A
-
A5 Ciphering Algorithms
Prediction of Plaintext in GSM Network using SDCCH Logical Channel [Volume 9, Issue 3, 2021, Pages 39-47]
-
Active Cyber Defense
The Presentation of an Active Cyber Defense Model for Application in Cyber Deception Technology [Volume 9, Issue 4, 2021, Pages 125-140]
-
Active Learnin
A Comprehensive Semi-Suprvised Model for Collaborative Intrusion Detection Based on Network Behavior Profiling Using The Concept of Deep Learning and Fuzzy Correlation of Alerts along [Volume 9, Issue 3, 2021, Pages 165-186]
-
Algorithm Kernel density Estimation
Detecting Fake Accounts in Social Networks Using Principal Components
Analysis and Kernel
Density Estimation Algorithm (A Case Study on the Twitter Social Network) [Volume 9, Issue 3, 2021, Pages 109-123]
-
Anomalous Subgraphs
Concurrent Detection of Compact Anomalous Subgraphs in Large Social Networks [Volume 9, Issue 2, 2021, Pages 179-194]
-
Anomaly Detection
Anomaly Detection in Dynamic Social Networks Based on Behavioral Measurements [Volume 9, Issue 1, 2021, Pages 115-123]
-
Anomaly Detection
Real-time Topology-based Tracking of Microscopic Objects [Volume 9, Issue 3, 2021, Pages 1-20]
-
Anomaly Detection
Concurrent Detection of Compact Anomalous Subgraphs in Large Social Networks [Volume 9, Issue 2, 2021, Pages 179-194]
-
Anomaly Detection
The Presentation of a Hybrid Anomaly Detection Model Using Inverse Weight Clustering and Machine Learning in Cloud Environments [Volume 9, Issue 4, 2021, Pages 21-29]
-
Anonymity
Design a Blockchain based Electronic Payment with Users’ Anonymity [Volume 9, Issue 2, 2021, Pages 85-100]
-
Artificial noise
The Analysis and Design of Secure Wireless Networks in the Presence of Users with Different Security Needs Based on Covert Communication and Secure Transmission of Information Theory in the Presence of a Friendly Jammer [Volume 9, Issue 4, 2021, Pages 67-76]
-
Artificial Noise (AN)
Improving the Security in Cellular Communications Networks with adding Artificial Noise by method Non-Orthogonal Resource Allocation Techniques [Volume 9, Issue 2, 2021, Pages 135-142]
-
Association Rules
Providing an Ontology-Based Method for Exploring the Association Rules in
Multi-Agent Distributed Environments [Volume 9, Issue 1, 2021, Pages 1-17]
-
Attack Graph
A Security Model Based Approach for Dynamic Risk Assessment of Multi-Step Attacks in Computer Networks [Volume 9, Issue 1, 2021, Pages 157-173]
-
Auction Algorithm
The IoT Resource Allocation Improvement in Fog Computing Using Non-Cooperative Game Theory [Volume 9, Issue 4, 2021, Pages 147-158]
-
Audio watermarking
Transparent and Robust Audio Watermarking Using Synergy LU Decomposition and the Fibonacci Sequence in GBT-DCT-DWT Transforms [Volume 9, Issue 1, 2021, Pages 101-113]
-
Authentication protocol
A Mutual Authentication Protocol for IoT Users in Cloud Environment [Volume 9, Issue 2, 2021, Pages 17-28]
-
Automated evaluation
The Automated Security Evaluation of Threat Paths Based on Petri Nets [Volume 9, Issue 4, 2021, Pages 87-98]
-
Automatic Text Generation
Automatic Persian Text Generation Using Rule-Based Models and Word Embedding [Volume 9, Issue 4, 2021, Pages 43-54]
-
Autonomous vehicles
The Semantic Segmentation of Autonomous Vehicles Images with the Teacher-Student Technique [Volume 9, Issue 4, 2021, Pages 1-19]
B
-
Basic reproductive ratio
SCEIRS information dissemination model based on rumor spreading in complex networks [Volume 9, Issue 2, 2021, Pages 121-134]
-
Basis Matrix
Inverse Synthetic Aperture Radar (ISAR) Imaging of Targets with Non-Uniform Motion and Constant Acceleration based on Compressed Sensing [Volume 9, Issue 2, 2021, Pages 51-62]
-
BB84 protocol
Generalized Version of the BB84 QKD Protocol with n Polarization Bases and Unequal Probabilities [Volume 9, Issue 1, 2021, Pages 125-136]
-
Behavioral Distance
Kavosh: Offering an Analysis Method and the Impact of Normal Network Traffic on Selection and Extraction Based on the Minkowski Distance [Volume 9, Issue 1, 2021, Pages 137-147]
-
Behavioral Measurement
Anomaly Detection in Dynamic Social Networks Based on Behavioral Measurements [Volume 9, Issue 1, 2021, Pages 115-123]
-
Bidimensional Empirical Mode Decomposition
Improving the Quality of Millimeter Wave Images by Fusion with Visible Images [Volume 9, Issue 4, 2021, Pages 77-86]
-
Big Data
Real-time Topology-based Tracking of Microscopic Objects [Volume 9, Issue 3, 2021, Pages 1-20]
-
Biometric
An Improvement on the Identification via Gait Using the Genetic Algorithm [Volume 9, Issue 4, 2021, Pages 31-42]
-
Blind Recognition
