Keyword Index

A

  • Access Control TNAC: A Novel Trust Negotiation Based Access Control Model Using XACML Architecture [Volume 3, Issue 1, 2015, Pages 53-67]
  • Adaptive Algorithm Blind Frequency Offset Estimation using Adaptive Algorithms in Non-Coherent OFDM Systems [Volume 3, Issue 4, 2015, Pages 61-70]
  • Attacks Weaknesses of SPRS Authentication Protocol and Present a Developed Protocol for RFID Systems [Volume 3, Issue 3, 2015, Pages 39-48]
  • Attack Tree Design the Model of CSRF Attack Tree for Immunization the Web Application in Development Process [Volume 3, Issue 1, 2015, Pages 41-52]
  • Authentication Phishing Website Detection for e-Banking by Inclined Planes Optimization Algorithm [Volume 3, Issue 1, 2015, Pages 29-39]
  • Authentication Secure and Fast Re-authentication Protocol to Support Extensive Movement of Users in IEEE 802.1X Wireless Networks [Volume 3, Issue 4, 2015, Pages 71-80]
  • Auxiliary particle filter On Improvement of Cardinalized Probability Hypothesis Density Filter Implementation by using Auxiliary Particle Filter [Volume 3, Issue 4, 2015, Pages 23-41]

B

  • Belief Model Projection of Muli Stage Cyber Attack Based on Belief Model and Fuzzy Inference [Volume 3, Issue 2, 2015, Pages 13-28]
  • Bilinear Pairing An Improved Authentication Scheme with Conditional Privacy Preserving in VANETs [Volume 3, Issue 2, 2015, Pages 1-12]
  • Bot Botnet Detection for Peer to Peer Networks [Volume 3, Issue 4, 2015, Pages 43-60]
  • Botnet Botnet Detection for Peer to Peer Networks [Volume 3, Issue 4, 2015, Pages 43-60]
  • Botnet Detection Botnet Detection for Peer to Peer Networks [Volume 3, Issue 4, 2015, Pages 43-60]
  • Breaking Time Optimum Parameter Selection for Rainbow Table TMTO Attack Considering Breaking Time and Using Sequential and Index Search Methods [Volume 3, Issue 3, 2015, Pages 49-57]

C

  • Cardinalized PHD On Improvement of Cardinalized Probability Hypothesis Density Filter Implementation by using Auxiliary Particle Filter [Volume 3, Issue 4, 2015, Pages 23-41]
  • Cellular communications network Enhancing Communication Security in Cellular Communications Networks by using Interference Alignment Technique [Volume 3, Issue 2, 2015, Pages 49-60]
  • Channel Coding Quality enhancement of received video using secondary channel encoding in Joint Source and Channel Coding (JSCC) [Volume 3, Issue 2, 2015, Pages 29-48]
  • Charge Simulation Method A New Method to Evaluate the Launch Pad Lightning Protection System Performance by Using LPM in 3-D [Volume 3, Issue 1, 2015, Pages 15-27]
  • Classification An Optimized Unsupervised Feature Selection Algorithm [Volume 3, Issue 3, 2015, Pages 1-7]
  • Combination of One-class Classifiers Web-based Military Management Systems Security Using Combination of One-class Classifiers [Volume 3, Issue 3, 2015, Pages 19-30]
  • Computational operations A Fast Method for Computation of Scalar Multiplication of Elliptic Curve Suitable for Elliptic Curve Cryptography System [Volume 3, Issue 3, 2015, Pages 9-17]
  • Constrained Optimization Optimum Parameter Selection for Rainbow Table TMTO Attack Considering Breaking Time and Using Sequential and Index Search Methods [Volume 3, Issue 3, 2015, Pages 49-57]
  • Convolutional Code Constraint length Sequential Decoding Algorithms of Convolutional Codes: Implementation, Improvement and Comparison [Volume 3, Issue 2, 2015, Pages 61-73]
  • Convolutional Codes Sequential Decoding Algorithms of Convolutional Codes: Implementation, Improvement and Comparison [Volume 3, Issue 2, 2015, Pages 61-73]
  • Correlation Defense Against Spoofing in GPS Receiver using Correlation and Least Mean Squares Method Based on Sign-Data Algorithm [Volume 3, Issue 4, 2015, Pages 11-22]
  • Credential TNAC: A Novel Trust Negotiation Based Access Control Model Using XACML Architecture [Volume 3, Issue 1, 2015, Pages 53-67]
  • CSRF Design the Model of CSRF Attack Tree for Immunization the Web Application in Development Process [Volume 3, Issue 1, 2015, Pages 41-52]
  • Cyber Attack Projection of Muli Stage Cyber Attack Based on Belief Model and Fuzzy Inference [Volume 3, Issue 2, 2015, Pages 13-28]
  • Cyber Defense Projection of Muli Stage Cyber Attack Based on Belief Model and Fuzzy Inference [Volume 3, Issue 2, 2015, Pages 13-28]
  • Cyclic Prefix Blind Frequency Offset Estimation using Adaptive Algorithms in Non-Coherent OFDM Systems [Volume 3, Issue 4, 2015, Pages 61-70]

