A
-
Adaptive Kalman Filter
Three-Dimensional Angles Measurement using IME based on MEMS Technology by Adaptive Kalman Filter [Volume 7, Issue 2, 2019, Pages 81-91]
-
Adaptive Power And Modulation
Performance Analysis of Free Space Optical Communication Links under M-PAM and M-PSK Modulations using Adaptive Power and Modulation Techniques [Volume 7, Issue 1, 2019, Pages 63-75]
-
Adaptive UKF
High Maneuvering Target Tracking Based on Augmented State Method using Adaptive Unscented Kalman Filter [Volume 7, Issue 2, 2019, Pages 93-108]
-
Advanced Encryption Standard
A Practical Template Attack Against the Implementation of the Advanced Encryption Standard on ARM Processor [Volume 7, Issue 1, 2019, Pages 39-48]
-
AKA Procedure
Analyzing Security Challenges of LTE Networks, Obstacles and Opportunities of Network Localization
Based on the Standard Platform [Volume 7, Issue 2, 2019, Pages 121-132]
-
AL-OFDM
Identification of STBC-OFDM Signals by Second-Order Cyclostationarity Method [Volume 7, Issue 4, 2019, Pages 27-36]
-
Anonymity
A new attack on Jakobsson Hybrid Mix-Net [Volume 7, Issue 3, 2019, Pages 113-119]
-
Approximate Dual
Finite Frame as Code: Some Characterizations for Error Correction Codes and Three Algorithms for Troubleshooting in Data Transfer [Volume 7, Issue 2, 2019, Pages 1-12]
-
Area Coverage
Optimal Placement of Cameras to Maximize Visual Coverage using Genetic Algorithm and Harmony Search [Volume 7, Issue 1, 2019, Pages 49-61]
-
ARM Microprocessor
A Practical Template Attack Against the Implementation of the Advanced Encryption Standard on ARM Processor [Volume 7, Issue 1, 2019, Pages 39-48]
-
Atmospheric Turbulence
Performance Analysis of Free Space Optical Communication Links under M-PAM and M-PSK Modulations using Adaptive Power and Modulation Techniques [Volume 7, Issue 1, 2019, Pages 63-75]
-
Attack Graph
Deterrence Model in Cyberspace Based on Bayesian Belief Attack Graph by using Risk Creating Payoff Function [Volume 7, Issue 1, 2019, Pages 25-38]
-
Augmented State Approac
High Maneuvering Target Tracking Based on Augmented State Method using Adaptive Unscented Kalman Filter [Volume 7, Issue 2, 2019, Pages 93-108]
-
Authentication
A Scheme for Improvement of Security and Privacy in Mobile Health Systems by Using SIM Card [Volume 7, Issue 1, 2019, Pages 11-24]
-
Authentication
A New Method for Image Steganography Using Discrete Wavelet Transforms [Volume 7, Issue 3, 2019, Pages 83-91]
B
-
Beamforming
Robust Adaptive Beamforming Against Interferer’s Direction Of Arrival Estimation Error [Volume 7, Issue 3, 2019, Pages 27-36]
-
Biometrics
Offline text-Independent Persian handwriting Forgery Detection using Texture Analysis [Volume 7, Issue 3, 2019, Pages 37-52]
-
Block Cipher
Analysis of Impossible Differential on LowMC Block Cipher [Volume 7, Issue 2, 2019, Pages 69-79]
-
Block Cipher
Structural Analysis based on Integral Characteristic of a Reduced Round Block Cipher with Making an Improvement [Volume 7, Issue 3, 2019, Pages 1-8]
-
Botnet
The Distributed Denial of Service Attacks Situation Awareness Based on The Prediction of Battle Scene Using Dempster-Shefer Evidences Theories and Bayesian Rules [Volume 7, Issue 1, 2019, Pages 77-94]
-
Botnet
Detecting Botnets with Timing-Based Covert Command and Control Channels [Volume 7, Issue 4, 2019, Pages 1-15]
C
-
Closed Circuit Television (CCTV)
Optimal Placement of Cameras to Maximize Visual Coverage using Genetic Algorithm and Harmony Search [Volume 7, Issue 1, 2019, Pages 49-61]
-
Collective Classification
Collusive Fraud Classification in Network of Online Auction Using Similarity Measure in Collective Classification [Volume 7, Issue 1, 2019, Pages 95-103]