A New Method for Blind Recognition of the Initial State of Synchronous Scramblers When Located after the Channel Encoder [Volume 9, Issue 1, 2021, Pages 19-27]
-
Blockchain
Design a Blockchain based Electronic Payment with Users’ Anonymity [Volume 9, Issue 2, 2021, Pages 85-100]
-
Botnet
Detecting of Botnets’ Malicious Domains with Deep Autoencoder Neural Network [Volume 9, Issue 1, 2021, Pages 61-74]
-
Botnet
Kavosh: Offering an Analysis Method and the Impact of Normal Network Traffic on Selection and Extraction Based on the Minkowski Distance [Volume 9, Issue 1, 2021, Pages 137-147]
C
-
Channel Encoder
A New Method for Blind Recognition of the Initial State of Synchronous Scramblers When Located after the Channel Encoder [Volume 9, Issue 1, 2021, Pages 19-27]
-
Classification Algorithm
Distributed Denial of Service Attacks Detection in Software Defined Networks [Volume 9, Issue 1, 2021, Pages 43-59]
-
Clustering
Energy-aware routing in wireless sensor networks using MLP and simulated annealing algorithms [Volume 9, Issue 3, 2021, Pages 133-142]
-
Cognitive Radio Network
Interference Mitigation in Cognitive Radio Communication Systems Based on the Wavelet Transform [Volume 9, Issue 4, 2021, Pages 55-66]
-
Cognitive Radio Sensor Network
A new analytical model for enhancing performance of cognitive radio user’s transmissions in the internet of things [Volume 9, Issue 3, 2021, Pages 73-82]
-
Common Vulnerability Scoring System(CVSS)
A Security Model Based Approach for Dynamic Risk Assessment of Multi-Step Attacks in Computer Networks [Volume 9, Issue 1, 2021, Pages 157-173]
-
Complex network
SCEIRS information dissemination model based on rumor spreading in complex networks [Volume 9, Issue 2, 2021, Pages 121-134]
-
Compressed Sensing (CS)
Inverse Synthetic Aperture Radar (ISAR) Imaging of Targets with Non-Uniform Motion and Constant Acceleration based on Compressed Sensing [Volume 9, Issue 2, 2021, Pages 51-62]
-
Compressive Sensing
Concurrent Detection of Compact Anomalous Subgraphs in Large Social Networks [Volume 9, Issue 2, 2021, Pages 179-194]
-
Conditional Privacy
Design a Blockchain based Electronic Payment with Users’ Anonymity [Volume 9, Issue 2, 2021, Pages 85-100]
-
Conflict Analysis
The Improvement of the GMCR Model Based on Statistical Analysis of the Game’ Graph (Case Study: Malwares and Countermeasures Actions Based on Detection-Independent and Deductive Evidence) [Volume 9, Issue 4, 2021, Pages 99-123]
-
Controller
Presentation and Performance Evaluation of an Efficient Algorithm for a Distributed Controller in SDN [Volume 9, Issue 1, 2021, Pages 175-183]
-
Convolutional neural networks
The Semantic Segmentation of Autonomous Vehicles Images with the Teacher-Student Technique [Volume 9, Issue 4, 2021, Pages 1-19]
-
Copyright protection
Transparent and Robust Audio Watermarking Using Synergy LU Decomposition and the Fibonacci Sequence in GBT-DCT-DWT Transforms [Volume 9, Issue 1, 2021, Pages 101-113]
-
Cost Optimization
A Techno-Economic Model of Sustainable Communication Infrastructure in the Smart City; using WDM-PON FTTx [Volume 9, Issue 1, 2021, Pages 149-156]
-
Counterattak
SCEIRS information dissemination model based on rumor spreading in complex networks [Volume 9, Issue 2, 2021, Pages 121-134]
-
Covert Communication
The Analysis and Design of Secure Wireless Networks in the Presence of Users with Different Security Needs Based on Covert Communication and Secure Transmission of Information Theory in the Presence of a Friendly Jammer [Volume 9, Issue 4, 2021, Pages 67-76]
-
Cross Site Scripting (XSS)
Automatic XSS Exploit Generation Using Grammatical Evolution [Volume 9, Issue 2, 2021, Pages 101-119]
-
Cryptography
A New Mechanism for Enhancing the Security of Military Internet of Things by Using Quantum and Classic Cryptography [Volume 9, Issue 2, 2021, Pages 29-49]
-
Cyber Dynamic
The Presentation of an Active Cyber Defense Model for Application in Cyber Deception Technology [Volume 9, Issue 4, 2021, Pages 125-140]
-
Cyber Security
The Presentation of an Active Cyber Defense Model for Application in Cyber Deception Technology [Volume 9, Issue 4, 2021, Pages 125-140]
D
-
Data Aggregation
A Heuristic Data Diffusion and Gathering Scheme Using Virtual Line for Wireless Sensor Networks with Mobile Sink [Volume 9, Issue 2, 2021, Pages 195-207]
-
Data diffusion
A Heuristic Data Diffusion and Gathering Scheme Using Virtual Line for Wireless Sensor Networks with Mobile Sink [Volume 9, Issue 2, 2021, Pages 195-207]
-
Data Gathering
A Heuristic Data Diffusion and Gathering Scheme Using Virtual Line for Wireless Sensor Networks with Mobile Sink [Volume 9, Issue 2, 2021, Pages 195-207]
