A
-
Action Abstraction
A Framework for Evaluating Malware and Countermeasures with an Analytical Approach based on the Game Theory
Case Study: Actors' Actions Based on Environmental Evidence [Volume 10, Issue 1, 2022, Pages 47-71]
-
Active Cyber Defense
A cooperative and independent deception system in the active cyber defense system [Volume 10, Issue 2, 2022, Pages 129-142]
-
Adaptive Neuro-Fuzzy Inference System
Investigation of a new ensemble method of intrusion detection system on different data sets [Volume 10, Issue 3, 2022, Pages 43-57]
-
Adder
The residue number system component design based on OneHot coding [Volume 10, Issue 1, 2022, Pages 119-133]
-
Anova F-value
An Optimized Compound Deep Neural Network Integrating With Feature Selection for Intrusion Detection System in Cyber Attacks [Volume 10, Issue 4, 2022, Pages 41-51]
-
Ant Colony Optimization Algorithm
Feature selection using a combination of Genetic-Whale-Ant colony algorithms for software fault prediction by machine learning [Volume 10, Issue 1, 2022, Pages 33-45]
-
Antenna Array
Improvement of Security in Wireless Communication Networks with Directional Modulation and Artificial Noise [Volume 10, Issue 4, 2022, Pages 11-18]
-
Autocorrelation
Blind symbol Rate estimation in multipath channels [Volume 10, Issue 3, 2022, Pages 59-66]
B
-
Bayesian Network
A Trust Evaluation Model for Cloud Computing Using Bayesian Network [Volume 10, Issue 4, 2022, Pages 53-61]
-
Behavioral signature
Kashef: A Two-step detector of Windows-based Malicious executable files [Volume 10, Issue 2, 2022, Pages 143-156]
C
-
Chaotic Processing
Guilty Knowledge Test by Chaotic Processing of Electroencephalogram Signals Based on Fuzzy Recurrence Plot [Volume 10, Issue 2, 2022, Pages 87-104]
-
Classification
Detection of Slippery Road Conditions using the Road CCTV Images based on the Convolutional Neural Networks and Transfer Learning [Volume 10, Issue 2, 2022, Pages 105-116]
-
Classification
Developing an Improved Method for Malware Attack Detection in Cloud Computing using Ensemble Learning [Volume 10, Issue 4, 2022, Pages 33-39]
-
Classifier
Investigation of a new ensemble method of intrusion detection system on different data sets [Volume 10, Issue 3, 2022, Pages 43-57]
-
Cloud service
A Trust Evaluation Model for Cloud Computing Using Bayesian Network [Volume 10, Issue 4, 2022, Pages 53-61]
-
Clustering
Clustering and Routing in Wireless Sensor Networks Using Multi-Objective Cuckoo Search and Game Theory [Volume 10, Issue 3, 2022, Pages 11-20]
-
Clustering
Developing an Improved Method for Malware Attack Detection in Cloud Computing using Ensemble Learning [Volume 10, Issue 4, 2022, Pages 33-39]
-
Cognitive Radio
Reducing the Destructive Effect of Misbehaving Users in Cooperative Spectrum Sensing using Reinforcement Learning [Volume 10, Issue 4, 2022, Pages 1-9]
-
Color image
A novel lossless color secret image sharing based on homogeneous linear recursion [Volume 10, Issue 3, 2022, Pages 107-118]
-
Communication networks
A Greedy Algorithm for Constructing Region-Fault Tolerant Geometric Spanners [Volume 10, Issue 4, 2022, Pages 75-80]
-
Congestion control
A cross layer approach for improving the TCP quality-of-service parameters over the IEEE 802.11.ac wireless networks [Volume 10, Issue 1, 2022, Pages 109-117]
-
Converter
The residue number system component design based on OneHot coding [Volume 10, Issue 1, 2022, Pages 119-133]
-
Convolutional neural networks
Detection of Slippery Road Conditions using the Road CCTV Images based on the Convolutional Neural Networks and Transfer Learning [Volume 10, Issue 2, 2022, Pages 105-116]
-
Convolution neural network
A way to predict the stock price of the Tehran Stock Exchange in relation to knowledge [Volume 10, Issue 4, 2022, Pages 91-100]