-
Communication delay
Guidance and distributed control of the networked UAVs [Volume 7, Issue 4, 2019, Pages 117-129]
-
Communication systems
Guidance and distributed control of the networked UAVs [Volume 7, Issue 4, 2019, Pages 117-129]
-
Complex War Scenes
The Presentation of a Model for Analyzing the Behavior of the Enemy Using Hidden Markov Models Based on Electronic Warfare Observations in Complex War Scenes [Volume 7, Issue 1, 2019, Pages 113-128]
-
Corrected Conditional entropy
Detecting Botnets with Timing-Based Covert Command and Control Channels [Volume 7, Issue 4, 2019, Pages 1-15]
-
Cover
Increasing Insertion Capacity and Resistance in Image Steganography Based on Mapping and Bits Reduction [Volume 7, Issue 2, 2019, Pages 33-39]
-
Covert Channel
Detecting Botnets with Timing-Based Covert Command and Control Channels [Volume 7, Issue 4, 2019, Pages 1-15]
-
Covert Timming Channel
Detecting Botnets with Timing-Based Covert Command and Control Channels [Volume 7, Issue 4, 2019, Pages 1-15]
-
CRLB
A Novel Algorithm for Radar Jamming Resource Allocation [Volume 7, Issue 3, 2019, Pages 53-70]
-
Cryptanalysis
Analysis of Impossible Differential on LowMC Block Cipher [Volume 7, Issue 2, 2019, Pages 69-79]
-
Cryptography
A New Method for Image Steganography Using Discrete Wavelet Transforms [Volume 7, Issue 3, 2019, Pages 83-91]
-
Customization
Analyzing Security Challenges of LTE Networks, Obstacles and Opportunities of Network Localization
Based on the Standard Platform [Volume 7, Issue 2, 2019, Pages 121-132]
-
Cyber-Attacks
An Improved Method of Incident Detection due to Cyber Attacks [Volume 7, Issue 4, 2019, Pages 105-116]
-
Cyber Security Analysis
A New Method for Image Steganography Using Discrete Wavelet Transforms [Volume 7, Issue 4, 2019, Pages 79-89]
-
Cyberspace
Deterrence Model in Cyberspace Based on Bayesian Belief Attack Graph by using Risk Creating Payoff Function [Volume 7, Issue 1, 2019, Pages 25-38]
-
Cyber Space
Effects of Cyber Threats in IT Projects Using the Fuzzy Cognitive Mapping Approach [Volume 7, Issue 2, 2019, Pages 41-51]
-
Cyber Threats
Effects of Cyber Threats in IT Projects Using the Fuzzy Cognitive Mapping Approach [Volume 7, Issue 2, 2019, Pages 41-51]
-
Cyclostationarity
Identification of STBC-OFDM Signals by Second-Order Cyclostationarity Method [Volume 7, Issue 4, 2019, Pages 27-36]
D
-
Data Mining
Smart Detection of Covert Worms in Computer Networks [Volume 7, Issue 4, 2019, Pages 67-77]
-
Decision-making Process
The Presentation of a Model for Analyzing the Behavior of the Enemy Using Hidden Markov Models Based on Electronic Warfare Observations in Complex War Scenes [Volume 7, Issue 1, 2019, Pages 113-128]
-
Decoding
Finite Frame as Code: Some Characterizations for Error Correction Codes and Three Algorithms for Troubleshooting in Data Transfer [Volume 7, Issue 2, 2019, Pages 1-12]
-
DEMATEL-Based Analytic Network Process (DANP)
The Course of Action Selection Model in Network Centric Operation [Volume 7, Issue 2, 2019, Pages 133-155]
-
DEMATEL method
Evaluation of Network-Based Operation Criteria Based on DEMATEL Method [Volume 7, Issue 1, 2019, Pages 139-153]
-
Dempster-Shefer Evidences Theory
The Distributed Denial of Service Attacks Situation Awareness Based on The Prediction of Battle Scene Using Dempster-Shefer Evidences Theories and Bayesian Rules [Volume 7, Issue 1, 2019, Pages 77-94]
-
Detector
Smart Detection of Covert Worms in Computer Networks [Volume 7, Issue 4, 2019, Pages 67-77]
-
Distributed command and control
