Keyword Index

A

  • Adaptive Post-Processing An Integrated Algorithm for Optimal Detection of Weak Radar Targets Masked by the Sidelobes of a Strong Target [Volume 6, Issue 4, 2018, Pages 91-104]
  • Adaptive Pulse Compression An Integrated Algorithm for Optimal Detection of Weak Radar Targets Masked by the Sidelobes of a Strong Target [Volume 6, Issue 4, 2018, Pages 91-104]
  • Advanced Encryption Standard A New And Efficient Method of Mass Masking and its Resistance Assessment to Power Analysis [Volume 6, Issue 2, 2018, Pages 123-134]
  • Advanced Persistent Threats Detection of advanced Cyber Attacks, Using Behavior Modeling Based on Natural Language Processing [Volume 6, Issue 3, 2018, Pages 141-151]
  • Alert Management A Foresight Framework for Intrusion Response Systems in Computer Networks [Volume 6, Issue 3, 2018, Pages 13-34]
  • Anonymity A Mutual Anonymity Private Authentication Protocol to Use in Radio-Frequency Identification Systems [Volume 6, Issue 4, 2018, Pages 45-59]
  • Ant Colony Algorithm Sequential Forward Feature Selection for Intrusion Detection System, Using Ant Colony Algorithm [Volume 6, Issue 2, 2018, Pages 49-63]
  • Anti-analysis techniques An Effective Method to Detect Environment-Aware Malware Based on the Behavioral Distances Comparison [Volume 6, Issue 4, 2018, Pages 123-133]
  • Attack Ability A Decision-Making Model in a Cyber Conflicts Acted Upon Vulnerability, Based on Game Theoretic Analysis [Volume 6, Issue 2, 2018, Pages 21-28]
  • Autonomous Distributed System Self-stabilizing Grundy Coloring Using Game Theory and Heuristics Ordering [Volume 6, Issue 2, 2018, Pages 39-48]

B

  • Bayesian Network Target Threat Assessment using Rule-Based Joint Fuzzy and Probabilistic Networks [Volume 6, Issue 4, 2018, Pages 61-78]
  • Behavior Detection of advanced Cyber Attacks, Using Behavior Modeling Based on Natural Language Processing [Volume 6, Issue 3, 2018, Pages 141-151]
  • Behavioral Distance An Effective Method to Detect Environment-Aware Malware Based on the Behavioral Distances Comparison [Volume 6, Issue 4, 2018, Pages 123-133]
  • Bionic Signals Covert and Secure Underwater Acoustic Communication using Merkle Hash Tree and Dolphin Whistle [Volume 6, Issue 2, 2018, Pages 135-146]
  • Blind estimation of number of users Introduction of the Entropy-Based Method for Finding Influential Nodes in Information Dissemination on Online Social Networks [Volume 6, Issue 2, 2018, Pages 1-10]
  • Blind estimation of number of users Blind Estimation of Number of Users in TDMA Networks Using Redundancy of Adaptive Channel Coding [Volume 6, Issue 2, 2018, Pages 11-20]

