A
-
Access Control
TNAC: A Novel Trust Negotiation Based Access Control Model Using XACML Architecture [Volume 3, Issue 1, 2015, Pages 53-67]
-
Adaptive Algorithm
Blind Frequency Offset Estimation using Adaptive Algorithms in Non-Coherent OFDM Systems [Volume 3, Issue 4, 2015, Pages 61-70]
-
Attacks
Weaknesses of SPRS Authentication Protocol and Present a Developed Protocol for RFID Systems [Volume 3, Issue 3, 2015, Pages 39-48]
-
Attack Tree
Design the Model of CSRF Attack Tree for Immunization the Web Application in Development Process [Volume 3, Issue 1, 2015, Pages 41-52]
-
Authentication
Phishing Website Detection for e-Banking by Inclined Planes Optimization Algorithm [Volume 3, Issue 1, 2015, Pages 29-39]
-
Authentication
Secure and Fast Re-authentication Protocol to Support Extensive Movement of Users in IEEE 802.1X Wireless Networks [Volume 3, Issue 4, 2015, Pages 71-80]
-
Auxiliary particle filter
On Improvement of Cardinalized Probability Hypothesis Density Filter Implementation by using Auxiliary Particle Filter [Volume 3, Issue 4, 2015, Pages 23-41]
B
-
Belief Model
Projection of Muli Stage Cyber Attack Based on Belief Model and Fuzzy Inference [Volume 3, Issue 2, 2015, Pages 13-28]
-
Bilinear Pairing
An Improved Authentication Scheme with Conditional Privacy Preserving in VANETs [Volume 3, Issue 2, 2015, Pages 1-12]
-
Bot
Botnet Detection for Peer to Peer Networks [Volume 3, Issue 4, 2015, Pages 43-60]
-
Botnet
Botnet Detection for Peer to Peer Networks [Volume 3, Issue 4, 2015, Pages 43-60]
-
Botnet Detection
Botnet Detection for Peer to Peer Networks [Volume 3, Issue 4, 2015, Pages 43-60]
-
Breaking Time
Optimum Parameter Selection for Rainbow Table TMTO Attack Considering Breaking Time and Using Sequential and Index Search Methods [Volume 3, Issue 3, 2015, Pages 49-57]
C
-
Cardinalized PHD
On Improvement of Cardinalized Probability Hypothesis Density Filter Implementation by using Auxiliary Particle Filter [Volume 3, Issue 4, 2015, Pages 23-41]
-
Cellular communications network
Enhancing Communication Security in Cellular Communications Networks by using Interference Alignment Technique [Volume 3, Issue 2, 2015, Pages 49-60]
-
Channel Coding
Quality enhancement of received video using secondary channel encoding in Joint Source and Channel Coding (JSCC) [Volume 3, Issue 2, 2015, Pages 29-48]
-
Charge Simulation Method
A New Method to Evaluate the Launch Pad Lightning Protection
System Performance by Using LPM in 3-D [Volume 3, Issue 1, 2015, Pages 15-27]
-
Classification
An Optimized Unsupervised Feature Selection Algorithm [Volume 3, Issue 3, 2015, Pages 1-7]
-
Combination of One-class Classifiers
Web-based Military Management Systems Security Using Combination of One-class Classifiers [Volume 3, Issue 3, 2015, Pages 19-30]
-
Computational operations
A Fast Method for Computation of Scalar Multiplication of Elliptic Curve Suitable for Elliptic Curve Cryptography System [Volume 3, Issue 3, 2015, Pages 9-17]
-
Constrained Optimization
Optimum Parameter Selection for Rainbow Table TMTO Attack Considering Breaking Time and Using Sequential and Index Search Methods [Volume 3, Issue 3, 2015, Pages 49-57]
-
Convolutional Code Constraint length
Sequential Decoding Algorithms of Convolutional Codes: Implementation, Improvement and Comparison [Volume 3, Issue 2, 2015, Pages 61-73]
-
Convolutional Codes
Sequential Decoding Algorithms of Convolutional Codes: Implementation, Improvement and Comparison [Volume 3, Issue 2, 2015, Pages 61-73]
-
Correlation
Defense Against Spoofing in GPS Receiver using Correlation and Least Mean Squares Method Based on Sign-Data Algorithm [Volume 3, Issue 4, 2015, Pages 11-22]
