A
-
Activity
Identifying Influential Nodes in Social Networks by Integrating the Centrality Method and Node Activity [Volume 8, Issue 3, 2020, Pages 1-11]
-
Adaptive Notch Filter
Reducing Interference Effect on GPS Navigation System Using Evolutionary Notch Filter [Volume 8, Issue 4, 2020, Pages 95-106]
-
AES
Introducing a new timing attack on the ARM processor and its practical implementation on the Raspberrypi3 board [Volume 8, Issue 1, 2020, Pages 125-132]
-
Agent-Oriented Architecture
Providing an Agent-Based Architecture for Semantic Mining From Large-Scale Data in Distributed Environments [Volume 8, Issue 3, 2020, Pages 83-99]
-
Aggregate signature
Security Analysis and Improvement of an Intelligent Transportation System based on Certificateless Aggregate Signature [Volume 8, Issue 1, 2020, Pages 25-33]
-
ALOHA
Introduction of An Anti-Collision Protocol in RFID Systems [Volume 8, Issue 4, 2020, Pages 119-128]
-
Anomaly Detection
Hybrid Anomaly detection method using community detection in graph and feature selection [Volume 8, Issue 1, 2020, Pages 17-24]
-
Anomaly Detection
An Accelerated Method for Rules Anomaly Detection in Software Defined Networks [Volume 8, Issue 4, 2020, Pages 31-39]
-
Anonymity
Distributed Anonymity Based On the Integrated Block Chain in Vehicular Ad Hoc Network [Volume 8, Issue 4, 2020, Pages 41-52]
-
Anti_collision protocol
Introduction of An Anti-Collision Protocol in RFID Systems [Volume 8, Issue 4, 2020, Pages 119-128]
-
API Calls
Improvement in the Ransomwares Detection Method With New API
Calls Features [Volume 8, Issue 4, 2020, Pages 107-118]
-
Artificial Neural Networks
Network Intrusion Detection using a combination of artificial neural networks in a hierarchical manner [Volume 8, Issue 1, 2020, Pages 89-99]
-
Artificial noise forwarding
Information Theoretic Secret Key Agreement Based on Localization [Volume 8, Issue 2, 2020, Pages 35-49]
-
Assignment and Scheduling Sensor-Weapon/Threat
Modelling and optimal solving of dependent sensor-weapon/threat assignment and scheduling problem by a metaheuristic algorithm based on GRASP [Volume 8, Issue 1, 2020, Pages 35-50]
-
Atmospheric Turbulence
Introducing an Optimal Modulation Constellation, Resistant to Atmospheric Turbulence [Volume 8, Issue 2, 2020, Pages 115-124]
-
Attack Sequence
Modeling of Obfuscated Multi- Stage cyber Attacks [Volume 8, Issue 2, 2020, Pages 61-73]
-
Attribute based encryption
A Novel and Secure Model for Sharing Protected Health Record (PHR) Based on Blockchain and Attribute Based Encryption [Volume 8, Issue 1, 2020, Pages 101-124]
-
Authentication
A secure three factor authentication scheme for wireless
healthcare sensor networks based on elliptic curve [Volume 8, Issue 1, 2020, Pages 147-167]
B
-
BAN logic
A Novel and Secure Model for Sharing Protected Health Record (PHR) Based on Blockchain and Attribute Based Encryption [Volume 8, Issue 1, 2020, Pages 101-124]
-
Bipartite graph
The relationship of software vulnerabilities and workarounds [Volume 8, Issue 2, 2020, Pages 75-81]
-
Blacklist
Comparison of Supervised Machine Learning Algorithms in Detection of Botnets Domain Generation Algorithms [Volume 8, Issue 4, 2020, Pages 17-29]
-
Blockchain
A Novel and Secure Model for Sharing Protected Health Record (PHR) Based on Blockchain and Attribute Based Encryption [Volume 8, Issue 1, 2020, Pages 101-124]
-
Block Cipher
Upper Bounds for the Probability of Differential Characteristics of Five Block Cipher
Constructions Functions [Volume 8, Issue 4, 2020, Pages 129-137]
-
Botnet
P2P Botnet Detection Using Deep Learning Method [Volume 8, Issue 2, 2020, Pages 1-14]
