Keyword Index

A

  • Activity Identifying Influential Nodes in Social Networks by Integrating the Centrality Method and Node Activity [Volume 8, Issue 3, 2020, Pages 1-11]
  • Adaptive Notch Filter Reducing Interference Effect on GPS Navigation System Using Evolutionary Notch Filter [Volume 8, Issue 4, 2020, Pages 95-106]
  • AES Introducing a new timing attack on the ARM processor and its practical implementation on the Raspberrypi3 board [Volume 8, Issue 1, 2020, Pages 125-132]
  • Agent-Oriented Architecture   Providing an Agent-Based Architecture for Semantic Mining From Large-Scale Data in Distributed Environments [Volume 8, Issue 3, 2020, Pages 83-99]
  • Aggregate signature Security Analysis and Improvement of an Intelligent Transportation System based on Certificateless Aggregate Signature [Volume 8, Issue 1, 2020, Pages 25-33]
  • ALOHA Introduction of An Anti-Collision Protocol in RFID Systems [Volume 8, Issue 4, 2020, Pages 119-128]
  • Anomaly Detection Hybrid Anomaly detection method using community detection in graph and feature selection [Volume 8, Issue 1, 2020, Pages 17-24]
  • Anomaly Detection An Accelerated Method for Rules Anomaly Detection in Software Defined Networks [Volume 8, Issue 4, 2020, Pages 31-39]
  • Anonymity Distributed Anonymity Based On the Integrated Block Chain in Vehicular Ad Hoc Network [Volume 8, Issue 4, 2020, Pages 41-52]
  • Anti_collision protocol Introduction of An Anti-Collision Protocol in RFID Systems [Volume 8, Issue 4, 2020, Pages 119-128]
  • API Calls Improvement in the Ransomwares Detection Method With New API Calls Features [Volume 8, Issue 4, 2020, Pages 107-118]
  • Artificial Neural Networks Network Intrusion Detection using a combination of artificial neural networks in a hierarchical manner [Volume 8, Issue 1, 2020, Pages 89-99]
  • Artificial noise forwarding Information Theoretic Secret Key Agreement Based on Localization [Volume 8, Issue 2, 2020, Pages 35-49]
  • Assignment and Scheduling Sensor-Weapon/Threat Modelling and optimal solving of dependent sensor-weapon/threat assignment and scheduling problem by a metaheuristic algorithm based on GRASP [Volume 8, Issue 1, 2020, Pages 35-50]
  • Atmospheric Turbulence Introducing an Optimal Modulation Constellation, Resistant to Atmospheric Turbulence [Volume 8, Issue 2, 2020, Pages 115-124]
  • Attack Sequence  Modeling of Obfuscated Multi- Stage cyber Attacks [Volume 8, Issue 2, 2020, Pages 61-73]
  • Attribute based encryption A Novel and Secure Model for Sharing Protected Health Record (PHR) Based on Blockchain and Attribute Based Encryption [Volume 8, Issue 1, 2020, Pages 101-124]
  • Authentication A secure three factor authentication scheme for wireless healthcare sensor networks based on elliptic curve [Volume 8, Issue 1, 2020, Pages 147-167]

B

  • BAN logic A Novel and Secure Model for Sharing Protected Health Record (PHR) Based on Blockchain and Attribute Based Encryption [Volume 8, Issue 1, 2020, Pages 101-124]
  • Bipartite graph The relationship of software vulnerabilities and workarounds [Volume 8, Issue 2, 2020, Pages 75-81]
  • Blacklist Comparison of Supervised Machine Learning Algorithms in Detection of Botnets Domain Generation Algorithms [Volume 8, Issue 4, 2020, Pages 17-29]
  • Blockchain A Novel and Secure Model for Sharing Protected Health Record (PHR) Based on Blockchain and Attribute Based Encryption [Volume 8, Issue 1, 2020, Pages 101-124]
  • Block Cipher Upper Bounds for the Probability of Differential Characteristics of Five Block Cipher Constructions Functions [Volume 8, Issue 4, 2020, Pages 129-137]
  • Botnet P2P Botnet Detection Using Deep Learning Method [Volume 8, Issue 2, 2020, Pages 1-14]
  • Botnet Comparison of Supervised Machine Learning Algorithms in Detection of Botnets Domain Generation Algorithms [Volume 8, Issue 4, 2020, Pages 17-29]
  • Botnet Detection P2P Botnet Detection Using Deep Learning Method [Volume 8, Issue 2, 2020, Pages 1-14]