D

  • Detection Detection of Spoofing Attack Based on Multi-Layer Neural Network in Single-Frequency GPS Receivers [Volume 3, Issue 1, 2015, Pages 69-80]
  • Detection Defense Against Spoofing in GPS Receiver using Correlation and Least Mean Squares Method Based on Sign-Data Algorithm [Volume 3, Issue 4, 2015, Pages 11-22]
  • Doubleround(x) Function An Efficient Visual Multi-Secret Sharing Scheme [Volume 3, Issue 4, 2015, Pages 1-9]

E

  • EAP Protocol Secure and Fast Re-authentication Protocol to Support Extensive Movement of Users in IEEE 802.1X Wireless Networks [Volume 3, Issue 4, 2015, Pages 71-80]
  • Electronic voting A Fast Method for Computation of Scalar Multiplication of Elliptic Curve Suitable for Elliptic Curve Cryptography System [Volume 3, Issue 3, 2015, Pages 9-17]
  • Elliptic Curve Cryptography A Fast Method for Computation of Scalar Multiplication of Elliptic Curve Suitable for Elliptic Curve Cryptography System [Volume 3, Issue 3, 2015, Pages 9-17]

F

  • Fano Algorithm Sequential Decoding Algorithms of Convolutional Codes: Implementation, Improvement and Comparison [Volume 3, Issue 2, 2015, Pages 61-73]
  • Feature Vector An Optimized Unsupervised Feature Selection Algorithm [Volume 3, Issue 3, 2015, Pages 1-7]
  • Feature Vector Selection An Optimized Unsupervised Feature Selection Algorithm [Volume 3, Issue 3, 2015, Pages 1-7]
  • Frequency Offset Blind Frequency Offset Estimation using Adaptive Algorithms in Non-Coherent OFDM Systems [Volume 3, Issue 4, 2015, Pages 61-70]
  • Frequency-Selective Multipath Channel Blind Frequency Offset Estimation using Adaptive Algorithms in Non-Coherent OFDM Systems [Volume 3, Issue 4, 2015, Pages 61-70]
  • Fuzzy Inference Projection of Muli Stage Cyber Attack Based on Belief Model and Fuzzy Inference [Volume 3, Issue 2, 2015, Pages 13-28]

G

  • Generating Function An Efficient Visual Multi-Secret Sharing Scheme [Volume 3, Issue 4, 2015, Pages 1-9]
  • GPS Detection of Spoofing Attack Based on Multi-Layer Neural Network in Single-Frequency GPS Receivers [Volume 3, Issue 1, 2015, Pages 69-80]
  • GPS Spoofing Defense Against Spoofing in GPS Receiver using Correlation and Least Mean Squares Method Based on Sign-Data Algorithm [Volume 3, Issue 4, 2015, Pages 11-22]

I

  • Image Compressing Standard An Optimized Unsupervised Feature Selection Algorithm [Volume 3, Issue 3, 2015, Pages 1-7]
  • Index Search Optimum Parameter Selection for Rainbow Table TMTO Attack Considering Breaking Time and Using Sequential and Index Search Methods [Volume 3, Issue 3, 2015, Pages 49-57]
  • Intrusion detection Web-based Military Management Systems Security Using Combination of One-class Classifiers [Volume 3, Issue 3, 2015, Pages 19-30]

J

  • Joint channel and data detection A New Method for Detection of Discrete Data Transmitted over Non-Linear Dynamic Wireless Channels [Volume 3, Issue 2, 2015, Pages 75-85]