-
Botnet
Comparison of Supervised Machine Learning Algorithms in Detection of Botnets Domain Generation Algorithms [Volume 8, Issue 4, 2020, Pages 17-29]
-
Botnet Detection
P2P Botnet Detection Using Deep Learning Method [Volume 8, Issue 2, 2020, Pages 1-14]
C
-
Cardinal Hermite functions
Cardinal Hermit functions and their application in solving the time-delay fractional optimal control problems [Volume 8, Issue 4, 2020, Pages 153-160]
-
C&C Server
Comparison of Supervised Machine Learning Algorithms in Detection of Botnets Domain Generation Algorithms [Volume 8, Issue 4, 2020, Pages 17-29]
-
Centrality
Identifying Influential Nodes in Social Networks by Integrating the Centrality Method and Node Activity [Volume 8, Issue 3, 2020, Pages 1-11]
-
Certificateless Cryptography
Security Analysis and Improvement of an Intelligent Transportation System based on Certificateless Aggregate Signature [Volume 8, Issue 1, 2020, Pages 25-33]
-
Class I amplifier
Design and Simulation of a LORAN Signal Generator for LPS Transmitter Using Class I Amplifier [Volume 8, Issue 2, 2020, Pages 25-33]
-
Classification
Improvement in the Ransomwares Detection Method With New API
Calls Features [Volume 8, Issue 4, 2020, Pages 107-118]
-
Clustering
Fuzzy Keyword Search Scheme on an Encrypted Database in Cloud Computing Using Word Clustering [Volume 8, Issue 3, 2020, Pages 151-165]
-
Clustering
Energy-Harvesting Aware Multi-Hop Routing in Wireless Sensor Networks for Defense Applications [Volume 8, Issue 4, 2020, Pages 63-73]
-
Cognitive Radio
Frequency Spectrum Sensing by Multi-Stage Adaptive Optimization Algorithm with the Efficient Non-Cooperative Technique in Cognitive radios with hardware implementation [Volume 8, Issue 3, 2020, Pages 39-51]
-
Coherent sources
Coherent Acoustic source DOA estimation by nested array based on sparse solution [Volume 8, Issue 1, 2020, Pages 79-88]
-
Combinatory steganography
Designing a combinatorial Image Steganography algorithm based on game theory [Volume 8, Issue 1, 2020, Pages 133-145]
-
Comparator
Design of Content-Addressable Memory in Quantum-Dot Cellular Automata [Volume 8, Issue 4, 2020, Pages 53-61]
-
Constraint non-linear optimization
Wireless Target Localization Using Median Weighted Least Square Error Metric in the Presence of Non-Line of Sight Signals [Volume 8, Issue 2, 2020, Pages 125-133]
-
Content addressable memory
Design of Content-Addressable Memory in Quantum-Dot Cellular Automata [Volume 8, Issue 4, 2020, Pages 53-61]
-
Convert Channel
Web Covert Timing Channel Detection based on Entropy [Volume 8, Issue 3, 2020, Pages 13-23]
-
Covariance Matrix
Frequency Spectrum Sensing by Multi-Stage Adaptive Optimization Algorithm with the Efficient Non-Cooperative Technique in Cognitive radios with hardware implementation [Volume 8, Issue 3, 2020, Pages 39-51]
-
Cryptography
Distributed Anonymity Based On the Integrated Block Chain in Vehicular Ad Hoc Network [Volume 8, Issue 4, 2020, Pages 41-52]
-
CWE
The relationship of software vulnerabilities and workarounds [Volume 8, Issue 2, 2020, Pages 75-81]
-
Cyberspace
Development of the Concept of Deterrence Theory in the Country's Cyberspace
Based on Upstream Documents and Available Approaches [Volume 8, Issue 4, 2020, Pages 161-173]
-
Cyber Threats
Development of the Concept of Deterrence Theory in the Country's Cyberspace
Based on Upstream Documents and Available Approaches [Volume 8, Issue 4, 2020, Pages 161-173]
-
Cyber Attacks
Modeling of Obfuscated Multi- Stage cyber Attacks [Volume 8, Issue 2, 2020, Pages 61-73]
D
-
Database outsourcing
