Keyword Index

A

  • Adaptive Kalman Filter Three-Dimensional Angles Measurement using IME based on MEMS Technology by Adaptive Kalman Filter [Volume 7, Issue 2, 2019, Pages 81-91]
  • Adaptive Power And Modulation Performance Analysis of Free Space Optical Communication Links under M-PAM and M-PSK Modulations using Adaptive Power and Modulation Techniques [Volume 7, Issue 1, 2019, Pages 63-75]
  • Adaptive UKF High Maneuvering Target Tracking Based on Augmented State Method using Adaptive Unscented Kalman Filter [Volume 7, Issue 2, 2019, Pages 93-108]
  • Advanced Encryption Standard A Practical Template Attack Against the Implementation of the Advanced Encryption Standard on ARM Processor [Volume 7, Issue 1, 2019, Pages 39-48]
  • AKA Procedure Analyzing Security Challenges of LTE Networks, Obstacles and Opportunities of Network Localization Based on the Standard Platform [Volume 7, Issue 2, 2019, Pages 121-132]
  • AL-OFDM Identification of STBC-OFDM Signals by Second-Order Cyclostationarity Method [Volume 7, Issue 4, 2019, Pages 27-36]
  • Anonymity A new attack on Jakobsson Hybrid Mix-Net [Volume 7, Issue 3, 2019, Pages 113-119]
  • Approximate Dual Finite Frame as Code: Some Characterizations for Error Correction Codes and Three Algorithms for Troubleshooting in Data Transfer [Volume 7, Issue 2, 2019, Pages 1-12]
  • Area Coverage Optimal Placement of Cameras to Maximize Visual Coverage using Genetic Algorithm and Harmony Search [Volume 7, Issue 1, 2019, Pages 49-61]
  • ARM Microprocessor A Practical Template Attack Against the Implementation of the Advanced Encryption Standard on ARM Processor [Volume 7, Issue 1, 2019, Pages 39-48]
  • Atmospheric Turbulence Performance Analysis of Free Space Optical Communication Links under M-PAM and M-PSK Modulations using Adaptive Power and Modulation Techniques [Volume 7, Issue 1, 2019, Pages 63-75]
  • Attack Graph Deterrence Model in Cyberspace Based on Bayesian Belief Attack Graph by using Risk Creating Payoff Function [Volume 7, Issue 1, 2019, Pages 25-38]
  • Augmented State Approac High Maneuvering Target Tracking Based on Augmented State Method using Adaptive Unscented Kalman Filter [Volume 7, Issue 2, 2019, Pages 93-108]
  • Authentication A Scheme for Improvement of Security and Privacy in Mobile Health Systems by Using SIM Card [Volume 7, Issue 1, 2019, Pages 11-24]
  • Authentication A New Method for Image Steganography Using Discrete Wavelet Transforms [Volume 7, Issue 3, 2019, Pages 83-91]

B

  • Beamforming Robust Adaptive Beamforming Against Interferer’s Direction Of Arrival Estimation Error [Volume 7, Issue 3, 2019, Pages 27-36]
  • Biometrics Offline text-Independent Persian handwriting Forgery Detection using Texture Analysis [Volume 7, Issue 3, 2019, Pages 37-52]
  • Block Cipher Analysis of Impossible Differential on LowMC Block Cipher [Volume 7, Issue 2, 2019, Pages 69-79]
  • Block Cipher Structural Analysis based on Integral Characteristic of a Reduced Round Block Cipher with Making an Improvement [Volume 7, Issue 3, 2019, Pages 1-8]
  • Botnet The Distributed Denial of Service Attacks Situation Awareness Based on The Prediction of Battle Scene Using Dempster-Shefer Evidences Theories and Bayesian Rules [Volume 7, Issue 1, 2019, Pages 77-94]
  • Botnet Detecting Botnets with Timing-Based Covert Command and Control Channels [Volume 7, Issue 4, 2019, Pages 1-15]