Guidance and distributed control of the networked UAVs [Volume 7, Issue 4, 2019, Pages 117-129]
-
Distributed Denial of Service
The Distributed Denial of Service Attacks Situation Awareness Based on The Prediction of Battle Scene Using Dempster-Shefer Evidences Theories and Bayesian Rules [Volume 7, Issue 1, 2019, Pages 77-94]
-
Distributed Simulation
A Software System for Large-Scale Simulation of Malware Propagation
in Computer Networks [Volume 7, Issue 2, 2019, Pages 53-67]
-
DOA estimation error
Robust Adaptive Beamforming Against Interferer’s Direction Of Arrival Estimation Error [Volume 7, Issue 3, 2019, Pages 27-36]
-
Double-slit Experiment
A New Approach for Estimating the Rate of Emission in Quantum Bit Exchange Systems Using Binomial Distribution [Volume 7, Issue 1, 2019, Pages 105-112]
-
Dynamic Differential Logic
Side-Channel Attack Resistance Approaches Through Dynamic Differential Logic [Volume 7, Issue 3, 2019, Pages 93-104]
E
-
Edge dominating set
Generating Tree Decomposition of Graphs with Imperialist Competitive Algorithm for Use in Secret Sharing Scheme [Volume 7, Issue 3, 2019, Pages 105-111]
-
Effective Base Approach
Evaluation of Network-Based Operation Criteria Based on DEMATEL Method [Volume 7, Issue 1, 2019, Pages 139-153]
-
Electronic Warfare
The Presentation of a Model for Analyzing the Behavior of the Enemy Using Hidden Markov Models Based on Electronic Warfare Observations in Complex War Scenes [Volume 7, Issue 1, 2019, Pages 113-128]
-
Embed Capacity
Increasing Insertion Capacity and Resistance in Image Steganography Based on Mapping and Bits Reduction [Volume 7, Issue 2, 2019, Pages 33-39]
-
Encoding
Finite Frame as Code: Some Characterizations for Error Correction Codes and Three Algorithms for Troubleshooting in Data Transfer [Volume 7, Issue 2, 2019, Pages 1-12]
-
Enemy’s Behavior Analysis Model
The Presentation of a Model for Analyzing the Behavior of the Enemy Using Hidden Markov Models Based on Electronic Warfare Observations in Complex War Scenes [Volume 7, Issue 1, 2019, Pages 113-128]
-
Epidemic Phenomena Modeling
A Software System for Large-Scale Simulation of Malware Propagation
in Computer Networks [Volume 7, Issue 2, 2019, Pages 53-67]
-
ESM
Robust Adaptive Beamforming Against Interferer’s Direction Of Arrival Estimation Error [Volume 7, Issue 3, 2019, Pages 27-36]
-
Expert
The Distributed Denial of Service Attacks Situation Awareness Based on The Prediction of Battle Scene Using Dempster-Shefer Evidences Theories and Bayesian Rules [Volume 7, Issue 1, 2019, Pages 77-94]
F
-
Fourth Generation (4G) Mobile Network
Analyzing Security Challenges of LTE Networks, Obstacles and Opportunities of Network Localization
Based on the Standard Platform [Volume 7, Issue 2, 2019, Pages 121-132]
-
FPGA Implementation
Design and Production of Hardware Authentication Code Using Physically Unclonable Functions and a Random Number Generator on FPGA [Volume 7, Issue 4, 2019, Pages 37-50]
-
Frame
Finite Frame as Code: Some Characterizations for Error Correction Codes and Three Algorithms for Troubleshooting in Data Transfer [Volume 7, Issue 2, 2019, Pages 1-12]
-
Free-Space Optical Communications (FSO)
Performance Analysis of Free Space Optical Communication Links under M-PAM and M-PSK Modulations using Adaptive Power and Modulation Techniques [Volume 7, Issue 1, 2019, Pages 63-75]
-
Fuzzy Cognitive Map
Effects of Cyber Threats in IT Projects Using the Fuzzy Cognitive Mapping Approach [Volume 7, Issue 2, 2019, Pages 41-51]
G
-
Graph Anonymization
An Improved Method for Graph Data Anonymization with Emphasis on Preserving the Average Path length [Volume 7, Issue 2, 2019, Pages 25-32]