Fuzzy Keyword Search Scheme on an Encrypted Database in Cloud Computing Using Word Clustering [Volume 8, Issue 3, 2020, Pages 151-165]
-
Database Security
Detection and Prevention of SQL Injection Attacks at Runtime Using Decision Tree Classification [Volume 8, Issue 4, 2020, Pages 75-93]
-
Data locality
A New Scheduling Algorithm to Reduce Computation Time in Hadoop Environment [Volume 8, Issue 2, 2020, Pages 51-59]
-
Data Mining
Hybrid Anomaly detection method using community detection in graph and feature selection [Volume 8, Issue 1, 2020, Pages 17-24]
-
Dataset
Improvement in the Ransomwares Detection Method With New API
Calls Features [Volume 8, Issue 4, 2020, Pages 107-118]
-
Detection
Detection and Prevention of SQL Injection Attacks at Runtime Using Decision Tree Classification [Volume 8, Issue 4, 2020, Pages 75-93]
-
Detection accuracy rate
Improvement in the Ransomwares Detection Method With New API
Calls Features [Volume 8, Issue 4, 2020, Pages 107-118]
-
Differential
Upper Bounds for the Probability of Differential Characteristics of Five Block Cipher
Constructions Functions [Volume 8, Issue 4, 2020, Pages 129-137]
-
Differential Characteristic
Upper Bounds for the Probability of Differential Characteristics of Five Block Cipher
Constructions Functions [Volume 8, Issue 4, 2020, Pages 129-137]
-
Direction finding
Coherent Acoustic source DOA estimation by nested array based on sparse solution [Volume 8, Issue 1, 2020, Pages 79-88]
-
Discrete Cosine Transform
Enhancing E-Security by Inserting a Watermark Using the Combination of Genetic Algorithm and Tabu Search [Volume 8, Issue 3, 2020, Pages 25-37]
-
Distributed Processing
A Distributed Approach to Community Detection in Large Social Networks Based on Label Propagation [Volume 8, Issue 4, 2020, Pages 1-15]
-
Domain Generation Algorithms (DGAs)
Comparison of Supervised Machine Learning Algorithms in Detection of Botnets Domain Generation Algorithms [Volume 8, Issue 4, 2020, Pages 17-29]
-
DS/CDMA
Using Generalized Entropy Approach for Blind Estimation of the Length of Spreading Sequences in Code Division Multiple Access Systems [Volume 8, Issue 3, 2020, Pages 53-61]
-
Dynamic priority
A New Scheduling Algorithm to Reduce Computation Time in Hadoop Environment [Volume 8, Issue 2, 2020, Pages 51-59]
E
-
E-Health
A secure three factor authentication scheme for wireless
healthcare sensor networks based on elliptic curve [Volume 8, Issue 1, 2020, Pages 147-167]
-
Elasticity
Resource Elasticity Management using Fuzzy Controller Based on Threshold Changes in the Cloud Computing Environment [Volume 8, Issue 3, 2020, Pages 63-81]
-
Electronic health
A Novel and Secure Model for Sharing Protected Health Record (PHR) Based on Blockchain and Attribute Based Encryption [Volume 8, Issue 1, 2020, Pages 101-124]
-
Energy Detector
Frequency Spectrum Sensing by Multi-Stage Adaptive Optimization Algorithm with the Efficient Non-Cooperative Technique in Cognitive radios with hardware implementation [Volume 8, Issue 3, 2020, Pages 39-51]
-
Energy harvesting
Energy-Harvesting Aware Multi-Hop Routing in Wireless Sensor Networks for Defense Applications [Volume 8, Issue 4, 2020, Pages 63-73]
-
Error Bit Rate
Steganography on raw video based on proper detection and compromise between the parameters of transparency, resistance and capacity [Volume 8, Issue 1, 2020, Pages 51-65]
-
Evolutionary Algorithm
Reducing Interference Effect on GPS Navigation System Using Evolutionary Notch Filter [Volume 8, Issue 4, 2020, Pages 95-106]
F
-
Fault Tolerance
A Fault Tolerant Task Scheduling Method for Optimal use of Resources in Cloud Computing Environment [Volume 8, Issue 2, 2020, Pages 95-103]