C

  • Capability Projection of Cyber Attacks using Damage Estimation and Combination of Attacker’s Capability and Opportunity based on Transferable Belief Model [Volume 6, Issue 4, 2018, Pages 1-12]
  • Capacity Relating the Detection Rate, Capacity and the Cost of Steganography by Steganographer Modeling [Volume 6, Issue 3, 2018, Pages 81-94]
  • Cartesian Product Some New Bounds on the Information Ratio of the Cartesian Product of Some Classes of Graphs [Volume 6, Issue 4, 2018, Pages 135-142]
  • Cellular phone An Anti-Spam Framework for Advertising Targeting Smart Mobile Devices on IoT [Volume 6, Issue 2, 2018, Pages 65-81]
  • Centralized Daemon Self-stabilizing Grundy Coloring Using Game Theory and Heuristics Ordering [Volume 6, Issue 2, 2018, Pages 39-48]
  • Classification Improving Intrusion Detection System Using a New Feature Selection Technique [Volume 6, Issue 4, 2018, Pages 143-152]
  • Cloud service Hybrid Method for Detecting Trustworthy Cloud Service Providers using Analytical Hierarchical Process and Neural Network [Volume 6, Issue 4, 2018, Pages 105-122]
  • Cognitive Radio Technology Joint Spectrum Sensing and Power Allocation for Multiband Cognitive Radio Networks Using Probabilistic Spectrum Access [Volume 6, Issue 3, 2018, Pages 117-130]
  • Combat Management Systems Modelling and Solving the Location Problem of Fire Launching Sites [Volume 6, Issue 3, 2018, Pages 45-57]
  • Combat Management Systems Modelling and Solving the Location Problem of Fire Launching Sites [Volume 6, Issue 3, 2018, Pages 59-64]
  • Conditions Environment A New Method For Gradual Detection of Environmental Conditions and Resources Required by Smart Malware [Volume 6, Issue 4, 2018, Pages 33-44]
  • Covert and Secure UWAC Covert and Secure Underwater Acoustic Communication using Merkle Hash Tree and Dolphin Whistle [Volume 6, Issue 2, 2018, Pages 135-146]
  • Cryptography Non-Performance of Pearson Correlation Coefficient for Evaluating Image Encryption Security [Volume 6, Issue 2, 2018, Pages 83-91]
  • Cyber Attacks Detection of advanced Cyber Attacks, Using Behavior Modeling Based on Natural Language Processing [Volume 6, Issue 3, 2018, Pages 141-151]
  • Cyber Attacks Projection Projection of Cyber Attacks using Damage Estimation and Combination of Attacker’s Capability and Opportunity based on Transferable Belief Model [Volume 6, Issue 4, 2018, Pages 1-12]
  • Cyber Defence A Decision-Making Model in a Cyber Conflicts Acted Upon Vulnerability, Based on Game Theoretic Analysis [Volume 6, Issue 2, 2018, Pages 21-28]

D

  • Damage Estimation Projection of Cyber Attacks using Damage Estimation and Combination of Attacker’s Capability and Opportunity based on Transferable Belief Model [Volume 6, Issue 4, 2018, Pages 1-12]
  • Data Fusion Detection of advanced Cyber Attacks, Using Behavior Modeling Based on Natural Language Processing [Volume 6, Issue 3, 2018, Pages 141-151]
  • Data Mining Sequential Forward Feature Selection for Intrusion Detection System, Using Ant Colony Algorithm [Volume 6, Issue 2, 2018, Pages 49-63]
  • DDOS Detect Web Denial of Service Attacks Using Entropy and Support Vector Machine Algorithm [Volume 6, Issue 4, 2018, Pages 79-89]
  • Delay Lock Loop GPS Spoofing Mitigation using Adaptive Estimator in Tracking Loop [Volume 6, Issue 3, 2018, Pages 65-80]
  • Design Structure Matrix The Design Process Reform of the Gama-ray Imaging System by using the Design Structure Matrix [Volume 6, Issue 3, 2018, Pages 95-106]
  • Dolphin Whistle Covert and Secure Underwater Acoustic Communication using Merkle Hash Tree and Dolphin Whistle [Volume 6, Issue 2, 2018, Pages 135-146]

E

  • Eclipsing Pulse An Integrated Algorithm for Optimal Detection of Weak Radar Targets Masked by the Sidelobes of a Strong Target [Volume 6, Issue 4, 2018, Pages 91-104]
  • EGSO algorithm Providing a Method for the Optimal Detection of Software Testing Paths Using Meta-Algorithms [Volume 6, Issue 4, 2018, Pages 13-22]
  • Encryption Hierarchical Fuzzy Identity-Based Encryption [Volume 6, Issue 3, 2018, Pages 35-44]
  • Ensemble Learning Detection of Unknown Malicious Network Streams using Ensemble Learning [Volume 6, Issue 2, 2018, Pages 93-108]
  • Environment-aware malware An Effective Method to Detect Environment-Aware Malware Based on the Behavioral Distances Comparison [Volume 6, Issue 4, 2018, Pages 123-133]
  • Extended Kalman Filter Target Tracking Algorithm in Wireless Sensor Networks with Optimum Power Consumption Using Quantized Observation [Volume 6, Issue 2, 2018, Pages 109-121]

