A
-
Active learning
DDoS Attack Detection System Using Ensemble Method Classification and Active Learning Approach [Volume 11, Issue 3, 2023, Pages 101-118]
-
Ad-hoc Networks
Security of UAV Relay Networks based on Covert Communication in the Presence of an Eavesdropping UAV [Volume 11, Issue 2, 2023, Pages 45-56]
-
Analysis
dentifying Zero Day Android Daily through Neural Networks [Volume 11, Issue 3, 2023, Pages 49-55]
-
Android
dentifying Zero Day Android Daily through Neural Networks [Volume 11, Issue 3, 2023, Pages 49-55]
-
Anonymity
Evaluation and proof of routing algorithm in Tor anonymity network [Volume 11, Issue 3, 2023, Pages 15-24]
-
Archimedes optimization algorithm
Presenting a new sentiment analysis method based on multi-objective Archimedes optimization algorithm and machine learning [Volume 11, Issue 4, 2023]
-
Automatically Generate Optimized Test Data
A novel way to identify effective test-case in software testing [Volume 11, Issue 2, 2023, Pages 103-116]
B
-
Blind Estimation
The New Algorithm for The Blind Extraction of The Radio Frequency Fingerprint Using the Specific Features of High-Power Amplifier and Local Oscillator [Volume 11, Issue 1, 2023, Pages 57-65]
-
Botnet
Mobile botnets detection using deep learning techniques [Volume 11, Issue 2, 2023, Pages 31-43]
-
Botnet Detection
Mobile botnets detection using deep learning techniques [Volume 11, Issue 2, 2023, Pages 31-43]
C
-
Carrier Frequency
Detection of Interfering Signals and Estimation of Their Carrier Frequency in CNC Satellite Communications using Cyclic Spectrum Density [Volume 11, Issue 2, 2023, Pages 91-101]
-
Chaff
Recognition Chaff from target by determining the optimal waveform in the radar detector using artificial neural network [Volume 11, Issue 2, 2023, Pages 117-132]
-
Chaos Theory
Energy Aware Routing in the Internet of Things using improved Grasshopper Metaheuristic Algorithm [Volume 11, Issue 1, 2023, Pages 15-29]
-
Chaos Theory
Improving mobile mass monitoring in the IoT environment based on Chaotic Fog Algorithm [Volume 11, Issue 3, 2023, Pages 77-88]
-
CICIDS2017 dataset
DDoS Attack Detection System Using Ensemble Method Classification and Active Learning Approach [Volume 11, Issue 3, 2023, Pages 101-118]
-
Classification
A method to prediction of software system’s code smells using neural network [Volume 11, Issue 3, 2023, Pages 67-76]
-
Classifiers
Modular human face recognition method based on principal component analysis and Mahalanobis distance [Volume 11, Issue 4, 2023]
-
Clustering
Providing a routing method in Internet of Things networks based on fuzzy logic and clustering
For use in smart transportatio [Volume 11, Issue 4, 2023]
-
CNC Satellite Communication
Detection of Interfering Signals and Estimation of Their Carrier Frequency in CNC Satellite Communications using Cyclic Spectrum Density [Volume 11, Issue 2, 2023, Pages 91-101]
-
CNN Algorithm
A Malware Classification Method Using visualization and Word Embedding Features [Volume 11, Issue 1, 2023, Pages 1-13]
-
Convolutional Neural Network
Improving the performance of the convolutional neural network using incremental weight loss function to deal with class imbalanced data [Volume 11, Issue 4, 2023, Pages 19-34]
-
Copy-move forgery
Forgery detection in digital images using the hybrid deep learning method [Volume 11, Issue 4, 2023]
-
Covert Communication
Security of UAV Relay Networks based on Covert Communication in the Presence of an Eavesdropping UAV [Volume 11, Issue 2, 2023, Pages 45-56]
-
Crime Patterns
Analysis of exchange market disruptors using graph-based social network analysis [Volume 11, Issue 1, 2023, Pages 107-116]
-
Crime Prevention
Analysis of exchange market disruptors using graph-based social network analysis [Volume 11, Issue 1, 2023, Pages 107-116]
-
Cybercrime
Analysis of exchange market disruptors using graph-based social network analysis [Volume 11, Issue 1, 2023, Pages 107-116]
-