-
Flow Rules
An Accelerated Method for Rules Anomaly Detection in Software Defined Networks [Volume 8, Issue 4, 2020, Pages 31-39]
-
Flow Tables
An Accelerated Method for Rules Anomaly Detection in Software Defined Networks [Volume 8, Issue 4, 2020, Pages 31-39]
-
Forgeability
Security Analysis and Improvement of an Intelligent Transportation System based on Certificateless Aggregate Signature [Volume 8, Issue 1, 2020, Pages 25-33]
-
Fourier Transform
Enhancing E-Security by Inserting a Watermark Using the Combination of Genetic Algorithm and Tabu Search [Volume 8, Issue 3, 2020, Pages 25-37]
-
Fractional optimal control problem of time delay
Cardinal Hermit functions and their application in solving the time-delay fractional optimal control problems [Volume 8, Issue 4, 2020, Pages 153-160]
-
Free-Space Optical Communication
Introducing an Optimal Modulation Constellation, Resistant to Atmospheric Turbulence [Volume 8, Issue 2, 2020, Pages 115-124]
-
Fuzz Testing
Automatic Test Data Generation in File Format Fuzzers [Volume 8, Issue 1, 2020, Pages 1-16]
-
Fuzzy control system
Resource Elasticity Management using Fuzzy Controller Based on Threshold Changes in the Cloud Computing Environment [Volume 8, Issue 3, 2020, Pages 63-81]
-
Fuzzy Search
Fuzzy Keyword Search Scheme on an Encrypted Database in Cloud Computing Using Word Clustering [Volume 8, Issue 3, 2020, Pages 151-165]
G
-
Game Theory
Designing a combinatorial Image Steganography algorithm based on game theory [Volume 8, Issue 1, 2020, Pages 133-145]
-
Gamma-Gamma Distribution
Introducing an Optimal Modulation Constellation, Resistant to Atmospheric Turbulence [Volume 8, Issue 2, 2020, Pages 115-124]
-
GPS
Reducing Interference Effect on GPS Navigation System Using Evolutionary Notch Filter [Volume 8, Issue 4, 2020, Pages 95-106]
-
Graph mining
Hybrid Anomaly detection method using community detection in graph and feature selection [Volume 8, Issue 1, 2020, Pages 17-24]
H
-
Hadoop scheduling
A New Scheduling Algorithm to Reduce Computation Time in Hadoop Environment [Volume 8, Issue 2, 2020, Pages 51-59]
-
Hybrid algorithm
A New Scheduling Algorithm to Reduce Computation Time in Hadoop Environment [Volume 8, Issue 2, 2020, Pages 51-59]
I
-
Image Encryption
An Image Encryption Algorithm Based on the Sn Permutation Group and Chaotic Functions [Volume 8, Issue 3, 2020, Pages 139-150]
-
Influence
Identifying Influential Nodes in Social Networks by Integrating the Centrality Method and Node Activity [Volume 8, Issue 3, 2020, Pages 1-11]
-
Influence Maximization (IM)
Identifying Influential Nodes in Social Networks by Integrating the Centrality Method and Node Activity [Volume 8, Issue 3, 2020, Pages 1-11]
-
Influential Nodes
Identifying Influential Nodes in Social Networks by Integrating the Centrality Method and Node Activity [Volume 8, Issue 3, 2020, Pages 1-11]
-
Information Security
Web Covert Timing Channel Detection based on Entropy [Volume 8, Issue 3, 2020, Pages 13-23]
-
Information theoretic secrecy
Information Theoretic Secret Key Agreement Based on Localization [Volume 8, Issue 2, 2020, Pages 35-49]
-
Information theory
Using Generalized Entropy Approach for Blind Estimation of the Length of Spreading Sequences in Code Division Multiple Access Systems [Volume 8, Issue 3, 2020, Pages 53-61]
-
Inter-cluster routing
Energy-Harvesting Aware Multi-Hop Routing in Wireless Sensor Networks for Defense Applications [Volume 8, Issue 4, 2020, Pages 63-73]
-
Intermediate Frequency Coefficients of the Wavelet