H
-
Hard and Soft Data Fusion
A New Method for Image Steganography Using Discrete Wavelet Transforms [Volume 7, Issue 4, 2019, Pages 79-89]
-
Hardware Chips
Side Channel Analysis of International Data Encryption Algorithm (IDEA) [Volume 7, Issue 4, 2019, Pages 51-57]
-
Hardware Security
Design and Production of Hardware Authentication Code Using Physically Unclonable Functions and a Random Number Generator on FPGA [Volume 7, Issue 4, 2019, Pages 37-50]
-
Harmony search algorithm
Optimal Placement of Cameras to Maximize Visual Coverage using Genetic Algorithm and Harmony Search [Volume 7, Issue 1, 2019, Pages 49-61]
-
Hidden Markov Models
The Presentation of a Model for Analyzing the Behavior of the Enemy Using Hidden Markov Models Based on Electronic Warfare Observations in Complex War Scenes [Volume 7, Issue 1, 2019, Pages 113-128]
-
High Maneuvering Target Tracking
High Maneuvering Target Tracking Based on Augmented State Method using Adaptive Unscented Kalman Filter [Volume 7, Issue 2, 2019, Pages 93-108]
-
Hybrid cloud
Secure and confidential workflow scheduling in hybrid cloud using improved particle swarm optimization algorithm [Volume 7, Issue 4, 2019, Pages 131-145]
I
-
IEEE 802.15.4
Enhance Media Access Control in IEEE 802.15.4 Based Smart Grids using Swarm Intelligence Algorithms [Volume 7, Issue 3, 2019, Pages 9-20]
-
Image authentication
Detection of Median Filtering Manipulation in Compressed Images [Volume 7, Issue 3, 2019, Pages 121-129]
-
Image Forensics
Detection of Median Filtering Manipulation in Compressed Images [Volume 7, Issue 3, 2019, Pages 121-129]
-
Imperialist Competitive Algorithm (ICA)
Generating Tree Decomposition of Graphs with Imperialist Competitive Algorithm for Use in Secret Sharing Scheme [Volume 7, Issue 3, 2019, Pages 105-111]
-
Impossible Differential Attack
Analysis of Impossible Differential on LowMC Block Cipher [Volume 7, Issue 2, 2019, Pages 69-79]
-
IMU
Three-Dimensional Angles Measurement using IME based on MEMS Technology by Adaptive Kalman Filter [Volume 7, Issue 2, 2019, Pages 81-91]
-
Industrial Control Systems Security
Prioritizing Obstacles to Industrial Control Systems Security Management Implementation, using Interpretive Structural Modeling (ISM) Approach [Volume 7, Issue 2, 2019, Pages 109-119]
-
Information Hiding
Side-Channel Attack Resistance Approaches Through Dynamic Differential Logic [Volume 7, Issue 3, 2019, Pages 93-104]
-
Information Technology Project
Effects of Cyber Threats in IT Projects Using the Fuzzy Cognitive Mapping Approach [Volume 7, Issue 2, 2019, Pages 41-51]
-
Integral characteristic
Structural Analysis based on Integral Characteristic of a Reduced Round Block Cipher with Making an Improvement [Volume 7, Issue 3, 2019, Pages 1-8]
-
International Data Encryption Algorithm (IDEA)
Side Channel Analysis of International Data Encryption Algorithm (IDEA) [Volume 7, Issue 4, 2019, Pages 51-57]
-
Intra-pulse modulation
Intra-pulse Modulation Recognition Using Time-Frequency Features Based on Modified-B Distribution [Volume 7, Issue 1, 2019, Pages 129-138]
K
-
Key Management
Analyzing Security Challenges of LTE Networks, Obstacles and Opportunities of Network Localization
Based on the Standard Platform [Volume 7, Issue 2, 2019, Pages 121-132]
-
Key Rate
A New Approach for Estimating the Rate of Emission in Quantum Bit Exchange Systems Using Binomial Distribution [Volume 7, Issue 1, 2019, Pages 105-112]
L
-
L1-norm
Collusive Fraud Classification in Network of Online Auction Using Similarity Measure in Collective Classification [Volume 7, Issue 1, 2019, Pages 95-103]
-
