Keyword Index

A

  • Action Abstraction A Framework for Evaluating Malware and Countermeasures with an Analytical Approach based on the Game Theory Case Study: Actors' Actions Based on Environmental Evidence [Volume 10, Issue 1, 2022, Pages 47-71]
  • Active Cyber Defense A cooperative and independent deception system in the active cyber defense system [Volume 10, Issue 2, 2022, Pages 129-142]
  • Adaptive Neuro-Fuzzy Inference System Investigation of a new ensemble method of intrusion detection system on different data sets [Volume 10, Issue 3, 2022, Pages 43-57]
  • Adder The residue number system component design based on OneHot coding [Volume 10, Issue 1, 2022, Pages 119-133]
  • Anova F-value An Optimized Compound Deep Neural Network Integrating With Feature Selection for Intrusion Detection System in Cyber Attacks [Volume 10, Issue 4, 2022, Pages 41-51]
  • Ant Colony Optimization Algorithm Feature selection using a combination of Genetic-Whale-Ant colony algorithms for software fault prediction by machine learning [Volume 10, Issue 1, 2022, Pages 33-45]
  • Antenna Array Improvement of Security in Wireless Communication Networks with Directional Modulation and Artificial Noise [Volume 10, Issue 4, 2022, Pages 11-18]
  • Autocorrelation Blind symbol Rate estimation in multipath channels [Volume 10, Issue 3, 2022, Pages 59-66]

B

  • Bayesian Network A Trust Evaluation Model for Cloud Computing Using Bayesian Network [Volume 10, Issue 4, 2022, Pages 53-61]
  • Behavioral signature Kashef: A Two-step detector of Windows-based Malicious executable files [Volume 10, Issue 2, 2022, Pages 143-156]

C

  • Chaotic Processing Guilty Knowledge Test by Chaotic Processing of Electroencephalogram Signals Based on Fuzzy Recurrence Plot [Volume 10, Issue 2, 2022, Pages 87-104]
  • Classification Detection of Slippery Road Conditions using the Road CCTV Images based on the Convolutional Neural Networks and Transfer Learning [Volume 10, Issue 2, 2022, Pages 105-116]
  • Classification Developing an Improved Method for Malware Attack Detection in Cloud Computing using Ensemble Learning [Volume 10, Issue 4, 2022, Pages 33-39]
  • Classifier Investigation of a new ensemble method of intrusion detection system on different data sets [Volume 10, Issue 3, 2022, Pages 43-57]
  • Cloud service A Trust Evaluation Model for Cloud Computing Using Bayesian Network [Volume 10, Issue 4, 2022, Pages 53-61]
  • Clustering Clustering and Routing in Wireless Sensor Networks Using Multi-Objective Cuckoo Search and Game Theory [Volume 10, Issue 3, 2022, Pages 11-20]
  • Clustering Developing an Improved Method for Malware Attack Detection in Cloud Computing using Ensemble Learning [Volume 10, Issue 4, 2022, Pages 33-39]
  • Cognitive Radio Reducing the Destructive Effect of Misbehaving Users in Cooperative Spectrum Sensing using Reinforcement Learning [Volume 10, Issue 4, 2022, Pages 1-9]
  • Color image A novel lossless color secret image sharing based on homogeneous linear recursion [Volume 10, Issue 3, 2022, Pages 107-118]
  • Communication networks A Greedy Algorithm for Constructing Region-Fault Tolerant Geometric Spanners [Volume 10, Issue 4, 2022, Pages 75-80]
  • Congestion control A cross layer approach for improving the TCP quality-of-service parameters over the IEEE 802.11.ac wireless networks [Volume 10, Issue 1, 2022, Pages 109-117]
  • Converter The residue number system component design based on OneHot coding [Volume 10, Issue 1, 2022, Pages 119-133]
  • Convolutional neural networks Detection of Slippery Road Conditions using the Road CCTV Images based on the Convolutional Neural Networks and Transfer Learning [Volume 10, Issue 2, 2022, Pages 105-116]
  • Convolution neural network A way to predict the stock price of the Tehran Stock Exchange in relation to knowledge [Volume 10, Issue 4, 2022, Pages 91-100]
  • Cooperative Spectrum Sensing Reducing the Destructive Effect of Misbehaving Users in Cooperative Spectrum Sensing using Reinforcement Learning [Volume 10, Issue 4, 2022, Pages 1-9]
  • Cost reduction Presentation of a model for feasibility assessment of implementing the IoT social network projects using the existing public social networks as the infrastructure [Volume 10, Issue 1, 2022, Pages 73-84]
  • Countermeasure Action A Framework for Evaluating Malware and Countermeasures with an Analytical Approach based on the Game Theory Case Study: Actors' Actions Based on Environmental Evidence [Volume 10, Issue 1, 2022, Pages 47-71]
  • Covert Communication Improving security of wireless telecommunication networks based on covert communication in presence of a controlled noise using multiple beamforming [Volume 10, Issue 1, 2022, Pages 11-19]
  • Crystals-Kyber Speeding up the execution-time of Crystals-Kyber PQC Algorithm on FPGA [Volume 10, Issue 4, 2022, Pages 101-110]
  • Cuckoo Search Clustering and Routing in Wireless Sensor Networks Using Multi-Objective Cuckoo Search and Game Theory [Volume 10, Issue 3, 2022, Pages 11-20]
  • Cyber-Attacks A survey on detecting false data injection in power systems with auto-encoder based deep learning methods [Volume 10, Issue 2, 2022, Pages 11-17]
  • Cyber Security The enhancement of online social network security by detecting and preventing fake accounts through machine learning [Volume 10, Issue 1, 2022, Pages 85-97]
  • Cyclostationery Blind symbol Rate estimation in multipath channels [Volume 10, Issue 3, 2022, Pages 59-66]