-
Cooperative Spectrum Sensing
Reducing the Destructive Effect of Misbehaving Users in Cooperative Spectrum Sensing using Reinforcement Learning [Volume 10, Issue 4, 2022, Pages 1-9]
-
Cost reduction
Presentation of a model for feasibility assessment of implementing the IoT social network projects using the existing public social networks as the infrastructure [Volume 10, Issue 1, 2022, Pages 73-84]
-
Countermeasure Action
A Framework for Evaluating Malware and Countermeasures with an Analytical Approach based on the Game Theory
Case Study: Actors' Actions Based on Environmental Evidence [Volume 10, Issue 1, 2022, Pages 47-71]
-
Covert Communication
Improving security of wireless telecommunication networks based on covert communication in presence of a controlled noise using multiple beamforming [Volume 10, Issue 1, 2022, Pages 11-19]
-
Crystals-Kyber
Speeding up the execution-time of Crystals-Kyber PQC Algorithm on FPGA [Volume 10, Issue 4, 2022, Pages 101-110]
-
Cuckoo Search
Clustering and Routing in Wireless Sensor Networks Using Multi-Objective Cuckoo Search and Game Theory [Volume 10, Issue 3, 2022, Pages 11-20]
-
Cyber-Attacks
A survey on detecting false data injection in power systems with auto-encoder based deep learning methods [Volume 10, Issue 2, 2022, Pages 11-17]
-
Cyber Security
The enhancement of online social network security by detecting and preventing fake accounts through machine learning [Volume 10, Issue 1, 2022, Pages 85-97]
-
Cyclostationery
Blind symbol Rate estimation in multipath channels [Volume 10, Issue 3, 2022, Pages 59-66]
D
-
Data classification
Sonar Dataset Classification using Multi-Layer Perceptron Neural Network Based on Dragonfly and Moth Algorithms [Volume 10, Issue 3, 2022, Pages 21-31]
-
Data Mining
The enhancement of online social network security by detecting and preventing fake accounts through machine learning [Volume 10, Issue 1, 2022, Pages 85-97]
-
Data Mining
A Trust Evaluation Model for Cloud Computing Using Bayesian Network [Volume 10, Issue 4, 2022, Pages 53-61]
-
Deep Convolutional Neural Networks (CNN)
Fast Detection of Vehicle Type and Position in Images Based on Deep Neural Network [Volume 10, Issue 2, 2022, Pages 117-127]
-
Delay
A cross layer approach for improving the TCP quality-of-service parameters over the IEEE 802.11.ac wireless networks [Volume 10, Issue 1, 2022, Pages 109-117]
-
Directional Modulation
Improvement of Security in Wireless Communication Networks with Directional Modulation and Artificial Noise [Volume 10, Issue 4, 2022, Pages 11-18]
-
Dragonfly Algorithm
A model for Multi-Class Intrusion Detection Using the Dragonfly Feature Selection by Learning on the KDD-CUP99 Dataset [Volume 10, Issue 3, 2022, Pages 33-42]
-
Drones
Motion-encoded Gravitational Search Algorithm for moving target search using UAVs [Volume 10, Issue 4, 2022, Pages 63-73]
E
-
Electroencephalogram
Guilty Knowledge Test by Chaotic Processing of Electroencephalogram Signals Based on Fuzzy Recurrence Plot [Volume 10, Issue 2, 2022, Pages 87-104]
-
Ensemble Learning
Developing an Improved Method for Malware Attack Detection in Cloud Computing using Ensemble Learning [Volume 10, Issue 4, 2022, Pages 33-39]
-
Environmental Evidence
A Framework for Evaluating Malware and Countermeasures with an Analytical Approach based on the Game Theory
Case Study: Actors' Actions Based on Environmental Evidence [Volume 10, Issue 1, 2022, Pages 47-71]
-
Event Detection
Presentation of a model for feasibility assessment of implementing the IoT social network projects using the existing public social networks as the infrastructure [Volume 10, Issue 1, 2022, Pages 73-84]
-
Event prediction
