Keyword Index

A

  • A5 Ciphering Algorithms Prediction of Plaintext in GSM Network using SDCCH Logical Channel [Volume 9, Issue 3, 2021, Pages 39-47]
  • Active Cyber Defense The Presentation of an Active Cyber Defense Model for Application in Cyber Deception Technology [Volume 9, Issue 4, 2021, Pages 125-140]
  • Active Learnin A Comprehensive Semi-Suprvised Model for Collaborative Intrusion Detection Based on Network Behavior Profiling Using The Concept of Deep Learning and Fuzzy Correlation of Alerts along [Volume 9, Issue 3, 2021, Pages 165-186]
  • Algorithm Kernel density Estimation Detecting Fake Accounts in Social Networks Using Principal Components Analysis and Kernel Density Estimation Algorithm (A Case Study on the Twitter Social Network) [Volume 9, Issue 3, 2021, Pages 109-123]
  • Anomalous Subgraphs Concurrent Detection of Compact Anomalous Subgraphs in Large Social Networks [Volume 9, Issue 2, 2021, Pages 179-194]
  • Anomaly Detection Anomaly Detection in Dynamic Social Networks Based on Behavioral Measurements [Volume 9, Issue 1, 2021, Pages 115-123]
  • Anomaly Detection Real-time Topology-based Tracking of Microscopic Objects [Volume 9, Issue 3, 2021, Pages 1-20]
  • Anomaly Detection Concurrent Detection of Compact Anomalous Subgraphs in Large Social Networks [Volume 9, Issue 2, 2021, Pages 179-194]
  • Anomaly Detection The Presentation of a Hybrid Anomaly Detection Model Using Inverse Weight Clustering and Machine Learning in Cloud Environments [Volume 9, Issue 4, 2021, Pages 21-29]
  • Anonymity Design a Blockchain based Electronic Payment with Users’ Anonymity [Volume 9, Issue 2, 2021, Pages 85-100]
  • Artificial noise The Analysis and Design of Secure Wireless Networks in the Presence of Users with Different Security Needs Based on Covert Communication and Secure Transmission of Information Theory in the Presence of a Friendly Jammer [Volume 9, Issue 4, 2021, Pages 67-76]
  • Artificial Noise (AN) Improving the Security in Cellular Communications Networks with adding Artificial Noise by method Non-Orthogonal Resource Allocation Techniques [Volume 9, Issue 2, 2021, Pages 135-142]
  • Association Rules Providing an Ontology-Based Method for Exploring the Association Rules in Multi-Agent Distributed Environments [Volume 9, Issue 1, 2021, Pages 1-17]
  • Attack Graph A Security Model Based Approach for Dynamic Risk Assessment of Multi-Step Attacks in Computer Networks [Volume 9, Issue 1, 2021, Pages 157-173]
  • Auction Algorithm The IoT Resource Allocation Improvement in Fog Computing Using Non-Cooperative Game Theory [Volume 9, Issue 4, 2021, Pages 147-158]
  • Audio watermarking Transparent and Robust Audio Watermarking Using Synergy LU Decomposition and the Fibonacci Sequence in GBT-DCT-DWT Transforms [Volume 9, Issue 1, 2021, Pages 101-113]
  • Authentication protocol A Mutual Authentication Protocol for IoT Users in Cloud Environment [Volume 9, Issue 2, 2021, Pages 17-28]
  • Automated evaluation The Automated Security Evaluation of Threat Paths Based on Petri Nets [Volume 9, Issue 4, 2021, Pages 87-98]
  • Automatic Text Generation Automatic Persian Text Generation Using Rule-Based Models and Word Embedding [Volume 9, Issue 4, 2021, Pages 43-54]
  • Autonomous vehicles The Semantic Segmentation of Autonomous Vehicles Images with the Teacher-Student Technique [Volume 9, Issue 4, 2021, Pages 1-19]

B

  • Basic reproductive ratio SCEIRS information dissemination model based on rumor spreading in complex networks [Volume 9, Issue 2, 2021, Pages 121-134]
  • Basis Matrix Inverse Synthetic Aperture Radar (ISAR) Imaging of Targets with Non-Uniform Motion and Constant Acceleration based on Compressed Sensing [Volume 9, Issue 2, 2021, Pages 51-62]
  • BB84 protocol Generalized Version of the BB84 QKD Protocol with n Polarization Bases and Unequal Probabilities [Volume 9, Issue 1, 2021, Pages 125-136]
  • Behavioral Distance Kavosh: Offering an Analysis Method and the Impact of Normal Network Traffic on Selection and Extraction Based on the Minkowski Distance [Volume 9, Issue 1, 2021, Pages 137-147]
  • Behavioral Measurement Anomaly Detection in Dynamic Social Networks Based on Behavioral Measurements [Volume 9, Issue 1, 2021, Pages 115-123]
  • Bidimensional Empirical Mode Decomposition Improving the Quality of Millimeter Wave Images by Fusion with Visible Images [Volume 9, Issue 4, 2021, Pages 77-86]
  • Big Data Real-time Topology-based Tracking of Microscopic Objects [Volume 9, Issue 3, 2021, Pages 1-20]
  • Biometric An Improvement on the Identification via Gait Using the Genetic Algorithm [Volume 9, Issue 4, 2021, Pages 31-42]
  • Blind Recognition A New Method for Blind Recognition of the Initial State of Synchronous Scramblers When Located after the Channel Encoder [Volume 9, Issue 1, 2021, Pages 19-27]
  • Blockchain Design a Blockchain based Electronic Payment with Users’ Anonymity [Volume 9, Issue 2, 2021, Pages 85-100]
  • Botnet Detecting of Botnets’ Malicious Domains with Deep Autoencoder Neural Network [Volume 9, Issue 1, 2021, Pages 61-74]
  • Botnet Kavosh: Offering an Analysis Method and the Impact of Normal Network Traffic on Selection and Extraction Based on the Minkowski Distance [Volume 9, Issue 1, 2021, Pages 137-147]