D

  • Data classification Sonar Dataset Classification using Multi-Layer Perceptron Neural Network Based on Dragonfly and Moth Algorithms [Volume 10, Issue 3, 2022, Pages 21-31]
  • Data Mining The enhancement of online social network security by detecting and preventing fake accounts through machine learning [Volume 10, Issue 1, 2022, Pages 85-97]
  • Data Mining A Trust Evaluation Model for Cloud Computing Using Bayesian Network [Volume 10, Issue 4, 2022, Pages 53-61]
  • Deep Convolutional Neural Networks (CNN) Fast Detection of Vehicle Type and Position in Images Based on Deep Neural Network [Volume 10, Issue 2, 2022, Pages 117-127]
  • Delay A cross layer approach for improving the TCP quality-of-service parameters over the IEEE 802.11.ac wireless networks [Volume 10, Issue 1, 2022, Pages 109-117]
  • Directional Modulation Improvement of Security in Wireless Communication Networks with Directional Modulation and Artificial Noise [Volume 10, Issue 4, 2022, Pages 11-18]
  • Dragonfly Algorithm A model for Multi-Class Intrusion Detection Using the Dragonfly Feature Selection by Learning on the KDD-CUP99 Dataset [Volume 10, Issue 3, 2022, Pages 33-42]
  • Drones Motion-encoded Gravitational Search Algorithm for moving target search using UAVs [Volume 10, Issue 4, 2022, Pages 63-73]

E

  • Electroencephalogram Guilty Knowledge Test by Chaotic Processing of Electroencephalogram Signals Based on Fuzzy Recurrence Plot [Volume 10, Issue 2, 2022, Pages 87-104]
  • Ensemble Learning Developing an Improved Method for Malware Attack Detection in Cloud Computing using Ensemble Learning [Volume 10, Issue 4, 2022, Pages 33-39]
  • Environmental Evidence A Framework for Evaluating Malware and Countermeasures with an Analytical Approach based on the Game Theory Case Study: Actors' Actions Based on Environmental Evidence [Volume 10, Issue 1, 2022, Pages 47-71]
  • Event Detection Presentation of a model for feasibility assessment of implementing the IoT social network projects using the existing public social networks as the infrastructure [Volume 10, Issue 1, 2022, Pages 73-84]
  • Event prediction Presentation of a model for feasibility assessment of implementing the IoT social network projects using the existing public social networks as the infrastructure [Volume 10, Issue 1, 2022, Pages 73-84]
  • Executable file Kashef: A Two-step detector of Windows-based Malicious executable files [Volume 10, Issue 2, 2022, Pages 143-156]
  • Expected Number of Transmissions Performance Analysis of Hybrid FSO/RF Systems Using the ℳ Distribution and Markov Function [Volume 10, Issue 2, 2022, Pages 1-10]