Presentation of a model for feasibility assessment of implementing the IoT social network projects using the existing public social networks as the infrastructure [Volume 10, Issue 1, 2022, Pages 73-84]
-
Executable file
Kashef: A Two-step detector of Windows-based Malicious executable files [Volume 10, Issue 2, 2022, Pages 143-156]
-
Expected Number of Transmissions
Performance Analysis of Hybrid FSO/RF Systems Using the ℳ Distribution and Markov Function [Volume 10, Issue 2, 2022, Pages 1-10]
F
-
Fake accounts
The enhancement of online social network security by detecting and preventing fake accounts through machine learning [Volume 10, Issue 1, 2022, Pages 85-97]
-
False Alarm Rate
A New Hybrid Approach for Traffic Identification and Classification in Wireless Networks [Volume 10, Issue 2, 2022, Pages 31-41]
-
False data
A survey on detecting false data injection in power systems with auto-encoder based deep learning methods [Volume 10, Issue 2, 2022, Pages 11-17]
-
False Hit
An Approach to Dependability Enhancement of Cache Memories [Volume 10, Issue 1, 2022, Pages 1-10]
-
Frequency Selective Fading
Blind symbol Rate estimation in multipath channels [Volume 10, Issue 3, 2022, Pages 59-66]
-
Fuzzing
Evaluating Deep Learning Models for Test Data Generation In File Based Fuzzers [Volume 10, Issue 2, 2022, Pages 57-73]
-
Fuzzy Best-Worst Multi-Criteria method
A framework for assessing cyber security and privacy threats and investigating their impact on smart city performance [Volume 10, Issue 3, 2022, Pages 77-91]
-
Fuzzy Delphi Method
A framework for assessing cyber security and privacy threats and investigating their impact on smart city performance [Volume 10, Issue 3, 2022, Pages 77-91]
-
Fuzzy Recurrence Plot
Guilty Knowledge Test by Chaotic Processing of Electroencephalogram Signals Based on Fuzzy Recurrence Plot [Volume 10, Issue 2, 2022, Pages 87-104]
G
-
Game Theory
A Framework for Evaluating Malware and Countermeasures with an Analytical Approach based on the Game Theory
Case Study: Actors' Actions Based on Environmental Evidence [Volume 10, Issue 1, 2022, Pages 47-71]
-
Game Theory
A method to detect intrusion into the Internet of Things using the game theory [Volume 10, Issue 1, 2022, Pages 21-31]
-
Game Theory
Clustering and Routing in Wireless Sensor Networks Using Multi-Objective Cuckoo Search and Game Theory [Volume 10, Issue 3, 2022, Pages 11-20]
-
Geometric secrecy
Security Evaluation of Mutual Random Phase Injection Scheme for Secret Key Generation over Static Point-to-Point Communications [Volume 10, Issue 2, 2022, Pages 19-30]
-
Geometric spanners
A Greedy Algorithm for Constructing Region-Fault Tolerant Geometric Spanners [Volume 10, Issue 4, 2022, Pages 75-80]
-
Graph Model
A Framework for Evaluating Malware and Countermeasures with an Analytical Approach based on the Game Theory
Case Study: Actors' Actions Based on Environmental Evidence [Volume 10, Issue 1, 2022, Pages 47-71]
-
Gravitational Search Algorithm
Motion-encoded Gravitational Search Algorithm for moving target search using UAVs [Volume 10, Issue 4, 2022, Pages 63-73]
-
Greedy algorithm
A Greedy Algorithm for Constructing Region-Fault Tolerant Geometric Spanners [Volume 10, Issue 4, 2022, Pages 75-80]
-
Grey Wolf Optimization Algorithm
An Optimized Compound Deep Neural Network Integrating With Feature Selection for Intrusion Detection System in Cyber Attacks [Volume 10, Issue 4, 2022, Pages 41-51]
-
Guilty Knowledge Test
Guilty Knowledge Test by Chaotic Processing of Electroencephalogram Signals Based on Fuzzy Recurrence Plot [Volume 10, Issue 2, 2022, Pages 87-104]
H
-
Hamming distance
An Approach to Dependability Enhancement of Cache Memories [Volume 10, Issue 1, 2022, Pages 1-10]
-
Homogeneous linear recursion