F

  • Fire launching sites Modelling and Solving the Location Problem of Fire Launching Sites [Volume 6, Issue 3, 2018, Pages 45-57]
  • Fire launching sites Modelling and Solving the Location Problem of Fire Launching Sites [Volume 6, Issue 3, 2018, Pages 59-64]
  • Foresight A Foresight Framework for Intrusion Response Systems in Computer Networks [Volume 6, Issue 3, 2018, Pages 13-34]
  • FPGA Implementation Design and Implementation of a Physically Unclonable Function on FPGA [Volume 6, Issue 4, 2018, Pages 23-32]
  • Fuzzy and Probabilistic uncertainty Target Threat Assessment using Rule-Based Joint Fuzzy and Probabilistic Networks [Volume 6, Issue 4, 2018, Pages 61-78]
  • Fuzzy Cognitive Map Target Threat Assessment using Rule-Based Joint Fuzzy and Probabilistic Networks [Volume 6, Issue 4, 2018, Pages 61-78]
  • Fuzzy Identity-Based Hierarchical Fuzzy Identity-Based Encryption [Volume 6, Issue 3, 2018, Pages 35-44]

G

  • Gama-Ray Imaging System The Design Process Reform of the Gama-ray Imaging System by using the Design Structure Matrix [Volume 6, Issue 3, 2018, Pages 95-106]
  • Game Theory A Decision-Making Model in a Cyber Conflicts Acted Upon Vulnerability, Based on Game Theoretic Analysis [Volume 6, Issue 2, 2018, Pages 21-28]
  • General Access Structure A Hash-Based Multi-Use Multi-Stage Secret Sharing Scheme with General Access Structure [Volume 6, Issue 3, 2018, Pages 107-115]
  • GPS Enhancing Vector Tracking Accuracy of GPS in Weak Signal Condition Based on Adaptive Strong Tracking Kalman Filter​ [Volume 6, Issue 3, 2018, Pages 1-12]
  • GPS Receiver GPS Spoofing Mitigation using Adaptive Estimator in Tracking Loop [Volume 6, Issue 3, 2018, Pages 65-80]

H

  • Hardware Security Design and Implementation of a Physically Unclonable Function on FPGA [Volume 6, Issue 4, 2018, Pages 23-32]
  • Hash Function A Hash-Based Multi-Use Multi-Stage Secret Sharing Scheme with General Access Structure [Volume 6, Issue 3, 2018, Pages 107-115]
  • Hierarchical Hierarchical Fuzzy Identity-Based Encryption [Volume 6, Issue 3, 2018, Pages 35-44]
  • Honeynet Detection of Unknown Malicious Network Streams using Ensemble Learning [Volume 6, Issue 2, 2018, Pages 93-108]

I

  • Image Encryption Non-Performance of Pearson Correlation Coefficient for Evaluating Image Encryption Security [Volume 6, Issue 2, 2018, Pages 83-91]
  • Imbalanced Data Detection of Unknown Malicious Network Streams using Ensemble Learning [Volume 6, Issue 2, 2018, Pages 93-108]
  • Information Index Non-Performance of Pearson Correlation Coefficient for Evaluating Image Encryption Security [Volume 6, Issue 2, 2018, Pages 83-91]
  • Information Ratio Some New Bounds on the Information Ratio of the Cartesian Product of Some Classes of Graphs [Volume 6, Issue 4, 2018, Pages 135-142]
  • Intelligence Mobile Advertising and Electronic Commerce An Anti-Spam Framework for Advertising Targeting Smart Mobile Devices on IoT [Volume 6, Issue 2, 2018, Pages 65-81]
  • Intrusion detection Improving Intrusion Detection System Using a New Feature Selection Technique [Volume 6, Issue 4, 2018, Pages 143-152]
  • Intrusion Detection System Sequential Forward Feature Selection for Intrusion Detection System, Using Ant Colony Algorithm [Volume 6, Issue 2, 2018, Pages 49-63]
  • Intrusion Response System A Foresight Framework for Intrusion Response Systems in Computer Networks [Volume 6, Issue 3, 2018, Pages 13-34]
  • IoT An Anti-Spam Framework for Advertising Targeting Smart Mobile Devices on IoT [Volume 6, Issue 2, 2018, Pages 65-81]

L

  • Location Modelling and Solving the Location Problem of Fire Launching Sites [Volume 6, Issue 3, 2018, Pages 45-57]
  • Location Modelling and Solving the Location Problem of Fire Launching Sites [Volume 6, Issue 3, 2018, Pages 59-64]