F

  • Fake accounts The enhancement of online social network security by detecting and preventing fake accounts through machine learning [Volume 10, Issue 1, 2022, Pages 85-97]
  • False Alarm Rate A New Hybrid Approach for Traffic Identification and Classification in Wireless Networks [Volume 10, Issue 2, 2022, Pages 31-41]
  • False data A survey on detecting false data injection in power systems with auto-encoder based deep learning methods [Volume 10, Issue 2, 2022, Pages 11-17]
  • False Hit An Approach to Dependability Enhancement of Cache Memories [Volume 10, Issue 1, 2022, Pages 1-10]
  • Frequency Selective Fading Blind symbol Rate estimation in multipath channels [Volume 10, Issue 3, 2022, Pages 59-66]
  • Fuzzing Evaluating Deep Learning Models for Test Data Generation In File Based Fuzzers [Volume 10, Issue 2, 2022, Pages 57-73]
  • Fuzzy Best-Worst Multi-Criteria method A framework for assessing cyber security and privacy threats and investigating their impact on smart city performance [Volume 10, Issue 3, 2022, Pages 77-91]
  • Fuzzy Delphi Method A framework for assessing cyber security and privacy threats and investigating their impact on smart city performance [Volume 10, Issue 3, 2022, Pages 77-91]
  • Fuzzy Recurrence Plot Guilty Knowledge Test by Chaotic Processing of Electroencephalogram Signals Based on Fuzzy Recurrence Plot [Volume 10, Issue 2, 2022, Pages 87-104]

G

  • Game Theory A Framework for Evaluating Malware and Countermeasures with an Analytical Approach based on the Game Theory Case Study: Actors' Actions Based on Environmental Evidence [Volume 10, Issue 1, 2022, Pages 47-71]
  • Game Theory A method to detect intrusion into the Internet of Things using the game theory [Volume 10, Issue 1, 2022, Pages 21-31]
  • Game Theory Clustering and Routing in Wireless Sensor Networks Using Multi-Objective Cuckoo Search and Game Theory [Volume 10, Issue 3, 2022, Pages 11-20]
  • Geometric secrecy Security Evaluation of Mutual Random Phase Injection Scheme for Secret Key Generation over Static Point-to-Point Communications [Volume 10, Issue 2, 2022, Pages 19-30]
  • Geometric spanners A Greedy Algorithm for Constructing Region-Fault Tolerant Geometric Spanners [Volume 10, Issue 4, 2022, Pages 75-80]
  • Graph Model A Framework for Evaluating Malware and Countermeasures with an Analytical Approach based on the Game Theory Case Study: Actors' Actions Based on Environmental Evidence [Volume 10, Issue 1, 2022, Pages 47-71]
  • Gravitational Search Algorithm Motion-encoded Gravitational Search Algorithm for moving target search using UAVs [Volume 10, Issue 4, 2022, Pages 63-73]
  • Greedy algorithm A Greedy Algorithm for Constructing Region-Fault Tolerant Geometric Spanners [Volume 10, Issue 4, 2022, Pages 75-80]
  • Grey Wolf Optimization Algorithm An Optimized Compound Deep Neural Network Integrating With Feature Selection for Intrusion Detection System in Cyber Attacks [Volume 10, Issue 4, 2022, Pages 41-51]
  • Guilty Knowledge Test Guilty Knowledge Test by Chaotic Processing of Electroencephalogram Signals Based on Fuzzy Recurrence Plot [Volume 10, Issue 2, 2022, Pages 87-104]