A novel lossless color secret image sharing based on homogeneous linear recursion [Volume 10, Issue 3, 2022, Pages 107-118]
-
Honeypot
A cooperative and independent deception system in the active cyber defense system [Volume 10, Issue 2, 2022, Pages 129-142]
-
Hybrid Approach in Machine Learning
A New Hybrid Approach for Traffic Identification and Classification in Wireless Networks [Volume 10, Issue 2, 2022, Pages 31-41]
-
Hybrid FSO/RF
Performance Analysis of Hybrid FSO/RF Systems Using the ℳ Distribution and Markov Function [Volume 10, Issue 2, 2022, Pages 1-10]
-
Hyper-parameter Optimization
An Optimized Compound Deep Neural Network Integrating With Feature Selection for Intrusion Detection System in Cyber Attacks [Volume 10, Issue 4, 2022, Pages 41-51]
I
-
Identifying Misbehaving Users
Reducing the Destructive Effect of Misbehaving Users in Cooperative Spectrum Sensing using Reinforcement Learning [Volume 10, Issue 4, 2022, Pages 1-9]
-
Image Processing
Improve the detection of dangerous objects in x-ray images in security and military inspections using image processing approaches [Volume 10, Issue 4, 2022, Pages 81-89]
-
Internet of Things
Presentation of a model for feasibility assessment of implementing the IoT social network projects using the existing public social networks as the infrastructure [Volume 10, Issue 1, 2022, Pages 73-84]
-
Intrusion detection
A method to detect intrusion into the Internet of Things using the game theory [Volume 10, Issue 1, 2022, Pages 21-31]
-
Intrusion detection
A model for Multi-Class Intrusion Detection Using the Dragonfly Feature Selection by Learning on the KDD-CUP99 Dataset [Volume 10, Issue 3, 2022, Pages 33-42]
-
Intrusion Detection System
Detection of the Remote Code Execution Attacks Using the PHP Web Application Intrusion Detection System [Volume 10, Issue 2, 2022, Pages 75-85]
-
Intrusion Detection System
Investigation of a new ensemble method of intrusion detection system on different data sets [Volume 10, Issue 3, 2022, Pages 43-57]
-
Intrusion Detection System
An Optimized Compound Deep Neural Network Integrating With Feature Selection for Intrusion Detection System in Cyber Attacks [Volume 10, Issue 4, 2022, Pages 41-51]
-
IoT
A method to detect intrusion into the Internet of Things using the game theory [Volume 10, Issue 1, 2022, Pages 21-31]
J
-
Jitter
A cross layer approach for improving the TCP quality-of-service parameters over the IEEE 802.11.ac wireless networks [Volume 10, Issue 1, 2022, Pages 109-117]
K
-
KDD-CUP99
A model for Multi-Class Intrusion Detection Using the Dragonfly Feature Selection by Learning on the KDD-CUP99 Dataset [Volume 10, Issue 3, 2022, Pages 33-42]
-
K-Nearest Neighbors
Guilty Knowledge Test by Chaotic Processing of Electroencephalogram Signals Based on Fuzzy Recurrence Plot [Volume 10, Issue 2, 2022, Pages 87-104]
L
-
Latin square
Quasi-transversals in Latin squares and k-domination in graphs [Volume 10, Issue 3, 2022, Pages 67-75]
-
Layered approach
Detection of the Remote Code Execution Attacks Using the PHP Web Application Intrusion Detection System [Volume 10, Issue 2, 2022, Pages 75-85]
-
Learning Automata
Reducing the Destructive Effect of Misbehaving Users in Cooperative Spectrum Sensing using Reinforcement Learning [Volume 10, Issue 4, 2022, Pages 1-9]
-
Level Crossing Rate
Performance Analysis of Hybrid FSO/RF Systems Using the ℳ Distribution and Markov Function [Volume 10, Issue 2, 2022, Pages 1-10]
-
Lifi
Optimal Design of Wireless Visible Light Communication Network with the Aim of Minimizing the Outage Probability at the Location of the Mobile Receiver [Volume 10, Issue 3, 2022, Pages 1-9]
-
Lossless recovery
A novel lossless color secret image sharing based on homogeneous linear recursion [Volume 10, Issue 3, 2022, Pages 107-118]
-
LSTM neural network