L

  • Launch Pad A New Method to Evaluate the Launch Pad Lightning Protection System Performance by Using LPM in 3-D [Volume 3, Issue 1, 2015, Pages 15-27]
  • Leader Progression Model A New Method to Evaluate the Launch Pad Lightning Protection System Performance by Using LPM in 3-D [Volume 3, Issue 1, 2015, Pages 15-27]
  • LMS and Sign-Data Algorithm Defense Against Spoofing in GPS Receiver using Correlation and Least Mean Squares Method Based on Sign-Data Algorithm [Volume 3, Issue 4, 2015, Pages 11-22]

M

  • Mean Squared Error Blind Frequency Offset Estimation using Adaptive Algorithms in Non-Coherent OFDM Systems [Volume 3, Issue 4, 2015, Pages 61-70]
  • MIMO interference channel Enhancing Communication Security in Cellular Communications Networks by using Interference Alignment Technique [Volume 3, Issue 2, 2015, Pages 49-60]
  • Mitigation Defense Against Spoofing in GPS Receiver using Correlation and Least Mean Squares Method Based on Sign-Data Algorithm [Volume 3, Issue 4, 2015, Pages 11-22]
  • Multitarget tracking On Improvement of Cardinalized Probability Hypothesis Density Filter Implementation by using Auxiliary Particle Filter [Volume 3, Issue 4, 2015, Pages 23-41]

N

  • Network Flow Analysis Botnet Detection for Peer to Peer Networks [Volume 3, Issue 4, 2015, Pages 43-60]
  • Neural Networks Increasing the Accuracy of Locating in Wireless Communication Systems Based on Neural Networks [Volume 3, Issue 3, 2015, Pages 31-38]
  • N-gram properties Design the Model of CSRF Attack Tree for Immunization the Web Application in Development Process [Volume 3, Issue 1, 2015, Pages 41-52]

O

  • OFDM Blind Frequency Offset Estimation using Adaptive Algorithms in Non-Coherent OFDM Systems [Volume 3, Issue 4, 2015, Pages 61-70]

P

  • Peer to Peer Botnet Botnet Detection for Peer to Peer Networks [Volume 3, Issue 4, 2015, Pages 43-60]
  • Per survivor processing (PSP) Technique A New Method for Detection of Discrete Data Transmitted over Non-Linear Dynamic Wireless Channels [Volume 3, Issue 2, 2015, Pages 75-85]
  • Port-Knocking Phishing Website Detection for e-Banking by Inclined Planes Optimization Algorithm [Volume 3, Issue 1, 2015, Pages 29-39]
  • Port Security Phishing Website Detection for e-Banking by Inclined Planes Optimization Algorithm [Volume 3, Issue 1, 2015, Pages 29-39]
  • Practical properties Design the Model of CSRF Attack Tree for Immunization the Web Application in Development Process [Volume 3, Issue 1, 2015, Pages 41-52]
  • Probability hypothesis density filter On Improvement of Cardinalized Probability Hypothesis Density Filter Implementation by using Auxiliary Particle Filter [Volume 3, Issue 4, 2015, Pages 23-41]

R

  • Random Finite Set On Improvement of Cardinalized Probability Hypothesis Density Filter Implementation by using Auxiliary Particle Filter [Volume 3, Issue 4, 2015, Pages 23-41]
  • RFID Authentication Protocols Weaknesses of SPRS Authentication Protocol and Present a Developed Protocol for RFID Systems [Volume 3, Issue 3, 2015, Pages 39-48]