Localization Systems
A Novel Algorithm for Radar Jamming Resource Allocation [Volume 7, Issue 3, 2019, Pages 53-70]
-
Loopy Belief Propagation
Collusive Fraud Classification in Network of Online Auction Using Similarity Measure in Collective Classification [Volume 7, Issue 1, 2019, Pages 95-103]
-
Low-distortion Topology
Optimal Design of Low-power High-resolution Unity-STF S-MASH Sigma Delta Modulator for Telecommunication Applications [Volume 7, Issue 2, 2019, Pages 13-24]
-
LowMC Block Cipher
Analysis of Impossible Differential on LowMC Block Cipher [Volume 7, Issue 2, 2019, Pages 69-79]
-
LTE Network
Analyzing Security Challenges of LTE Networks, Obstacles and Opportunities of Network Localization
Based on the Standard Platform [Volume 7, Issue 2, 2019, Pages 121-132]
M
-
Machine Intelligence
A Practical Template Attack Against the Implementation of the Advanced Encryption Standard on ARM Processor [Volume 7, Issue 1, 2019, Pages 39-48]
-
Malware Propagation
A Software System for Large-Scale Simulation of Malware Propagation
in Computer Networks [Volume 7, Issue 2, 2019, Pages 53-67]
-
Markov Random Field
Collusive Fraud Classification in Network of Online Auction Using Similarity Measure in Collective Classification [Volume 7, Issue 1, 2019, Pages 95-103]
-
Matrix
Finite Frame as Code: Some Characterizations for Error Correction Codes and Three Algorithms for Troubleshooting in Data Transfer [Volume 7, Issue 2, 2019, Pages 1-12]
-
Media Access Control
Enhance Media Access Control in IEEE 802.15.4 Based Smart Grids using Swarm Intelligence Algorithms [Volume 7, Issue 3, 2019, Pages 9-20]
-
Median filter
Detection of Median Filtering Manipulation in Compressed Images [Volume 7, Issue 3, 2019, Pages 121-129]
-
MEMS
Three-Dimensional Angles Measurement using IME based on MEMS Technology by Adaptive Kalman Filter [Volume 7, Issue 2, 2019, Pages 81-91]
-
MICMAC
Prioritizing Obstacles to Industrial Control Systems Security Management Implementation, using Interpretive Structural Modeling (ISM) Approach [Volume 7, Issue 2, 2019, Pages 109-119]
-
MIMO
Identification of STBC-OFDM Signals by Second-Order Cyclostationarity Method [Volume 7, Issue 4, 2019, Pages 27-36]
-
Mobile Health
A Scheme for Improvement of Security and Privacy in Mobile Health Systems by Using SIM Card [Volume 7, Issue 1, 2019, Pages 11-24]
-
Mobile AD hoc Networks
Performance Improvement of the ODMRP Protocol using Analysis of the Received Signal Strength Level [Volume 7, Issue 3, 2019, Pages 21-26]
-
Modified-B distribution
Intra-pulse Modulation Recognition Using Time-Frequency Features Based on Modified-B Distribution [Volume 7, Issue 1, 2019, Pages 129-138]
-
Multi-Criteria Decision Making
Evaluation of Network-Based Operation Criteria Based on DEMATEL Method [Volume 7, Issue 1, 2019, Pages 139-153]
-
Multiple-Criteria/Attribute Decision-making
The Course of Action Selection Model in Network Centric Operation [Volume 7, Issue 2, 2019, Pages 133-155]
N
-
Network Attack
A Trust Model Based on Swarm Intelligence Algorithms in WSNs [Volume 7, Issue 1, 2019, Pages 1-10]
-
Network Centric Operation
The Course of Action Selection Model in Network Centric Operation [Volume 7, Issue 2, 2019, Pages 133-155]
-
Network-centric warfare
Evaluation of Network-Based Operation Criteria Based on DEMATEL Method [Volume 7, Issue 1, 2019, Pages 139-153]
-
Networked UAVs
Guidance and distributed control of the networked UAVs [Volume 7, Issue 4, 2019, Pages 117-129]
-
Network Forensics
Improving Payload Attribution Techniques in Computer Network Criminology with Time based Hierarchical Bloom Filter [Volume 7, Issue 3, 2019, Pages 71-81]