A way to predict the stock price of the Tehran Stock Exchange in relation to knowledge [Volume 10, Issue 4, 2022, Pages 91-100]
M
-
Malware
Kashef: A Two-step detector of Windows-based Malicious executable files [Volume 10, Issue 2, 2022, Pages 143-156]
-
Malware Analysis
A Framework for Evaluating Malware and Countermeasures with an Analytical Approach based on the Game Theory
Case Study: Actors' Actions Based on Environmental Evidence [Volume 10, Issue 1, 2022, Pages 47-71]
-
Malware attacks
Developing an Improved Method for Malware Attack Detection in Cloud Computing using Ensemble Learning [Volume 10, Issue 4, 2022, Pages 33-39]
-
Malware Detection
Kashef: A Two-step detector of Windows-based Malicious executable files [Volume 10, Issue 2, 2022, Pages 143-156]
-
Metaheuristic Algorithm
Feature selection using a combination of Genetic-Whale-Ant colony algorithms for software fault prediction by machine learning [Volume 10, Issue 1, 2022, Pages 33-45]
-
Meta-Heuristic Algorithms
Sonar Dataset Classification using Multi-Layer Perceptron Neural Network Based on Dragonfly and Moth Algorithms [Volume 10, Issue 3, 2022, Pages 21-31]
-
Mobile User
Optimal Design of Wireless Visible Light Communication Network with the Aim of Minimizing the Outage Probability at the Location of the Mobile Receiver [Volume 10, Issue 3, 2022, Pages 1-9]
-
Multi-class
A model for Multi-Class Intrusion Detection Using the Dragonfly Feature Selection by Learning on the KDD-CUP99 Dataset [Volume 10, Issue 3, 2022, Pages 33-42]
-
Multi Path Channel
Blind symbol Rate estimation in multipath channels [Volume 10, Issue 3, 2022, Pages 59-66]
-
Multiplier
The residue number system component design based on OneHot coding [Volume 10, Issue 1, 2022, Pages 119-133]
-
Mutual Information
An Optimized Compound Deep Neural Network Integrating With Feature Selection for Intrusion Detection System in Cyber Attacks [Volume 10, Issue 4, 2022, Pages 41-51]
N
-
Network Traffic
A New Hybrid Approach for Traffic Identification and Classification in Wireless Networks [Volume 10, Issue 2, 2022, Pages 31-41]
-
Neural Networks VGG
Fast Detection of Vehicle Type and Position in Images Based on Deep Neural Network [Volume 10, Issue 2, 2022, Pages 117-127]
-
Noise Reduction
Novel Spoofing Mitigation Method using Wavelet Transform Based on PSO Algorithm in the Acquisition Stage of GPS Receiver [Volume 10, Issue 4, 2022, Pages 19-31]
-
NTT
Speeding up the execution-time of Crystals-Kyber PQC Algorithm on FPGA [Volume 10, Issue 4, 2022, Pages 101-110]
O
-
OneHot coding
The residue number system component design based on OneHot coding [Volume 10, Issue 1, 2022, Pages 119-133]
-
Optimal LED Placement
Optimal Design of Wireless Visible Light Communication Network with the Aim of Minimizing the Outage Probability at the Location of the Mobile Receiver [Volume 10, Issue 3, 2022, Pages 1-9]
-
Optimization
Motion-encoded Gravitational Search Algorithm for moving target search using UAVs [Volume 10, Issue 4, 2022, Pages 63-73]
-
Outage Probability
Optimal Design of Wireless Visible Light Communication Network with the Aim of Minimizing the Outage Probability at the Location of the Mobile Receiver [Volume 10, Issue 3, 2022, Pages 1-9]
P
-
Packet Loss
A cross layer approach for improving the TCP quality-of-service parameters over the IEEE 802.11.ac wireless networks [Volume 10, Issue 1, 2022, Pages 109-117]
-
Partial Least Squares approach
A framework for assessing cyber security and privacy threats and investigating their impact on smart city performance [Volume 10, Issue 3, 2022, Pages 77-91]
-
Phisical Layer Security and Artificial Noise
Improvement of Security in Wireless Communication Networks with Directional Modulation and Artificial Noise [Volume 10, Issue 4, 2022, Pages 11-18]