C

  • Closed Circuit Television (CCTV) Optimal Placement of Cameras to Maximize Visual Coverage using Genetic Algorithm and Harmony Search [Volume 7, Issue 1, 2019, Pages 49-61]
  • Collective Classification Collusive Fraud Classification in Network of Online Auction Using Similarity Measure in Collective Classification [Volume 7, Issue 1, 2019, Pages 95-103]
  • Communication delay Guidance and distributed control of the networked UAVs [Volume 7, Issue 4, 2019, Pages 117-129]
  • Communication systems Guidance and distributed control of the networked UAVs [Volume 7, Issue 4, 2019, Pages 117-129]
  • Complex War Scenes The Presentation of a Model for Analyzing the Behavior of the Enemy Using Hidden Markov Models Based on Electronic Warfare Observations in Complex War Scenes [Volume 7, Issue 1, 2019, Pages 113-128]
  • Corrected Conditional entropy Detecting Botnets with Timing-Based Covert Command and Control Channels [Volume 7, Issue 4, 2019, Pages 1-15]
  • Cover Increasing Insertion Capacity and Resistance in Image Steganography Based on Mapping and Bits Reduction [Volume 7, Issue 2, 2019, Pages 33-39]
  • Covert Channel Detecting Botnets with Timing-Based Covert Command and Control Channels [Volume 7, Issue 4, 2019, Pages 1-15]
  • Covert Timming Channel Detecting Botnets with Timing-Based Covert Command and Control Channels [Volume 7, Issue 4, 2019, Pages 1-15]
  • CRLB A Novel Algorithm for Radar Jamming Resource Allocation [Volume 7, Issue 3, 2019, Pages 53-70]
  • Cryptanalysis Analysis of Impossible Differential on LowMC Block Cipher [Volume 7, Issue 2, 2019, Pages 69-79]
  • Cryptography A New Method for Image Steganography Using Discrete Wavelet Transforms [Volume 7, Issue 3, 2019, Pages 83-91]
  • Customization Analyzing Security Challenges of LTE Networks, Obstacles and Opportunities of Network Localization Based on the Standard Platform [Volume 7, Issue 2, 2019, Pages 121-132]
  • Cyber-Attacks An Improved Method of Incident Detection due to Cyber Attacks [Volume 7, Issue 4, 2019, Pages 105-116]
  • Cyber Security Analysis A New Method for Image Steganography Using Discrete Wavelet Transforms [Volume 7, Issue 4, 2019, Pages 79-89]
  • Cyberspace Deterrence Model in Cyberspace Based on Bayesian Belief Attack Graph by using Risk Creating Payoff Function [Volume 7, Issue 1, 2019, Pages 25-38]
  • Cyber Space Effects of Cyber Threats in IT Projects Using the Fuzzy Cognitive Mapping Approach [Volume 7, Issue 2, 2019, Pages 41-51]
  • Cyber Threats Effects of Cyber Threats in IT Projects Using the Fuzzy Cognitive Mapping Approach [Volume 7, Issue 2, 2019, Pages 41-51]
  • Cyclostationarity Identification of STBC-OFDM Signals by Second-Order Cyclostationarity Method [Volume 7, Issue 4, 2019, Pages 27-36]

D

  • Data Mining Smart Detection of Covert Worms in Computer Networks [Volume 7, Issue 4, 2019, Pages 67-77]
  • Decision-making Process The Presentation of a Model for Analyzing the Behavior of the Enemy Using Hidden Markov Models Based on Electronic Warfare Observations in Complex War Scenes [Volume 7, Issue 1, 2019, Pages 113-128]
  • Decoding Finite Frame as Code: Some Characterizations for Error Correction Codes and Three Algorithms for Troubleshooting in Data Transfer [Volume 7, Issue 2, 2019, Pages 1-12]
  • DEMATEL-Based Analytic Network Process (DANP) The Course of Action Selection Model in Network Centric Operation [Volume 7, Issue 2, 2019, Pages 133-155]
  • DEMATEL method Evaluation of Network-Based Operation Criteria Based on DEMATEL Method [Volume 7, Issue 1, 2019, Pages 139-153]
  • Dempster-Shefer Evidences Theory The Distributed Denial of Service Attacks Situation Awareness Based on The Prediction of Battle Scene Using Dempster-Shefer Evidences Theories and Bayesian Rules [Volume 7, Issue 1, 2019, Pages 77-94]
  • Detector Smart Detection of Covert Worms in Computer Networks [Volume 7, Issue 4, 2019, Pages 67-77]
  • Distributed command and control Guidance and distributed control of the networked UAVs [Volume 7, Issue 4, 2019, Pages 117-129]
  • Distributed Denial of Service The Distributed Denial of Service Attacks Situation Awareness Based on The Prediction of Battle Scene Using Dempster-Shefer Evidences Theories and Bayesian Rules [Volume 7, Issue 1, 2019, Pages 77-94]
  • Distributed Simulation A Software System for Large-Scale Simulation of Malware Propagation in Computer Networks [Volume 7, Issue 2, 2019, Pages 53-67]
  • DOA estimation error Robust Adaptive Beamforming Against Interferer’s Direction Of Arrival Estimation Error [Volume 7, Issue 3, 2019, Pages 27-36]
  • Double-slit Experiment A New Approach for Estimating the Rate of Emission in Quantum Bit Exchange‏ ‎Systems ‎Using Binomial Distribution [Volume 7, Issue 1, 2019, Pages 105-112]
  • Dynamic Differential Logic Side-Channel Attack Resistance Approaches Through Dynamic Differential Logic [Volume 7, Issue 3, 2019, Pages 93-104]