-
Decision Tree
Intrusion Detection in Computer Networks using Decision Tree and Feature Reduction [Volume 9, Issue 3, 2021, Pages 99-108]
-
Deep Autoencoder Neural Network
Detecting of Botnets’ Malicious Domains with Deep Autoencoder Neural Network [Volume 9, Issue 1, 2021, Pages 61-74]
-
Deep Neural Network
Detecting of Botnets’ Malicious Domains with Deep Autoencoder Neural Network [Volume 9, Issue 1, 2021, Pages 61-74]
-
Deep Neural Networks
Classification of High Dimensional Imbalanced Dataset via Game Theory-based Generative Adversarial Networks [Volume 9, Issue 2, 2021, Pages 63-74]
-
Detection-Independent and deductive evidence
The Improvement of the GMCR Model Based on Statistical Analysis of the Game’ Graph (Case Study: Malwares and Countermeasures Actions Based on Detection-Independent and Deductive Evidence) [Volume 9, Issue 4, 2021, Pages 99-123]
-
Differential privacy
Trajectory Database Release with Differential Privacy Guarantee [Volume 9, Issue 1, 2021, Pages 29-42]
-
Digital Signature
A New Mechanism for Enhancing the Security of Military Internet of Things by Using Quantum and Classic Cryptography [Volume 9, Issue 2, 2021, Pages 29-49]
-
Dimensionality reduction
Fixing Security Defects of Video Authentication Systems with Face Recognition, Based on 3D Structure and Shape Evaluation [Volume 9, Issue 4, 2021, Pages 141-145]
-
Discrete Cosine Transform(DCT)
Transparent and Robust Audio Watermarking Using Synergy LU Decomposition and the Fibonacci Sequence in GBT-DCT-DWT Transforms [Volume 9, Issue 1, 2021, Pages 101-113]
-
Discrete wavelet transform (DWT) LU decomposition
Transparent and Robust Audio Watermarking Using Synergy LU Decomposition and the Fibonacci Sequence in GBT-DCT-DWT Transforms [Volume 9, Issue 1, 2021, Pages 101-113]
-
Distributed Algorithm
Real-time Topology-based Tracking of Microscopic Objects [Volume 9, Issue 3, 2021, Pages 1-20]
-
Distributed Denial of Service
Distributed Denial of Service Attacks Detection in Software Defined Networks [Volume 9, Issue 1, 2021, Pages 43-59]
-
Distribution
Presentation and Performance Evaluation of an Efficient Algorithm for a Distributed Controller in SDN [Volume 9, Issue 1, 2021, Pages 175-183]
-
DNS data
Malicious Domain Detection using DNS Records [Volume 9, Issue 3, 2021, Pages 83-97]
-
Domain Generation Algorithms (DGAs)
Detecting of Botnets’ Malicious Domains with Deep Autoencoder Neural Network [Volume 9, Issue 1, 2021, Pages 61-74]
-
Dominating set
k-Adjacency Domination in Graphs [Volume 9, Issue 3, 2021, Pages 125-131]
-
Domination number
k-Adjacency Domination in Graphs [Volume 9, Issue 3, 2021, Pages 125-131]
-
DoS attack
Intrusion Detection in Computer Networks using Decision Tree and Feature Reduction [Volume 9, Issue 3, 2021, Pages 99-108]
-
Dragonfly Optimization Algorithm
Providing a behavioral malware detection system based on the function of hardware counters using a neural network optimized with a dragonfly algorithm [Volume 9, Issue 2, 2021, Pages 9-16]
-
Dynamic Graph
Anomaly Detection in Dynamic Social Networks Based on Behavioral Measurements [Volume 9, Issue 1, 2021, Pages 115-123]
E
-
Effective Options
The Improvement of the GMCR Model Based on Statistical Analysis of the Game’ Graph (Case Study: Malwares and Countermeasures Actions Based on Detection-Independent and Deductive Evidence) [Volume 9, Issue 4, 2021, Pages 99-123]
-
Electronic Payment
Design a Blockchain based Electronic Payment with Users’ Anonymity [Volume 9, Issue 2, 2021, Pages 85-100]
-
End to end delay
A new analytical model for enhancing performance of cognitive radio user’s transmissions in the internet of things [Volume 9, Issue 3, 2021, Pages 73-82]
-
Exploitation
Automatic XSS Exploit Generation Using Grammatical Evolution [Volume 9, Issue 2, 2021, Pages 101-119]
-
Exposed
SCEIRS information dissemination model based on rumor spreading in complex networks [Volume 9, Issue 2, 2021, Pages 121-134]
F
-
Face recognition
Fixing Security Defects of Video Authentication Systems with Face Recognition, Based on 3D Structure and Shape Evaluation [Volume 9, Issue 4, 2021, Pages 141-145]
-
Feature Extraction
Detecting of Botnets’ Malicious Domains with Deep Autoencoder Neural Network [Volume 9, Issue 1, 2021, Pages 61-74]
-
Feature Extraction
Kavosh: Offering an Analysis Method and the Impact of Normal Network Traffic on Selection and Extraction Based on the Minkowski Distance [Volume 9, Issue 1, 2021, Pages 137-147]
-
Feature Extraction
Providing a new solution to botnet detection in a Markov chain-based network [Volume 9, Issue 3, 2021, Pages 59-71]