O
-
Obstacles to Implementing Security
Prioritizing Obstacles to Industrial Control Systems Security Management Implementation, using Interpretive Structural Modeling (ISM) Approach [Volume 7, Issue 2, 2019, Pages 109-119]
-
ODMRP protocol
Performance Improvement of the ODMRP Protocol using Analysis of the Received Signal Strength Level [Volume 7, Issue 3, 2019, Pages 21-26]
-
OFDM
Identification of STBC-OFDM Signals by Second-Order Cyclostationarity Method [Volume 7, Issue 4, 2019, Pages 27-36]
-
Ontology
A New Method for Image Steganography Using Discrete Wavelet Transforms [Volume 7, Issue 4, 2019, Pages 79-89]
-
Operator
Finite Frame as Code: Some Characterizations for Error Correction Codes and Three Algorithms for Troubleshooting in Data Transfer [Volume 7, Issue 2, 2019, Pages 1-12]
-
Optimization
Guidance and distributed control of the networked UAVs [Volume 7, Issue 4, 2019, Pages 117-129]
-
Overselling
A New Approach for Estimating the Rate of Emission in Quantum Bit Exchange Systems Using Binomial Distribution [Volume 7, Issue 1, 2019, Pages 105-112]
P
-
Payload Attribution
Improving Payload Attribution Techniques in Computer Network Criminology with Time based Hierarchical Bloom Filter [Volume 7, Issue 3, 2019, Pages 71-81]
-
Personal Data
An Improved Method for Graph Data Anonymization with Emphasis on Preserving the Average Path length [Volume 7, Issue 2, 2019, Pages 25-32]
-
Phase Shift Keying Modulation (PSK)
Performance Analysis of Free Space Optical Communication Links under M-PAM and M-PSK Modulations using Adaptive Power and Modulation Techniques [Volume 7, Issue 1, 2019, Pages 63-75]
-
Physically Unclonable Function
Design and Production of Hardware Authentication Code Using Physically Unclonable Functions and a Random Number Generator on FPGA [Volume 7, Issue 4, 2019, Pages 37-50]
-
PIC Microcontroller
Side Channel Analysis of International Data Encryption Algorithm (IDEA) [Volume 7, Issue 4, 2019, Pages 51-57]
-
Privacy
A Scheme for Improvement of Security and Privacy in Mobile Health Systems by Using SIM Card [Volume 7, Issue 1, 2019, Pages 11-24]
-
Privacy
An Improved Method for Graph Data Anonymization with Emphasis on Preserving the Average Path length [Volume 7, Issue 2, 2019, Pages 25-32]
-
Probability of successful recognition
Intra-pulse Modulation Recognition Using Time-Frequency Features Based on Modified-B Distribution [Volume 7, Issue 1, 2019, Pages 129-138]
-
Projection of Future
The Distributed Denial of Service Attacks Situation Awareness Based on The Prediction of Battle Scene Using Dempster-Shefer Evidences Theories and Bayesian Rules [Volume 7, Issue 1, 2019, Pages 77-94]
-
Pulse Amplitude Modulation (PAM)
Performance Analysis of Free Space Optical Communication Links under M-PAM and M-PSK Modulations using Adaptive Power and Modulation Techniques [Volume 7, Issue 1, 2019, Pages 63-75]
Q
-
Quantum Key Distribution
A New Approach for Estimating the Rate of Emission in Quantum Bit Exchange Systems Using Binomial Distribution [Volume 7, Issue 1, 2019, Pages 105-112]
R
-
Random Number Generator
Design and Production of Hardware Authentication Code Using Physically Unclonable Functions and a Random Number Generator on FPGA [Volume 7, Issue 4, 2019, Pages 37-50]
-
Rate of Emission
A New Approach for Estimating the Rate of Emission in Quantum Bit Exchange Systems Using Binomial Distribution [Volume 7, Issue 1, 2019, Pages 105-112]
-
Real-time
An Improved Method of Incident Detection due to Cyber Attacks [Volume 7, Issue 4, 2019, Pages 105-116]
-
Reconfigurable Chips