C

  • Channel Encoder A New Method for Blind Recognition of the Initial State of Synchronous Scramblers When Located after the Channel Encoder [Volume 9, Issue 1, 2021, Pages 19-27]
  • Classification Algorithm Distributed Denial of Service Attacks Detection in Software Defined Networks [Volume 9, Issue 1, 2021, Pages 43-59]
  • Clustering Energy-aware routing in wireless sensor networks using MLP and simulated annealing algorithms [Volume 9, Issue 3, 2021, Pages 133-142]
  • Cognitive Radio Network Interference Mitigation in Cognitive Radio Communication Systems Based on the Wavelet Transform [Volume 9, Issue 4, 2021, Pages 55-66]
  • Cognitive Radio Sensor Network A new analytical model for enhancing performance of cognitive radio user’s transmissions in the internet of things [Volume 9, Issue 3, 2021, Pages 73-82]
  • Common Vulnerability Scoring System(CVSS) A Security Model Based Approach for Dynamic Risk Assessment of Multi-Step Attacks in Computer Networks [Volume 9, Issue 1, 2021, Pages 157-173]
  • Complex network SCEIRS information dissemination model based on rumor spreading in complex networks [Volume 9, Issue 2, 2021, Pages 121-134]
  • Compressed Sensing (CS) Inverse Synthetic Aperture Radar (ISAR) Imaging of Targets with Non-Uniform Motion and Constant Acceleration based on Compressed Sensing [Volume 9, Issue 2, 2021, Pages 51-62]
  • Compressive Sensing Concurrent Detection of Compact Anomalous Subgraphs in Large Social Networks [Volume 9, Issue 2, 2021, Pages 179-194]
  • Conditional Privacy Design a Blockchain based Electronic Payment with Users’ Anonymity [Volume 9, Issue 2, 2021, Pages 85-100]
  • Conflict Analysis The Improvement of the GMCR Model Based on Statistical Analysis of the Game’ Graph (Case Study: Malwares and Countermeasures Actions Based on Detection-Independent and Deductive Evidence) [Volume 9, Issue 4, 2021, Pages 99-123]
  • Controller Presentation and Performance Evaluation of an Efficient Algorithm for a Distributed Controller in SDN [Volume 9, Issue 1, 2021, Pages 175-183]
  • Convolutional neural networks The Semantic Segmentation of Autonomous Vehicles Images with the Teacher-Student Technique [Volume 9, Issue 4, 2021, Pages 1-19]
  • Copyright protection Transparent and Robust Audio Watermarking Using Synergy LU Decomposition and the Fibonacci Sequence in GBT-DCT-DWT Transforms [Volume 9, Issue 1, 2021, Pages 101-113]
  • Cost Optimization A Techno-Economic Model of Sustainable Communication Infrastructure in the Smart City; using WDM-PON FTTx [Volume 9, Issue 1, 2021, Pages 149-156]
  • Counterattak SCEIRS information dissemination model based on rumor spreading in complex networks [Volume 9, Issue 2, 2021, Pages 121-134]
  • Covert Communication The Analysis and Design of Secure Wireless Networks in the Presence of Users with Different Security Needs Based on Covert Communication and Secure Transmission of Information Theory in the Presence of a Friendly Jammer [Volume 9, Issue 4, 2021, Pages 67-76]
  • Cross Site Scripting (XSS) Automatic XSS Exploit Generation Using Grammatical Evolution [Volume 9, Issue 2, 2021, Pages 101-119]
  • Cryptography A New Mechanism for Enhancing the Security of Military Internet of Things by Using Quantum and Classic Cryptography [Volume 9, Issue 2, 2021, Pages 29-49]
  • Cyber Dynamic The Presentation of an Active Cyber Defense Model for Application in Cyber Deception Technology [Volume 9, Issue 4, 2021, Pages 125-140]
  • Cyber Security The Presentation of an Active Cyber Defense Model for Application in Cyber Deception Technology [Volume 9, Issue 4, 2021, Pages 125-140]

