Keyword Index

A

  • Active learning DDoS Attack Detection System Using Ensemble Method Classification and Active Learning Approach [Volume 11, Issue 3, 2023, Pages 101-118]
  • Ad-hoc Networks Security of UAV Relay Networks based on Covert Communication in the Presence of an Eavesdropping UAV [Volume 11, Issue 2, 2023, Pages 45-56]
  • Analysis dentifying Zero Day Android Daily through Neural Networks [Volume 11, Issue 3, 2023, Pages 49-55]
  • Android dentifying Zero Day Android Daily through Neural Networks [Volume 11, Issue 3, 2023, Pages 49-55]
  • Anonymity Evaluation and proof of routing algorithm in Tor anonymity network [Volume 11, Issue 3, 2023, Pages 15-24]
  • Archimedes optimization algorithm Presenting a new sentiment analysis method based on multi-objective Archimedes optimization algorithm and machine learning [Volume 11, Issue 4, 2023]
  • Automatically Generate Optimized Test Data A novel way to identify effective test-case in software testing [Volume 11, Issue 2, 2023, Pages 103-116]

B

  • Blind Estimation The New Algorithm for The Blind Extraction of The Radio Frequency Fingerprint Using the Specific Features of High-Power Amplifier and Local Oscillator [Volume 11, Issue 1, 2023, Pages 57-65]
  • Botnet Mobile botnets detection using deep learning techniques [Volume 11, Issue 2, 2023, Pages 31-43]
  • Botnet Detection Mobile botnets detection using deep learning techniques [Volume 11, Issue 2, 2023, Pages 31-43]

C

  • Carrier Frequency Detection of Interfering Signals and Estimation of Their Carrier Frequency in CNC Satellite Communications using Cyclic Spectrum Density [Volume 11, Issue 2, 2023, Pages 91-101]
  • Chaff Recognition Chaff from target by determining the optimal waveform in the radar detector using artificial neural network [Volume 11, Issue 2, 2023, Pages 117-132]
  • Chaos Theory Energy Aware Routing in the Internet of Things using improved Grasshopper Metaheuristic Algorithm [Volume 11, Issue 1, 2023, Pages 15-29]
  • Chaos Theory Improving mobile mass monitoring in the IoT environment based on Chaotic Fog Algorithm [Volume 11, Issue 3, 2023, Pages 77-88]
  • CICIDS2017 dataset DDoS Attack Detection System Using Ensemble Method Classification and Active Learning Approach [Volume 11, Issue 3, 2023, Pages 101-118]
  • Classification A method to prediction of software system’s code smells using neural network [Volume 11, Issue 3, 2023, Pages 67-76]
  • Classifiers Modular human face recognition method based on principal component analysis and Mahalanobis distance [Volume 11, Issue 4, 2023]
  • Clustering Providing a routing method in Internet of Things networks based on fuzzy logic and clustering For use in smart transportatio [Volume 11, Issue 4, 2023]
  • CNC Satellite Communication Detection of Interfering Signals and Estimation of Their Carrier Frequency in CNC Satellite Communications using Cyclic Spectrum Density [Volume 11, Issue 2, 2023, Pages 91-101]
  • CNN Algorithm A Malware Classification Method Using visualization and Word Embedding Features [Volume 11, Issue 1, 2023, Pages 1-13]
  • Convolutional Neural Network Improving the performance of the convolutional neural network using incremental weight loss function to deal with class imbalanced data [Volume 11, Issue 4, 2023, Pages 19-34]
  • Copy-move forgery Forgery detection in digital images using the hybrid deep learning method [Volume 11, Issue 4, 2023]
  • Covert Communication Security of UAV Relay Networks based on Covert Communication in the Presence of an Eavesdropping UAV [Volume 11, Issue 2, 2023, Pages 45-56]
  • Crime Patterns Analysis of exchange market disruptors using graph-based social network analysis [Volume 11, Issue 1, 2023, Pages 107-116]
  • Crime Prevention Analysis of exchange market disruptors using graph-based social network analysis [Volume 11, Issue 1, 2023, Pages 107-116]
  • Cybercrime Analysis of exchange market disruptors using graph-based social network analysis [Volume 11, Issue 1, 2023, Pages 107-116]
  • Cyber-physical systems (CPSs) A method for quantitative evaluation of security risk in cyber-physical systems [Volume 11, Issue 2, 2023, Pages 71-80]
  • Cyber Security Identify the Factors Affecting the Culture and Awareness of Cyber Security Using Theme Analysis [Volume 11, Issue 1, 2023, Pages 67-80]
  • Cyclic Autocorrelation Function Detection of Interfering Signals and Estimation of Their Carrier Frequency in CNC Satellite Communications using Cyclic Spectrum Density [Volume 11, Issue 2, 2023, Pages 91-101]
  • Cyclic spectrum density Detection of Interfering Signals and Estimation of Their Carrier Frequency in CNC Satellite Communications using Cyclic Spectrum Density [Volume 11, Issue 2, 2023, Pages 91-101]

