing Port-Knocking as first defensive layer at defense-in-depth strategies using hybrid of the Internet Control Message Protocol features, Internet Addresses and Tunneling [Volume 2, Issue 4, 2014, Pages 25-40]
-
Port Security
Utilizing Port-Knocking as first defensive layer at defense-in-depth strategies using hybrid of the Internet Control Message Protocol features, Internet Addresses and Tunneling [Volume 2, Issue 4, 2014, Pages 25-40]
-
Position Estimation
A New Metric for Estimation the User Position in the Multi User OFDMA Networks [Volume 2, Issue 3, 2014, Pages 1-11]
-
Power Spectral Density
A New Metric for Estimation the User Position in the Multi User OFDMA Networks [Volume 2, Issue 3, 2014, Pages 1-11]
-
Probable Data Flow Analysis
A new approach for static detection of security vulnerabilities in web applications [Volume 2, Issue 4, 2014, Pages 65-74]
-
Provable Security
A New (t,n) Designated Verifier Threshold Proxy Signature Scheme in the Standard Model [Volume 2, Issue 1, 2014, Pages 25-35]
-
Proxy signature scheme
A New (t,n) Designated Verifier Threshold Proxy Signature Scheme in the Standard Model [Volume 2, Issue 1, 2014, Pages 25-35]
Q
-
Query
An Approach Based on Semantic Similarity in Persian Query-Based Summarization [Volume 2, Issue 3, 2014, Pages 51-63]
-
Query-Based Suummarization
An Approach Based on Semantic Similarity in Persian Query-Based Summarization [Volume 2, Issue 3, 2014, Pages 51-63]
S
-
Sandbox
A Secure Environment for Behavioral Malware Analysis [Volume 2, Issue 3, 2014, Pages 65-76]
-
Securing the Virtual Machine
Implementing a Novel Malware Detection System in Virtual Machines [Volume 2, Issue 3, 2014, Pages 23-33]
-
Security in Linux
Implementing a Novel Malware Detection System in Virtual Machines [Volume 2, Issue 3, 2014, Pages 23-33]
-
Security Mechanism
The Impact of Security Mechanisms on Software Vulnerabilities [Volume 2, Issue 1, 2014, Pages 49-60]
-
Semantic Analysis
Syntax and Semantic Analysis for SQL-Injection Attacks [Volume 2, Issue 1, 2014, Pages 83-97]
-
Semantic Similarity
An Approach Based on Semantic Similarity in Persian Query-Based Summarization [Volume 2, Issue 3, 2014, Pages 51-63]
-
Service Security
Utilizing Port-Knocking as first defensive layer at defense-in-depth strategies using hybrid of the Internet Control Message Protocol features, Internet Addresses and Tunneling [Volume 2, Issue 4, 2014, Pages 25-40]
-
Simulation
Simulation and Evaluation of Jitter and Packet Loss Noises Influence on Covert Timing Channel Performance [Volume 2, Issue 3, 2014, Pages 35-49]
-
Social network
Spam Management in Social Networks by Content Rating [Volume 2, Issue 2, 2014, Pages 53-62]
-
Software Verification
A Secure Environment for Behavioral Malware Analysis [Volume 2, Issue 3, 2014, Pages 65-76]
-
Spam
Spam Management in Social Networks by Content Rating [Volume 2, Issue 2, 2014, Pages 53-62]
-
Spread Spectrum Communication
Robust Steganography Algorithm Text in the Image Using A Spread Spectrum Method [Volume 2, Issue 3, 2014, Pages 77-83]
-
SQL injection
Syntax and Semantic Analysis for SQL-Injection Attacks [Volume 2, Issue 1, 2014, Pages 83-97]
-
Standard model
A New (t,n) Designated Verifier Threshold Proxy Signature Scheme in the Standard Model [Volume 2, Issue 1, 2014, Pages 25-35]
-
Static and Dynamic Analysis
Syntax and Semantic Analysis for SQL-Injection Attacks [Volume 2, Issue 1, 2014, Pages 83-97]
-
Steganography
Robust Steganography Algorithm Text in the Image Using A Spread Spectrum Method [Volume 2, Issue 3, 2014, Pages 77-83]
-
System Call Tracking
A Secure Environment for Behavioral Malware Analysis [Volume 2, Issue 3, 2014, Pages 65-76]
T
-
TDOA
Optimization of Site Topologies and Delay Extraction in Radar Emitter Location [Volume 2, Issue 2, 2014, Pages 41-51]
-
Threshold proxy signature scheme
A New (t,n) Designated Verifier Threshold Proxy Signature Scheme in the Standard Model [Volume 2, Issue 1, 2014, Pages 25-35]
-
TOA ، TDOA ،Loran C
A Combined Improved Algorithm to Estimating The delay of Sky waves In Loran c Receiver [Volume 2, Issue 4, 2014, Pages 55-63]
V
-
Vulnerabilities Static detection
A new approach for static detection of security vulnerabilities in web applications [Volume 2, Issue 4, 2014, Pages 65-74]
-
Vulnerability
The Impact of Security Mechanisms on Software Vulnerabilities [Volume 2, Issue 1, 2014, Pages 49-60]
-
Vulnerability Probability Graph
A new approach for static detection of security vulnerabilities in web applications [Volume 2, Issue 4, 2014, Pages 65-74]
W
-
Web Applications
A new approach for static detection of security vulnerabilities in web applications [Volume 2, Issue 4, 2014, Pages 65-74]
-
Word Sense Disambiguation
An Approach Based on Semantic Similarity in Persian Query-Based Summarization [Volume 2, Issue 3, 2014, Pages 51-63]
Your query does not match with any item