Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
1. Classification of encrypted traffic for applications based on statistical features

A. fanian; E. Mahdavi; H. Hassannejad

Volume 10, Issue 1 , Winter and Spring 2018, , Pages 29-43


  Traffic classification plays an important role in many aspects of network management such as identifying type of the transferred data, detection of malware applications, applying policies to restrict network accesses and so on. Basic methods in this field were using some obvious traffic features like ...  Read More

2. Improving Tor security against timing and traffic analysis attacks with fair randomization

A. Tavakoly; R. Ebrahimi Atani

Volume 6, Issue 1 , Winter and Spring 2014, , Pages 67-76


  The Tor network is probably one of the most popular online anonymity systems in the world. It has been built based on the volunteer relays from all around the world. It has a strong scientific basis which is structured very well to work in low latency mode that makes it suitable for tasks such as web ...  Read More