-
Fog Computing
The Presentation of a Hybrid Anomaly Detection Model Using Inverse Weight Clustering and Machine Learning in Cloud Environments [Volume 9, Issue 4, 2021, Pages 21-29]
-
Fog Computing
The IoT Resource Allocation Improvement in Fog Computing Using Non-Cooperative Game Theory [Volume 9, Issue 4, 2021, Pages 147-158]
-
Friendly jammer
The Analysis and Design of Secure Wireless Networks in the Presence of Users with Different Security Needs Based on Covert Communication and Secure Transmission of Information Theory in the Presence of a Friendly Jammer [Volume 9, Issue 4, 2021, Pages 67-76]
-
FTTx
A Techno-Economic Model of Sustainable Communication Infrastructure in the Smart City; using WDM-PON FTTx [Volume 9, Issue 1, 2021, Pages 149-156]
-
Fusion Evaluation Criterion
Improving the Quality of Millimeter Wave Images by Fusion with Visible Images [Volume 9, Issue 4, 2021, Pages 77-86]
-
Fuzzer
Automatic XSS Exploit Generation Using Grammatical Evolution [Volume 9, Issue 2, 2021, Pages 101-119]
-
Fuzz Testing
Automatic XSS Exploit Generation Using Grammatical Evolution [Volume 9, Issue 2, 2021, Pages 101-119]
-
Fuzzy Correlator
A Comprehensive Semi-Suprvised Model for Collaborative Intrusion Detection Based on Network Behavior Profiling Using The Concept of Deep Learning and Fuzzy Correlation of Alerts along [Volume 9, Issue 3, 2021, Pages 165-186]
-
Fuzzy Logic
A model for feature selection in software fault prediction based on memetic algorithm and fuzzy logic [Volume 9, Issue 3, 2021, Pages 143-163]
G
-
Gait Energy Image (GEI)
An Improvement on the Identification via Gait Using the Genetic Algorithm [Volume 9, Issue 4, 2021, Pages 31-42]
-
Game Theory
Classification of High Dimensional Imbalanced Dataset via Game Theory-based Generative Adversarial Networks [Volume 9, Issue 2, 2021, Pages 63-74]
-
Game Theory
The Improvement of the GMCR Model Based on Statistical Analysis of the Game’ Graph (Case Study: Malwares and Countermeasures Actions Based on Detection-Independent and Deductive Evidence) [Volume 9, Issue 4, 2021, Pages 99-123]
-
Generative Adversarial Networks
Classification of High Dimensional Imbalanced Dataset via Game Theory-based Generative Adversarial Networks [Volume 9, Issue 2, 2021, Pages 63-74]
-
Genetic Algorithm (GA)
An Improvement on the Identification via Gait Using the Genetic Algorithm [Volume 9, Issue 4, 2021, Pages 31-42]
-
Geometric methods
Fixing Security Defects of Video Authentication Systems with Face Recognition, Based on 3D Structure and Shape Evaluation [Volume 9, Issue 4, 2021, Pages 141-145]
-
GPS
Improving INS/GPS Integration with Artificial Intelligence during GPS Outage [Volume 9, Issue 2, 2021, Pages 143-157]
-
GPS Receiver
Reducing Interference Effect on GPS Receiver by Using Multi-correlation Architecture [Volume 9, Issue 3, 2021, Pages 49-57]
-
Grammatical Evolution
Automatic XSS Exploit Generation Using Grammatical Evolution [Volume 9, Issue 2, 2021, Pages 101-119]
-
Graph
k-Adjacency Domination in Graphs [Volume 9, Issue 3, 2021, Pages 125-131]
-
Graph Analysis
Detecting Fake Accounts in Social Networks Using Principal Components
Analysis and Kernel
Density Estimation Algorithm (A Case Study on the Twitter Social Network) [Volume 9, Issue 3, 2021, Pages 109-123]
-
Graph-based Transform(GBT)
Transparent and Robust Audio Watermarking Using Synergy LU Decomposition and the Fibonacci Sequence in GBT-DCT-DWT Transforms [Volume 9, Issue 1, 2021, Pages 101-113]
-
Graph Model
The Improvement of the GMCR Model Based on Statistical Analysis of the Game’ Graph (Case Study: Malwares and Countermeasures Actions Based on Detection-Independent and Deductive Evidence) [Volume 9, Issue 4, 2021, Pages 99-123]
-
Graph Theory
Concurrent Detection of Compact Anomalous Subgraphs in Large Social Networks [Volume 9, Issue 2, 2021, Pages 179-194]
-
GSM Network
Prediction of Plaintext in GSM Network using SDCCH Logical Channel [Volume 9, Issue 3, 2021, Pages 39-47]
H
-
Hardware Counters
Providing a behavioral malware detection system based on the function of hardware counters using a neural network optimized with a dragonfly algorithm [Volume 9, Issue 2, 2021, Pages 9-16]
-
Hash Function
Improvement of Rotational Cryptanalysis of Shabal and Cubehash Hash Functions [Volume 9, Issue 1, 2021, Pages 91-100]
I
-
IDS
The Presentation of a Hybrid Anomaly Detection Model Using Inverse Weight Clustering and Machine Learning in Cloud Environments [Volume 9, Issue 4, 2021, Pages 21-29]
-
Image Classification