D

  • DDoS attack detection DDoS Attack Detection System Using Ensemble Method Classification and Active Learning Approach [Volume 11, Issue 3, 2023, Pages 101-118]
  • Deception Investigating The Effect of Social Engineering Techniques on Employees Vulnerability (Case study: Tehran Municipality Employees) [Volume 11, Issue 1, 2023, Pages 31-46]
  • Detection Providing an Improved Unmanned Aerial Vehicle Detection System to Increase Detection speed Using Deep Learning [Volume 11, Issue 1, 2023, Pages 81-96]
  • Differential game Developing a Threat-Tolerability Bilateral Concept within a Differential Game for the Analysis of the Insider/Adversary Behavior in Operational environment [Volume 11, Issue 2, 2023, Pages 15-29]
  • Diffusion model A Dynamic Metaheuristic Algorithm for Influence Maximization in Social Networks [Volume 11, Issue 2, 2023, Pages 57-69]
  • Distributed problems Distributed Solving of Weapon Target Assignment Problem using Learning Automata [Volume 11, Issue 1, 2023, Pages 47-55]
  • DoS attacks Cyber disruption in the hierarchical control of intelligent microgrid power sharing [Volume 11, Issue 4, 2023]
  • Drone . Deep learnings Providing an Improved Unmanned Aerial Vehicle Detection System to Increase Detection speed Using Deep Learning [Volume 11, Issue 1, 2023, Pages 81-96]

E

  • Effective Test Cases A novel way to identify effective test-case in software testing [Volume 11, Issue 2, 2023, Pages 103-116]
  • Ensemble method DDoS Attack Detection System Using Ensemble Method Classification and Active Learning Approach [Volume 11, Issue 3, 2023, Pages 101-118]
  • Euclidean Distance Modular human face recognition method based on principal component analysis and Mahalanobis distance [Volume 11, Issue 4, 2023]
  • Evaluation A method for quantitative evaluation of security risk in cyber-physical systems [Volume 11, Issue 2, 2023, Pages 71-80]

F

  • Face recognition Modular human face recognition method based on principal component analysis and Mahalanobis distance [Volume 11, Issue 4, 2023]
  • Face recongnition Applying weighted smoothed norm in sparse representation classification for face recognition [Volume 11, Issue 3, 2023, Pages 57-65]
  • FA-MABC Algorithm A novel way to identify effective test-case in software testing [Volume 11, Issue 2, 2023, Pages 103-116]
  • Feature Extraction Identify malicious traffic on IoT infrastructure using neural networks and deep learning [Volume 11, Issue 2, 2023, Pages 1-13]
  • Feature Extraction Applying weighted smoothed norm in sparse representation classification for face recognition [Volume 11, Issue 3, 2023, Pages 57-65]
  • Flow-level features DDoS Attack Detection System Using Ensemble Method Classification and Active Learning Approach [Volume 11, Issue 3, 2023, Pages 101-118]
  • Forest Optimization Algorithm Improving mobile mass monitoring in the IoT environment based on Chaotic Fog Algorithm [Volume 11, Issue 3, 2023, Pages 77-88]
  • Fuzzy Logic Energy Aware Routing in the Internet of Things using improved Grasshopper Metaheuristic Algorithm [Volume 11, Issue 1, 2023, Pages 15-29]
  • Fuzzy Logic Providing a routing method in Internet of Things networks based on fuzzy logic and clustering For use in smart transportatio [Volume 11, Issue 4, 2023]
  • Fuzzy System Improving mobile mass monitoring in the IoT environment based on Chaotic Fog Algorithm [Volume 11, Issue 3, 2023, Pages 77-88]