-
Credential
TNAC: A Novel Trust Negotiation Based Access Control Model Using XACML Architecture [Volume 3, Issue 1, 2015, Pages 53-67]
-
CSRF
Design the Model of CSRF Attack Tree for Immunization the Web Application in Development Process [Volume 3, Issue 1, 2015, Pages 41-52]
-
Cyber Attack
Projection of Muli Stage Cyber Attack Based on Belief Model and Fuzzy Inference [Volume 3, Issue 2, 2015, Pages 13-28]
-
Cyber Defense
Projection of Muli Stage Cyber Attack Based on Belief Model and Fuzzy Inference [Volume 3, Issue 2, 2015, Pages 13-28]
-
Cyclic Prefix
Blind Frequency Offset Estimation using Adaptive Algorithms in Non-Coherent OFDM Systems [Volume 3, Issue 4, 2015, Pages 61-70]
D
-
Detection
Detection of Spoofing Attack Based on Multi-Layer Neural Network in Single-Frequency GPS Receivers [Volume 3, Issue 1, 2015, Pages 69-80]
-
Detection
Defense Against Spoofing in GPS Receiver using Correlation and Least Mean Squares Method Based on Sign-Data Algorithm [Volume 3, Issue 4, 2015, Pages 11-22]
-
Doubleround(x) Function
An Efficient Visual Multi-Secret Sharing Scheme [Volume 3, Issue 4, 2015, Pages 1-9]
E
-
EAP Protocol
Secure and Fast Re-authentication Protocol to Support Extensive Movement of Users in IEEE 802.1X Wireless Networks [Volume 3, Issue 4, 2015, Pages 71-80]
-
Electronic voting
A Fast Method for Computation of Scalar Multiplication of Elliptic Curve Suitable for Elliptic Curve Cryptography System [Volume 3, Issue 3, 2015, Pages 9-17]
-
Elliptic Curve Cryptography
A Fast Method for Computation of Scalar Multiplication of Elliptic Curve Suitable for Elliptic Curve Cryptography System [Volume 3, Issue 3, 2015, Pages 9-17]
F
-
Fano Algorithm
Sequential Decoding Algorithms of Convolutional Codes: Implementation, Improvement and Comparison [Volume 3, Issue 2, 2015, Pages 61-73]
-
Feature Vector
An Optimized Unsupervised Feature Selection Algorithm [Volume 3, Issue 3, 2015, Pages 1-7]
-
Feature Vector Selection
An Optimized Unsupervised Feature Selection Algorithm [Volume 3, Issue 3, 2015, Pages 1-7]
-
Frequency Offset
Blind Frequency Offset Estimation using Adaptive Algorithms in Non-Coherent OFDM Systems [Volume 3, Issue 4, 2015, Pages 61-70]
-
Frequency-Selective Multipath Channel
Blind Frequency Offset Estimation using Adaptive Algorithms in Non-Coherent OFDM Systems [Volume 3, Issue 4, 2015, Pages 61-70]
-
Fuzzy Inference
Projection of Muli Stage Cyber Attack Based on Belief Model and Fuzzy Inference [Volume 3, Issue 2, 2015, Pages 13-28]
G
-
Generating Function
An Efficient Visual Multi-Secret Sharing Scheme [Volume 3, Issue 4, 2015, Pages 1-9]
-
GPS
Detection of Spoofing Attack Based on Multi-Layer Neural Network in Single-Frequency GPS Receivers [Volume 3, Issue 1, 2015, Pages 69-80]
-
GPS Spoofing
Defense Against Spoofing in GPS Receiver using Correlation and Least Mean Squares Method Based on Sign-Data Algorithm [Volume 3, Issue 4, 2015, Pages 11-22]
I
-
Image Compressing Standard
An Optimized Unsupervised Feature Selection Algorithm [Volume 3, Issue 3, 2015, Pages 1-7]
-
Index Search
Optimum Parameter Selection for Rainbow Table TMTO Attack Considering Breaking Time and Using Sequential and Index Search Methods [Volume 3, Issue 3, 2015, Pages 49-57]
-
Intrusion detection
Web-based Military Management Systems Security Using Combination of One-class Classifiers [Volume 3, Issue 3, 2015, Pages 19-30]
J
-
Joint channel and data detection
A New Method for Detection of Discrete Data Transmitted over Non-Linear Dynamic Wireless Channels [Volume 3, Issue 2, 2015, Pages 75-85]
L
-
Launch Pad
A New Method to Evaluate the Launch Pad Lightning Protection