Classification of High Dimensional Imbalanced Dataset via Game Theory-based Generative Adversarial Networks [Volume 9, Issue 2, 2021, Pages 63-74]
-
Image Fusion
Improving the Quality of Millimeter Wave Images by Fusion with Visible Images [Volume 9, Issue 4, 2021, Pages 77-86]
-
Image Processing
Real-time Topology-based Tracking of Microscopic Objects [Volume 9, Issue 3, 2021, Pages 1-20]
-
Imbalanced Dataset
Classification of High Dimensional Imbalanced Dataset via Game Theory-based Generative Adversarial Networks [Volume 9, Issue 2, 2021, Pages 63-74]
-
Incremental Online Learning
A Comprehensive Semi-Suprvised Model for Collaborative Intrusion Detection Based on Network Behavior Profiling Using The Concept of Deep Learning and Fuzzy Correlation of Alerts along [Volume 9, Issue 3, 2021, Pages 165-186]
-
Initial State
A New Method for Blind Recognition of the Initial State of Synchronous Scramblers When Located after the Channel Encoder [Volume 9, Issue 1, 2021, Pages 19-27]
-
INS
Improving INS/GPS Integration with Artificial Intelligence during GPS Outage [Volume 9, Issue 2, 2021, Pages 143-157]
-
Intentional Interference
Interference Mitigation in Cognitive Radio Communication Systems Based on the Wavelet Transform [Volume 9, Issue 4, 2021, Pages 55-66]
-
Interference Mitigation
Interference Mitigation in Cognitive Radio Communication Systems Based on the Wavelet Transform [Volume 9, Issue 4, 2021, Pages 55-66]
-
Internet of Things
A Mutual Authentication Protocol for IoT Users in Cloud Environment [Volume 9, Issue 2, 2021, Pages 17-28]
-
Internet of Things
A new analytical model for enhancing performance of cognitive radio user’s transmissions in the internet of things [Volume 9, Issue 3, 2021, Pages 73-82]
-
Internet of Things (IoT)
Real-time Topology-based Tracking of Microscopic Objects [Volume 9, Issue 3, 2021, Pages 1-20]
-
Intrusion detection
Intrusion Detection in Computer Networks using Decision Tree and Feature Reduction [Volume 9, Issue 3, 2021, Pages 99-108]
-
Inverse Synthetic Aperture Radar (ISAR)
Inverse Synthetic Aperture Radar (ISAR) Imaging of Targets with Non-Uniform Motion and Constant Acceleration based on Compressed Sensing [Volume 9, Issue 2, 2021, Pages 51-62]
-
IoT
The Presentation of a Hybrid Anomaly Detection Model Using Inverse Weight Clustering and Machine Learning in Cloud Environments [Volume 9, Issue 4, 2021, Pages 21-29]
-
IoT
The IoT Resource Allocation Improvement in Fog Computing Using Non-Cooperative Game Theory [Volume 9, Issue 4, 2021, Pages 147-158]
-
ISCM Neural Network
Improving the Quality of Millimeter Wave Images by Fusion with Visible Images [Volume 9, Issue 4, 2021, Pages 77-86]
K
-
KDD Cup99 dataset
Intrusion Detection in Computer Networks using Decision Tree and Feature Reduction [Volume 9, Issue 3, 2021, Pages 99-108]
L
-
Linear discriminant analysis (LDA)
Fixing Security Defects of Video Authentication Systems with Face Recognition, Based on 3D Structure and Shape Evaluation [Volume 9, Issue 4, 2021, Pages 141-145]
-
Load Balancing
Presentation and Performance Evaluation of an Efficient Algorithm for a Distributed Controller in SDN [Volume 9, Issue 1, 2021, Pages 175-183]
-
LSB
Speech Steganalysis of Least Significant Bits Based on the Percentage of Equal Adjacent Samples [Volume 9, Issue 1, 2021, Pages 75-90]
-
LVQ
Radar data processing using a combination of principal component analysis methods and self-organizing and digitized neural networks of the learning vector [Volume 9, Issue 2, 2021, Pages 1-7]
M
-
Machine Learning
Classification of High Dimensional Imbalanced Dataset via Game Theory-based Generative Adversarial Networks [Volume 9, Issue 2, 2021, Pages 63-74]
-
MAG Architecture
The Improvement of the GMCR Model Based on Statistical Analysis of the Game’ Graph (Case Study: Malwares and Countermeasures Actions Based on Detection-Independent and Deductive Evidence) [Volume 9, Issue 4, 2021, Pages 99-123]
-
Malicious domain detection
Malicious Domain Detection using DNS Records [Volume 9, Issue 3, 2021, Pages 83-97]
-
Malware
Providing a behavioral malware detection system based on the function of hardware counters using a neural network optimized with a dragonfly algorithm [Volume 9, Issue 2, 2021, Pages 9-16]
-
Malware Analysis
The Improvement of the GMCR Model Based on Statistical Analysis of the Game’ Graph (Case Study: Malwares and Countermeasures Actions Based on Detection-Independent and Deductive Evidence) [Volume 9, Issue 4, 2021, Pages 99-123]
-
Mapping-Reduction
Providing an Ontology-Based Method for Exploring the Association Rules in
Multi-Agent Distributed Environments [Volume 9, Issue 1, 2021, Pages 1-17]
-
Markov