G

  • Game Theory Routing and Buffer managment based on game theory in delay tolerant network [Volume 11, Issue 4, 2023, Pages 35-43]
  • Global Positioning System Reducing the Effects of Deception Attack on GPS Receivers of Phasor Measurement Units using Neural Networks [Volume 11, Issue 1, 2023, Pages 97-105]
  • Grasshopper Optimization Algorithm Energy Aware Routing in the Internet of Things using improved Grasshopper Metaheuristic Algorithm [Volume 11, Issue 1, 2023, Pages 15-29]

H

  • Hamming distance Presenting A Method Based on Nearest Neighbors and Hamming Distance in Order to Identify Malicious Applications [Volume 11, Issue 2, 2023, Pages 81-90]
  • Hermite pulse shaping filter A new method for data transmission in shallow water channel based on offset multi-carrier filter bank [Volume 11, Issue 3, 2023, Pages 25-34]

I

  • Image forgery detection Forgery detection in digital images using the hybrid deep learning method [Volume 11, Issue 4, 2023]
  • Influence maximization A Dynamic Metaheuristic Algorithm for Influence Maximization in Social Networks [Volume 11, Issue 2, 2023, Pages 57-69]
  • Interfering Signals Detection Detection of Interfering Signals and Estimation of Their Carrier Frequency in CNC Satellite Communications using Cyclic Spectrum Density [Volume 11, Issue 2, 2023, Pages 91-101]
  • Internet of Things Energy Aware Routing in the Internet of Things using improved Grasshopper Metaheuristic Algorithm [Volume 11, Issue 1, 2023, Pages 15-29]
  • Internet of Things Improving mobile mass monitoring in the IoT environment based on Chaotic Fog Algorithm [Volume 11, Issue 3, 2023, Pages 77-88]
  • Internet of Things A recommender system using a support vector machine and the TOPSIS model in the Internet of Things [Volume 11, Issue 4, 2023]
  • Internet of Things Providing a routing method in Internet of Things networks based on fuzzy logic and clustering For use in smart transportatio [Volume 11, Issue 4, 2023]
  • Internet service A recommender system using a support vector machine and the TOPSIS model in the Internet of Things [Volume 11, Issue 4, 2023]
  • IoT Identify malicious traffic on IoT infrastructure using neural networks and deep learning [Volume 11, Issue 2, 2023, Pages 1-13]

L

  • Lanchester equation Developing a Threat-Tolerability Bilateral Concept within a Differential Game for the Analysis of the Insider/Adversary Behavior in Operational environment [Volume 11, Issue 2, 2023, Pages 15-29]
  • Learning Automata Distributed Solving of Weapon Target Assignment Problem using Learning Automata [Volume 11, Issue 1, 2023, Pages 47-55]

M

  • Machine Learning A method to prediction of software system’s code smells using neural network [Volume 11, Issue 3, 2023, Pages 67-76]
  • Mahalanobis Distance Modular human face recognition method based on principal component analysis and Mahalanobis distance [Volume 11, Issue 4, 2023]
  • Malware Identify malicious traffic on IoT infrastructure using neural networks and deep learning [Volume 11, Issue 2, 2023, Pages 1-13]
  • Malware Presenting A Method Based on Nearest Neighbors and Hamming Distance in Order to Identify Malicious Applications [Volume 11, Issue 2, 2023, Pages 81-90]
  • Malware dentifying Zero Day Android Daily through Neural Networks [Volume 11, Issue 3, 2023, Pages 49-55]
  • Malware Detection A Malware Classification Method Using visualization and Word Embedding Features [Volume 11, Issue 1, 2023, Pages 1-13]
  • Malware Embedding A Malware Classification Method Using visualization and Word Embedding Features [Volume 11, Issue 1, 2023, Pages 1-13]
  • Malware Visualization A Malware Classification Method Using visualization and Word Embedding Features [Volume 11, Issue 1, 2023, Pages 1-13]
  • Monitoring and electronic action A New Method in Wide Band Adaptive Beam Forming By Deep Learning Method In An Array System [Volume 11, Issue 3, 2023, Pages 35-47]
  • Multi-agent systems Distributed Solving of Weapon Target Assignment Problem using Learning Automata [Volume 11, Issue 1, 2023, Pages 47-55]
  • Multimode fiber Sensing and detecting changes due to displacement, pressure, or dynamic vibration in an optical fiber, based on fiber Specklegram [Volume 11, Issue 3, 2023, Pages 89-99]
  • Multiple Antennas Security of UAV Relay Networks based on Covert Communication in the Presence of an Eavesdropping UAV [Volume 11, Issue 2, 2023, Pages 45-56]
  • Mutation Testing A novel way to identify effective test-case in software testing [Volume 11, Issue 2, 2023, Pages 103-116]