H

  • Hamming distance An Approach to Dependability Enhancement of Cache Memories [Volume 10, Issue 1, 2022, Pages 1-10]
  • Homogeneous linear recursion A novel lossless color secret image sharing based on homogeneous linear recursion [Volume 10, Issue 3, 2022, Pages 107-118]
  • Honeypot A cooperative and independent deception system in the active cyber defense system [Volume 10, Issue 2, 2022, Pages 129-142]
  • Hybrid Approach in Machine Learning A New Hybrid Approach for Traffic Identification and Classification in Wireless Networks [Volume 10, Issue 2, 2022, Pages 31-41]
  • Hybrid FSO/RF Performance Analysis of Hybrid FSO/RF Systems Using the ℳ Distribution and Markov Function [Volume 10, Issue 2, 2022, Pages 1-10]
  • Hyper-parameter Optimization An Optimized Compound Deep Neural Network Integrating With Feature Selection for Intrusion Detection System in Cyber Attacks [Volume 10, Issue 4, 2022, Pages 41-51]

I

  • Identifying Misbehaving Users Reducing the Destructive Effect of Misbehaving Users in Cooperative Spectrum Sensing using Reinforcement Learning [Volume 10, Issue 4, 2022, Pages 1-9]
  • Image Processing Improve the detection of dangerous objects in x-ray images in security and military inspections using image processing approaches [Volume 10, Issue 4, 2022, Pages 81-89]
  • Internet of Things Presentation of a model for feasibility assessment of implementing the IoT social network projects using the existing public social networks as the infrastructure [Volume 10, Issue 1, 2022, Pages 73-84]
  • Intrusion detection A method to detect intrusion into the Internet of Things using the game theory [Volume 10, Issue 1, 2022, Pages 21-31]
  • Intrusion detection A model for Multi-Class Intrusion Detection Using the Dragonfly Feature Selection by Learning on the KDD-CUP99 Dataset [Volume 10, Issue 3, 2022, Pages 33-42]
  • Intrusion Detection System Detection of the Remote Code Execution Attacks Using the PHP Web Application Intrusion Detection System [Volume 10, Issue 2, 2022, Pages 75-85]
  • Intrusion Detection System Investigation of a new ensemble method of intrusion detection system on different data sets [Volume 10, Issue 3, 2022, Pages 43-57]
  • Intrusion Detection System An Optimized Compound Deep Neural Network Integrating With Feature Selection for Intrusion Detection System in Cyber Attacks [Volume 10, Issue 4, 2022, Pages 41-51]
  • IoT A method to detect intrusion into the Internet of Things using the game theory [Volume 10, Issue 1, 2022, Pages 21-31]

J

  • Jitter A cross layer approach for improving the TCP quality-of-service parameters over the IEEE 802.11.ac wireless networks [Volume 10, Issue 1, 2022, Pages 109-117]

K

  • KDD-CUP99 A model for Multi-Class Intrusion Detection Using the Dragonfly Feature Selection by Learning on the KDD-CUP99 Dataset [Volume 10, Issue 3, 2022, Pages 33-42]
  • K-Nearest Neighbors Guilty Knowledge Test by Chaotic Processing of Electroencephalogram Signals Based on Fuzzy Recurrence Plot [Volume 10, Issue 2, 2022, Pages 87-104]

L

  • Latin square Quasi-transversals in Latin squares and k-domination in graphs [Volume 10, Issue 3, 2022, Pages 67-75]
  • Layered approach Detection of the Remote Code Execution Attacks Using the PHP Web Application Intrusion Detection System [Volume 10, Issue 2, 2022, Pages 75-85]
  • Learning Automata Reducing the Destructive Effect of Misbehaving Users in Cooperative Spectrum Sensing using Reinforcement Learning [Volume 10, Issue 4, 2022, Pages 1-9]
  • Level Crossing Rate Performance Analysis of Hybrid FSO/RF Systems Using the ℳ Distribution and Markov Function [Volume 10, Issue 2, 2022, Pages 1-10]
  • Lifi Optimal Design of Wireless Visible Light Communication Network with the Aim of Minimizing the Outage Probability at the Location of the Mobile Receiver [Volume 10, Issue 3, 2022, Pages 1-9]
  • Lossless recovery A novel lossless color secret image sharing based on homogeneous linear recursion [Volume 10, Issue 3, 2022, Pages 107-118]
  • LSTM neural network A way to predict the stock price of the Tehran Stock Exchange in relation to knowledge [Volume 10, Issue 4, 2022, Pages 91-100]