C

  • Cardinal Hermite functions Cardinal Hermit functions and their application in solving the time-delay fractional optimal control problems [Volume 8, Issue 4, 2020, Pages 153-160]
  • C­&­C Server Comparison of Supervised Machine Learning Algorithms in Detection of Botnets Domain Generation Algorithms [Volume 8, Issue 4, 2020, Pages 17-29]
  • Centrality Identifying Influential Nodes in Social Networks by Integrating the Centrality Method and Node Activity [Volume 8, Issue 3, 2020, Pages 1-11]
  • Certificateless Cryptography Security Analysis and Improvement of an Intelligent Transportation System based on Certificateless Aggregate Signature [Volume 8, Issue 1, 2020, Pages 25-33]
  • Class I amplifier Design and Simulation of a LORAN Signal Generator for LPS Transmitter Using Class I Amplifier [Volume 8, Issue 2, 2020, Pages 25-33]
  • Classification Improvement in the Ransomwares Detection Method With New API Calls Features [Volume 8, Issue 4, 2020, Pages 107-118]
  • Clustering Fuzzy Keyword Search Scheme on an Encrypted Database in Cloud Computing Using Word Clustering [Volume 8, Issue 3, 2020, Pages 151-165]
  • Clustering Energy-Harvesting Aware Multi-Hop Routing in Wireless Sensor Networks for Defense Applications [Volume 8, Issue 4, 2020, Pages 63-73]
  • Cognitive Radio Frequency Spectrum Sensing by Multi-Stage Adaptive Optimization Algorithm with the Efficient Non-Cooperative Technique in Cognitive radios with hardware implementation [Volume 8, Issue 3, 2020, Pages 39-51]
  • Coherent sources Coherent Acoustic source DOA estimation by nested array based on sparse solution [Volume 8, Issue 1, 2020, Pages 79-88]
  • Combinatory steganography Designing a combinatorial Image Steganography algorithm based on game theory [Volume 8, Issue 1, 2020, Pages 133-145]
  • Comparator Design of Content-Addressable Memory in Quantum-Dot Cellular Automata [Volume 8, Issue 4, 2020, Pages 53-61]
  • Constraint non-linear optimization Wireless Target Localization Using Median Weighted Least Square Error Metric in the Presence of Non-Line of Sight Signals [Volume 8, Issue 2, 2020, Pages 125-133]
  • Content addressable memory Design of Content-Addressable Memory in Quantum-Dot Cellular Automata [Volume 8, Issue 4, 2020, Pages 53-61]
  • Convert Channel Web Covert Timing Channel Detection based on Entropy [Volume 8, Issue 3, 2020, Pages 13-23]
  • Covariance Matrix Frequency Spectrum Sensing by Multi-Stage Adaptive Optimization Algorithm with the Efficient Non-Cooperative Technique in Cognitive radios with hardware implementation [Volume 8, Issue 3, 2020, Pages 39-51]
  • Cryptography Distributed Anonymity Based On the Integrated Block Chain in Vehicular Ad Hoc Network [Volume 8, Issue 4, 2020, Pages 41-52]
  • CWE The relationship of software vulnerabilities and workarounds [Volume 8, Issue 2, 2020, Pages 75-81]
  • Cyberspace Development of the Concept of Deterrence Theory in the Country's Cyberspace Based on Upstream Documents and Available Approaches [Volume 8, Issue 4, 2020, Pages 161-173]
  • Cyber Threats Development of the Concept of Deterrence Theory in the Country's Cyberspace Based on Upstream Documents and Available Approaches [Volume 8, Issue 4, 2020, Pages 161-173]
  • Cyber Attacks Modeling of Obfuscated Multi- Stage cyber Attacks [Volume 8, Issue 2, 2020, Pages 61-73]