S

  • Scalar Multiplication A Fast Method for Computation of Scalar Multiplication of Elliptic Curve Suitable for Elliptic Curve Cryptography System [Volume 3, Issue 3, 2015, Pages 9-17]
  • Secret image An Efficient Visual Multi-Secret Sharing Scheme [Volume 3, Issue 4, 2015, Pages 1-9]
  • Security and Privacy Weaknesses of SPRS Authentication Protocol and Present a Developed Protocol for RFID Systems [Volume 3, Issue 3, 2015, Pages 39-48]
  • Security Policy TNAC: A Novel Trust Negotiation Based Access Control Model Using XACML Architecture [Volume 3, Issue 1, 2015, Pages 53-67]
  • Sequential Decoding of Convolutional Codes Sequential Decoding Algorithms of Convolutional Codes: Implementation, Improvement and Comparison [Volume 3, Issue 2, 2015, Pages 61-73]
  • Sequential Search Optimum Parameter Selection for Rainbow Table TMTO Attack Considering Breaking Time and Using Sequential and Index Search Methods [Volume 3, Issue 3, 2015, Pages 49-57]
  • Service Security Phishing Website Detection for e-Banking by Inclined Planes Optimization Algorithm [Volume 3, Issue 1, 2015, Pages 29-39]
  • Shadow image An Efficient Visual Multi-Secret Sharing Scheme [Volume 3, Issue 4, 2015, Pages 1-9]
  • Situationa Awareness Projection of Muli Stage Cyber Attack Based on Belief Model and Fuzzy Inference [Volume 3, Issue 2, 2015, Pages 13-28]
  • S-OWA Operator Web-based Military Management Systems Security Using Combination of One-class Classifiers [Volume 3, Issue 3, 2015, Pages 19-30]
  • Spoofing Attack Detection of Spoofing Attack Based on Multi-Layer Neural Network in Single-Frequency GPS Receivers [Volume 3, Issue 1, 2015, Pages 69-80]
  • SPRS Protocol Weaknesses of SPRS Authentication Protocol and Present a Developed Protocol for RFID Systems [Volume 3, Issue 3, 2015, Pages 39-48]
  • Stack Algorithm Sequential Decoding Algorithms of Convolutional Codes: Implementation, Improvement and Comparison [Volume 3, Issue 2, 2015, Pages 61-73]
  • Switching state space mode (SSSM) A New Method for Detection of Discrete Data Transmitted over Non-Linear Dynamic Wireless Channels [Volume 3, Issue 2, 2015, Pages 75-85]

T

  • The EM approach A New Method for Detection of Discrete Data Transmitted over Non-Linear Dynamic Wireless Channels [Volume 3, Issue 2, 2015, Pages 75-85]
  • The Viterbi algorithm A New Method for Detection of Discrete Data Transmitted over Non-Linear Dynamic Wireless Channels [Volume 3, Issue 2, 2015, Pages 75-85]
  • Time-Memory Trade-Off (TMTO) Attack Optimum Parameter Selection for Rainbow Table TMTO Attack Considering Breaking Time and Using Sequential and Index Search Methods [Volume 3, Issue 3, 2015, Pages 49-57]
  • Trust Negotiation TNAC: A Novel Trust Negotiation Based Access Control Model Using XACML Architecture [Volume 3, Issue 1, 2015, Pages 53-67]

U

  • Upward leaders A New Method to Evaluate the Launch Pad Lightning Protection System Performance by Using LPM in 3-D [Volume 3, Issue 1, 2015, Pages 15-27]

V

  • VANET An Improved Authentication Scheme with Conditional Privacy Preserving in VANETs [Volume 3, Issue 2, 2015, Pages 1-12]
  • Variable Bit Rate Quality enhancement of received video using secondary channel encoding in Joint Source and Channel Coding (JSCC) [Volume 3, Issue 2, 2015, Pages 29-48]
  • Video Coding Quality enhancement of received video using secondary channel encoding in Joint Source and Channel Coding (JSCC) [Volume 3, Issue 2, 2015, Pages 29-48]
  • Visual Multiple-Secret Sharing Scheme An Efficient Visual Multi-Secret Sharing Scheme [Volume 3, Issue 4, 2015, Pages 1-9]
  • Viterbi Algorithm Sequential Decoding Algorithms of Convolutional Codes: Implementation, Improvement and Comparison [Volume 3, Issue 2, 2015, Pages 61-73]

W

  • Web-Applications Web-based Military Management Systems Security Using Combination of One-class Classifiers [Volume 3, Issue 3, 2015, Pages 19-30]
  • Wireless networks Secure and Fast Re-authentication Protocol to Support Extensive Movement of Users in IEEE 802.1X Wireless Networks [Volume 3, Issue 4, 2015, Pages 71-80]
  • Wireless Networks Security Secure and Fast Re-authentication Protocol to Support Extensive Movement of Users in IEEE 802.1X Wireless Networks [Volume 3, Issue 4, 2015, Pages 71-80]

X

  • XACML Architecture TNAC: A Novel Trust Negotiation Based Access Control Model Using XACML Architecture [Volume 3, Issue 1, 2015, Pages 53-67]