M

  • Malware Kashef: A Two-step detector of Windows-based Malicious executable files [Volume 10, Issue 2, 2022, Pages 143-156]
  • Malware Analysis A Framework for Evaluating Malware and Countermeasures with an Analytical Approach based on the Game Theory Case Study: Actors' Actions Based on Environmental Evidence [Volume 10, Issue 1, 2022, Pages 47-71]
  • Malware attacks Developing an Improved Method for Malware Attack Detection in Cloud Computing using Ensemble Learning [Volume 10, Issue 4, 2022, Pages 33-39]
  • Malware Detection Kashef: A Two-step detector of Windows-based Malicious executable files [Volume 10, Issue 2, 2022, Pages 143-156]
  • Metaheuristic Algorithm Feature selection using a combination of Genetic-Whale-Ant colony algorithms for software fault prediction by machine learning [Volume 10, Issue 1, 2022, Pages 33-45]
  • Meta-Heuristic Algorithms Sonar Dataset Classification using Multi-Layer Perceptron Neural Network Based on Dragonfly and Moth Algorithms [Volume 10, Issue 3, 2022, Pages 21-31]
  • Mobile User Optimal Design of Wireless Visible Light Communication Network with the Aim of Minimizing the Outage Probability at the Location of the Mobile Receiver [Volume 10, Issue 3, 2022, Pages 1-9]
  • Multi-class A model for Multi-Class Intrusion Detection Using the Dragonfly Feature Selection by Learning on the KDD-CUP99 Dataset [Volume 10, Issue 3, 2022, Pages 33-42]
  • Multi Path Channel Blind symbol Rate estimation in multipath channels [Volume 10, Issue 3, 2022, Pages 59-66]
  • Multiplier The residue number system component design based on OneHot coding [Volume 10, Issue 1, 2022, Pages 119-133]
  • Mutual Information An Optimized Compound Deep Neural Network Integrating With Feature Selection for Intrusion Detection System in Cyber Attacks [Volume 10, Issue 4, 2022, Pages 41-51]

N

  • Network Traffic A New Hybrid Approach for Traffic Identification and Classification in Wireless Networks [Volume 10, Issue 2, 2022, Pages 31-41]
  • Neural Networks VGG Fast Detection of Vehicle Type and Position in Images Based on Deep Neural Network [Volume 10, Issue 2, 2022, Pages 117-127]
  • Noise Reduction Novel Spoofing Mitigation Method using Wavelet Transform Based on PSO Algorithm in the Acquisition Stage of GPS Receiver [Volume 10, Issue 4, 2022, Pages 19-31]
  • NTT Speeding up the execution-time of Crystals-Kyber PQC Algorithm on FPGA [Volume 10, Issue 4, 2022, Pages 101-110]

O

  • OneHot coding The residue number system component design based on OneHot coding [Volume 10, Issue 1, 2022, Pages 119-133]
  • Optimal LED Placement Optimal Design of Wireless Visible Light Communication Network with the Aim of Minimizing the Outage Probability at the Location of the Mobile Receiver [Volume 10, Issue 3, 2022, Pages 1-9]
  • Optimization Motion-encoded Gravitational Search Algorithm for moving target search using UAVs [Volume 10, Issue 4, 2022, Pages 63-73]
  • Outage Probability Optimal Design of Wireless Visible Light Communication Network with the Aim of Minimizing the Outage Probability at the Location of the Mobile Receiver [Volume 10, Issue 3, 2022, Pages 1-9]