D

  • Database outsourcing Fuzzy Keyword Search Scheme on an Encrypted Database in Cloud Computing Using Word Clustering [Volume 8, Issue 3, 2020, Pages 151-165]
  • Database Security Detection and Prevention of SQL Injection Attacks at Runtime Using Decision Tree Classification [Volume 8, Issue 4, 2020, Pages 75-93]
  • Data locality A New Scheduling Algorithm to Reduce Computation Time in Hadoop Environment [Volume 8, Issue 2, 2020, Pages 51-59]
  • Data Mining Hybrid Anomaly detection method using community detection in graph and feature selection [Volume 8, Issue 1, 2020, Pages 17-24]
  • Dataset Improvement in the Ransomwares Detection Method With New API Calls Features [Volume 8, Issue 4, 2020, Pages 107-118]
  • Detection Detection and Prevention of SQL Injection Attacks at Runtime Using Decision Tree Classification [Volume 8, Issue 4, 2020, Pages 75-93]
  • Detection accuracy rate Improvement in the Ransomwares Detection Method With New API Calls Features [Volume 8, Issue 4, 2020, Pages 107-118]
  • Differential Upper Bounds for the Probability of Differential Characteristics of Five Block Cipher Constructions Functions [Volume 8, Issue 4, 2020, Pages 129-137]
  • Differential Characteristic Upper Bounds for the Probability of Differential Characteristics of Five Block Cipher Constructions Functions [Volume 8, Issue 4, 2020, Pages 129-137]
  • Direction finding Coherent Acoustic source DOA estimation by nested array based on sparse solution [Volume 8, Issue 1, 2020, Pages 79-88]
  • Discrete Cosine Transform Enhancing E-Security by Inserting a Watermark Using the Combination of Genetic Algorithm and Tabu Search [Volume 8, Issue 3, 2020, Pages 25-37]
  • Distributed Processing A Distributed Approach to Community Detection in Large Social Networks Based on Label Propagation [Volume 8, Issue 4, 2020, Pages 1-15]
  • Domain Generation Algorithms (DGAs) Comparison of Supervised Machine Learning Algorithms in Detection of Botnets Domain Generation Algorithms [Volume 8, Issue 4, 2020, Pages 17-29]
  • DS/CDMA Using Generalized Entropy Approach for Blind Estimation of the Length of Spreading Sequences in Code Division Multiple Access Systems [Volume 8, Issue 3, 2020, Pages 53-61]
  • Dynamic priority A New Scheduling Algorithm to Reduce Computation Time in Hadoop Environment [Volume 8, Issue 2, 2020, Pages 51-59]

E

  • E-Health A secure three factor authentication scheme for wireless healthcare sensor networks based on elliptic curve [Volume 8, Issue 1, 2020, Pages 147-167]
  • Elasticity Resource Elasticity Management using Fuzzy Controller Based on Threshold Changes in the Cloud Computing Environment [Volume 8, Issue 3, 2020, Pages 63-81]
  • Electronic health A Novel and Secure Model for Sharing Protected Health Record (PHR) Based on Blockchain and Attribute Based Encryption [Volume 8, Issue 1, 2020, Pages 101-124]
  • Energy Detector Frequency Spectrum Sensing by Multi-Stage Adaptive Optimization Algorithm with the Efficient Non-Cooperative Technique in Cognitive radios with hardware implementation [Volume 8, Issue 3, 2020, Pages 39-51]
  • Energy harvesting Energy-Harvesting Aware Multi-Hop Routing in Wireless Sensor Networks for Defense Applications [Volume 8, Issue 4, 2020, Pages 63-73]
  • Error Bit Rate Steganography on raw video based on proper detection and compromise between the parameters of transparency, resistance and capacity [Volume 8, Issue 1, 2020, Pages 51-65]
  • Evolutionary Algorithm Reducing Interference Effect on GPS Navigation System Using Evolutionary Notch Filter [Volume 8, Issue 4, 2020, Pages 95-106]