Interference Mitigation in Cognitive Radio Communication Systems Based on the Wavelet Transform [Volume 9, Issue 4, 2021, Pages 55-66]
-
Markov Chain
A new analytical model for enhancing performance of cognitive radio user’s transmissions in the internet of things [Volume 9, Issue 3, 2021, Pages 73-82]
-
Markov Chain
Providing a new solution to botnet detection in a Markov chain-based network [Volume 9, Issue 3, 2021, Pages 59-71]
-
Markov Chain
The Presentation of an Active Cyber Defense Model for Application in Cyber Deception Technology [Volume 9, Issue 4, 2021, Pages 125-140]
-
Markov Chaining
Improvement of Rotational Cryptanalysis of Shabal and Cubehash Hash Functions [Volume 9, Issue 1, 2021, Pages 91-100]
-
Meta- heuristic
Security-aware Task Scheduling Algorithm based on Multi Adaptive Learning and PSO Technique [Volume 9, Issue 2, 2021, Pages 159-178]
-
Microscopic Objects
Real-time Topology-based Tracking of Microscopic Objects [Volume 9, Issue 3, 2021, Pages 1-20]
-
Military Internet of Things
A New Mechanism for Enhancing the Security of Military Internet of Things by Using Quantum and Classic Cryptography [Volume 9, Issue 2, 2021, Pages 29-49]
-
MILP
A Techno-Economic Model of Sustainable Communication Infrastructure in the Smart City; using WDM-PON FTTx [Volume 9, Issue 1, 2021, Pages 149-156]
-
Minkowski Distance
Kavosh: Offering an Analysis Method and the Impact of Normal Network Traffic on Selection and Extraction Based on the Minkowski Distance [Volume 9, Issue 1, 2021, Pages 137-147]
-
Mobile Sink
A Heuristic Data Diffusion and Gathering Scheme Using Virtual Line for Wireless Sensor Networks with Mobile Sink [Volume 9, Issue 2, 2021, Pages 195-207]
-
Modular Addition
Improvement of Rotational Cryptanalysis of Shabal and Cubehash Hash Functions [Volume 9, Issue 1, 2021, Pages 91-100]
-
Multi Agent Systems
Providing an Ontology-Based Method for Exploring the Association Rules in
Multi-Agent Distributed Environments [Volume 9, Issue 1, 2021, Pages 1-17]
-
Multi-correlation Architecture
Reducing Interference Effect on GPS Receiver by Using Multi-correlation Architecture [Volume 9, Issue 3, 2021, Pages 49-57]
-
Multi-Layer Perceptron Neural Network
Providing a behavioral malware detection system based on the function of hardware counters using a neural network optimized with a dragonfly algorithm [Volume 9, Issue 2, 2021, Pages 9-16]
-
Multi-Step Attacks
A Security Model Based Approach for Dynamic Risk Assessment of Multi-Step Attacks in Computer Networks [Volume 9, Issue 1, 2021, Pages 157-173]
N
-
Nash Equilibrium
The IoT Resource Allocation Improvement in Fog Computing Using Non-Cooperative Game Theory [Volume 9, Issue 4, 2021, Pages 147-158]
-
Natural Language Generation
Automatic Persian Text Generation Using Rule-Based Models and Word Embedding [Volume 9, Issue 4, 2021, Pages 43-54]
-
Navigation
Improving INS/GPS Integration with Artificial Intelligence during GPS Outage [Volume 9, Issue 2, 2021, Pages 143-157]
-
Network Flow
Kavosh: Offering an Analysis Method and the Impact of Normal Network Traffic on Selection and Extraction Based on the Minkowski Distance [Volume 9, Issue 1, 2021, Pages 137-147]
-
Network Flow
Providing a new solution to botnet detection in a Markov chain-based network [Volume 9, Issue 3, 2021, Pages 59-71]
-
Neural Networks MLP
Energy-aware routing in wireless sensor networks using MLP and simulated annealing algorithms [Volume 9, Issue 3, 2021, Pages 133-142]
-
Noisy path tree
Trajectory Database Release with Differential Privacy Guarantee [Volume 9, Issue 1, 2021, Pages 29-42]
-
Non-orthogonal multiple access (NOMA)
Improving the Security in Cellular Communications Networks with adding Artificial Noise by method Non-Orthogonal Resource Allocation Techniques [Volume 9, Issue 2, 2021, Pages 135-142]
-
Non-uniform motion
Inverse Synthetic Aperture Radar (ISAR) Imaging of Targets with Non-Uniform Motion and Constant Acceleration based on Compressed Sensing [Volume 9, Issue 2, 2021, Pages 51-62]
-
Normal Distribution
Distributed Denial of Service Attacks Detection in Software Defined Networks [Volume 9, Issue 1, 2021, Pages 43-59]
O
-
Ontology
Providing an Ontology-Based Method for Exploring the Association Rules in
Multi-Agent Distributed Environments [Volume 9, Issue 1, 2021, Pages 1-17]
-
Outage
Improving INS/GPS Integration with Artificial Intelligence during GPS Outage [Volume 9, Issue 2, 2021, Pages 143-157]
P
-
Packet loss probability
A new analytical model for enhancing performance of cognitive radio user’s transmissions in the internet of things [Volume 9, Issue 3, 2021, Pages 73-82]