P

  • Packet Loss A cross layer approach for improving the TCP quality-of-service parameters over the IEEE 802.11.ac wireless networks [Volume 10, Issue 1, 2022, Pages 109-117]
  • Partial Least Squares approach A framework for assessing cyber security and privacy threats and investigating their impact on smart city performance [Volume 10, Issue 3, 2022, Pages 77-91]
  • Phisical Layer Security and Artificial Noise Improvement of Security in Wireless Communication Networks with Directional Modulation and Artificial Noise [Volume 10, Issue 4, 2022, Pages 11-18]
  • PHP server side language Detection of the Remote Code Execution Attacks Using the PHP Web Application Intrusion Detection System [Volume 10, Issue 2, 2022, Pages 75-85]
  • Post-quantum cryptography Speeding up the execution-time of Crystals-Kyber PQC Algorithm on FPGA [Volume 10, Issue 4, 2022, Pages 101-110]
  • Probability of Detection A New Hybrid Approach for Traffic Identification and Classification in Wireless Networks [Volume 10, Issue 2, 2022, Pages 31-41]

Q

  • Quality of service. Network Bandwidth A cross layer approach for improving the TCP quality-of-service parameters over the IEEE 802.11.ac wireless networks [Volume 10, Issue 1, 2022, Pages 109-117]

R

  • Random forest A model for Multi-Class Intrusion Detection Using the Dragonfly Feature Selection by Learning on the KDD-CUP99 Dataset [Volume 10, Issue 3, 2022, Pages 33-42]
  • Random Forest Algorithm Kashef: A Two-step detector of Windows-based Malicious executable files [Volume 10, Issue 2, 2022, Pages 143-156]
  • Real-time algorithm Fast Detection of Vehicle Type and Position in Images Based on Deep Neural Network [Volume 10, Issue 2, 2022, Pages 117-127]
  • Reliability An Approach to Dependability Enhancement of Cache Memories [Volume 10, Issue 1, 2022, Pages 1-10]
  • Remote code execution attack Detection of the Remote Code Execution Attacks Using the PHP Web Application Intrusion Detection System [Volume 10, Issue 2, 2022, Pages 75-85]
  • Residue number system The residue number system component design based on OneHot coding [Volume 10, Issue 1, 2022, Pages 119-133]
  • Road Safety Detection of Slippery Road Conditions using the Road CCTV Images based on the Convolutional Neural Networks and Transfer Learning [Volume 10, Issue 2, 2022, Pages 105-116]
  • Rumor Rumor Detection on Social Networks Based on the Degree Distribution Analysis in Step-by-Step Propagation Subgraphs [Volume 10, Issue 3, 2022, Pages 93-105]

S

  • Secret image sharing A novel lossless color secret image sharing based on homogeneous linear recursion [Volume 10, Issue 3, 2022, Pages 107-118]
  • Secret key generation Security Evaluation of Mutual Random Phase Injection Scheme for Secret Key Generation over Static Point-to-Point Communications [Volume 10, Issue 2, 2022, Pages 19-30]
  • Sentence Concept Extraction Investigation of the Semantic Similarity of Persian Sentences Using Vector Space Adaptation And Deep Learning [Volume 10, Issue 2, 2022, Pages 43-56]
  • Sentence Similarity Extraction Investigation of the Semantic Similarity of Persian Sentences Using Vector Space Adaptation And Deep Learning [Volume 10, Issue 2, 2022, Pages 43-56]
  • Service Quality A Trust Evaluation Model for Cloud Computing Using Bayesian Network [Volume 10, Issue 4, 2022, Pages 53-61]
  • Shadow image A novel lossless color secret image sharing based on homogeneous linear recursion [Volume 10, Issue 3, 2022, Pages 107-118]
  • Short Burst Blind symbol Rate estimation in multipath channels [Volume 10, Issue 3, 2022, Pages 59-66]
  • Smart City A framework for assessing cyber security and privacy threats and investigating their impact on smart city performance [Volume 10, Issue 3, 2022, Pages 77-91]
  • Social network Rumor Detection on Social Networks Based on the Degree Distribution Analysis in Step-by-Step Propagation Subgraphs [Volume 10, Issue 3, 2022, Pages 93-105]
  • Sonar targets Sonar Dataset Classification using Multi-Layer Perceptron Neural Network Based on Dragonfly and Moth Algorithms [Volume 10, Issue 3, 2022, Pages 21-31]
  • Spectral Efficiency Performance Analysis of Hybrid FSO/RF Systems Using the ℳ Distribution and Markov Function [Volume 10, Issue 2, 2022, Pages 1-10]
  • Spectrum Efficiency Performance analysis of adaptive modulation and coding methods in the wireless telecommunication channels [Volume 10, Issue 1, 2022, Pages 99-108]
  • Spoofing Attack Novel Spoofing Mitigation Method using Wavelet Transform Based on PSO Algorithm in the Acquisition Stage of GPS Receiver [Volume 10, Issue 4, 2022, Pages 19-31]
  • Structural Equation Modelling A framework for assessing cyber security and privacy threats and investigating their impact on smart city performance [Volume 10, Issue 3, 2022, Pages 77-91]
  • Subtractor The residue number system component design based on OneHot coding [Volume 10, Issue 1, 2022, Pages 119-133]
  • Support Vector Machines Investigation of a new ensemble method of intrusion detection system on different data sets [Volume 10, Issue 3, 2022, Pages 43-57]
  • SURF algorithm Improve the detection of dangerous objects in x-ray images in security and military inspections using image processing approaches [Volume 10, Issue 4, 2022, Pages 81-89]
  • Symbol Rate Estimation Blind symbol Rate estimation in multipath channels [Volume 10, Issue 3, 2022, Pages 59-66]