F

  • Fault Tolerance A Fault Tolerant Task Scheduling Method for Optimal use of Resources in Cloud Computing Environment [Volume 8, Issue 2, 2020, Pages 95-103]
  • Flow Rules An Accelerated Method for Rules Anomaly Detection in Software Defined Networks [Volume 8, Issue 4, 2020, Pages 31-39]
  • Flow Tables An Accelerated Method for Rules Anomaly Detection in Software Defined Networks [Volume 8, Issue 4, 2020, Pages 31-39]
  • Forgeability Security Analysis and Improvement of an Intelligent Transportation System based on Certificateless Aggregate Signature [Volume 8, Issue 1, 2020, Pages 25-33]
  • Fourier Transform Enhancing E-Security by Inserting a Watermark Using the Combination of Genetic Algorithm and Tabu Search [Volume 8, Issue 3, 2020, Pages 25-37]
  • Fractional optimal control problem of time delay Cardinal Hermit functions and their application in solving the time-delay fractional optimal control problems [Volume 8, Issue 4, 2020, Pages 153-160]
  • Free-Space Optical Communication Introducing an Optimal Modulation Constellation, Resistant to Atmospheric Turbulence [Volume 8, Issue 2, 2020, Pages 115-124]
  • Fuzz Testing Automatic Test Data Generation in File Format Fuzzers [Volume 8, Issue 1, 2020, Pages 1-16]
  • Fuzzy control system Resource Elasticity Management using Fuzzy Controller Based on Threshold Changes in the Cloud Computing Environment [Volume 8, Issue 3, 2020, Pages 63-81]
  • Fuzzy Search Fuzzy Keyword Search Scheme on an Encrypted Database in Cloud Computing Using Word Clustering [Volume 8, Issue 3, 2020, Pages 151-165]

G

  • Game Theory Designing a combinatorial Image Steganography algorithm based on game theory [Volume 8, Issue 1, 2020, Pages 133-145]
  • Gamma-Gamma Distribution Introducing an Optimal Modulation Constellation, Resistant to Atmospheric Turbulence [Volume 8, Issue 2, 2020, Pages 115-124]
  • GPS Reducing Interference Effect on GPS Navigation System Using Evolutionary Notch Filter [Volume 8, Issue 4, 2020, Pages 95-106]
  • Graph mining Hybrid Anomaly detection method using community detection in graph and feature selection [Volume 8, Issue 1, 2020, Pages 17-24]

H

  • Hadoop scheduling A New Scheduling Algorithm to Reduce Computation Time in Hadoop Environment [Volume 8, Issue 2, 2020, Pages 51-59]
  • Hybrid algorithm A New Scheduling Algorithm to Reduce Computation Time in Hadoop Environment [Volume 8, Issue 2, 2020, Pages 51-59]

I

  • Image Encryption An Image Encryption Algorithm Based on the Sn Permutation Group and Chaotic Functions [Volume 8, Issue 3, 2020, Pages 139-150]
  • Influence Identifying Influential Nodes in Social Networks by Integrating the Centrality Method and Node Activity [Volume 8, Issue 3, 2020, Pages 1-11]
  • Influence Maximization (IM) Identifying Influential Nodes in Social Networks by Integrating the Centrality Method and Node Activity [Volume 8, Issue 3, 2020, Pages 1-11]
  • Influential Nodes Identifying Influential Nodes in Social Networks by Integrating the Centrality Method and Node Activity [Volume 8, Issue 3, 2020, Pages 1-11]
  • Information Security Web Covert Timing Channel Detection based on Entropy [Volume 8, Issue 3, 2020, Pages 13-23]
  • Information theoretic secrecy Information Theoretic Secret Key Agreement Based on Localization [Volume 8, Issue 2, 2020, Pages 35-49]
  • Information theory Using Generalized Entropy Approach for Blind Estimation of the Length of Spreading Sequences in Code Division Multiple Access Systems [Volume 8, Issue 3, 2020, Pages 53-61]
  • Inter-cluster routing Energy-Harvesting Aware Multi-Hop Routing in Wireless Sensor Networks for Defense Applications [Volume 8, Issue 4, 2020, Pages 63-73]
  • Intermediate Frequency Coefficients of the Wavelet Steganography on raw video based on proper detection and compromise between the parameters of transparency, resistance and capacity [Volume 8, Issue 1, 2020, Pages 51-65]
  • Intrusion Detection System Network Intrusion Detection using a combination of artificial neural networks in a hierarchical manner [Volume 8, Issue 1, 2020, Pages 89-99]