E

  • Edge dominating set Generating Tree Decomposition of Graphs with Imperialist Competitive Algorithm for Use in Secret Sharing Scheme [Volume 7, Issue 3, 2019, Pages 105-111]
  • Effective Base Approach Evaluation of Network-Based Operation Criteria Based on DEMATEL Method [Volume 7, Issue 1, 2019, Pages 139-153]
  • Electronic Warfare The Presentation of a Model for Analyzing the Behavior of the Enemy Using Hidden Markov Models Based on Electronic Warfare Observations in Complex War Scenes [Volume 7, Issue 1, 2019, Pages 113-128]
  • Embed Capacity Increasing Insertion Capacity and Resistance in Image Steganography Based on Mapping and Bits Reduction [Volume 7, Issue 2, 2019, Pages 33-39]
  • Encoding Finite Frame as Code: Some Characterizations for Error Correction Codes and Three Algorithms for Troubleshooting in Data Transfer [Volume 7, Issue 2, 2019, Pages 1-12]
  • Enemy’s Behavior Analysis Model The Presentation of a Model for Analyzing the Behavior of the Enemy Using Hidden Markov Models Based on Electronic Warfare Observations in Complex War Scenes [Volume 7, Issue 1, 2019, Pages 113-128]
  • Epidemic Phenomena Modeling A Software System for Large-Scale Simulation of Malware Propagation in Computer Networks [Volume 7, Issue 2, 2019, Pages 53-67]
  • ESM Robust Adaptive Beamforming Against Interferer’s Direction Of Arrival Estimation Error [Volume 7, Issue 3, 2019, Pages 27-36]
  • Expert The Distributed Denial of Service Attacks Situation Awareness Based on The Prediction of Battle Scene Using Dempster-Shefer Evidences Theories and Bayesian Rules [Volume 7, Issue 1, 2019, Pages 77-94]

F

  • Fourth Generation (4G) Mobile Network Analyzing Security Challenges of LTE Networks, Obstacles and Opportunities of Network Localization Based on the Standard Platform [Volume 7, Issue 2, 2019, Pages 121-132]
  • FPGA Implementation Design and Production of Hardware Authentication Code Using Physically Unclonable Functions and a Random Number Generator on FPGA [Volume 7, Issue 4, 2019, Pages 37-50]
  • Frame Finite Frame as Code: Some Characterizations for Error Correction Codes and Three Algorithms for Troubleshooting in Data Transfer [Volume 7, Issue 2, 2019, Pages 1-12]
  • Free-Space Optical Communications (FSO) Performance Analysis of Free Space Optical Communication Links under M-PAM and M-PSK Modulations using Adaptive Power and Modulation Techniques [Volume 7, Issue 1, 2019, Pages 63-75]
  • Fuzzy Cognitive Map Effects of Cyber Threats in IT Projects Using the Fuzzy Cognitive Mapping Approach [Volume 7, Issue 2, 2019, Pages 41-51]

G

  • Graph Anonymization An Improved Method for Graph Data Anonymization with Emphasis on Preserving the Average Path length [Volume 7, Issue 2, 2019, Pages 25-32]