D

  • Data Aggregation A Heuristic Data Diffusion and Gathering Scheme Using Virtual Line for Wireless Sensor Networks with Mobile Sink [Volume 9, Issue 2, 2021, Pages 195-207]
  • Data diffusion A Heuristic Data Diffusion and Gathering Scheme Using Virtual Line for Wireless Sensor Networks with Mobile Sink [Volume 9, Issue 2, 2021, Pages 195-207]
  • Data Gathering A Heuristic Data Diffusion and Gathering Scheme Using Virtual Line for Wireless Sensor Networks with Mobile Sink [Volume 9, Issue 2, 2021, Pages 195-207]
  • Decision Tree Intrusion Detection in Computer Networks using Decision Tree and Feature Reduction [Volume 9, Issue 3, 2021, Pages 99-108]
  • Deep Autoencoder Neural Network Detecting of Botnets’ Malicious Domains with Deep Autoencoder Neural Network [Volume 9, Issue 1, 2021, Pages 61-74]
  • Deep Neural Network Detecting of Botnets’ Malicious Domains with Deep Autoencoder Neural Network [Volume 9, Issue 1, 2021, Pages 61-74]
  • Deep Neural Networks Classification of High Dimensional Imbalanced Dataset via Game Theory-based Generative Adversarial Networks [Volume 9, Issue 2, 2021, Pages 63-74]
  • Detection-Independent and deductive evidence The Improvement of the GMCR Model Based on Statistical Analysis of the Game’ Graph (Case Study: Malwares and Countermeasures Actions Based on Detection-Independent and Deductive Evidence) [Volume 9, Issue 4, 2021, Pages 99-123]
  • Differential privacy Trajectory Database Release with Differential Privacy Guarantee [Volume 9, Issue 1, 2021, Pages 29-42]
  • Digital Signature A New Mechanism for Enhancing the Security of Military Internet of Things by Using Quantum and Classic Cryptography [Volume 9, Issue 2, 2021, Pages 29-49]
  • Dimensionality reduction Fixing Security Defects of Video Authentication Systems with Face Recognition, Based on 3D Structure and Shape Evaluation [Volume 9, Issue 4, 2021, Pages 141-145]
  • Discrete Cosine Transform(DCT) Transparent and Robust Audio Watermarking Using Synergy LU Decomposition and the Fibonacci Sequence in GBT-DCT-DWT Transforms [Volume 9, Issue 1, 2021, Pages 101-113]
  • Discrete wavelet transform (DWT) LU decomposition Transparent and Robust Audio Watermarking Using Synergy LU Decomposition and the Fibonacci Sequence in GBT-DCT-DWT Transforms [Volume 9, Issue 1, 2021, Pages 101-113]
  • Distributed Algorithm Real-time Topology-based Tracking of Microscopic Objects [Volume 9, Issue 3, 2021, Pages 1-20]
  • Distributed Denial of Service Distributed Denial of Service Attacks Detection in Software Defined Networks [Volume 9, Issue 1, 2021, Pages 43-59]
  • Distribution Presentation and Performance Evaluation of an Efficient Algorithm for a Distributed Controller in SDN [Volume 9, Issue 1, 2021, Pages 175-183]
  • DNS data Malicious Domain Detection using DNS Records [Volume 9, Issue 3, 2021, Pages 83-97]
  • Domain Generation Algorithms (DGAs) Detecting of Botnets’ Malicious Domains with Deep Autoencoder Neural Network [Volume 9, Issue 1, 2021, Pages 61-74]
  • Dominating set k-Adjacency Domination in Graphs [Volume 9, Issue 3, 2021, Pages 125-131]
  • Domination number k-Adjacency Domination in Graphs [Volume 9, Issue 3, 2021, Pages 125-131]
  • DoS attack Intrusion Detection in Computer Networks using Decision Tree and Feature Reduction [Volume 9, Issue 3, 2021, Pages 99-108]
  • Dragonfly Optimization Algorithm Providing a behavioral malware detection system based on the function of hardware counters using a neural network optimized with a dragonfly algorithm [Volume 9, Issue 2, 2021, Pages 9-16]
  • Dynamic Graph Anomaly Detection in Dynamic Social Networks Based on Behavioral Measurements [Volume 9, Issue 1, 2021, Pages 115-123]

E

  • Effective Options The Improvement of the GMCR Model Based on Statistical Analysis of the Game’ Graph (Case Study: Malwares and Countermeasures Actions Based on Detection-Independent and Deductive Evidence) [Volume 9, Issue 4, 2021, Pages 99-123]
  • Electronic Payment Design a Blockchain based Electronic Payment with Users’ Anonymity [Volume 9, Issue 2, 2021, Pages 85-100]
  • End to end delay A new analytical model for enhancing performance of cognitive radio user’s transmissions in the internet of things [Volume 9, Issue 3, 2021, Pages 73-82]
  • Exploitation Automatic XSS Exploit Generation Using Grammatical Evolution [Volume 9, Issue 2, 2021, Pages 101-119]
  • Exposed SCEIRS information dissemination model based on rumor spreading in complex networks [Volume 9, Issue 2, 2021, Pages 121-134]