-
Passive Millimeter Wave Imaging
Improving the Quality of Millimeter Wave Images by Fusion with Visible Images [Volume 9, Issue 4, 2021, Pages 77-86]
-
PCA
Radar data processing using a combination of principal component analysis methods and self-organizing and digitized neural networks of the learning vector [Volume 9, Issue 2, 2021, Pages 1-7]
-
PendingIntent
PIVATool- a fast and precise tool for analysis and detection of PendingIntent vulnerabilities [Volume 9, Issue 2, 2021, Pages 75-83]
-
Petri Nets
The Automated Security Evaluation of Threat Paths Based on Petri Nets [Volume 9, Issue 4, 2021, Pages 87-98]
-
Phishing
Malicious Domain Detection using DNS Records [Volume 9, Issue 3, 2021, Pages 83-97]
-
PIAnalyzer
PIVATool- a fast and precise tool for analysis and detection of PendingIntent vulnerabilities [Volume 9, Issue 2, 2021, Pages 75-83]
-
PIVATool
PIVATool- a fast and precise tool for analysis and detection of PendingIntent vulnerabilities [Volume 9, Issue 2, 2021, Pages 75-83]
-
Primary user
A new analytical model for enhancing performance of cognitive radio user’s transmissions in the internet of things [Volume 9, Issue 3, 2021, Pages 73-82]
-
Principal Component Analysis (PCA)
An Improvement on the Identification via Gait Using the Genetic Algorithm [Volume 9, Issue 4, 2021, Pages 31-42]
-
Principal Component Analysis (PCA)
Fixing Security Defects of Video Authentication Systems with Face Recognition, Based on 3D Structure and Shape Evaluation [Volume 9, Issue 4, 2021, Pages 141-145]
Q
-
Quantum Secret Sharing
A New Mechanism for Enhancing the Security of Military Internet of Things by Using Quantum and Classic Cryptography [Volume 9, Issue 2, 2021, Pages 29-49]
R
-
Radar Processing
Radar data processing using a combination of principal component analysis methods and self-organizing and digitized neural networks of the learning vector [Volume 9, Issue 2, 2021, Pages 1-7]
-
Reachability graph
The Automated Security Evaluation of Threat Paths Based on Petri Nets [Volume 9, Issue 4, 2021, Pages 87-98]
-
Real-time Topology-based Tracking
Real-time Topology-based Tracking of Microscopic Objects [Volume 9, Issue 3, 2021, Pages 1-20]
-
Resource Allocation
Improving the Security in Cellular Communications Networks with adding Artificial Noise by method Non-Orthogonal Resource Allocation Techniques [Volume 9, Issue 2, 2021, Pages 135-142]
-
Resource Allocation
The IoT Resource Allocation Improvement in Fog Computing Using Non-Cooperative Game Theory [Volume 9, Issue 4, 2021, Pages 147-158]
-
Revocation
Design a Blockchain based Electronic Payment with Users’ Anonymity [Volume 9, Issue 2, 2021, Pages 85-100]
-
Rotational Cryptanalysis
Improvement of Rotational Cryptanalysis of Shabal and Cubehash Hash Functions [Volume 9, Issue 1, 2021, Pages 91-100]
-
Rule-Based Method
Automatic Persian Text Generation Using Rule-Based Models and Word Embedding [Volume 9, Issue 4, 2021, Pages 43-54]
-
Rumor
SCEIRS information dissemination model based on rumor spreading in complex networks [Volume 9, Issue 2, 2021, Pages 121-134]
S
-
Scalability
Presentation and Performance Evaluation of an Efficient Algorithm for a Distributed Controller in SDN [Volume 9, Issue 1, 2021, Pages 175-183]
-
SDCCH logical channel
Prediction of Plaintext in GSM Network using SDCCH Logical Channel [Volume 9, Issue 3, 2021, Pages 39-47]
-
Secondary User
A new analytical model for enhancing performance of cognitive radio user’s transmissions in the internet of things [Volume 9, Issue 3, 2021, Pages 73-82]
-
Secondary Users
Interference Mitigation in Cognitive Radio Communication Systems Based on the Wavelet Transform [Volume 9, Issue 4, 2021, Pages 55-66]
-
Secrecy Sum Rate (SSR)
Improving the Security in Cellular Communications Networks with adding Artificial Noise by method Non-Orthogonal Resource Allocation Techniques [Volume 9, Issue 2, 2021, Pages 135-142]
-
Secure transmission
The Analysis and Design of Secure Wireless Networks in the Presence of Users with Different Security Needs Based on Covert Communication and Secure Transmission of Information Theory in the Presence of a Friendly Jammer [Volume 9, Issue 4, 2021, Pages 67-76]
-
Security Metric
A Security Model Based Approach for Dynamic Risk Assessment of Multi-Step Attacks in Computer Networks [Volume 9, Issue 1, 2021, Pages 157-173]
-
Security requirements
The Automated Security Evaluation of Threat Paths Based on Petri Nets [Volume 9, Issue 4, 2021, Pages 87-98]
-
Semantic Segmentation
The Semantic Segmentation of Autonomous Vehicles Images with the Teacher-Student Technique [Volume 9, Issue 4, 2021, Pages 1-19]