H

  • Hard and Soft Data Fusion A New Method for Image Steganography Using Discrete Wavelet Transforms [Volume 7, Issue 4, 2019, Pages 79-89]
  • Hardware Chips Side Channel Analysis of International Data Encryption Algorithm (IDEA) [Volume 7, Issue 4, 2019, Pages 51-57]
  • Hardware Security Design and Production of Hardware Authentication Code Using Physically Unclonable Functions and a Random Number Generator on FPGA [Volume 7, Issue 4, 2019, Pages 37-50]
  • Harmony search algorithm Optimal Placement of Cameras to Maximize Visual Coverage using Genetic Algorithm and Harmony Search [Volume 7, Issue 1, 2019, Pages 49-61]
  • Hidden Markov Models The Presentation of a Model for Analyzing the Behavior of the Enemy Using Hidden Markov Models Based on Electronic Warfare Observations in Complex War Scenes [Volume 7, Issue 1, 2019, Pages 113-128]
  • High Maneuvering Target Tracking High Maneuvering Target Tracking Based on Augmented State Method using Adaptive Unscented Kalman Filter [Volume 7, Issue 2, 2019, Pages 93-108]
  • Hybrid cloud Secure and confidential workflow scheduling in hybrid cloud using improved particle swarm optimization algorithm [Volume 7, Issue 4, 2019, Pages 131-145]

I

  • IEEE 802.15.4 Enhance Media Access Control in IEEE 802.15.4 Based Smart Grids using Swarm Intelligence Algorithms [Volume 7, Issue 3, 2019, Pages 9-20]
  • Image authentication Detection of Median Filtering Manipulation in Compressed Images [Volume 7, Issue 3, 2019, Pages 121-129]
  • Image Forensics Detection of Median Filtering Manipulation in Compressed Images [Volume 7, Issue 3, 2019, Pages 121-129]
  • Imperialist Competitive Algorithm (ICA) Generating Tree Decomposition of Graphs with Imperialist Competitive Algorithm for Use in Secret Sharing Scheme [Volume 7, Issue 3, 2019, Pages 105-111]
  • Impossible Differential Attack Analysis of Impossible Differential on LowMC Block Cipher [Volume 7, Issue 2, 2019, Pages 69-79]
  • IMU Three-Dimensional Angles Measurement using IME based on MEMS Technology by Adaptive Kalman Filter [Volume 7, Issue 2, 2019, Pages 81-91]
  • Industrial Control Systems Security Prioritizing Obstacles to Industrial Control Systems Security Management Implementation, using Interpretive Structural Modeling (ISM) Approach [Volume 7, Issue 2, 2019, Pages 109-119]
  • Information Hiding Side-Channel Attack Resistance Approaches Through Dynamic Differential Logic [Volume 7, Issue 3, 2019, Pages 93-104]
  • Information Technology Project Effects of Cyber Threats in IT Projects Using the Fuzzy Cognitive Mapping Approach [Volume 7, Issue 2, 2019, Pages 41-51]
  • Integral characteristic Structural Analysis based on Integral Characteristic of a Reduced Round Block Cipher with Making an Improvement [Volume 7, Issue 3, 2019, Pages 1-8]
  • International Data Encryption Algorithm (IDEA) Side Channel Analysis of International Data Encryption Algorithm (IDEA) [Volume 7, Issue 4, 2019, Pages 51-57]
  • Intra-pulse modulation Intra-pulse Modulation Recognition Using Time-Frequency Features Based on Modified-B Distribution [Volume 7, Issue 1, 2019, Pages 129-138]

K

  • Key Management Analyzing Security Challenges of LTE Networks, Obstacles and Opportunities of Network Localization Based on the Standard Platform [Volume 7, Issue 2, 2019, Pages 121-132]
  • Key Rate A New Approach for Estimating the Rate of Emission in Quantum Bit Exchange‏ ‎Systems ‎Using Binomial Distribution [Volume 7, Issue 1, 2019, Pages 105-112]