F

  • Face recognition Fixing Security Defects of Video Authentication Systems with Face Recognition, Based on 3D Structure and Shape Evaluation [Volume 9, Issue 4, 2021, Pages 141-145]
  • Feature Extraction Detecting of Botnets’ Malicious Domains with Deep Autoencoder Neural Network [Volume 9, Issue 1, 2021, Pages 61-74]
  • Feature Extraction Kavosh: Offering an Analysis Method and the Impact of Normal Network Traffic on Selection and Extraction Based on the Minkowski Distance [Volume 9, Issue 1, 2021, Pages 137-147]
  • Feature Extraction Providing a new solution to botnet detection in a Markov chain-based network [Volume 9, Issue 3, 2021, Pages 59-71]
  • Fog Computing The Presentation of a Hybrid Anomaly Detection Model Using Inverse Weight Clustering and Machine Learning in Cloud Environments [Volume 9, Issue 4, 2021, Pages 21-29]
  • Fog Computing The IoT Resource Allocation Improvement in Fog Computing Using Non-Cooperative Game Theory [Volume 9, Issue 4, 2021, Pages 147-158]
  • Friendly jammer The Analysis and Design of Secure Wireless Networks in the Presence of Users with Different Security Needs Based on Covert Communication and Secure Transmission of Information Theory in the Presence of a Friendly Jammer [Volume 9, Issue 4, 2021, Pages 67-76]
  • FTTx A Techno-Economic Model of Sustainable Communication Infrastructure in the Smart City; using WDM-PON FTTx [Volume 9, Issue 1, 2021, Pages 149-156]
  • Fusion Evaluation Criterion Improving the Quality of Millimeter Wave Images by Fusion with Visible Images [Volume 9, Issue 4, 2021, Pages 77-86]
  • Fuzzer Automatic XSS Exploit Generation Using Grammatical Evolution [Volume 9, Issue 2, 2021, Pages 101-119]
  • Fuzz Testing Automatic XSS Exploit Generation Using Grammatical Evolution [Volume 9, Issue 2, 2021, Pages 101-119]
  • Fuzzy Correlator A Comprehensive Semi-Suprvised Model for Collaborative Intrusion Detection Based on Network Behavior Profiling Using The Concept of Deep Learning and Fuzzy Correlation of Alerts along [Volume 9, Issue 3, 2021, Pages 165-186]
  • Fuzzy Logic A model for feature selection in software fault prediction based on memetic algorithm and fuzzy logic [Volume 9, Issue 3, 2021, Pages 143-163]

G

  • Gait Energy Image (GEI) An Improvement on the Identification via Gait Using the Genetic Algorithm [Volume 9, Issue 4, 2021, Pages 31-42]
  • Game Theory Classification of High Dimensional Imbalanced Dataset via Game Theory-based Generative Adversarial Networks [Volume 9, Issue 2, 2021, Pages 63-74]
  • Game Theory The Improvement of the GMCR Model Based on Statistical Analysis of the Game’ Graph (Case Study: Malwares and Countermeasures Actions Based on Detection-Independent and Deductive Evidence) [Volume 9, Issue 4, 2021, Pages 99-123]
  • Generative Adversarial Networks Classification of High Dimensional Imbalanced Dataset via Game Theory-based Generative Adversarial Networks [Volume 9, Issue 2, 2021, Pages 63-74]
  • Genetic Algorithm (GA) An Improvement on the Identification via Gait Using the Genetic Algorithm [Volume 9, Issue 4, 2021, Pages 31-42]
  • Geometric methods Fixing Security Defects of Video Authentication Systems with Face Recognition, Based on 3D Structure and Shape Evaluation [Volume 9, Issue 4, 2021, Pages 141-145]
  • GPS Improving INS/GPS Integration with Artificial Intelligence during GPS Outage [Volume 9, Issue 2, 2021, Pages 143-157]
  • GPS Receiver Reducing Interference Effect on GPS Receiver by Using Multi-correlation Architecture [Volume 9, Issue 3, 2021, Pages 49-57]
  • Grammatical Evolution Automatic XSS Exploit Generation Using Grammatical Evolution [Volume 9, Issue 2, 2021, Pages 101-119]
  • Graph k-Adjacency Domination in Graphs [Volume 9, Issue 3, 2021, Pages 125-131]
  • Graph Analysis Detecting Fake Accounts in Social Networks Using Principal Components Analysis and Kernel Density Estimation Algorithm (A Case Study on the Twitter Social Network) [Volume 9, Issue 3, 2021, Pages 109-123]
  • Graph-based Transform(GBT) Transparent and Robust Audio Watermarking Using Synergy LU Decomposition and the Fibonacci Sequence in GBT-DCT-DWT Transforms [Volume 9, Issue 1, 2021, Pages 101-113]
  • Graph Model The Improvement of the GMCR Model Based on Statistical Analysis of the Game’ Graph (Case Study: Malwares and Countermeasures Actions Based on Detection-Independent and Deductive Evidence) [Volume 9, Issue 4, 2021, Pages 99-123]
  • Graph Theory Concurrent Detection of Compact Anomalous Subgraphs in Large Social Networks [Volume 9, Issue 2, 2021, Pages 179-194]
  • GSM Network Prediction of Plaintext in GSM Network using SDCCH Logical Channel [Volume 9, Issue 3, 2021, Pages 39-47]

H

  • Hardware Counters Providing a behavioral malware detection system based on the function of hardware counters using a neural network optimized with a dragonfly algorithm [Volume 9, Issue 2, 2021, Pages 9-16]
  • Hash Function Improvement of Rotational Cryptanalysis of Shabal and Cubehash Hash Functions [Volume 9, Issue 1, 2021, Pages 91-100]