Cyber-physical systems (CPSs)
A method for quantitative evaluation of security risk in cyber-physical systems [Volume 11, Issue 2, 2023, Pages 71-80]
-
Cyber Security
Identify the Factors Affecting the Culture and Awareness of Cyber Security Using Theme Analysis [Volume 11, Issue 1, 2023, Pages 67-80]
-
Cyclic Autocorrelation Function
Detection of Interfering Signals and Estimation of Their Carrier Frequency in CNC Satellite Communications using Cyclic Spectrum Density [Volume 11, Issue 2, 2023, Pages 91-101]
-
Cyclic spectrum density
Detection of Interfering Signals and Estimation of Their Carrier Frequency in CNC Satellite Communications using Cyclic Spectrum Density [Volume 11, Issue 2, 2023, Pages 91-101]
D
-
DDoS attack detection
DDoS Attack Detection System Using Ensemble Method Classification and Active Learning Approach [Volume 11, Issue 3, 2023, Pages 101-118]
-
Deception
Investigating The Effect of Social Engineering Techniques on Employees Vulnerability
(Case study: Tehran Municipality Employees) [Volume 11, Issue 1, 2023, Pages 31-46]
-
Detection
Providing an Improved Unmanned Aerial Vehicle Detection System to Increase Detection speed Using Deep Learning [Volume 11, Issue 1, 2023, Pages 81-96]
-
Differential game
Developing a Threat-Tolerability Bilateral Concept within a Differential Game for the Analysis of the Insider/Adversary Behavior in Operational environment [Volume 11, Issue 2, 2023, Pages 15-29]
-
Diffusion model
A Dynamic Metaheuristic Algorithm for Influence Maximization in Social Networks [Volume 11, Issue 2, 2023, Pages 57-69]
-
Distributed problems
Distributed Solving of Weapon Target Assignment Problem using Learning Automata [Volume 11, Issue 1, 2023, Pages 47-55]
-
DoS attacks
Cyber disruption in the hierarchical control of intelligent microgrid power sharing [Volume 11, Issue 4, 2023]
-
Drone . Deep learnings
Providing an Improved Unmanned Aerial Vehicle Detection System to Increase Detection speed Using Deep Learning [Volume 11, Issue 1, 2023, Pages 81-96]
E
-
Effective Test Cases
A novel way to identify effective test-case in software testing [Volume 11, Issue 2, 2023, Pages 103-116]
-
Ensemble method
DDoS Attack Detection System Using Ensemble Method Classification and Active Learning Approach [Volume 11, Issue 3, 2023, Pages 101-118]
-
Euclidean Distance
Modular human face recognition method based on principal component analysis and Mahalanobis distance [Volume 11, Issue 4, 2023]
-
Evaluation
A method for quantitative evaluation of security risk in cyber-physical systems [Volume 11, Issue 2, 2023, Pages 71-80]
F
-
Face recognition
Modular human face recognition method based on principal component analysis and Mahalanobis distance [Volume 11, Issue 4, 2023]
-
Face recongnition
Applying weighted smoothed norm in sparse representation classification for face recognition [Volume 11, Issue 3, 2023, Pages 57-65]
-
FA-MABC Algorithm
A novel way to identify effective test-case in software testing [Volume 11, Issue 2, 2023, Pages 103-116]
-
Feature Extraction
Identify malicious traffic on IoT infrastructure using neural networks and deep learning [Volume 11, Issue 2, 2023, Pages 1-13]
-
Feature Extraction
Applying weighted smoothed norm in sparse representation classification for face recognition [Volume 11, Issue 3, 2023, Pages 57-65]
-
Flow-level features
DDoS Attack Detection System Using Ensemble Method Classification and Active Learning Approach [Volume 11, Issue 3, 2023, Pages 101-118]
-
Forest Optimization Algorithm
Improving mobile mass monitoring in the IoT environment based on Chaotic Fog Algorithm [Volume 11, Issue 3, 2023, Pages 77-88]
-
Fuzzy Logic
Energy Aware Routing in the Internet of Things using improved Grasshopper Metaheuristic Algorithm [Volume 11, Issue 1, 2023, Pages 15-29]
-
Fuzzy Logic
Providing a routing method in Internet of Things networks based on fuzzy logic and clustering
For use in smart transportatio [Volume 11, Issue 4, 2023]