N

  • Nearest neighbor Presenting A Method Based on Nearest Neighbors and Hamming Distance in Order to Identify Malicious Applications [Volume 11, Issue 2, 2023, Pages 81-90]
  • Network dynamicity A Dynamic Metaheuristic Algorithm for Influence Maximization in Social Networks [Volume 11, Issue 2, 2023, Pages 57-69]
  • Network Traffic Identify malicious traffic on IoT infrastructure using neural networks and deep learning [Volume 11, Issue 2, 2023, Pages 1-13]
  • Network traffic classification DDoS Attack Detection System Using Ensemble Method Classification and Active Learning Approach [Volume 11, Issue 3, 2023, Pages 101-118]

O

  • Online social network (OSN) a conceptual model for computational evaluation of influence operations in online social networks [Volume 11, Issue 4, 2023, Pages 1-17]
  • Optical Fiber Sensor Sensing and detecting changes due to displacement, pressure, or dynamic vibration in an optical fiber, based on fiber Specklegram [Volume 11, Issue 3, 2023, Pages 89-99]
  • Organized Crime Analysis of exchange market disruptors using graph-based social network analysis [Volume 11, Issue 1, 2023, Pages 107-116]

P

  • Phase Noise The New Algorithm for The Blind Extraction of The Radio Frequency Fingerprint Using the Specific Features of High-Power Amplifier and Local Oscillator [Volume 11, Issue 1, 2023, Pages 57-65]
  • Phasor Mesurement Units Reducing the Effects of Deception Attack on GPS Receivers of Phasor Measurement Units using Neural Networks [Volume 11, Issue 1, 2023, Pages 97-105]
  • Physical security systems Cyber disruption in the hierarchical control of intelligent microgrid power sharing [Volume 11, Issue 4, 2023]
  • Pixel forgery detection Forgery detection in digital images using the hybrid deep learning method [Volume 11, Issue 4, 2023]
  • Power amplifier The New Algorithm for The Blind Extraction of The Radio Frequency Fingerprint Using the Specific Features of High-Power Amplifier and Local Oscillator [Volume 11, Issue 1, 2023, Pages 57-65]
  • Principal Component Analysis (PCA) Modular human face recognition method based on principal component analysis and Mahalanobis distance [Volume 11, Issue 4, 2023]

Q

  • Quantum Fourier transform Steganalysis of Quantum Audio Signal using Quantum Support Vector Machine Algorithm [Volume 11, Issue 3, 2023, Pages 1-14]
  • Quantum Spectrum Bandwidth Steganalysis of Quantum Audio Signal using Quantum Support Vector Machine Algorithm [Volume 11, Issue 3, 2023, Pages 1-14]
  • Quantum Spectrum Centroid Steganalysis of Quantum Audio Signal using Quantum Support Vector Machine Algorithm [Volume 11, Issue 3, 2023, Pages 1-14]
  • Quantum steganalysis Steganalysis of Quantum Audio Signal using Quantum Support Vector Machine Algorithm [Volume 11, Issue 3, 2023, Pages 1-14]