I

  • IDS The Presentation of a Hybrid Anomaly Detection Model Using Inverse Weight Clustering and Machine Learning in Cloud Environments [Volume 9, Issue 4, 2021, Pages 21-29]
  • Image Classification Classification of High Dimensional Imbalanced Dataset via Game Theory-based Generative Adversarial Networks [Volume 9, Issue 2, 2021, Pages 63-74]
  • Image Fusion Improving the Quality of Millimeter Wave Images by Fusion with Visible Images [Volume 9, Issue 4, 2021, Pages 77-86]
  • Image Processing Real-time Topology-based Tracking of Microscopic Objects [Volume 9, Issue 3, 2021, Pages 1-20]
  • Imbalanced Dataset Classification of High Dimensional Imbalanced Dataset via Game Theory-based Generative Adversarial Networks [Volume 9, Issue 2, 2021, Pages 63-74]
  • Incremental Online Learning A Comprehensive Semi-Suprvised Model for Collaborative Intrusion Detection Based on Network Behavior Profiling Using The Concept of Deep Learning and Fuzzy Correlation of Alerts along [Volume 9, Issue 3, 2021, Pages 165-186]
  • Initial State A New Method for Blind Recognition of the Initial State of Synchronous Scramblers When Located after the Channel Encoder [Volume 9, Issue 1, 2021, Pages 19-27]
  • INS Improving INS/GPS Integration with Artificial Intelligence during GPS Outage [Volume 9, Issue 2, 2021, Pages 143-157]
  • Intentional Interference Interference Mitigation in Cognitive Radio Communication Systems Based on the Wavelet Transform [Volume 9, Issue 4, 2021, Pages 55-66]
  • Interference Mitigation Interference Mitigation in Cognitive Radio Communication Systems Based on the Wavelet Transform [Volume 9, Issue 4, 2021, Pages 55-66]
  • Internet of Things A Mutual Authentication Protocol for IoT Users in Cloud Environment [Volume 9, Issue 2, 2021, Pages 17-28]
  • Internet of Things A new analytical model for enhancing performance of cognitive radio user’s transmissions in the internet of things [Volume 9, Issue 3, 2021, Pages 73-82]
  • Internet of Things (IoT) Real-time Topology-based Tracking of Microscopic Objects [Volume 9, Issue 3, 2021, Pages 1-20]
  • Intrusion detection Intrusion Detection in Computer Networks using Decision Tree and Feature Reduction [Volume 9, Issue 3, 2021, Pages 99-108]
  • Inverse Synthetic Aperture Radar (ISAR) Inverse Synthetic Aperture Radar (ISAR) Imaging of Targets with Non-Uniform Motion and Constant Acceleration based on Compressed Sensing [Volume 9, Issue 2, 2021, Pages 51-62]
  • IoT The Presentation of a Hybrid Anomaly Detection Model Using Inverse Weight Clustering and Machine Learning in Cloud Environments [Volume 9, Issue 4, 2021, Pages 21-29]
  • IoT The IoT Resource Allocation Improvement in Fog Computing Using Non-Cooperative Game Theory [Volume 9, Issue 4, 2021, Pages 147-158]
  • ISCM Neural Network Improving the Quality of Millimeter Wave Images by Fusion with Visible Images [Volume 9, Issue 4, 2021, Pages 77-86]

K

  • KDD Cup99 dataset Intrusion Detection in Computer Networks using Decision Tree and Feature Reduction [Volume 9, Issue 3, 2021, Pages 99-108]

L

  • Linear discriminant analysis (LDA) Fixing Security Defects of Video Authentication Systems with Face Recognition, Based on 3D Structure and Shape Evaluation [Volume 9, Issue 4, 2021, Pages 141-145]
  • Load Balancing Presentation and Performance Evaluation of an Efficient Algorithm for a Distributed Controller in SDN [Volume 9, Issue 1, 2021, Pages 175-183]
  • LSB Speech Steganalysis of Least Significant Bits Based on the Percentage of Equal Adjacent Samples [Volume 9, Issue 1, 2021, Pages 75-90]
  • LVQ Radar data processing using a combination of principal component analysis methods and self-organizing and digitized neural networks of the learning vector [Volume 9, Issue 2, 2021, Pages 1-7]