System Performance by Using LPM in 3-D [Volume 3, Issue 1, 2015, Pages 15-27]
-
Leader Progression Model
A New Method to Evaluate the Launch Pad Lightning Protection
System Performance by Using LPM in 3-D [Volume 3, Issue 1, 2015, Pages 15-27]
-
LMS and Sign-Data Algorithm
Defense Against Spoofing in GPS Receiver using Correlation and Least Mean Squares Method Based on Sign-Data Algorithm [Volume 3, Issue 4, 2015, Pages 11-22]
M
-
Mean Squared Error
Blind Frequency Offset Estimation using Adaptive Algorithms in Non-Coherent OFDM Systems [Volume 3, Issue 4, 2015, Pages 61-70]
-
MIMO interference channel
Enhancing Communication Security in Cellular Communications Networks by using Interference Alignment Technique [Volume 3, Issue 2, 2015, Pages 49-60]
-
Mitigation
Defense Against Spoofing in GPS Receiver using Correlation and Least Mean Squares Method Based on Sign-Data Algorithm [Volume 3, Issue 4, 2015, Pages 11-22]
-
Multitarget tracking
On Improvement of Cardinalized Probability Hypothesis Density Filter Implementation by using Auxiliary Particle Filter [Volume 3, Issue 4, 2015, Pages 23-41]
N
-
Network Flow Analysis
Botnet Detection for Peer to Peer Networks [Volume 3, Issue 4, 2015, Pages 43-60]
-
Neural Networks
Increasing the Accuracy of Locating in Wireless Communication Systems Based on Neural Networks [Volume 3, Issue 3, 2015, Pages 31-38]
-
N-gram properties
Design the Model of CSRF Attack Tree for Immunization the Web Application in Development Process [Volume 3, Issue 1, 2015, Pages 41-52]
O
-
OFDM
Blind Frequency Offset Estimation using Adaptive Algorithms in Non-Coherent OFDM Systems [Volume 3, Issue 4, 2015, Pages 61-70]
P
-
Peer to Peer Botnet
Botnet Detection for Peer to Peer Networks [Volume 3, Issue 4, 2015, Pages 43-60]
-
Per survivor processing (PSP) Technique
A New Method for Detection of Discrete Data Transmitted over Non-Linear Dynamic Wireless Channels [Volume 3, Issue 2, 2015, Pages 75-85]
-
Port-Knocking
Phishing Website Detection for e-Banking by Inclined Planes Optimization Algorithm [Volume 3, Issue 1, 2015, Pages 29-39]
-
Port Security
Phishing Website Detection for e-Banking by Inclined Planes Optimization Algorithm [Volume 3, Issue 1, 2015, Pages 29-39]
-
Practical properties
Design the Model of CSRF Attack Tree for Immunization the Web Application in Development Process [Volume 3, Issue 1, 2015, Pages 41-52]
-
Probability hypothesis density filter
On Improvement of Cardinalized Probability Hypothesis Density Filter Implementation by using Auxiliary Particle Filter [Volume 3, Issue 4, 2015, Pages 23-41]
R
-
Random Finite Set
On Improvement of Cardinalized Probability Hypothesis Density Filter Implementation by using Auxiliary Particle Filter [Volume 3, Issue 4, 2015, Pages 23-41]
-
RFID Authentication Protocols
Weaknesses of SPRS Authentication Protocol and Present a Developed Protocol for RFID Systems [Volume 3, Issue 3, 2015, Pages 39-48]
S
-
Scalar Multiplication
A Fast Method for Computation of Scalar Multiplication of Elliptic Curve Suitable for Elliptic Curve Cryptography System [Volume 3, Issue 3, 2015, Pages 9-17]
-
Secret image
An Efficient Visual Multi-Secret Sharing Scheme [Volume 3, Issue 4, 2015, Pages 1-9]
-
Security and Privacy
Weaknesses of SPRS Authentication Protocol and Present a Developed Protocol for RFID Systems [Volume 3, Issue 3, 2015, Pages 39-48]
-
Security Policy
TNAC: A Novel Trust Negotiation Based Access Control Model Using XACML Architecture [Volume 3, Issue 1, 2015, Pages 53-67]
-
Sequential Decoding of Convolutional Codes
Sequential Decoding Algorithms of Convolutional Codes: Implementation, Improvement and Comparison [Volume 3, Issue 2, 2015, Pages 61-73]