K

  • Key Agreement A secure three factor authentication scheme for wireless healthcare sensor networks based on elliptic curve [Volume 8, Issue 1, 2020, Pages 147-167]
  • Keyword Extraction Automatic Keyword Extraction from Persian short Text Using word2vec [Volume 8, Issue 2, 2020, Pages 105-114]

L

  • Label Propagation Algorithm A Distributed Approach to Community Detection in Large Social Networks Based on Label Propagation [Volume 8, Issue 4, 2020, Pages 1-15]
  • Large Scale Data Providing an Agent-Based Architecture for Semantic Mining From Large-Scale Data in Distributed Environments [Volume 8, Issue 3, 2020, Pages 83-99]
  • Lattice Two Verifiable Multi-Secret Sharing Schemes: A Linear Scheme with Standard Security and A Lattice-Based Scheme [Volume 8, Issue 3, 2020, Pages 101-115]
  • Link prediction An Improved New Link Prediction Method in Social Multilplex Networks Based on the Gravitational Search Algorithm [Volume 8, Issue 2, 2020, Pages 15-24]
  • Localization Information Theoretic Secret Key Agreement Based on Localization [Volume 8, Issue 2, 2020, Pages 35-49]
  • Localization Wireless Target Localization Using Median Weighted Least Square Error Metric in the Presence of Non-Line of Sight Signals [Volume 8, Issue 2, 2020, Pages 125-133]
  • Local Positioning System Design and Simulation of a LORAN Signal Generator for LPS Transmitter Using Class I Amplifier [Volume 8, Issue 2, 2020, Pages 25-33]
  • Long Short Term Memory (LSTM) P2P Botnet Detection Using Deep Learning Method [Volume 8, Issue 2, 2020, Pages 1-14]
  • LORAN signal Design and Simulation of a LORAN Signal Generator for LPS Transmitter Using Class I Amplifier [Volume 8, Issue 2, 2020, Pages 25-33]
  • LORAN Transmitter Reliability Analysis of Open-Loop Switching Loran Signal Generator Using Omoe Indicator [Volume 8, Issue 2, 2020, Pages 83-93]
  • LPS Design and Simulation of a LORAN Signal Generator for LPS Transmitter Using Class I Amplifier [Volume 8, Issue 2, 2020, Pages 25-33]
  • LWE Problem Two Verifiable Multi-Secret Sharing Schemes: A Linear Scheme with Standard Security and A Lattice-Based Scheme [Volume 8, Issue 3, 2020, Pages 101-115]

M

  • Machine Learning Improvement in the Ransomwares Detection Method With New API Calls Features [Volume 8, Issue 4, 2020, Pages 107-118]
  • Machine Learning Algorithms Comparison of Supervised Machine Learning Algorithms in Detection of Botnets Domain Generation Algorithms [Volume 8, Issue 4, 2020, Pages 17-29]
  • MapReduce scheduling A New Scheduling Algorithm to Reduce Computation Time in Hadoop Environment [Volume 8, Issue 2, 2020, Pages 51-59]
  • Middle Band Enhancing E-Security by Inserting a Watermark Using the Combination of Genetic Algorithm and Tabu Search [Volume 8, Issue 3, 2020, Pages 25-37]
  • Mixed Integer Linear Programming Upper Bounds for the Probability of Differential Characteristics of Five Block Cipher Constructions Functions [Volume 8, Issue 4, 2020, Pages 129-137]
  • Modeling of cyber-attacks Modeling of cyber-attacks obfuscation, based on alteration technique of attack [Volume 8, Issue 1, 2020, Pages 67-77]
  • Multi-level PWM Reliability Analysis of Open-Loop Switching Loran Signal Generator Using Omoe Indicator [Volume 8, Issue 2, 2020, Pages 83-93]
  • Multipath phenomena Coherent Acoustic source DOA estimation by nested array based on sparse solution [Volume 8, Issue 1, 2020, Pages 79-88]
  • Multiplex networks An Improved New Link Prediction Method in Social Multilplex Networks Based on the Gravitational Search Algorithm [Volume 8, Issue 2, 2020, Pages 15-24]
  • Multi – Stage Modeling of Obfuscated Multi- Stage cyber Attacks [Volume 8, Issue 2, 2020, Pages 61-73]