-
Fuzzy System
Improving mobile mass monitoring in the IoT environment based on Chaotic Fog Algorithm [Volume 11, Issue 3, 2023, Pages 77-88]
G
-
Game Theory
Routing and Buffer managment based on game theory in delay tolerant network [Volume 11, Issue 4, 2023, Pages 35-43]
-
Global Positioning System
Reducing the Effects of Deception Attack on GPS Receivers of Phasor Measurement Units using Neural Networks [Volume 11, Issue 1, 2023, Pages 97-105]
-
Grasshopper Optimization Algorithm
Energy Aware Routing in the Internet of Things using improved Grasshopper Metaheuristic Algorithm [Volume 11, Issue 1, 2023, Pages 15-29]
H
-
Hamming distance
Presenting A Method Based on Nearest Neighbors and Hamming Distance in Order to Identify Malicious Applications [Volume 11, Issue 2, 2023, Pages 81-90]
-
Hermite pulse shaping filter
A new method for data transmission in shallow water channel based on offset multi-carrier filter bank [Volume 11, Issue 3, 2023, Pages 25-34]
I
-
Image forgery detection
Forgery detection in digital images using the hybrid deep learning method [Volume 11, Issue 4, 2023]
-
Influence maximization
A Dynamic Metaheuristic Algorithm for Influence Maximization in Social Networks [Volume 11, Issue 2, 2023, Pages 57-69]
-
Interfering Signals Detection
Detection of Interfering Signals and Estimation of Their Carrier Frequency in CNC Satellite Communications using Cyclic Spectrum Density [Volume 11, Issue 2, 2023, Pages 91-101]
-
Internet of Things
Energy Aware Routing in the Internet of Things using improved Grasshopper Metaheuristic Algorithm [Volume 11, Issue 1, 2023, Pages 15-29]
-
Internet of Things
Improving mobile mass monitoring in the IoT environment based on Chaotic Fog Algorithm [Volume 11, Issue 3, 2023, Pages 77-88]
-
Internet of Things
A recommender system using a support vector machine and the TOPSIS model in the Internet of Things [Volume 11, Issue 4, 2023]
-
Internet of Things
Providing a routing method in Internet of Things networks based on fuzzy logic and clustering
For use in smart transportatio [Volume 11, Issue 4, 2023]
-
Internet service
A recommender system using a support vector machine and the TOPSIS model in the Internet of Things [Volume 11, Issue 4, 2023]
-
IoT
Identify malicious traffic on IoT infrastructure using neural networks and deep learning [Volume 11, Issue 2, 2023, Pages 1-13]
L
-
Lanchester equation
Developing a Threat-Tolerability Bilateral Concept within a Differential Game for the Analysis of the Insider/Adversary Behavior in Operational environment [Volume 11, Issue 2, 2023, Pages 15-29]
-
Learning Automata
Distributed Solving of Weapon Target Assignment Problem using Learning Automata [Volume 11, Issue 1, 2023, Pages 47-55]
M
-
Machine Learning
A method to prediction of software system’s code smells using neural network [Volume 11, Issue 3, 2023, Pages 67-76]
-
Mahalanobis Distance
Modular human face recognition method based on principal component analysis and Mahalanobis distance [Volume 11, Issue 4, 2023]
-
Malware
Identify malicious traffic on IoT infrastructure using neural networks and deep learning [Volume 11, Issue 2, 2023, Pages 1-13]
-
Malware
Presenting A Method Based on Nearest Neighbors and Hamming Distance in Order to Identify Malicious Applications [Volume 11, Issue 2, 2023, Pages 81-90]
-
Malware
dentifying Zero Day Android Daily through Neural Networks [Volume 11, Issue 3, 2023, Pages 49-55]
-
Malware Detection
A Malware Classification Method Using visualization and Word Embedding Features [Volume 11, Issue 1, 2023, Pages 1-13]
-
Malware Embedding
A Malware Classification Method Using visualization and Word Embedding Features [Volume 11, Issue 1, 2023, Pages 1-13]
-
Malware Visualization
A Malware Classification Method Using visualization and Word Embedding Features [Volume 11, Issue 1, 2023, Pages 1-13]
-
Monitoring and electronic action