-
PHP server side language
Detection of the Remote Code Execution Attacks Using the PHP Web Application Intrusion Detection System [Volume 10, Issue 2, 2022, Pages 75-85]
-
Post-quantum cryptography
Speeding up the execution-time of Crystals-Kyber PQC Algorithm on FPGA [Volume 10, Issue 4, 2022, Pages 101-110]
-
Probability of Detection
A New Hybrid Approach for Traffic Identification and Classification in Wireless Networks [Volume 10, Issue 2, 2022, Pages 31-41]
Q
-
Quality of service. Network Bandwidth
A cross layer approach for improving the TCP quality-of-service parameters over the IEEE 802.11.ac wireless networks [Volume 10, Issue 1, 2022, Pages 109-117]
R
-
Random forest
A model for Multi-Class Intrusion Detection Using the Dragonfly Feature Selection by Learning on the KDD-CUP99 Dataset [Volume 10, Issue 3, 2022, Pages 33-42]
-
Random Forest Algorithm
Kashef: A Two-step detector of Windows-based Malicious executable files [Volume 10, Issue 2, 2022, Pages 143-156]
-
Real-time algorithm
Fast Detection of Vehicle Type and Position in Images Based on Deep Neural Network [Volume 10, Issue 2, 2022, Pages 117-127]
-
Reliability
An Approach to Dependability Enhancement of Cache Memories [Volume 10, Issue 1, 2022, Pages 1-10]
-
Remote code execution attack
Detection of the Remote Code Execution Attacks Using the PHP Web Application Intrusion Detection System [Volume 10, Issue 2, 2022, Pages 75-85]
-
Residue number system
The residue number system component design based on OneHot coding [Volume 10, Issue 1, 2022, Pages 119-133]
-
Road Safety
Detection of Slippery Road Conditions using the Road CCTV Images based on the Convolutional Neural Networks and Transfer Learning [Volume 10, Issue 2, 2022, Pages 105-116]
-
Rumor
Rumor Detection on Social Networks Based on the Degree Distribution Analysis in Step-by-Step Propagation Subgraphs [Volume 10, Issue 3, 2022, Pages 93-105]
S
-
Secret image sharing
A novel lossless color secret image sharing based on homogeneous linear recursion [Volume 10, Issue 3, 2022, Pages 107-118]
-
Secret key generation
Security Evaluation of Mutual Random Phase Injection Scheme for Secret Key Generation over Static Point-to-Point Communications [Volume 10, Issue 2, 2022, Pages 19-30]
-
Sentence Concept Extraction
Investigation of the Semantic Similarity of Persian Sentences Using Vector Space Adaptation And Deep Learning [Volume 10, Issue 2, 2022, Pages 43-56]
-
Sentence Similarity Extraction
Investigation of the Semantic Similarity of Persian Sentences Using Vector Space Adaptation And Deep Learning [Volume 10, Issue 2, 2022, Pages 43-56]
-
Service Quality
A Trust Evaluation Model for Cloud Computing Using Bayesian Network [Volume 10, Issue 4, 2022, Pages 53-61]
-
Shadow image
A novel lossless color secret image sharing based on homogeneous linear recursion [Volume 10, Issue 3, 2022, Pages 107-118]
-
Short Burst
Blind symbol Rate estimation in multipath channels [Volume 10, Issue 3, 2022, Pages 59-66]
-
Smart City
A framework for assessing cyber security and privacy threats and investigating their impact on smart city performance [Volume 10, Issue 3, 2022, Pages 77-91]
-
Social network
Rumor Detection on Social Networks Based on the Degree Distribution Analysis in Step-by-Step Propagation Subgraphs [Volume 10, Issue 3, 2022, Pages 93-105]
-
Sonar targets
Sonar Dataset Classification using Multi-Layer Perceptron Neural Network Based on Dragonfly and Moth Algorithms [Volume 10, Issue 3, 2022, Pages 21-31]
-
Spectral Efficiency
Performance Analysis of Hybrid FSO/RF Systems Using the ℳ Distribution and Markov Function [Volume 10, Issue 2, 2022, Pages 1-10]
-
Spectrum Efficiency
Performance analysis of adaptive modulation and coding methods in the wireless telecommunication channels [Volume 10, Issue 1, 2022, Pages 99-108]