N

  • Nanotechnology Design of Content-Addressable Memory in Quantum-Dot Cellular Automata [Volume 8, Issue 4, 2020, Pages 53-61]
  • Navigation Design and Simulation of a LORAN Signal Generator for LPS Transmitter Using Class I Amplifier [Volume 8, Issue 2, 2020, Pages 25-33]
  • Non-line of sight signals Wireless Target Localization Using Median Weighted Least Square Error Metric in the Presence of Non-Line of Sight Signals [Volume 8, Issue 2, 2020, Pages 125-133]

O

  • OMOE indicator Reliability Analysis of Open-Loop Switching Loran Signal Generator Using Omoe Indicator [Volume 8, Issue 2, 2020, Pages 83-93]
  • Ontology Providing an Agent-Based Architecture for Semantic Mining From Large-Scale Data in Distributed Environments [Volume 8, Issue 3, 2020, Pages 83-99]
  • Operational matrices Cardinal Hermit functions and their application in solving the time-delay fractional optimal control problems [Volume 8, Issue 4, 2020, Pages 153-160]
  • Overlapping Community Detection A Distributed Approach to Community Detection in Large Social Networks Based on Label Propagation [Volume 8, Issue 4, 2020, Pages 1-15]

P

  • Passive Defense Energy-Harvesting Aware Multi-Hop Routing in Wireless Sensor Networks for Defense Applications [Volume 8, Issue 4, 2020, Pages 63-73]
  • Persian Language Automatic Keyword Extraction from Persian short Text Using word2vec [Volume 8, Issue 2, 2020, Pages 105-114]
  • Polarization Shift Keying Introducing an Optimal Modulation Constellation, Resistant to Atmospheric Turbulence [Volume 8, Issue 2, 2020, Pages 115-124]
  • Post-Quantum Two Verifiable Multi-Secret Sharing Schemes: A Linear Scheme with Standard Security and A Lattice-Based Scheme [Volume 8, Issue 3, 2020, Pages 101-115]
  • Prevention Detection and Prevention of SQL Injection Attacks at Runtime Using Decision Tree Classification [Volume 8, Issue 4, 2020, Pages 75-93]
  • Privacy A secure three factor authentication scheme for wireless healthcare sensor networks based on elliptic curve [Volume 8, Issue 1, 2020, Pages 147-167]
  • Privacy-preserving Security Analysis and Improvement of an Intelligent Transportation System based on Certificateless Aggregate Signature [Volume 8, Issue 1, 2020, Pages 25-33]
  • Probabilistic modeling Modeling of Obfuscated Multi- Stage cyber Attacks [Volume 8, Issue 2, 2020, Pages 61-73]
  • Proper Detection Steganography on raw video based on proper detection and compromise between the parameters of transparency, resistance and capacity [Volume 8, Issue 1, 2020, Pages 51-65]
  • ProVerif A secure three factor authentication scheme for wireless healthcare sensor networks based on elliptic curve [Volume 8, Issue 1, 2020, Pages 147-167]
  • Pure Adaptive steganography Designing a combinatorial Image Steganography algorithm based on game theory [Volume 8, Issue 1, 2020, Pages 133-145]
  • PWM Design and Simulation of a LORAN Signal Generator for LPS Transmitter Using Class I Amplifier [Volume 8, Issue 2, 2020, Pages 25-33]

Q

  • Quantum computing Proposing a New and Comprehensive Method for Quantum Representation of Digital Audio Signals [Volume 8, Issue 4, 2020, Pages 139-152]
  • Quantum-dot Cellular Automata (QCA) Design of Content-Addressable Memory in Quantum-Dot Cellular Automata [Volume 8, Issue 4, 2020, Pages 53-61]