A New Method in Wide Band Adaptive Beam Forming By Deep Learning Method In An Array System [Volume 11, Issue 3, 2023, Pages 35-47]
-
Multi-agent systems
Distributed Solving of Weapon Target Assignment Problem using Learning Automata [Volume 11, Issue 1, 2023, Pages 47-55]
-
Multimode fiber
Sensing and detecting changes due to displacement, pressure, or dynamic vibration in an optical fiber, based on fiber Specklegram [Volume 11, Issue 3, 2023, Pages 89-99]
-
Multiple Antennas
Security of UAV Relay Networks based on Covert Communication in the Presence of an Eavesdropping UAV [Volume 11, Issue 2, 2023, Pages 45-56]
-
Mutation Testing
A novel way to identify effective test-case in software testing [Volume 11, Issue 2, 2023, Pages 103-116]
N
-
Nearest neighbor
Presenting A Method Based on Nearest Neighbors and Hamming Distance in Order to Identify Malicious Applications [Volume 11, Issue 2, 2023, Pages 81-90]
-
Network dynamicity
A Dynamic Metaheuristic Algorithm for Influence Maximization in Social Networks [Volume 11, Issue 2, 2023, Pages 57-69]
-
Network Traffic
Identify malicious traffic on IoT infrastructure using neural networks and deep learning [Volume 11, Issue 2, 2023, Pages 1-13]
-
Network traffic classification
DDoS Attack Detection System Using Ensemble Method Classification and Active Learning Approach [Volume 11, Issue 3, 2023, Pages 101-118]
O
-
Online social network (OSN)
a conceptual model for computational evaluation of influence operations in online social networks [Volume 11, Issue 4, 2023, Pages 1-17]
-
Optical Fiber Sensor
Sensing and detecting changes due to displacement, pressure, or dynamic vibration in an optical fiber, based on fiber Specklegram [Volume 11, Issue 3, 2023, Pages 89-99]
-
Organized Crime
Analysis of exchange market disruptors using graph-based social network analysis [Volume 11, Issue 1, 2023, Pages 107-116]
P
-
Phase Noise
The New Algorithm for The Blind Extraction of The Radio Frequency Fingerprint Using the Specific Features of High-Power Amplifier and Local Oscillator [Volume 11, Issue 1, 2023, Pages 57-65]
-
Phasor Mesurement Units
Reducing the Effects of Deception Attack on GPS Receivers of Phasor Measurement Units using Neural Networks [Volume 11, Issue 1, 2023, Pages 97-105]
-
Physical security systems
Cyber disruption in the hierarchical control of intelligent microgrid power sharing [Volume 11, Issue 4, 2023]
-
Pixel forgery detection
Forgery detection in digital images using the hybrid deep learning method [Volume 11, Issue 4, 2023]
-
Power amplifier
The New Algorithm for The Blind Extraction of The Radio Frequency Fingerprint Using the Specific Features of High-Power Amplifier and Local Oscillator [Volume 11, Issue 1, 2023, Pages 57-65]
-
Principal Component Analysis (PCA)
Modular human face recognition method based on principal component analysis and Mahalanobis distance [Volume 11, Issue 4, 2023]
Q
-
Quantum Fourier transform
Steganalysis of Quantum Audio Signal using Quantum Support Vector Machine Algorithm [Volume 11, Issue 3, 2023, Pages 1-14]
-
Quantum Spectrum Bandwidth
Steganalysis of Quantum Audio Signal using Quantum Support Vector Machine Algorithm [Volume 11, Issue 3, 2023, Pages 1-14]
-
Quantum Spectrum Centroid
Steganalysis of Quantum Audio Signal using Quantum Support Vector Machine Algorithm [Volume 11, Issue 3, 2023, Pages 1-14]
-
Quantum steganalysis
Steganalysis of Quantum Audio Signal using Quantum Support Vector Machine Algorithm [Volume 11, Issue 3, 2023, Pages 1-14]
R
-
Radar
Recognition Chaff from target by determining the optimal waveform in the radar detector using artificial neural network [Volume 11, Issue 2, 2023, Pages 117-132]
-
Radio Frequency Fingerprint
The New Algorithm for The Blind Extraction of The Radio Frequency Fingerprint Using the Specific Features of High-Power Amplifier and Local Oscillator [Volume 11, Issue 1, 2023, Pages 57-65]
-
Recommender System
A recommender system using a support vector machine and the TOPSIS model in the Internet of Things [Volume 11, Issue 4, 2023]