L

  • L1-norm Collusive Fraud Classification in Network of Online Auction Using Similarity Measure in Collective Classification [Volume 7, Issue 1, 2019, Pages 95-103]
  • Localization Systems A Novel Algorithm for Radar Jamming Resource Allocation [Volume 7, Issue 3, 2019, Pages 53-70]
  • Loopy Belief Propagation Collusive Fraud Classification in Network of Online Auction Using Similarity Measure in Collective Classification [Volume 7, Issue 1, 2019, Pages 95-103]
  • Low-distortion Topology Optimal Design of Low-power High-resolution Unity-STF S-MASH Sigma Delta Modulator for Telecommunication Applications [Volume 7, Issue 2, 2019, Pages 13-24]
  • LowMC Block Cipher Analysis of Impossible Differential on LowMC Block Cipher [Volume 7, Issue 2, 2019, Pages 69-79]
  • LTE Network Analyzing Security Challenges of LTE Networks, Obstacles and Opportunities of Network Localization Based on the Standard Platform [Volume 7, Issue 2, 2019, Pages 121-132]

M

  • Machine Intelligence A Practical Template Attack Against the Implementation of the Advanced Encryption Standard on ARM Processor [Volume 7, Issue 1, 2019, Pages 39-48]
  • Malware Propagation A Software System for Large-Scale Simulation of Malware Propagation in Computer Networks [Volume 7, Issue 2, 2019, Pages 53-67]
  • Markov Random Field Collusive Fraud Classification in Network of Online Auction Using Similarity Measure in Collective Classification [Volume 7, Issue 1, 2019, Pages 95-103]
  • Matrix Finite Frame as Code: Some Characterizations for Error Correction Codes and Three Algorithms for Troubleshooting in Data Transfer [Volume 7, Issue 2, 2019, Pages 1-12]
  • Media Access Control Enhance Media Access Control in IEEE 802.15.4 Based Smart Grids using Swarm Intelligence Algorithms [Volume 7, Issue 3, 2019, Pages 9-20]
  • Median filter Detection of Median Filtering Manipulation in Compressed Images [Volume 7, Issue 3, 2019, Pages 121-129]
  • MEMS Three-Dimensional Angles Measurement using IME based on MEMS Technology by Adaptive Kalman Filter [Volume 7, Issue 2, 2019, Pages 81-91]
  • MICMAC Prioritizing Obstacles to Industrial Control Systems Security Management Implementation, using Interpretive Structural Modeling (ISM) Approach [Volume 7, Issue 2, 2019, Pages 109-119]
  • MIMO Identification of STBC-OFDM Signals by Second-Order Cyclostationarity Method [Volume 7, Issue 4, 2019, Pages 27-36]
  • Mobile Health A Scheme for Improvement of Security and Privacy in Mobile Health Systems by Using SIM Card [Volume 7, Issue 1, 2019, Pages 11-24]
  • Mobile AD hoc Networks Performance Improvement of the ODMRP Protocol using Analysis of the Received Signal Strength Level [Volume 7, Issue 3, 2019, Pages 21-26]
  • Modified-B distribution Intra-pulse Modulation Recognition Using Time-Frequency Features Based on Modified-B Distribution [Volume 7, Issue 1, 2019, Pages 129-138]
  • Multi-Criteria Decision Making Evaluation of Network-Based Operation Criteria Based on DEMATEL Method [Volume 7, Issue 1, 2019, Pages 139-153]
  • Multiple-Criteria/Attribute Decision-making The Course of Action Selection Model in Network Centric Operation [Volume 7, Issue 2, 2019, Pages 133-155]

N

  • Network Attack A Trust Model Based on Swarm Intelligence Algorithms in WSNs [Volume 7, Issue 1, 2019, Pages 1-10]
  • Network Centric Operation The Course of Action Selection Model in Network Centric Operation [Volume 7, Issue 2, 2019, Pages 133-155]
  • Network-centric warfare Evaluation of Network-Based Operation Criteria Based on DEMATEL Method [Volume 7, Issue 1, 2019, Pages 139-153]
  • Networked UAVs Guidance and distributed control of the networked UAVs [Volume 7, Issue 4, 2019, Pages 117-129]
  • Network Forensics Improving Payload Attribution Techniques in Computer Network Criminology with Time based Hierarchical Bloom Filter [Volume 7, Issue 3, 2019, Pages 71-81]