R

  • Ransomware Improvement in the Ransomwares Detection Method With New API Calls Features [Volume 8, Issue 4, 2020, Pages 107-118]
  • Rate of detection speed Improvement in the Ransomwares Detection Method With New API Calls Features [Volume 8, Issue 4, 2020, Pages 107-118]
  • Recurrent Neural Network (RNN) P2P Botnet Detection Using Deep Learning Method [Volume 8, Issue 2, 2020, Pages 1-14]
  • Relay Cluster-Head Energy-Harvesting Aware Multi-Hop Routing in Wireless Sensor Networks for Defense Applications [Volume 8, Issue 4, 2020, Pages 63-73]
  • Reliability Reliability Analysis of Open-Loop Switching Loran Signal Generator Using Omoe Indicator [Volume 8, Issue 2, 2020, Pages 83-93]
  • Resource Assignment Modelling and optimal solving of dependent sensor-weapon/threat assignment and scheduling problem by a metaheuristic algorithm based on GRASP [Volume 8, Issue 1, 2020, Pages 35-50]
  • Resource provisioning Resource Elasticity Management using Fuzzy Controller Based on Threshold Changes in the Cloud Computing Environment [Volume 8, Issue 3, 2020, Pages 63-81]
  • RFID System Introduction of An Anti-Collision Protocol in RFID Systems [Volume 8, Issue 4, 2020, Pages 119-128]

S

  • S-box An Image Encryption Algorithm Based on the Sn Permutation Group and Chaotic Functions [Volume 8, Issue 3, 2020, Pages 139-150]
  • Scheduling Modelling and optimal solving of dependent sensor-weapon/threat assignment and scheduling problem by a metaheuristic algorithm based on GRASP [Volume 8, Issue 1, 2020, Pages 35-50]
  • Searchable encryption Fuzzy Keyword Search Scheme on an Encrypted Database in Cloud Computing Using Word Clustering [Volume 8, Issue 3, 2020, Pages 151-165]
  • Secret key agreement Information Theoretic Secret Key Agreement Based on Localization [Volume 8, Issue 2, 2020, Pages 35-49]
  • Secret key capacity Information Theoretic Secret Key Agreement Based on Localization [Volume 8, Issue 2, 2020, Pages 35-49]
  • Secret Sharing Two Verifiable Multi-Secret Sharing Schemes: A Linear Scheme with Standard Security and A Lattice-Based Scheme [Volume 8, Issue 3, 2020, Pages 101-115]
  • Security Bound Upper Bounds for the Probability of Differential Characteristics of Five Block Cipher Constructions Functions [Volume 8, Issue 4, 2020, Pages 129-137]
  • Semantic Mining Providing an Agent-Based Architecture for Semantic Mining From Large-Scale Data in Distributed Environments [Volume 8, Issue 3, 2020, Pages 83-99]
  • Social network analysis An Improved New Link Prediction Method in Social Multilplex Networks Based on the Gravitational Search Algorithm [Volume 8, Issue 2, 2020, Pages 15-24]
  • Software Defined Network An Accelerated Method for Rules Anomaly Detection in Software Defined Networks [Volume 8, Issue 4, 2020, Pages 31-39]
  • Software vulnerability The relationship of software vulnerabilities and workarounds [Volume 8, Issue 2, 2020, Pages 75-81]
  • Sparse Coherent Acoustic source DOA estimation by nested array based on sparse solution [Volume 8, Issue 1, 2020, Pages 79-88]
  • Specific Values Frequency Spectrum Sensing by Multi-Stage Adaptive Optimization Algorithm with the Efficient Non-Cooperative Technique in Cognitive radios with hardware implementation [Volume 8, Issue 3, 2020, Pages 39-51]
  • Spectral Holes Frequency Spectrum Sensing by Multi-Stage Adaptive Optimization Algorithm with the Efficient Non-Cooperative Technique in Cognitive radios with hardware implementation [Volume 8, Issue 3, 2020, Pages 39-51]
  • Spectral Sensors Frequency Spectrum Sensing by Multi-Stage Adaptive Optimization Algorithm with the Efficient Non-Cooperative Technique in Cognitive radios with hardware implementation [Volume 8, Issue 3, 2020, Pages 39-51]
  • Spread Spectrum Steganography on raw video based on proper detection and compromise between the parameters of transparency, resistance and capacity [Volume 8, Issue 1, 2020, Pages 51-65]
  • SQL Injection Attacks Detection and Prevention of SQL Injection Attacks at Runtime Using Decision Tree Classification [Volume 8, Issue 4, 2020, Pages 75-93]
  • Standard Security Two Verifiable Multi-Secret Sharing Schemes: A Linear Scheme with Standard Security and A Lattice-Based Scheme [Volume 8, Issue 3, 2020, Pages 101-115]
  • Static Analysis An Improved New Link Prediction Method in Social Multilplex Networks Based on the Gravitational Search Algorithm [Volume 8, Issue 2, 2020, Pages 15-24]
  • Switching amplifier Reliability Analysis of Open-Loop Switching Loran Signal Generator Using Omoe Indicator [Volume 8, Issue 2, 2020, Pages 83-93]