-
Resource Assignment
Developing a Threat-Tolerability Bilateral Concept within a Differential Game for the Analysis of the Insider/Adversary Behavior in Operational environment [Volume 11, Issue 2, 2023, Pages 15-29]
-
Risk
A method for quantitative evaluation of security risk in cyber-physical systems [Volume 11, Issue 2, 2023, Pages 71-80]
-
Routing protocol
Providing a routing method in Internet of Things networks based on fuzzy logic and clustering
For use in smart transportatio [Volume 11, Issue 4, 2023]
S
-
Security risk
Presenting A Method Based on Nearest Neighbors and Hamming Distance in Order to Identify Malicious Applications [Volume 11, Issue 2, 2023, Pages 81-90]
-
Semi-blind separation
Semi-Blind Separation of Multiple Synchronous Wideband Frequency Hopping Signals Using a Band-Limited Receiver and Space-Time- Frequency Distributions [Volume 11, Issue 4, 2023]
-
Sentiment Analysis
Presenting a new sentiment analysis method based on multi-objective Archimedes optimization algorithm and machine learning [Volume 11, Issue 4, 2023]
-
Social network analysis
Analysis of exchange market disruptors using graph-based social network analysis [Volume 11, Issue 1, 2023, Pages 107-116]
-
Software Quality
Fault Proness Estimation of Software Modules Using Machine learning [Volume 11, Issue 4, 2023]
-
Sparse representation classification
Applying weighted smoothed norm in sparse representation classification for face recognition [Volume 11, Issue 3, 2023, Pages 57-65]
-
Spoofing Attacks
Reducing the Effects of Deception Attack on GPS Receivers of Phasor Measurement Units using Neural Networks [Volume 11, Issue 1, 2023, Pages 97-105]
-
Static Analysis
A Malware Classification Method Using visualization and Word Embedding Features [Volume 11, Issue 1, 2023, Pages 1-13]
-
Support Vector Machine (SVM)
A recommender system using a support vector machine and the TOPSIS model in the Internet of Things [Volume 11, Issue 4, 2023]
T
-
Technique of Order Preference for Similarity to Ideal Solution (TOPSIS)
A recommender system using a support vector machine and the TOPSIS model in the Internet of Things [Volume 11, Issue 4, 2023]
-
Threat evaluation
Developing a Threat-Tolerability Bilateral Concept within a Differential Game for the Analysis of the Insider/Adversary Behavior in Operational environment [Volume 11, Issue 2, 2023, Pages 15-29]
-
Time Synchronization Attacks
Reducing the Effects of Deception Attack on GPS Receivers of Phasor Measurement Units using Neural Networks [Volume 11, Issue 1, 2023, Pages 97-105]
-
Tolerability
Developing a Threat-Tolerability Bilateral Concept within a Differential Game for the Analysis of the Insider/Adversary Behavior in Operational environment [Volume 11, Issue 2, 2023, Pages 15-29]
-
Tor Network
Evaluation and proof of routing algorithm in Tor anonymity network [Volume 11, Issue 3, 2023, Pages 15-24]
U
-
UAV relay
Security of UAV Relay Networks based on Covert Communication in the Presence of an Eavesdropping UAV [Volume 11, Issue 2, 2023, Pages 45-56]
-
Underwater transmission
A new method for data transmission in shallow water channel based on offset multi-carrier filter bank [Volume 11, Issue 3, 2023, Pages 25-34]
V
-
Vulnerability
Investigating The Effect of Social Engineering Techniques on Employees Vulnerability
(Case study: Tehran Municipality Employees) [Volume 11, Issue 1, 2023, Pages 31-46]
W
-
Weighted smoothed l0 norm
Applying weighted smoothed norm in sparse representation classification for face recognition [Volume 11, Issue 3, 2023, Pages 57-65]
-
Wideband Beamforming
A New Method in Wide Band Adaptive Beam Forming By Deep Learning Method In An Array System [Volume 11, Issue 3, 2023, Pages 35-47]
-
Wireless networks
Security of UAV Relay Networks based on Covert Communication in the Presence of an Eavesdropping UAV [Volume 11, Issue 2, 2023, Pages 45-56]
Your query does not match with any item