O

  • Obstacles to Implementing Security Prioritizing Obstacles to Industrial Control Systems Security Management Implementation, using Interpretive Structural Modeling (ISM) Approach [Volume 7, Issue 2, 2019, Pages 109-119]
  • ODMRP protocol Performance Improvement of the ODMRP Protocol using Analysis of the Received Signal Strength Level [Volume 7, Issue 3, 2019, Pages 21-26]
  • OFDM Identification of STBC-OFDM Signals by Second-Order Cyclostationarity Method [Volume 7, Issue 4, 2019, Pages 27-36]
  • Ontology A New Method for Image Steganography Using Discrete Wavelet Transforms [Volume 7, Issue 4, 2019, Pages 79-89]
  • Operator Finite Frame as Code: Some Characterizations for Error Correction Codes and Three Algorithms for Troubleshooting in Data Transfer [Volume 7, Issue 2, 2019, Pages 1-12]
  • Optimization Guidance and distributed control of the networked UAVs [Volume 7, Issue 4, 2019, Pages 117-129]
  • Overselling A New Approach for Estimating the Rate of Emission in Quantum Bit Exchange‏ ‎Systems ‎Using Binomial Distribution [Volume 7, Issue 1, 2019, Pages 105-112]

P

  • Payload Attribution Improving Payload Attribution Techniques in Computer Network Criminology with Time based Hierarchical Bloom Filter [Volume 7, Issue 3, 2019, Pages 71-81]
  • Personal Data An Improved Method for Graph Data Anonymization with Emphasis on Preserving the Average Path length [Volume 7, Issue 2, 2019, Pages 25-32]
  • Phase Shift Keying Modulation (PSK) Performance Analysis of Free Space Optical Communication Links under M-PAM and M-PSK Modulations using Adaptive Power and Modulation Techniques [Volume 7, Issue 1, 2019, Pages 63-75]
  • Physically Unclonable Function Design and Production of Hardware Authentication Code Using Physically Unclonable Functions and a Random Number Generator on FPGA [Volume 7, Issue 4, 2019, Pages 37-50]
  • PIC Microcontroller Side Channel Analysis of International Data Encryption Algorithm (IDEA) [Volume 7, Issue 4, 2019, Pages 51-57]
  • Privacy A Scheme for Improvement of Security and Privacy in Mobile Health Systems by Using SIM Card [Volume 7, Issue 1, 2019, Pages 11-24]
  • Privacy An Improved Method for Graph Data Anonymization with Emphasis on Preserving the Average Path length [Volume 7, Issue 2, 2019, Pages 25-32]
  • Probability of successful recognition Intra-pulse Modulation Recognition Using Time-Frequency Features Based on Modified-B Distribution [Volume 7, Issue 1, 2019, Pages 129-138]
  • Projection of Future The Distributed Denial of Service Attacks Situation Awareness Based on The Prediction of Battle Scene Using Dempster-Shefer Evidences Theories and Bayesian Rules [Volume 7, Issue 1, 2019, Pages 77-94]
  • Pulse Amplitude Modulation (PAM) Performance Analysis of Free Space Optical Communication Links under M-PAM and M-PSK Modulations using Adaptive Power and Modulation Techniques [Volume 7, Issue 1, 2019, Pages 63-75]

Q

  • Quantum Key Distribution A New Approach for Estimating the Rate of Emission in Quantum Bit Exchange‏ ‎Systems ‎Using Binomial Distribution [Volume 7, Issue 1, 2019, Pages 105-112]

R

  • Random Number Generator Design and Production of Hardware Authentication Code Using Physically Unclonable Functions and a Random Number Generator on FPGA [Volume 7, Issue 4, 2019, Pages 37-50]
  • Rate of Emission A New Approach for Estimating the Rate of Emission in Quantum Bit Exchange‏ ‎Systems ‎Using Binomial Distribution [Volume 7, Issue 1, 2019, Pages 105-112]
  • Real-time An Improved Method of Incident Detection due to Cyber Attacks [Volume 7, Issue 4, 2019, Pages 105-116]
  • Reconfigurable Chips Side-Channel Attack Resistance Approaches Through Dynamic Differential Logic [Volume 7, Issue 3, 2019, Pages 93-104]
  • Resistance Increasing Insertion Capacity and Resistance in Image Steganography Based on Mapping and Bits Reduction [Volume 7, Issue 2, 2019, Pages 33-39]
  • Resource Allocation A Novel Algorithm for Radar Jamming Resource Allocation [Volume 7, Issue 3, 2019, Pages 53-70]
  • Risk Creating Payoff Function Deterrence Model in Cyberspace Based on Bayesian Belief Attack Graph by using Risk Creating Payoff Function [Volume 7, Issue 1, 2019, Pages 25-38]
  • Routing protocols Performance Improvement of the ODMRP Protocol using Analysis of the Received Signal Strength Level [Volume 7, Issue 3, 2019, Pages 21-26]