R

  • Radar Recognition Chaff from target by determining the optimal waveform in the radar detector using artificial neural network [Volume 11, Issue 2, 2023, Pages 117-132]
  • Radio Frequency Fingerprint The New Algorithm for The Blind Extraction of The Radio Frequency Fingerprint Using the Specific Features of High-Power Amplifier and Local Oscillator [Volume 11, Issue 1, 2023, Pages 57-65]
  • Recommender System A recommender system using a support vector machine and the TOPSIS model in the Internet of Things [Volume 11, Issue 4, 2023]
  • Resource Assignment Developing a Threat-Tolerability Bilateral Concept within a Differential Game for the Analysis of the Insider/Adversary Behavior in Operational environment [Volume 11, Issue 2, 2023, Pages 15-29]
  • Risk A method for quantitative evaluation of security risk in cyber-physical systems [Volume 11, Issue 2, 2023, Pages 71-80]
  • Routing protocol Providing a routing method in Internet of Things networks based on fuzzy logic and clustering For use in smart transportatio [Volume 11, Issue 4, 2023]

S

  • Security risk Presenting A Method Based on Nearest Neighbors and Hamming Distance in Order to Identify Malicious Applications [Volume 11, Issue 2, 2023, Pages 81-90]
  • Semi-blind separation Semi-Blind Separation of Multiple Synchronous Wideband Frequency Hopping Signals Using a Band-Limited Receiver and Space-Time- Frequency Distributions [Volume 11, Issue 4, 2023]
  • Sentiment Analysis Presenting a new sentiment analysis method based on multi-objective Archimedes optimization algorithm and machine learning [Volume 11, Issue 4, 2023]
  • Social network analysis Analysis of exchange market disruptors using graph-based social network analysis [Volume 11, Issue 1, 2023, Pages 107-116]
  • Software Quality Fault Proness Estimation of Software Modules Using Machine learning [Volume 11, Issue 4, 2023]
  • Sparse representation classification Applying weighted smoothed norm in sparse representation classification for face recognition [Volume 11, Issue 3, 2023, Pages 57-65]
  • Spoofing Attacks Reducing the Effects of Deception Attack on GPS Receivers of Phasor Measurement Units using Neural Networks [Volume 11, Issue 1, 2023, Pages 97-105]
  • Static Analysis A Malware Classification Method Using visualization and Word Embedding Features [Volume 11, Issue 1, 2023, Pages 1-13]
  • Support Vector Machine (SVM) A recommender system using a support vector machine and the TOPSIS model in the Internet of Things [Volume 11, Issue 4, 2023]

T

  • Technique of Order Preference for Similarity to Ideal Solution (TOPSIS) A recommender system using a support vector machine and the TOPSIS model in the Internet of Things [Volume 11, Issue 4, 2023]
  • Threat evaluation Developing a Threat-Tolerability Bilateral Concept within a Differential Game for the Analysis of the Insider/Adversary Behavior in Operational environment [Volume 11, Issue 2, 2023, Pages 15-29]
  • Time Synchronization Attacks Reducing the Effects of Deception Attack on GPS Receivers of Phasor Measurement Units using Neural Networks [Volume 11, Issue 1, 2023, Pages 97-105]
  • Tolerability Developing a Threat-Tolerability Bilateral Concept within a Differential Game for the Analysis of the Insider/Adversary Behavior in Operational environment [Volume 11, Issue 2, 2023, Pages 15-29]
  • Tor Network Evaluation and proof of routing algorithm in Tor anonymity network [Volume 11, Issue 3, 2023, Pages 15-24]

U

  • UAV relay Security of UAV Relay Networks based on Covert Communication in the Presence of an Eavesdropping UAV [Volume 11, Issue 2, 2023, Pages 45-56]
  • Underwater transmission A new method for data transmission in shallow water channel based on offset multi-carrier filter bank [Volume 11, Issue 3, 2023, Pages 25-34]

V

  • Vulnerability Investigating The Effect of Social Engineering Techniques on Employees Vulnerability (Case study: Tehran Municipality Employees) [Volume 11, Issue 1, 2023, Pages 31-46]

W

  • Weighted smoothed l0 norm Applying weighted smoothed norm in sparse representation classification for face recognition [Volume 11, Issue 3, 2023, Pages 57-65]
  • Wideband Beamforming A New Method in Wide Band Adaptive Beam Forming By Deep Learning Method In An Array System [Volume 11, Issue 3, 2023, Pages 35-47]
  • Wireless networks Security of UAV Relay Networks based on Covert Communication in the Presence of an Eavesdropping UAV [Volume 11, Issue 2, 2023, Pages 45-56]