M

  • Machine Learning Classification of High Dimensional Imbalanced Dataset via Game Theory-based Generative Adversarial Networks [Volume 9, Issue 2, 2021, Pages 63-74]
  • MAG Architecture The Improvement of the GMCR Model Based on Statistical Analysis of the Game’ Graph (Case Study: Malwares and Countermeasures Actions Based on Detection-Independent and Deductive Evidence) [Volume 9, Issue 4, 2021, Pages 99-123]
  • Malicious domain detection Malicious Domain Detection using DNS Records [Volume 9, Issue 3, 2021, Pages 83-97]
  • Malware Providing a behavioral malware detection system based on the function of hardware counters using a neural network optimized with a dragonfly algorithm [Volume 9, Issue 2, 2021, Pages 9-16]
  • Malware Analysis The Improvement of the GMCR Model Based on Statistical Analysis of the Game’ Graph (Case Study: Malwares and Countermeasures Actions Based on Detection-Independent and Deductive Evidence) [Volume 9, Issue 4, 2021, Pages 99-123]
  • Mapping-Reduction Providing an Ontology-Based Method for Exploring the Association Rules in Multi-Agent Distributed Environments [Volume 9, Issue 1, 2021, Pages 1-17]
  • Markov Interference Mitigation in Cognitive Radio Communication Systems Based on the Wavelet Transform [Volume 9, Issue 4, 2021, Pages 55-66]
  • Markov Chain A new analytical model for enhancing performance of cognitive radio user’s transmissions in the internet of things [Volume 9, Issue 3, 2021, Pages 73-82]
  • Markov Chain Providing a new solution to botnet detection in a Markov chain-based network [Volume 9, Issue 3, 2021, Pages 59-71]
  • Markov Chain The Presentation of an Active Cyber Defense Model for Application in Cyber Deception Technology [Volume 9, Issue 4, 2021, Pages 125-140]
  • Markov Chaining Improvement of Rotational Cryptanalysis of Shabal and Cubehash Hash Functions [Volume 9, Issue 1, 2021, Pages 91-100]
  • Meta- heuristic Security-aware Task Scheduling Algorithm based on Multi Adaptive Learning and PSO Technique [Volume 9, Issue 2, 2021, Pages 159-178]
  • Microscopic Objects Real-time Topology-based Tracking of Microscopic Objects [Volume 9, Issue 3, 2021, Pages 1-20]
  • Military Internet of Things A New Mechanism for Enhancing the Security of Military Internet of Things by Using Quantum and Classic Cryptography [Volume 9, Issue 2, 2021, Pages 29-49]
  • MILP A Techno-Economic Model of Sustainable Communication Infrastructure in the Smart City; using WDM-PON FTTx [Volume 9, Issue 1, 2021, Pages 149-156]
  • Minkowski Distance Kavosh: Offering an Analysis Method and the Impact of Normal Network Traffic on Selection and Extraction Based on the Minkowski Distance [Volume 9, Issue 1, 2021, Pages 137-147]
  • Mobile Sink A Heuristic Data Diffusion and Gathering Scheme Using Virtual Line for Wireless Sensor Networks with Mobile Sink [Volume 9, Issue 2, 2021, Pages 195-207]
  • Modular Addition Improvement of Rotational Cryptanalysis of Shabal and Cubehash Hash Functions [Volume 9, Issue 1, 2021, Pages 91-100]
  • Multi Agent Systems Providing an Ontology-Based Method for Exploring the Association Rules in Multi-Agent Distributed Environments [Volume 9, Issue 1, 2021, Pages 1-17]
  • Multi-correlation Architecture Reducing Interference Effect on GPS Receiver by Using Multi-correlation Architecture [Volume 9, Issue 3, 2021, Pages 49-57]
  • Multi-Layer Perceptron Neural Network Providing a behavioral malware detection system based on the function of hardware counters using a neural network optimized with a dragonfly algorithm [Volume 9, Issue 2, 2021, Pages 9-16]
  • Multi-Step Attacks A Security Model Based Approach for Dynamic Risk Assessment of Multi-Step Attacks in Computer Networks [Volume 9, Issue 1, 2021, Pages 157-173]

N

  • Nash Equilibrium The IoT Resource Allocation Improvement in Fog Computing Using Non-Cooperative Game Theory [Volume 9, Issue 4, 2021, Pages 147-158]
  • Natural Language Generation Automatic Persian Text Generation Using Rule-Based Models and Word Embedding [Volume 9, Issue 4, 2021, Pages 43-54]
  • Navigation Improving INS/GPS Integration with Artificial Intelligence during GPS Outage [Volume 9, Issue 2, 2021, Pages 143-157]
  • Network Flow Kavosh: Offering an Analysis Method and the Impact of Normal Network Traffic on Selection and Extraction Based on the Minkowski Distance [Volume 9, Issue 1, 2021, Pages 137-147]
  • Network Flow Providing a new solution to botnet detection in a Markov chain-based network [Volume 9, Issue 3, 2021, Pages 59-71]
  • Neural Networks MLP Energy-aware routing in wireless sensor networks using MLP and simulated annealing algorithms [Volume 9, Issue 3, 2021, Pages 133-142]
  • Noisy path tree Trajectory Database Release with Differential Privacy Guarantee [Volume 9, Issue 1, 2021, Pages 29-42]
  • Non-orthogonal multiple access (NOMA) Improving the Security in Cellular Communications Networks with adding Artificial Noise by method Non-Orthogonal Resource Allocation Techniques [Volume 9, Issue 2, 2021, Pages 135-142]
  • Non-uniform motion Inverse Synthetic Aperture Radar (ISAR) Imaging of Targets with Non-Uniform Motion and Constant Acceleration based on Compressed Sensing [Volume 9, Issue 2, 2021, Pages 51-62]
  • Normal Distribution Distributed Denial of Service Attacks Detection in Software Defined Networks [Volume 9, Issue 1, 2021, Pages 43-59]

O

  • Ontology Providing an Ontology-Based Method for Exploring the Association Rules in Multi-Agent Distributed Environments [Volume 9, Issue 1, 2021, Pages 1-17]
  • Outage Improving INS/GPS Integration with Artificial Intelligence during GPS Outage [Volume 9, Issue 2, 2021, Pages 143-157]