Steganography on raw video based on proper detection and compromise between the parameters of transparency, resistance and capacity [Volume 8, Issue 1, 2020, Pages 51-65]
-
Intrusion Detection System
Network Intrusion Detection using a combination of artificial neural networks in a hierarchical manner [Volume 8, Issue 1, 2020, Pages 89-99]
K
-
Key Agreement
A secure three factor authentication scheme for wireless
healthcare sensor networks based on elliptic curve [Volume 8, Issue 1, 2020, Pages 147-167]
-
Keyword Extraction
Automatic Keyword Extraction from Persian short Text Using word2vec [Volume 8, Issue 2, 2020, Pages 105-114]
L
-
Label Propagation Algorithm
A Distributed Approach to Community Detection in Large Social Networks Based on Label Propagation [Volume 8, Issue 4, 2020, Pages 1-15]
-
Large Scale Data
Providing an Agent-Based Architecture for Semantic Mining From Large-Scale Data in Distributed Environments [Volume 8, Issue 3, 2020, Pages 83-99]
-
Lattice
Two Verifiable Multi-Secret Sharing Schemes: A Linear Scheme with Standard Security and A Lattice-Based Scheme [Volume 8, Issue 3, 2020, Pages 101-115]
-
Link prediction
An Improved New Link Prediction Method in Social Multilplex Networks Based on the Gravitational Search Algorithm [Volume 8, Issue 2, 2020, Pages 15-24]
-
Localization
Information Theoretic Secret Key Agreement Based on Localization [Volume 8, Issue 2, 2020, Pages 35-49]
-
Localization
Wireless Target Localization Using Median Weighted Least Square Error Metric in the Presence of Non-Line of Sight Signals [Volume 8, Issue 2, 2020, Pages 125-133]
-
Local Positioning System
Design and Simulation of a LORAN Signal Generator for LPS Transmitter Using Class I Amplifier [Volume 8, Issue 2, 2020, Pages 25-33]
-
Long Short Term Memory (LSTM)
P2P Botnet Detection Using Deep Learning Method [Volume 8, Issue 2, 2020, Pages 1-14]
-
LORAN signal
Design and Simulation of a LORAN Signal Generator for LPS Transmitter Using Class I Amplifier [Volume 8, Issue 2, 2020, Pages 25-33]
-
LORAN Transmitter
Reliability Analysis of Open-Loop Switching Loran Signal Generator Using Omoe Indicator [Volume 8, Issue 2, 2020, Pages 83-93]
-
LPS
Design and Simulation of a LORAN Signal Generator for LPS Transmitter Using Class I Amplifier [Volume 8, Issue 2, 2020, Pages 25-33]
-
LWE Problem
Two Verifiable Multi-Secret Sharing Schemes: A Linear Scheme with Standard Security and A Lattice-Based Scheme [Volume 8, Issue 3, 2020, Pages 101-115]
M
-
Machine Learning
Improvement in the Ransomwares Detection Method With New API
Calls Features [Volume 8, Issue 4, 2020, Pages 107-118]
-
Machine Learning Algorithms
Comparison of Supervised Machine Learning Algorithms in Detection of Botnets Domain Generation Algorithms [Volume 8, Issue 4, 2020, Pages 17-29]
-
MapReduce scheduling
A New Scheduling Algorithm to Reduce Computation Time in Hadoop Environment [Volume 8, Issue 2, 2020, Pages 51-59]
-
Middle Band
Enhancing E-Security by Inserting a Watermark Using the Combination of Genetic Algorithm and Tabu Search [Volume 8, Issue 3, 2020, Pages 25-37]
-
Mixed Integer Linear Programming
Upper Bounds for the Probability of Differential Characteristics of Five Block Cipher
Constructions Functions [Volume 8, Issue 4, 2020, Pages 129-137]
-
Modeling of cyber-attacks
Modeling of cyber-attacks obfuscation, based on alteration technique of attack [Volume 8, Issue 1, 2020, Pages 67-77]
-
Multi-level PWM
Reliability Analysis of Open-Loop Switching Loran Signal Generator Using Omoe Indicator [Volume 8, Issue 2, 2020, Pages 83-93]
-
Multipath phenomena
Coherent Acoustic source DOA estimation by nested array based on sparse solution [Volume 8, Issue 1, 2020, Pages 79-88]