-
Spoofing Attack
Novel Spoofing Mitigation Method using Wavelet Transform Based on PSO Algorithm in the Acquisition Stage of GPS Receiver [Volume 10, Issue 4, 2022, Pages 19-31]
-
Structural Equation Modelling
A framework for assessing cyber security and privacy threats and investigating their impact on smart city performance [Volume 10, Issue 3, 2022, Pages 77-91]
-
Subtractor
The residue number system component design based on OneHot coding [Volume 10, Issue 1, 2022, Pages 119-133]
-
Support Vector Machines
Investigation of a new ensemble method of intrusion detection system on different data sets [Volume 10, Issue 3, 2022, Pages 43-57]
-
SURF algorithm
Improve the detection of dangerous objects in x-ray images in security and military inspections using image processing approaches [Volume 10, Issue 4, 2022, Pages 81-89]
-
Symbol Rate Estimation
Blind symbol Rate estimation in multipath channels [Volume 10, Issue 3, 2022, Pages 59-66]
T
-
Text Test Data Generation
Evaluating Deep Learning Models for Test Data Generation In File Based Fuzzers [Volume 10, Issue 2, 2022, Pages 57-73]
-
Transfer Learning
Detection of Slippery Road Conditions using the Road CCTV Images based on the Convolutional Neural Networks and Transfer Learning [Volume 10, Issue 2, 2022, Pages 105-116]
-
Transmission Control Protocol
A cross layer approach for improving the TCP quality-of-service parameters over the IEEE 802.11.ac wireless networks [Volume 10, Issue 1, 2022, Pages 109-117]
-
Trust
A Trust Evaluation Model for Cloud Computing Using Bayesian Network [Volume 10, Issue 4, 2022, Pages 53-61]
V
-
Vector Space Adaptation
Investigation of the Semantic Similarity of Persian Sentences Using Vector Space Adaptation And Deep Learning [Volume 10, Issue 2, 2022, Pages 43-56]
-
Vehicle Detection
Fast Detection of Vehicle Type and Position in Images Based on Deep Neural Network [Volume 10, Issue 2, 2022, Pages 117-127]
-
Visible Light Communication
Optimal Design of Wireless Visible Light Communication Network with the Aim of Minimizing the Outage Probability at the Location of the Mobile Receiver [Volume 10, Issue 3, 2022, Pages 1-9]
W
-
Wavelet Conversion
Blind symbol Rate estimation in multipath channels [Volume 10, Issue 3, 2022, Pages 59-66]
-
Wavelet Transform
Novel Spoofing Mitigation Method using Wavelet Transform Based on PSO Algorithm in the Acquisition Stage of GPS Receiver [Volume 10, Issue 4, 2022, Pages 19-31]
-
Web Applications
Detection of the Remote Code Execution Attacks Using the PHP Web Application Intrusion Detection System [Volume 10, Issue 2, 2022, Pages 75-85]
-
Whale optimization algorithm
Feature selection using a combination of Genetic-Whale-Ant colony algorithms for software fault prediction by machine learning [Volume 10, Issue 1, 2022, Pages 33-45]
-
Whale optimization algorithm
An Optimized Compound Deep Neural Network Integrating With Feature Selection for Intrusion Detection System in Cyber Attacks [Volume 10, Issue 4, 2022, Pages 41-51]
-
Wireless Ad hoc Networks
A New Hybrid Approach for Traffic Identification and Classification in Wireless Networks [Volume 10, Issue 2, 2022, Pages 31-41]
-
Wireless Sensor Network
Clustering and Routing in Wireless Sensor Networks Using Multi-Objective Cuckoo Search and Game Theory [Volume 10, Issue 3, 2022, Pages 11-20]
-
Word Embedding
Investigation of the Semantic Similarity of Persian Sentences Using Vector Space Adaptation And Deep Learning [Volume 10, Issue 2, 2022, Pages 43-56]
X
-
X-ray images
Improve the detection of dangerous objects in x-ray images in security and military inspections using image processing approaches [Volume 10, Issue 4, 2022, Pages 81-89]
Your query does not match with any item