T

  • Text Test Data Generation Evaluating Deep Learning Models for Test Data Generation In File Based Fuzzers [Volume 10, Issue 2, 2022, Pages 57-73]
  • Transfer Learning Detection of Slippery Road Conditions using the Road CCTV Images based on the Convolutional Neural Networks and Transfer Learning [Volume 10, Issue 2, 2022, Pages 105-116]
  • Transmission Control Protocol A cross layer approach for improving the TCP quality-of-service parameters over the IEEE 802.11.ac wireless networks [Volume 10, Issue 1, 2022, Pages 109-117]
  • Trust A Trust Evaluation Model for Cloud Computing Using Bayesian Network [Volume 10, Issue 4, 2022, Pages 53-61]

V

  • Vector Space Adaptation Investigation of the Semantic Similarity of Persian Sentences Using Vector Space Adaptation And Deep Learning [Volume 10, Issue 2, 2022, Pages 43-56]
  • Vehicle Detection Fast Detection of Vehicle Type and Position in Images Based on Deep Neural Network [Volume 10, Issue 2, 2022, Pages 117-127]
  • Visible Light Communication Optimal Design of Wireless Visible Light Communication Network with the Aim of Minimizing the Outage Probability at the Location of the Mobile Receiver [Volume 10, Issue 3, 2022, Pages 1-9]

W

  • Wavelet Conversion Blind symbol Rate estimation in multipath channels [Volume 10, Issue 3, 2022, Pages 59-66]
  • Wavelet Transform Novel Spoofing Mitigation Method using Wavelet Transform Based on PSO Algorithm in the Acquisition Stage of GPS Receiver [Volume 10, Issue 4, 2022, Pages 19-31]
  • Web Applications Detection of the Remote Code Execution Attacks Using the PHP Web Application Intrusion Detection System [Volume 10, Issue 2, 2022, Pages 75-85]
  • Whale optimization algorithm Feature selection using a combination of Genetic-Whale-Ant colony algorithms for software fault prediction by machine learning [Volume 10, Issue 1, 2022, Pages 33-45]
  • Whale optimization algorithm An Optimized Compound Deep Neural Network Integrating With Feature Selection for Intrusion Detection System in Cyber Attacks [Volume 10, Issue 4, 2022, Pages 41-51]
  • Wireless Ad hoc Networks A New Hybrid Approach for Traffic Identification and Classification in Wireless Networks [Volume 10, Issue 2, 2022, Pages 31-41]
  • Wireless Sensor Network Clustering and Routing in Wireless Sensor Networks Using Multi-Objective Cuckoo Search and Game Theory [Volume 10, Issue 3, 2022, Pages 11-20]
  • Word Embedding Investigation of the Semantic Similarity of Persian Sentences Using Vector Space Adaptation And Deep Learning [Volume 10, Issue 2, 2022, Pages 43-56]

X

  • X-ray images Improve the detection of dangerous objects in x-ray images in security and military inspections using image processing approaches [Volume 10, Issue 4, 2022, Pages 81-89]