S

  • Scan Smart Detection of Covert Worms in Computer Networks [Volume 7, Issue 4, 2019, Pages 67-77]
  • Secret Sharing Generating Tree Decomposition of Graphs with Imperialist Competitive Algorithm for Use in Secret Sharing Scheme [Volume 7, Issue 3, 2019, Pages 105-111]
  • Secret Sharing A new attack on Jakobsson Hybrid Mix-Net [Volume 7, Issue 3, 2019, Pages 113-119]
  • Security Operation Center An Improved Method of Incident Detection due to Cyber Attacks [Volume 7, Issue 4, 2019, Pages 105-116]
  • Security requirements of task and data Secure and confidential workflow scheduling in hybrid cloud using improved particle swarm optimization algorithm [Volume 7, Issue 4, 2019, Pages 131-145]
  • Security strength of resource and communication paths Secure and confidential workflow scheduling in hybrid cloud using improved particle swarm optimization algorithm [Volume 7, Issue 4, 2019, Pages 131-145]
  • Sensor Fusion Three-Dimensional Angles Measurement using IME based on MEMS Technology by Adaptive Kalman Filter [Volume 7, Issue 2, 2019, Pages 81-91]
  • Side Channel Attack Side-Channel Attack Resistance Approaches Through Dynamic Differential Logic [Volume 7, Issue 3, 2019, Pages 93-104]
  • Side Channel Attacks Side Channel Analysis of International Data Encryption Algorithm (IDEA) [Volume 7, Issue 4, 2019, Pages 51-57]
  • Sigma Delta Modulator Optimal Design of Low-power High-resolution Unity-STF S-MASH Sigma Delta Modulator for Telecommunication Applications [Volume 7, Issue 2, 2019, Pages 13-24]
  • Signal identification Identification of STBC-OFDM Signals by Second-Order Cyclostationarity Method [Volume 7, Issue 4, 2019, Pages 27-36]
  • Signaling Game Deterrence Model in Cyberspace Based on Bayesian Belief Attack Graph by using Risk Creating Payoff Function [Volume 7, Issue 1, 2019, Pages 25-38]
  • Signal to Interference plus Noise Ratio Robust Adaptive Beamforming Against Interferer’s Direction Of Arrival Estimation Error [Volume 7, Issue 3, 2019, Pages 27-36]
  • SIM card A Scheme for Improvement of Security and Privacy in Mobile Health Systems by Using SIM Card [Volume 7, Issue 1, 2019, Pages 11-24]
  • Similarity Matrix Detecting Botnets with Timing-Based Covert Command and Control Channels [Volume 7, Issue 4, 2019, Pages 1-15]
  • Similarity Measure Collusive Fraud Classification in Network of Online Auction Using Similarity Measure in Collective Classification [Volume 7, Issue 1, 2019, Pages 95-103]
  • Simulation Designing Systolic Array for SL0 Algorithm Implementation [Volume 7, Issue 4, 2019, Pages 59-65]
  • Simulation Environment A Software System for Large-Scale Simulation of Malware Propagation in Computer Networks [Volume 7, Issue 2, 2019, Pages 53-67]
  • Situation Awareness The Distributed Denial of Service Attacks Situation Awareness Based on The Prediction of Battle Scene Using Dempster-Shefer Evidences Theories and Bayesian Rules [Volume 7, Issue 1, 2019, Pages 77-94]
  • SL0 algorithm Designing Systolic Array for SL0 Algorithm Implementation [Volume 7, Issue 4, 2019, Pages 59-65]
  • Smart Grid Enhance Media Access Control in IEEE 802.15.4 Based Smart Grids using Swarm Intelligence Algorithms [Volume 7, Issue 3, 2019, Pages 9-20]
  • S-MASH Optimal Design of Low-power High-resolution Unity-STF S-MASH Sigma Delta Modulator for Telecommunication Applications [Volume 7, Issue 2, 2019, Pages 13-24]
  • SM-OFDM Identification of STBC-OFDM Signals by Second-Order Cyclostationarity Method [Volume 7, Issue 4, 2019, Pages 27-36]
  • STBC Identification of STBC-OFDM Signals by Second-Order Cyclostationarity Method [Volume 7, Issue 4, 2019, Pages 27-36]
  • Steganlysis Increasing Insertion Capacity and Resistance in Image Steganography Based on Mapping and Bits Reduction [Volume 7, Issue 2, 2019, Pages 33-39]
  • Steganography Increasing Insertion Capacity and Resistance in Image Steganography Based on Mapping and Bits Reduction [Volume 7, Issue 2, 2019, Pages 33-39]
  • Structural analysis Structural Analysis based on Integral Characteristic of a Reduced Round Block Cipher with Making an Improvement [Volume 7, Issue 3, 2019, Pages 1-8]
  • Systolic array Designing Systolic Array for SL0 Algorithm Implementation [Volume 7, Issue 4, 2019, Pages 59-65]