Side-Channel Attack Resistance Approaches Through Dynamic Differential Logic [Volume 7, Issue 3, 2019, Pages 93-104]
-
Resistance
Increasing Insertion Capacity and Resistance in Image Steganography Based on Mapping and Bits Reduction [Volume 7, Issue 2, 2019, Pages 33-39]
-
Resource Allocation
A Novel Algorithm for Radar Jamming Resource Allocation [Volume 7, Issue 3, 2019, Pages 53-70]
-
Risk Creating Payoff Function
Deterrence Model in Cyberspace Based on Bayesian Belief Attack Graph by using Risk Creating Payoff Function [Volume 7, Issue 1, 2019, Pages 25-38]
-
Routing protocols
Performance Improvement of the ODMRP Protocol using Analysis of the Received Signal Strength Level [Volume 7, Issue 3, 2019, Pages 21-26]
S
-
Scan
Smart Detection of Covert Worms in Computer Networks [Volume 7, Issue 4, 2019, Pages 67-77]
-
Secret Sharing
Generating Tree Decomposition of Graphs with Imperialist Competitive Algorithm for Use in Secret Sharing Scheme [Volume 7, Issue 3, 2019, Pages 105-111]
-
Secret Sharing
A new attack on Jakobsson Hybrid Mix-Net [Volume 7, Issue 3, 2019, Pages 113-119]
-
Security Operation Center
An Improved Method of Incident Detection due to Cyber Attacks [Volume 7, Issue 4, 2019, Pages 105-116]
-
Security requirements of task and data
Secure and confidential workflow scheduling in hybrid cloud using improved particle swarm optimization algorithm [Volume 7, Issue 4, 2019, Pages 131-145]
-
Security strength of resource and communication paths
Secure and confidential workflow scheduling in hybrid cloud using improved particle swarm optimization algorithm [Volume 7, Issue 4, 2019, Pages 131-145]
-
Sensor Fusion
Three-Dimensional Angles Measurement using IME based on MEMS Technology by Adaptive Kalman Filter [Volume 7, Issue 2, 2019, Pages 81-91]
-
Side Channel Attack
Side-Channel Attack Resistance Approaches Through Dynamic Differential Logic [Volume 7, Issue 3, 2019, Pages 93-104]
-
Side Channel Attacks
Side Channel Analysis of International Data Encryption Algorithm (IDEA) [Volume 7, Issue 4, 2019, Pages 51-57]
-
Sigma Delta Modulator
Optimal Design of Low-power High-resolution Unity-STF S-MASH Sigma Delta Modulator for Telecommunication Applications [Volume 7, Issue 2, 2019, Pages 13-24]
-
Signal identification
Identification of STBC-OFDM Signals by Second-Order Cyclostationarity Method [Volume 7, Issue 4, 2019, Pages 27-36]
-
Signaling Game
Deterrence Model in Cyberspace Based on Bayesian Belief Attack Graph by using Risk Creating Payoff Function [Volume 7, Issue 1, 2019, Pages 25-38]
-
Signal to Interference plus Noise Ratio
Robust Adaptive Beamforming Against Interferer’s Direction Of Arrival Estimation Error [Volume 7, Issue 3, 2019, Pages 27-36]
-
SIM card
A Scheme for Improvement of Security and Privacy in Mobile Health Systems by Using SIM Card [Volume 7, Issue 1, 2019, Pages 11-24]
-
Similarity Matrix
Detecting Botnets with Timing-Based Covert Command and Control Channels [Volume 7, Issue 4, 2019, Pages 1-15]
-
Similarity Measure
Collusive Fraud Classification in Network of Online Auction Using Similarity Measure in Collective Classification [Volume 7, Issue 1, 2019, Pages 95-103]
-
Simulation
Designing Systolic Array for SL0 Algorithm Implementation [Volume 7, Issue 4, 2019, Pages 59-65]
-
Simulation Environment
A Software System for Large-Scale Simulation of Malware Propagation
in Computer Networks [Volume 7, Issue 2, 2019, Pages 53-67]
-
Situation Awareness
The Distributed Denial of Service Attacks Situation Awareness Based on The Prediction of Battle Scene Using Dempster-Shefer Evidences Theories and Bayesian Rules [Volume 7, Issue 1, 2019, Pages 77-94]
-
SL0 algorithm