P

  • Packet loss probability A new analytical model for enhancing performance of cognitive radio user’s transmissions in the internet of things [Volume 9, Issue 3, 2021, Pages 73-82]
  • Passive Millimeter Wave Imaging Improving the Quality of Millimeter Wave Images by Fusion with Visible Images [Volume 9, Issue 4, 2021, Pages 77-86]
  • PCA Radar data processing using a combination of principal component analysis methods and self-organizing and digitized neural networks of the learning vector [Volume 9, Issue 2, 2021, Pages 1-7]
  • PendingIntent PIVATool- a fast and precise tool for analysis and detection of PendingIntent vulnerabilities [Volume 9, Issue 2, 2021, Pages 75-83]
  • Petri Nets The Automated Security Evaluation of Threat Paths Based on Petri Nets [Volume 9, Issue 4, 2021, Pages 87-98]
  • Phishing Malicious Domain Detection using DNS Records [Volume 9, Issue 3, 2021, Pages 83-97]
  • PIAnalyzer PIVATool- a fast and precise tool for analysis and detection of PendingIntent vulnerabilities [Volume 9, Issue 2, 2021, Pages 75-83]
  • PIVATool PIVATool- a fast and precise tool for analysis and detection of PendingIntent vulnerabilities [Volume 9, Issue 2, 2021, Pages 75-83]
  • Primary user A new analytical model for enhancing performance of cognitive radio user’s transmissions in the internet of things [Volume 9, Issue 3, 2021, Pages 73-82]
  • Principal Component Analysis (PCA) An Improvement on the Identification via Gait Using the Genetic Algorithm [Volume 9, Issue 4, 2021, Pages 31-42]
  • Principal Component Analysis (PCA) Fixing Security Defects of Video Authentication Systems with Face Recognition, Based on 3D Structure and Shape Evaluation [Volume 9, Issue 4, 2021, Pages 141-145]

Q

  • Quantum Secret Sharing A New Mechanism for Enhancing the Security of Military Internet of Things by Using Quantum and Classic Cryptography [Volume 9, Issue 2, 2021, Pages 29-49]

R

  • Radar Processing Radar data processing using a combination of principal component analysis methods and self-organizing and digitized neural networks of the learning vector [Volume 9, Issue 2, 2021, Pages 1-7]
  • Reachability graph The Automated Security Evaluation of Threat Paths Based on Petri Nets [Volume 9, Issue 4, 2021, Pages 87-98]
  • Real-time Topology-based Tracking Real-time Topology-based Tracking of Microscopic Objects [Volume 9, Issue 3, 2021, Pages 1-20]
  • Resource Allocation Improving the Security in Cellular Communications Networks with adding Artificial Noise by method Non-Orthogonal Resource Allocation Techniques [Volume 9, Issue 2, 2021, Pages 135-142]
  • Resource Allocation The IoT Resource Allocation Improvement in Fog Computing Using Non-Cooperative Game Theory [Volume 9, Issue 4, 2021, Pages 147-158]
  • Revocation Design a Blockchain based Electronic Payment with Users’ Anonymity [Volume 9, Issue 2, 2021, Pages 85-100]
  • Rotational Cryptanalysis Improvement of Rotational Cryptanalysis of Shabal and Cubehash Hash Functions [Volume 9, Issue 1, 2021, Pages 91-100]
  • Rule-Based Method Automatic Persian Text Generation Using Rule-Based Models and Word Embedding [Volume 9, Issue 4, 2021, Pages 43-54]
  • Rumor SCEIRS information dissemination model based on rumor spreading in complex networks [Volume 9, Issue 2, 2021, Pages 121-134]