M

  • Machine Learning Introduction of the Entropy-Based Method for Finding Influential Nodes in Information Dissemination on Online Social Networks [Volume 6, Issue 2, 2018, Pages 1-10]
  • Machine Learning Blind Estimation of Number of Users in TDMA Networks Using Redundancy of Adaptive Channel Coding [Volume 6, Issue 2, 2018, Pages 11-20]
  • Malicious Attacks Covert and Secure Underwater Acoustic Communication using Merkle Hash Tree and Dolphin Whistle [Volume 6, Issue 2, 2018, Pages 135-146]
  • Malware A New Method For Gradual Detection of Environmental Conditions and Resources Required by Smart Malware [Volume 6, Issue 4, 2018, Pages 33-44]
  • Malware Analysis A New Method For Gradual Detection of Environmental Conditions and Resources Required by Smart Malware [Volume 6, Issue 4, 2018, Pages 33-44]
  • Malware Propagation Malware Propagation Modeling Considering Software Diversity Approach in Weighted Scale-Free Network [Volume 6, Issue 3, 2018, Pages 131-140]
  • Markov Decision Process A Foresight Framework for Intrusion Response Systems in Computer Networks [Volume 6, Issue 3, 2018, Pages 13-34]
  • Masking A New And Efficient Method of Mass Masking and its Resistance Assessment to Power Analysis [Volume 6, Issue 2, 2018, Pages 123-134]
  • Matched Filter An Integrated Algorithm for Optimal Detection of Weak Radar Targets Masked by the Sidelobes of a Strong Target [Volume 6, Issue 4, 2018, Pages 91-104]
  • Merkle Hash Tree Covert and Secure Underwater Acoustic Communication using Merkle Hash Tree and Dolphin Whistle [Volume 6, Issue 2, 2018, Pages 135-146]
  • Multi-stage A Hash-Based Multi-Use Multi-Stage Secret Sharing Scheme with General Access Structure [Volume 6, Issue 3, 2018, Pages 107-115]
  • Multi-use A Hash-Based Multi-Use Multi-Stage Secret Sharing Scheme with General Access Structure [Volume 6, Issue 3, 2018, Pages 107-115]
  • Mutual Authentication A Mutual Anonymity Private Authentication Protocol to Use in Radio-Frequency Identification Systems [Volume 6, Issue 4, 2018, Pages 45-59]

N

  • Narrow Band Correlator GPS Spoofing Mitigation using Adaptive Estimator in Tracking Loop [Volume 6, Issue 3, 2018, Pages 65-80]
  • Nash Equilibrium Self-stabilizing Grundy Coloring Using Game Theory and Heuristics Ordering [Volume 6, Issue 2, 2018, Pages 39-48]
  • Natural Language Processing Detection of advanced Cyber Attacks, Using Behavior Modeling Based on Natural Language Processing [Volume 6, Issue 3, 2018, Pages 141-151]
  • Network Dependency Graph A Foresight Framework for Intrusion Response Systems in Computer Networks [Volume 6, Issue 3, 2018, Pages 13-34]

O

  • One-knownsecret Attack A Hash-Based Multi-Use Multi-Stage Secret Sharing Scheme with General Access Structure [Volume 6, Issue 3, 2018, Pages 107-115]
  • Opportunity Projection of Cyber Attacks using Damage Estimation and Combination of Attacker’s Capability and Opportunity based on Transferable Belief Model [Volume 6, Issue 4, 2018, Pages 1-12]

P

  • Part Algorithm Sequential Forward Feature Selection for Intrusion Detection System, Using Ant Colony Algorithm [Volume 6, Issue 2, 2018, Pages 49-63]
  • Particle Fil-ter؛ Posterior Cramer-Rao Lower Bound Target Tracking Algorithm in Wireless Sensor Networks with Optimum Power Consumption Using Quantized Observation [Volume 6, Issue 2, 2018, Pages 109-121]
  • Pearson Correlation Coefficient Non-Performance of Pearson Correlation Coefficient for Evaluating Image Encryption Security [Volume 6, Issue 2, 2018, Pages 83-91]
  • Physically Unclonable Function Design and Implementation of a Physically Unclonable Function on FPGA [Volume 6, Issue 4, 2018, Pages 23-32]
  • Pixel Cost Relating the Detection Rate, Capacity and the Cost of Steganography by Steganographer Modeling [Volume 6, Issue 3, 2018, Pages 81-94]
  • Power Analysis Attacks A New And Efficient Method of Mass Masking and its Resistance Assessment to Power Analysis [Volume 6, Issue 2, 2018, Pages 123-134]
  • Privacy A Mutual Anonymity Private Authentication Protocol to Use in Radio-Frequency Identification Systems [Volume 6, Issue 4, 2018, Pages 45-59]
  • Probabilistic Spectrum Access Function Joint Spectrum Sensing and Power Allocation for Multiband Cognitive Radio Networks Using Probabilistic Spectrum Access [Volume 6, Issue 3, 2018, Pages 117-130]