-
Multiplex networks
An Improved New Link Prediction Method in Social Multilplex Networks Based on the Gravitational Search Algorithm [Volume 8, Issue 2, 2020, Pages 15-24]
-
Multi – Stage
Modeling of Obfuscated Multi- Stage cyber Attacks [Volume 8, Issue 2, 2020, Pages 61-73]
N
-
Nanotechnology
Design of Content-Addressable Memory in Quantum-Dot Cellular Automata [Volume 8, Issue 4, 2020, Pages 53-61]
-
Navigation
Design and Simulation of a LORAN Signal Generator for LPS Transmitter Using Class I Amplifier [Volume 8, Issue 2, 2020, Pages 25-33]
-
Non-line of sight signals
Wireless Target Localization Using Median Weighted Least Square Error Metric in the Presence of Non-Line of Sight Signals [Volume 8, Issue 2, 2020, Pages 125-133]
O
-
OMOE indicator
Reliability Analysis of Open-Loop Switching Loran Signal Generator Using Omoe Indicator [Volume 8, Issue 2, 2020, Pages 83-93]
-
Ontology
Providing an Agent-Based Architecture for Semantic Mining From Large-Scale Data in Distributed Environments [Volume 8, Issue 3, 2020, Pages 83-99]
-
Operational matrices
Cardinal Hermit functions and their application in solving the time-delay fractional optimal control problems [Volume 8, Issue 4, 2020, Pages 153-160]
-
Overlapping Community Detection
A Distributed Approach to Community Detection in Large Social Networks Based on Label Propagation [Volume 8, Issue 4, 2020, Pages 1-15]
P
-
Passive Defense
Energy-Harvesting Aware Multi-Hop Routing in Wireless Sensor Networks for Defense Applications [Volume 8, Issue 4, 2020, Pages 63-73]
-
Persian Language
Automatic Keyword Extraction from Persian short Text Using word2vec [Volume 8, Issue 2, 2020, Pages 105-114]
-
Polarization Shift Keying
Introducing an Optimal Modulation Constellation, Resistant to Atmospheric Turbulence [Volume 8, Issue 2, 2020, Pages 115-124]
-
Post-Quantum
Two Verifiable Multi-Secret Sharing Schemes: A Linear Scheme with Standard Security and A Lattice-Based Scheme [Volume 8, Issue 3, 2020, Pages 101-115]
-
Prevention
Detection and Prevention of SQL Injection Attacks at Runtime Using Decision Tree Classification [Volume 8, Issue 4, 2020, Pages 75-93]
-
Privacy
A secure three factor authentication scheme for wireless
healthcare sensor networks based on elliptic curve [Volume 8, Issue 1, 2020, Pages 147-167]
-
Privacy-preserving
Security Analysis and Improvement of an Intelligent Transportation System based on Certificateless Aggregate Signature [Volume 8, Issue 1, 2020, Pages 25-33]
-
Probabilistic modeling
Modeling of Obfuscated Multi- Stage cyber Attacks [Volume 8, Issue 2, 2020, Pages 61-73]
-
Proper Detection
Steganography on raw video based on proper detection and compromise between the parameters of transparency, resistance and capacity [Volume 8, Issue 1, 2020, Pages 51-65]
-
ProVerif
A secure three factor authentication scheme for wireless
healthcare sensor networks based on elliptic curve [Volume 8, Issue 1, 2020, Pages 147-167]
-
Pure Adaptive steganography
Designing a combinatorial Image Steganography algorithm based on game theory [Volume 8, Issue 1, 2020, Pages 133-145]
-
PWM
Design and Simulation of a LORAN Signal Generator for LPS Transmitter Using Class I Amplifier [Volume 8, Issue 2, 2020, Pages 25-33]
Q
-
Quantum computing
Proposing a New and Comprehensive Method for Quantum Representation of Digital Audio Signals [Volume 8, Issue 4, 2020, Pages 139-152]
-
Quantum-dot Cellular Automata (QCA)
Design of Content-Addressable Memory in Quantum-Dot Cellular Automata [Volume 8, Issue 4, 2020, Pages 53-61]
R
-
Ransomware