S

  • Scalability Presentation and Performance Evaluation of an Efficient Algorithm for a Distributed Controller in SDN [Volume 9, Issue 1, 2021, Pages 175-183]
  • SDCCH logical channel Prediction of Plaintext in GSM Network using SDCCH Logical Channel [Volume 9, Issue 3, 2021, Pages 39-47]
  • Secondary User A new analytical model for enhancing performance of cognitive radio user’s transmissions in the internet of things [Volume 9, Issue 3, 2021, Pages 73-82]
  • Secondary Users Interference Mitigation in Cognitive Radio Communication Systems Based on the Wavelet Transform [Volume 9, Issue 4, 2021, Pages 55-66]
  • Secrecy Sum Rate (SSR) Improving the Security in Cellular Communications Networks with adding Artificial Noise by method Non-Orthogonal Resource Allocation Techniques [Volume 9, Issue 2, 2021, Pages 135-142]
  • Secure transmission The Analysis and Design of Secure Wireless Networks in the Presence of Users with Different Security Needs Based on Covert Communication and Secure Transmission of Information Theory in the Presence of a Friendly Jammer [Volume 9, Issue 4, 2021, Pages 67-76]
  • Security Metric A Security Model Based Approach for Dynamic Risk Assessment of Multi-Step Attacks in Computer Networks [Volume 9, Issue 1, 2021, Pages 157-173]
  • Security requirements The Automated Security Evaluation of Threat Paths Based on Petri Nets [Volume 9, Issue 4, 2021, Pages 87-98]
  • Semantic Segmentation The Semantic Segmentation of Autonomous Vehicles Images with the Teacher-Student Technique [Volume 9, Issue 4, 2021, Pages 1-19]
  • Shearlet Transform Improving the Quality of Millimeter Wave Images by Fusion with Visible Images [Volume 9, Issue 4, 2021, Pages 77-86]
  • Signal Processing Concurrent Detection of Compact Anomalous Subgraphs in Large Social Networks [Volume 9, Issue 2, 2021, Pages 179-194]
  • Simulated Annealing Energy-aware routing in wireless sensor networks using MLP and simulated annealing algorithms [Volume 9, Issue 3, 2021, Pages 133-142]
  • Smart City A Techno-Economic Model of Sustainable Communication Infrastructure in the Smart City; using WDM-PON FTTx [Volume 9, Issue 1, 2021, Pages 149-156]
  • Social network SCEIRS information dissemination model based on rumor spreading in complex networks [Volume 9, Issue 2, 2021, Pages 121-134]
  • Software Defined Network Distributed Denial of Service Attacks Detection in Software Defined Networks [Volume 9, Issue 1, 2021, Pages 43-59]
  • Software Defined Network Presentation and Performance Evaluation of an Efficient Algorithm for a Distributed Controller in SDN [Volume 9, Issue 1, 2021, Pages 175-183]
  • SOM Radar data processing using a combination of principal component analysis methods and self-organizing and digitized neural networks of the learning vector [Volume 9, Issue 2, 2021, Pages 1-7]
  • Speech steganalysis Speech Steganalysis of Least Significant Bits Based on the Percentage of Equal Adjacent Samples [Volume 9, Issue 1, 2021, Pages 75-90]
  • Spoofing Reducing Interference Effect on GPS Receiver by Using Multi-correlation Architecture [Volume 9, Issue 3, 2021, Pages 49-57]
  • Steganography Speech Steganalysis of Least Significant Bits Based on the Percentage of Equal Adjacent Samples [Volume 9, Issue 1, 2021, Pages 75-90]
  • Synchronous Scrambler A New Method for Blind Recognition of the Initial State of Synchronous Scramblers When Located after the Channel Encoder [Volume 9, Issue 1, 2021, Pages 19-27]

T

  • Task scheduling Security-aware Task Scheduling Algorithm based on Multi Adaptive Learning and PSO Technique [Volume 9, Issue 2, 2021, Pages 159-178]
  • Teacher-student technique The Semantic Segmentation of Autonomous Vehicles Images with the Teacher-Student Technique [Volume 9, Issue 4, 2021, Pages 1-19]
  • Threat modelling The Automated Security Evaluation of Threat Paths Based on Petri Nets [Volume 9, Issue 4, 2021, Pages 87-98]
  • Threat path The Automated Security Evaluation of Threat Paths Based on Petri Nets [Volume 9, Issue 4, 2021, Pages 87-98]
  • Throughput A new analytical model for enhancing performance of cognitive radio user’s transmissions in the internet of things [Volume 9, Issue 3, 2021, Pages 73-82]
  • Traceability Design a Blockchain based Electronic Payment with Users’ Anonymity [Volume 9, Issue 2, 2021, Pages 85-100]
  • Trajectory database release Trajectory Database Release with Differential Privacy Guarantee [Volume 9, Issue 1, 2021, Pages 29-42]
  • Trajectory pattern Trajectory Database Release with Differential Privacy Guarantee [Volume 9, Issue 1, 2021, Pages 29-42]
  • Transport protocol A new analytical model for enhancing performance of cognitive radio user’s transmissions in the internet of things [Volume 9, Issue 3, 2021, Pages 73-82]

V

  • Virtual line A Heuristic Data Diffusion and Gathering Scheme Using Virtual Line for Wireless Sensor Networks with Mobile Sink [Volume 9, Issue 2, 2021, Pages 195-207]
  • Vulnerability PIVATool- a fast and precise tool for analysis and detection of PendingIntent vulnerabilities [Volume 9, Issue 2, 2021, Pages 75-83]
  • Vulnerability Automatic XSS Exploit Generation Using Grammatical Evolution [Volume 9, Issue 2, 2021, Pages 101-119]

W

  • Wavelet Transform Interference Mitigation in Cognitive Radio Communication Systems Based on the Wavelet Transform [Volume 9, Issue 4, 2021, Pages 55-66]
  • WDM-PON A Techno-Economic Model of Sustainable Communication Infrastructure in the Smart City; using WDM-PON FTTx [Volume 9, Issue 1, 2021, Pages 149-156]
  • Wireless Sensor Networks A Heuristic Data Diffusion and Gathering Scheme Using Virtual Line for Wireless Sensor Networks with Mobile Sink [Volume 9, Issue 2, 2021, Pages 195-207]
  • Wireless Sensor Networks Energy-aware routing in wireless sensor networks using MLP and simulated annealing algorithms [Volume 9, Issue 3, 2021, Pages 133-142]
  • Word Embedding Automatic Persian Text Generation Using Rule-Based Models and Word Embedding [Volume 9, Issue 4, 2021, Pages 43-54]

Z

  • Zero-Day Attacks A Security Model Based Approach for Dynamic Risk Assessment of Multi-Step Attacks in Computer Networks [Volume 9, Issue 1, 2021, Pages 157-173]