Q

  • Quantization Target Tracking Algorithm in Wireless Sensor Networks with Optimum Power Consumption Using Quantized Observation [Volume 6, Issue 2, 2018, Pages 109-121]

R

  • Radio Resource Allocation Joint Spectrum Sensing and Power Allocation for Multiband Cognitive Radio Networks Using Probabilistic Spectrum Access [Volume 6, Issue 3, 2018, Pages 117-130]
  • Reiterative Minimum Mean Square Error An Integrated Algorithm for Optimal Detection of Weak Radar Targets Masked by the Sidelobes of a Strong Target [Volume 6, Issue 4, 2018, Pages 91-104]
  • RFID A Mutual Anonymity Private Authentication Protocol to Use in Radio-Frequency Identification Systems [Volume 6, Issue 4, 2018, Pages 45-59]
  • RFID (Radio Frequency Identification) An Anti-Spam Framework for Advertising Targeting Smart Mobile Devices on IoT [Volume 6, Issue 2, 2018, Pages 65-81]
  • Rules Target Threat Assessment using Rule-Based Joint Fuzzy and Probabilistic Networks [Volume 6, Issue 4, 2018, Pages 61-78]

S

  • Sandbox A New Method For Gradual Detection of Environmental Conditions and Resources Required by Smart Malware [Volume 6, Issue 4, 2018, Pages 33-44]
  • Secret Sharing Scheme A Hash-Based Multi-Use Multi-Stage Secret Sharing Scheme with General Access Structure [Volume 6, Issue 3, 2018, Pages 107-115]
  • Secret Sharing Scheme Some New Bounds on the Information Ratio of the Cartesian Product of Some Classes of Graphs [Volume 6, Issue 4, 2018, Pages 135-142]
  • Security in cyberspace Improving Intrusion Detection System Using a New Feature Selection Technique [Volume 6, Issue 4, 2018, Pages 143-152]
  • Situation Awareness Projection of Cyber Attacks using Damage Estimation and Combination of Attacker’s Capability and Opportunity based on Transferable Belief Model [Volume 6, Issue 4, 2018, Pages 1-12]
  • Smart Malware A New Method For Gradual Detection of Environmental Conditions and Resources Required by Smart Malware [Volume 6, Issue 4, 2018, Pages 33-44]
  • Software basis path Providing a Method for the Optimal Detection of Software Testing Paths Using Meta-Algorithms [Volume 6, Issue 4, 2018, Pages 13-22]
  • Software Diversity Malware Propagation Modeling Considering Software Diversity Approach in Weighted Scale-Free Network [Volume 6, Issue 3, 2018, Pages 131-140]
  • Spectrum Sensing Joint Spectrum Sensing and Power Allocation for Multiband Cognitive Radio Networks Using Probabilistic Spectrum Access [Volume 6, Issue 3, 2018, Pages 117-130]
  • Spoofing Attack GPS Spoofing Mitigation using Adaptive Estimator in Tracking Loop [Volume 6, Issue 3, 2018, Pages 65-80]
  • Statistical Detectability Relating the Detection Rate, Capacity and the Cost of Steganography by Steganographer Modeling [Volume 6, Issue 3, 2018, Pages 81-94]
  • Statistical Tests Detection of Unknown Malicious Network Streams using Ensemble Learning [Volume 6, Issue 2, 2018, Pages 93-108]
  • Steganalysis Model Relating the Detection Rate, Capacity and the Cost of Steganography by Steganographer Modeling [Volume 6, Issue 3, 2018, Pages 81-94]
  • Steganography Relating the Detection Rate, Capacity and the Cost of Steganography by Steganographer Modeling [Volume 6, Issue 3, 2018, Pages 81-94]
  • Strategy A Decision-Making Model in a Cyber Conflicts Acted Upon Vulnerability, Based on Game Theoretic Analysis [Volume 6, Issue 2, 2018, Pages 21-28]
  • Strong Tracking Kalman Filter Enhancing Vector Tracking Accuracy of GPS in Weak Signal Condition Based on Adaptive Strong Tracking Kalman Filter​ [Volume 6, Issue 3, 2018, Pages 1-12]
  • Support Vectore machin(SVM) Detect Web Denial of Service Attacks Using Entropy and Support Vector Machine Algorithm [Volume 6, Issue 4, 2018, Pages 79-89]
  • Support Vector Machines An Effective Method to Detect Environment-Aware Malware Based on the Behavioral Distances Comparison [Volume 6, Issue 4, 2018, Pages 123-133]
  • Systematic Design Process The Design Process Reform of the Gama-ray Imaging System by using the Design Structure Matrix [Volume 6, Issue 3, 2018, Pages 95-106]
  • System call An Effective Method to Detect Environment-Aware Malware Based on the Behavioral Distances Comparison [Volume 6, Issue 4, 2018, Pages 123-133]