Improvement in the Ransomwares Detection Method With New API
Calls Features [Volume 8, Issue 4, 2020, Pages 107-118]
-
Rate of detection speed
Improvement in the Ransomwares Detection Method With New API
Calls Features [Volume 8, Issue 4, 2020, Pages 107-118]
-
Recurrent Neural Network (RNN)
P2P Botnet Detection Using Deep Learning Method [Volume 8, Issue 2, 2020, Pages 1-14]
-
Relay Cluster-Head
Energy-Harvesting Aware Multi-Hop Routing in Wireless Sensor Networks for Defense Applications [Volume 8, Issue 4, 2020, Pages 63-73]
-
Reliability
Reliability Analysis of Open-Loop Switching Loran Signal Generator Using Omoe Indicator [Volume 8, Issue 2, 2020, Pages 83-93]
-
Resource Assignment
Modelling and optimal solving of dependent sensor-weapon/threat assignment and scheduling problem by a metaheuristic algorithm based on GRASP [Volume 8, Issue 1, 2020, Pages 35-50]
-
Resource provisioning
Resource Elasticity Management using Fuzzy Controller Based on Threshold Changes in the Cloud Computing Environment [Volume 8, Issue 3, 2020, Pages 63-81]
-
RFID System
Introduction of An Anti-Collision Protocol in RFID Systems [Volume 8, Issue 4, 2020, Pages 119-128]
S
-
S-box
An Image Encryption Algorithm Based on the Sn Permutation Group and Chaotic Functions [Volume 8, Issue 3, 2020, Pages 139-150]
-
Scheduling
Modelling and optimal solving of dependent sensor-weapon/threat assignment and scheduling problem by a metaheuristic algorithm based on GRASP [Volume 8, Issue 1, 2020, Pages 35-50]
-
Searchable encryption
Fuzzy Keyword Search Scheme on an Encrypted Database in Cloud Computing Using Word Clustering [Volume 8, Issue 3, 2020, Pages 151-165]
-
Secret key agreement
Information Theoretic Secret Key Agreement Based on Localization [Volume 8, Issue 2, 2020, Pages 35-49]
-
Secret key capacity
Information Theoretic Secret Key Agreement Based on Localization [Volume 8, Issue 2, 2020, Pages 35-49]
-
Secret Sharing
Two Verifiable Multi-Secret Sharing Schemes: A Linear Scheme with Standard Security and A Lattice-Based Scheme [Volume 8, Issue 3, 2020, Pages 101-115]
-
Security Bound
Upper Bounds for the Probability of Differential Characteristics of Five Block Cipher
Constructions Functions [Volume 8, Issue 4, 2020, Pages 129-137]
-
Semantic Mining
Providing an Agent-Based Architecture for Semantic Mining From Large-Scale Data in Distributed Environments [Volume 8, Issue 3, 2020, Pages 83-99]
-
Social network analysis
An Improved New Link Prediction Method in Social Multilplex Networks Based on the Gravitational Search Algorithm [Volume 8, Issue 2, 2020, Pages 15-24]
-
Software Defined Network
An Accelerated Method for Rules Anomaly Detection in Software Defined Networks [Volume 8, Issue 4, 2020, Pages 31-39]
-
Software vulnerability
The relationship of software vulnerabilities and workarounds [Volume 8, Issue 2, 2020, Pages 75-81]
-
Sparse
Coherent Acoustic source DOA estimation by nested array based on sparse solution [Volume 8, Issue 1, 2020, Pages 79-88]
-
Specific Values
Frequency Spectrum Sensing by Multi-Stage Adaptive Optimization Algorithm with the Efficient Non-Cooperative Technique in Cognitive radios with hardware implementation [Volume 8, Issue 3, 2020, Pages 39-51]
-
Spectral Holes
Frequency Spectrum Sensing by Multi-Stage Adaptive Optimization Algorithm with the Efficient Non-Cooperative Technique in Cognitive radios with hardware implementation [Volume 8, Issue 3, 2020, Pages 39-51]
-
Spectral Sensors
Frequency Spectrum Sensing by Multi-Stage Adaptive Optimization Algorithm with the Efficient Non-Cooperative Technique in Cognitive radios with hardware implementation [Volume 8, Issue 3, 2020, Pages 39-51]