-
Shearlet Transform
Improving the Quality of Millimeter Wave Images by Fusion with Visible Images [Volume 9, Issue 4, 2021, Pages 77-86]
-
Signal Processing
Concurrent Detection of Compact Anomalous Subgraphs in Large Social Networks [Volume 9, Issue 2, 2021, Pages 179-194]
-
Simulated Annealing
Energy-aware routing in wireless sensor networks using MLP and simulated annealing algorithms [Volume 9, Issue 3, 2021, Pages 133-142]
-
Smart City
A Techno-Economic Model of Sustainable Communication Infrastructure in the Smart City; using WDM-PON FTTx [Volume 9, Issue 1, 2021, Pages 149-156]
-
Social network
SCEIRS information dissemination model based on rumor spreading in complex networks [Volume 9, Issue 2, 2021, Pages 121-134]
-
Software Defined Network
Distributed Denial of Service Attacks Detection in Software Defined Networks [Volume 9, Issue 1, 2021, Pages 43-59]
-
Software Defined Network
Presentation and Performance Evaluation of an Efficient Algorithm for a Distributed Controller in SDN [Volume 9, Issue 1, 2021, Pages 175-183]
-
SOM
Radar data processing using a combination of principal component analysis methods and self-organizing and digitized neural networks of the learning vector [Volume 9, Issue 2, 2021, Pages 1-7]
-
Speech steganalysis
Speech Steganalysis of Least Significant Bits Based on the Percentage of Equal Adjacent Samples [Volume 9, Issue 1, 2021, Pages 75-90]
-
Spoofing
Reducing Interference Effect on GPS Receiver by Using Multi-correlation Architecture [Volume 9, Issue 3, 2021, Pages 49-57]
-
Steganography
Speech Steganalysis of Least Significant Bits Based on the Percentage of Equal Adjacent Samples [Volume 9, Issue 1, 2021, Pages 75-90]
-
Synchronous Scrambler
A New Method for Blind Recognition of the Initial State of Synchronous Scramblers When Located after the Channel Encoder [Volume 9, Issue 1, 2021, Pages 19-27]
T
-
Task scheduling
Security-aware Task Scheduling Algorithm based on Multi Adaptive Learning and PSO Technique [Volume 9, Issue 2, 2021, Pages 159-178]
-
Teacher-student technique
The Semantic Segmentation of Autonomous Vehicles Images with the Teacher-Student Technique [Volume 9, Issue 4, 2021, Pages 1-19]
-
Threat modelling
The Automated Security Evaluation of Threat Paths Based on Petri Nets [Volume 9, Issue 4, 2021, Pages 87-98]
-
Threat path
The Automated Security Evaluation of Threat Paths Based on Petri Nets [Volume 9, Issue 4, 2021, Pages 87-98]
-
Throughput
A new analytical model for enhancing performance of cognitive radio user’s transmissions in the internet of things [Volume 9, Issue 3, 2021, Pages 73-82]
-
Traceability
Design a Blockchain based Electronic Payment with Users’ Anonymity [Volume 9, Issue 2, 2021, Pages 85-100]
-
Trajectory database release
Trajectory Database Release with Differential Privacy Guarantee [Volume 9, Issue 1, 2021, Pages 29-42]
-
Trajectory pattern
Trajectory Database Release with Differential Privacy Guarantee [Volume 9, Issue 1, 2021, Pages 29-42]
-
Transport protocol
A new analytical model for enhancing performance of cognitive radio user’s transmissions in the internet of things [Volume 9, Issue 3, 2021, Pages 73-82]
V
-
Virtual line
A Heuristic Data Diffusion and Gathering Scheme Using Virtual Line for Wireless Sensor Networks with Mobile Sink [Volume 9, Issue 2, 2021, Pages 195-207]
-
Vulnerability
PIVATool- a fast and precise tool for analysis and detection of PendingIntent vulnerabilities [Volume 9, Issue 2, 2021, Pages 75-83]
-
Vulnerability
Automatic XSS Exploit Generation Using Grammatical Evolution [Volume 9, Issue 2, 2021, Pages 101-119]
W
-
Wavelet Transform
Interference Mitigation in Cognitive Radio Communication Systems Based on the Wavelet Transform [Volume 9, Issue 4, 2021, Pages 55-66]
-
WDM-PON
A Techno-Economic Model of Sustainable Communication Infrastructure in the Smart City; using WDM-PON FTTx [Volume 9, Issue 1, 2021, Pages 149-156]
-
Wireless Sensor Networks
A Heuristic Data Diffusion and Gathering Scheme Using Virtual Line for Wireless Sensor Networks with Mobile Sink [Volume 9, Issue 2, 2021, Pages 195-207]
-
Wireless Sensor Networks
Energy-aware routing in wireless sensor networks using MLP and simulated annealing algorithms [Volume 9, Issue 3, 2021, Pages 133-142]
-
Word Embedding
Automatic Persian Text Generation Using Rule-Based Models and Word Embedding [Volume 9, Issue 4, 2021, Pages 43-54]
Z
-
Zero-Day Attacks
A Security Model Based Approach for Dynamic Risk Assessment of Multi-Step Attacks in Computer Networks [Volume 9, Issue 1, 2021, Pages 157-173]
Your query does not match with any item