T

  • Task scheduling Secure and confidential workflow scheduling in hybrid cloud using improved particle swarm optimization algorithm [Volume 7, Issue 4, 2019, Pages 131-145]
  • Template Side-Channel Attack A Practical Template Attack Against the Implementation of the Advanced Encryption Standard on ARM Processor [Volume 7, Issue 1, 2019, Pages 39-48]
  • Texture analysis Offline text-Independent Persian handwriting Forgery Detection using Texture Analysis [Volume 7, Issue 3, 2019, Pages 37-52]
  • TOPSIS Method The Course of Action Selection Model in Network Centric Operation [Volume 7, Issue 2, 2019, Pages 133-155]
  • Tree decomposition Generating Tree Decomposition of Graphs with Imperialist Competitive Algorithm for Use in Secret Sharing Scheme [Volume 7, Issue 3, 2019, Pages 105-111]
  • Trust A Trust Model Based on Swarm Intelligence Algorithms in WSNs [Volume 7, Issue 1, 2019, Pages 1-10]

U

  • Uncertainty modeling A New Method for Image Steganography Using Discrete Wavelet Transforms [Volume 7, Issue 4, 2019, Pages 79-89]
  • Unity-STF Optimal Design of Low-power High-resolution Unity-STF S-MASH Sigma Delta Modulator for Telecommunication Applications [Volume 7, Issue 2, 2019, Pages 13-24]
  • Unknown Input Estimation High Maneuvering Target Tracking Based on Augmented State Method using Adaptive Unscented Kalman Filter [Volume 7, Issue 2, 2019, Pages 93-108]

V

  • Visual Sensor Networks Optimal Placement of Cameras to Maximize Visual Coverage using Genetic Algorithm and Harmony Search [Volume 7, Issue 1, 2019, Pages 49-61]

W

  • Wavelet Transform A New Method for Image Steganography Using Discrete Wavelet Transforms [Volume 7, Issue 3, 2019, Pages 83-91]
  • Wireless networks Performance Improvement of the ODMRP Protocol using Analysis of the Received Signal Strength Level [Volume 7, Issue 3, 2019, Pages 21-26]
  • Wireless Sensor Network A Trust Model Based on Swarm Intelligence Algorithms in WSNs [Volume 7, Issue 1, 2019, Pages 1-10]
  • Wireless Sensor Networks Enhance Media Access Control in IEEE 802.15.4 Based Smart Grids using Swarm Intelligence Algorithms [Volume 7, Issue 3, 2019, Pages 9-20]
  • Worm Smart Detection of Covert Worms in Computer Networks [Volume 7, Issue 4, 2019, Pages 67-77]

Z

  • Zero day Smart Detection of Covert Worms in Computer Networks [Volume 7, Issue 4, 2019, Pages 67-77]