Designing Systolic Array for SL0 Algorithm Implementation [Volume 7, Issue 4, 2019, Pages 59-65]
-
Smart Grid
Enhance Media Access Control in IEEE 802.15.4 Based Smart Grids using Swarm Intelligence Algorithms [Volume 7, Issue 3, 2019, Pages 9-20]
-
S-MASH
Optimal Design of Low-power High-resolution Unity-STF S-MASH Sigma Delta Modulator for Telecommunication Applications [Volume 7, Issue 2, 2019, Pages 13-24]
-
SM-OFDM
Identification of STBC-OFDM Signals by Second-Order Cyclostationarity Method [Volume 7, Issue 4, 2019, Pages 27-36]
-
STBC
Identification of STBC-OFDM Signals by Second-Order Cyclostationarity Method [Volume 7, Issue 4, 2019, Pages 27-36]
-
Steganlysis
Increasing Insertion Capacity and Resistance in Image Steganography Based on Mapping and Bits Reduction [Volume 7, Issue 2, 2019, Pages 33-39]
-
Steganography
Increasing Insertion Capacity and Resistance in Image Steganography Based on Mapping and Bits Reduction [Volume 7, Issue 2, 2019, Pages 33-39]
-
Structural analysis
Structural Analysis based on Integral Characteristic of a Reduced Round Block Cipher with Making an Improvement [Volume 7, Issue 3, 2019, Pages 1-8]
-
Systolic array
Designing Systolic Array for SL0 Algorithm Implementation [Volume 7, Issue 4, 2019, Pages 59-65]
T
-
Task scheduling
Secure and confidential workflow scheduling in hybrid cloud using improved particle swarm optimization algorithm [Volume 7, Issue 4, 2019, Pages 131-145]
-
Template Side-Channel Attack
A Practical Template Attack Against the Implementation of the Advanced Encryption Standard on ARM Processor [Volume 7, Issue 1, 2019, Pages 39-48]
-
Texture analysis
Offline text-Independent Persian handwriting Forgery Detection using Texture Analysis [Volume 7, Issue 3, 2019, Pages 37-52]
-
TOPSIS Method
The Course of Action Selection Model in Network Centric Operation [Volume 7, Issue 2, 2019, Pages 133-155]
-
Tree decomposition
Generating Tree Decomposition of Graphs with Imperialist Competitive Algorithm for Use in Secret Sharing Scheme [Volume 7, Issue 3, 2019, Pages 105-111]
-
Trust
A Trust Model Based on Swarm Intelligence Algorithms in WSNs [Volume 7, Issue 1, 2019, Pages 1-10]
U
-
Uncertainty modeling
A New Method for Image Steganography Using Discrete Wavelet Transforms [Volume 7, Issue 4, 2019, Pages 79-89]
-
Unity-STF
Optimal Design of Low-power High-resolution Unity-STF S-MASH Sigma Delta Modulator for Telecommunication Applications [Volume 7, Issue 2, 2019, Pages 13-24]
-
Unknown Input Estimation
High Maneuvering Target Tracking Based on Augmented State Method using Adaptive Unscented Kalman Filter [Volume 7, Issue 2, 2019, Pages 93-108]
V
-
Visual Sensor Networks
Optimal Placement of Cameras to Maximize Visual Coverage using Genetic Algorithm and Harmony Search [Volume 7, Issue 1, 2019, Pages 49-61]
W
-
Wavelet Transform
A New Method for Image Steganography Using Discrete Wavelet Transforms [Volume 7, Issue 3, 2019, Pages 83-91]
-
Wireless networks
Performance Improvement of the ODMRP Protocol using Analysis of the Received Signal Strength Level [Volume 7, Issue 3, 2019, Pages 21-26]
-
Wireless Sensor Network
A Trust Model Based on Swarm Intelligence Algorithms in WSNs [Volume 7, Issue 1, 2019, Pages 1-10]
-
Wireless Sensor Networks
Enhance Media Access Control in IEEE 802.15.4 Based Smart Grids using Swarm Intelligence Algorithms [Volume 7, Issue 3, 2019, Pages 9-20]
-
Worm
Smart Detection of Covert Worms in Computer Networks [Volume 7, Issue 4, 2019, Pages 67-77]
Z
-
Zero day
Smart Detection of Covert Worms in Computer Networks [Volume 7, Issue 4, 2019, Pages 67-77]
Your query does not match with any item