T

  • Tabu Search Enhancing E-Security by Inserting a Watermark Using the Combination of Genetic Algorithm and Tabu Search [Volume 8, Issue 3, 2020, Pages 25-37]
  • Tag Identification Introduction of An Anti-Collision Protocol in RFID Systems [Volume 8, Issue 4, 2020, Pages 119-128]
  • Task scheduling A Fault Tolerant Task Scheduling Method for Optimal use of Resources in Cloud Computing Environment [Volume 8, Issue 2, 2020, Pages 95-103]
  • Text Mining Automatic Keyword Extraction from Persian short Text Using word2vec [Volume 8, Issue 2, 2020, Pages 105-114]
  • Threshold Resource Elasticity Management using Fuzzy Controller Based on Threshold Changes in the Cloud Computing Environment [Volume 8, Issue 3, 2020, Pages 63-81]
  • Timing Channel Web Covert Timing Channel Detection based on Entropy [Volume 8, Issue 3, 2020, Pages 13-23]
  • Tree-based Protocol Introduction of An Anti-Collision Protocol in RFID Systems [Volume 8, Issue 4, 2020, Pages 119-128]

U

  • Underdetermined Coherent Acoustic source DOA estimation by nested array based on sparse solution [Volume 8, Issue 1, 2020, Pages 79-88]
  • User-association Joint Optimization of User Association, Subchannel Allocation and Power Allocation in OFDMA Heterogeneous Networks [Volume 8, Issue 3, 2020, Pages 117-129]

V

  • VANET Security Analysis and Improvement of an Intelligent Transportation System based on Certificateless Aggregate Signature [Volume 8, Issue 1, 2020, Pages 25-33]
  • VANET Distributed Anonymity Based On the Integrated Block Chain in Vehicular Ad Hoc Network [Volume 8, Issue 4, 2020, Pages 41-52]
  • Verifiability Two Verifiable Multi-Secret Sharing Schemes: A Linear Scheme with Standard Security and A Lattice-Based Scheme [Volume 8, Issue 3, 2020, Pages 101-115]
  • VuWaDB database The relationship of software vulnerabilities and workarounds [Volume 8, Issue 2, 2020, Pages 75-81]

W

  • WEB Web Covert Timing Channel Detection based on Entropy [Volume 8, Issue 3, 2020, Pages 13-23]
  • Web Applications Detection and Prevention of SQL Injection Attacks at Runtime Using Decision Tree Classification [Volume 8, Issue 4, 2020, Pages 75-93]
  • Weighted Least Square Eerror Wireless Target Localization Using Median Weighted Least Square Error Metric in the Presence of Non-Line of Sight Signals [Volume 8, Issue 2, 2020, Pages 125-133]
  • Wireless Sensor Networks Energy-Harvesting Aware Multi-Hop Routing in Wireless Sensor Networks for Defense Applications [Volume 8, Issue 4, 2020, Pages 63-73]
  • Word Similarity Automatic Keyword Extraction from Persian short Text Using word2vec [Volume 8, Issue 2, 2020, Pages 105-114]
  • Workaround The relationship of software vulnerabilities and workarounds [Volume 8, Issue 2, 2020, Pages 75-81]