-
Spread Spectrum
Steganography on raw video based on proper detection and compromise between the parameters of transparency, resistance and capacity [Volume 8, Issue 1, 2020, Pages 51-65]
-
SQL Injection Attacks
Detection and Prevention of SQL Injection Attacks at Runtime Using Decision Tree Classification [Volume 8, Issue 4, 2020, Pages 75-93]
-
Standard Security
Two Verifiable Multi-Secret Sharing Schemes: A Linear Scheme with Standard Security and A Lattice-Based Scheme [Volume 8, Issue 3, 2020, Pages 101-115]
-
Static Analysis
An Improved New Link Prediction Method in Social Multilplex Networks Based on the Gravitational Search Algorithm [Volume 8, Issue 2, 2020, Pages 15-24]
-
Switching amplifier
Reliability Analysis of Open-Loop Switching Loran Signal Generator Using Omoe Indicator [Volume 8, Issue 2, 2020, Pages 83-93]
T
-
Tabu Search
Enhancing E-Security by Inserting a Watermark Using the Combination of Genetic Algorithm and Tabu Search [Volume 8, Issue 3, 2020, Pages 25-37]
-
Tag Identification
Introduction of An Anti-Collision Protocol in RFID Systems [Volume 8, Issue 4, 2020, Pages 119-128]
-
Task scheduling
A Fault Tolerant Task Scheduling Method for Optimal use of Resources in Cloud Computing Environment [Volume 8, Issue 2, 2020, Pages 95-103]
-
Text Mining
Automatic Keyword Extraction from Persian short Text Using word2vec [Volume 8, Issue 2, 2020, Pages 105-114]
-
Threshold
Resource Elasticity Management using Fuzzy Controller Based on Threshold Changes in the Cloud Computing Environment [Volume 8, Issue 3, 2020, Pages 63-81]
-
Timing Channel
Web Covert Timing Channel Detection based on Entropy [Volume 8, Issue 3, 2020, Pages 13-23]
-
Tree-based Protocol
Introduction of An Anti-Collision Protocol in RFID Systems [Volume 8, Issue 4, 2020, Pages 119-128]
U
-
Underdetermined
Coherent Acoustic source DOA estimation by nested array based on sparse solution [Volume 8, Issue 1, 2020, Pages 79-88]
-
User-association
Joint Optimization of User Association, Subchannel Allocation and Power Allocation in OFDMA Heterogeneous Networks [Volume 8, Issue 3, 2020, Pages 117-129]
V
-
VANET
Security Analysis and Improvement of an Intelligent Transportation System based on Certificateless Aggregate Signature [Volume 8, Issue 1, 2020, Pages 25-33]
-
VANET
Distributed Anonymity Based On the Integrated Block Chain in Vehicular Ad Hoc Network [Volume 8, Issue 4, 2020, Pages 41-52]
-
Verifiability
Two Verifiable Multi-Secret Sharing Schemes: A Linear Scheme with Standard Security and A Lattice-Based Scheme [Volume 8, Issue 3, 2020, Pages 101-115]
-
VuWaDB database
The relationship of software vulnerabilities and workarounds [Volume 8, Issue 2, 2020, Pages 75-81]
W
-
WEB
Web Covert Timing Channel Detection based on Entropy [Volume 8, Issue 3, 2020, Pages 13-23]
-
Web Applications
Detection and Prevention of SQL Injection Attacks at Runtime Using Decision Tree Classification [Volume 8, Issue 4, 2020, Pages 75-93]
-
Weighted Least Square Eerror
Wireless Target Localization Using Median Weighted Least Square Error Metric in the Presence of Non-Line of Sight Signals [Volume 8, Issue 2, 2020, Pages 125-133]
-
Wireless Sensor Networks
Energy-Harvesting Aware Multi-Hop Routing in Wireless Sensor Networks for Defense Applications [Volume 8, Issue 4, 2020, Pages 63-73]
-
Word Similarity
Automatic Keyword Extraction from Persian short Text Using word2vec [Volume 8, Issue 2, 2020, Pages 105-114]
-
Workaround
The relationship of software vulnerabilities and workarounds [Volume 8, Issue 2, 2020, Pages 75-81]
Your query does not match with any item