-
Sequential Search
Optimum Parameter Selection for Rainbow Table TMTO Attack Considering Breaking Time and Using Sequential and Index Search Methods [Volume 3, Issue 3, 2015, Pages 49-57]
-
Service Security
Phishing Website Detection for e-Banking by Inclined Planes Optimization Algorithm [Volume 3, Issue 1, 2015, Pages 29-39]
-
Shadow image
An Efficient Visual Multi-Secret Sharing Scheme [Volume 3, Issue 4, 2015, Pages 1-9]
-
Situationa Awareness
Projection of Muli Stage Cyber Attack Based on Belief Model and Fuzzy Inference [Volume 3, Issue 2, 2015, Pages 13-28]
-
S-OWA Operator
Web-based Military Management Systems Security Using Combination of One-class Classifiers [Volume 3, Issue 3, 2015, Pages 19-30]
-
Spoofing Attack
Detection of Spoofing Attack Based on Multi-Layer Neural Network in Single-Frequency GPS Receivers [Volume 3, Issue 1, 2015, Pages 69-80]
-
SPRS Protocol
Weaknesses of SPRS Authentication Protocol and Present a Developed Protocol for RFID Systems [Volume 3, Issue 3, 2015, Pages 39-48]
-
Stack Algorithm
Sequential Decoding Algorithms of Convolutional Codes: Implementation, Improvement and Comparison [Volume 3, Issue 2, 2015, Pages 61-73]
-
Switching state space mode (SSSM)
A New Method for Detection of Discrete Data Transmitted over Non-Linear Dynamic Wireless Channels [Volume 3, Issue 2, 2015, Pages 75-85]
T
-
The EM approach
A New Method for Detection of Discrete Data Transmitted over Non-Linear Dynamic Wireless Channels [Volume 3, Issue 2, 2015, Pages 75-85]
-
The Viterbi algorithm
A New Method for Detection of Discrete Data Transmitted over Non-Linear Dynamic Wireless Channels [Volume 3, Issue 2, 2015, Pages 75-85]
-
Time-Memory Trade-Off (TMTO) Attack
Optimum Parameter Selection for Rainbow Table TMTO Attack Considering Breaking Time and Using Sequential and Index Search Methods [Volume 3, Issue 3, 2015, Pages 49-57]
-
Trust Negotiation
TNAC: A Novel Trust Negotiation Based Access Control Model Using XACML Architecture [Volume 3, Issue 1, 2015, Pages 53-67]
U
-
Upward leaders
A New Method to Evaluate the Launch Pad Lightning Protection
System Performance by Using LPM in 3-D [Volume 3, Issue 1, 2015, Pages 15-27]
V
-
VANET
An Improved Authentication Scheme with Conditional Privacy Preserving in VANETs [Volume 3, Issue 2, 2015, Pages 1-12]
-
Variable Bit Rate
Quality enhancement of received video using secondary channel encoding in Joint Source and Channel Coding (JSCC) [Volume 3, Issue 2, 2015, Pages 29-48]
-
Video Coding
Quality enhancement of received video using secondary channel encoding in Joint Source and Channel Coding (JSCC) [Volume 3, Issue 2, 2015, Pages 29-48]
-
Visual Multiple-Secret Sharing Scheme
An Efficient Visual Multi-Secret Sharing Scheme [Volume 3, Issue 4, 2015, Pages 1-9]
-
Viterbi Algorithm
Sequential Decoding Algorithms of Convolutional Codes: Implementation, Improvement and Comparison [Volume 3, Issue 2, 2015, Pages 61-73]
W
-
Web-Applications
Web-based Military Management Systems Security Using Combination of One-class Classifiers [Volume 3, Issue 3, 2015, Pages 19-30]
-
Wireless networks
Secure and Fast Re-authentication Protocol to Support Extensive Movement of Users in IEEE 802.1X Wireless Networks [Volume 3, Issue 4, 2015, Pages 71-80]
-
Wireless Networks Security
Secure and Fast Re-authentication Protocol to Support Extensive Movement of Users in IEEE 802.1X Wireless Networks [Volume 3, Issue 4, 2015, Pages 71-80]
X
-
XACML Architecture
TNAC: A Novel Trust Negotiation Based Access Control Model Using XACML Architecture [Volume 3, Issue 1, 2015, Pages 53-67]
Your query does not match with any item