T

  • Target Tracking Target Tracking Algorithm in Wireless Sensor Networks with Optimum Power Consumption Using Quantized Observation [Volume 6, Issue 2, 2018, Pages 109-121]
  • TDMA networks Introduction of the Entropy-Based Method for Finding Influential Nodes in Information Dissemination on Online Social Networks [Volume 6, Issue 2, 2018, Pages 1-10]
  • TDMA networks Blind Estimation of Number of Users in TDMA Networks Using Redundancy of Adaptive Channel Coding [Volume 6, Issue 2, 2018, Pages 11-20]
  • Threat assessment Target Threat Assessment using Rule-Based Joint Fuzzy and Probabilistic Networks [Volume 6, Issue 4, 2018, Pages 61-78]
  • Topic Models Relating the Detection Rate, Capacity and the Cost of Steganography by Steganographer Modeling [Volume 6, Issue 3, 2018, Pages 81-94]
  • Transferable Belief Model Projection of Cyber Attacks using Damage Estimation and Combination of Attacker’s Capability and Opportunity based on Transferable Belief Model [Volume 6, Issue 4, 2018, Pages 1-12]
  • Transient Fault Self-stabilizing Grundy Coloring Using Game Theory and Heuristics Ordering [Volume 6, Issue 2, 2018, Pages 39-48]
  • Trust Hybrid Method for Detecting Trustworthy Cloud Service Providers using Analytical Hierarchical Process and Neural Network [Volume 6, Issue 4, 2018, Pages 105-122]
  • T-Test Analysis A New And Efficient Method of Mass Masking and its Resistance Assessment to Power Analysis [Volume 6, Issue 2, 2018, Pages 123-134]

U

  • Uncertainty-aware Attack Graph A Foresight Framework for Intrusion Response Systems in Computer Networks [Volume 6, Issue 3, 2018, Pages 13-34]
  • Unknown Attacks Detection of Unknown Malicious Network Streams using Ensemble Learning [Volume 6, Issue 2, 2018, Pages 93-108]

V

  • Validation criteria Target Threat Assessment using Rule-Based Joint Fuzzy and Probabilistic Networks [Volume 6, Issue 4, 2018, Pages 61-78]
  • Variance Detect Web Denial of Service Attacks Using Entropy and Support Vector Machine Algorithm [Volume 6, Issue 4, 2018, Pages 79-89]
  • Vector Tracking Enhancing Vector Tracking Accuracy of GPS in Weak Signal Condition Based on Adaptive Strong Tracking Kalman Filter​ [Volume 6, Issue 3, 2018, Pages 1-12]
  • Vulnerability A Decision-Making Model in a Cyber Conflicts Acted Upon Vulnerability, Based on Game Theoretic Analysis [Volume 6, Issue 2, 2018, Pages 21-28]

W

  • Weak Signal Enhancing Vector Tracking Accuracy of GPS in Weak Signal Condition Based on Adaptive Strong Tracking Kalman Filter​ [Volume 6, Issue 3, 2018, Pages 1-12]
  • Weighted Scale-Free Network Malware Propagation Modeling Considering Software Diversity Approach in Weighted Scale-Free Network [Volume 6, Issue 3, 2018, Pages 131-140]
  • Weighted Voting Detection of Unknown Malicious Network Streams using Ensemble Learning [Volume 6, Issue 2, 2018, Pages 93-108]
  • Wireless Sensor Network Target Tracking Algorithm in Wireless Sensor Networks with Optimum Power Consumption Using Quantized Observation [Volume 6, Issue 2, 2018, Pages 109-121]