1. Quantitative evaluation of software security: an approach based on UML/SecAM and evidence theory

Volume 8, Issue 2, Summer and Autumn 2016, Page 141-153

A. Sedaghatbaf; M. Abdollahi Azgomi


2. Dwarf Frankenstein is still in your memory: tiny code reuse attacks

Volume 9, Issue 1, Winter and Spring 2017, Page 53-72

A.A Sadeghi; F. Aminmansour; H.R. Shahriari


3. Phishing website detection using weighted feature line embedding

Volume 9, Issue 2, Summer and Autumn 2017, Page 147-159

M. Imani; Gh. A. Montazer


4. BotRevealer: Behavioral Detection of Botnets based on Botnet Life-cycle

Volume 10, Issue 1, Winter and Spring 2018, Page 55-61

E. Khoshhalpour; H. R. Shahriari


5. Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)

Volume 10, Issue 2, Summer and Autumn 2018, Page 129-139

N. Soltani; R. Bohlooli; R. Jalili


6. Biclique Cryptanalysis of Block Ciphers LBlock and TWINE-80 with Practical Data Complexity

Volume 11, Issue 1, Winter and Spring 2019, Page 57-74

Siavash Ahmadi; Zahra Ahmadian; Javad Mohajeri; Mohammad Reza Aref


7. Face Recognition Based Rank Reduction SVD Approach

Volume 11, Special Issue, Summer and Autumn 2019, Page 39-50

Omed Hassan Ahmed; Joan Lu; Qiang Xu; Muzhir Shaban Al-Ani


8. Anomaly Detection Using SVM as Classifier and Decision Tree for Optimizing Feature Vectors

Articles in Press, Accepted Manuscript, Available Online from 20 July 2019

Elham Serkani; Hossein Gharaee Garakani; Naser Mohammadzadeh


9. A confidence-aware interval-based trust model

Volume 4, Issue 2, Summer and Autumn 2012, Page 151-165

H. Shakeri; A. Ghaemi Bafghi


10. Image encryption based on chaotic tent map in time and frequency domains

Volume 5, Issue 1, Winter and Spring 2013, Page 97-110

E. Hassani; M. Eshghi


11. STLR: a novel danger theory based structural TLR algorithm

Volume 5, Issue 2, Summer and Autumn 2013, Page 209-225

R. Azmi; B. Pishgoo


12. A density based clustering approach to distinguish between web robot and human requests to a web server

Volume 6, Issue 1, Winter and Spring 2014, Page 77-89

M. Zabihi; M. Vafaei Jahan; J. Hamidzadeh


13. A two-phase wormhole attack detection scheme in MANETs

Volume 6, Issue 2, Summer and Autumn 2014, Page 183-191

Sh. Shamaei; A. Movaghar


14. SEIMCHA: a new semantic image CAPTCHA using geometric transformations

Volume 4, Issue 1, Winter and Spring 2012, Page 63-76

M. Mehrnejad; A. Ghaemi Bafghi; A. Harati; E. Toreini


15. Security-aware register placement to hinder malicious hardware updating and improve Trojan detectability

Volume 7, Issue 1, Winter and Spring 2015, Page 75-81

M. Vosoughi; A. Jahanian


16. A collusion mitigation scheme for reputation systems

Volume 7, Issue 2, Summer and Autumn 2015, Page 151-166

M. Niknafs; S. Dorri Nogoorani; R. Jalili


17. A new method for accelerating impossible differential cryptanalysis and its application on LBlock

Volume 8, Issue 1, Winter and Spring 2016, Page 73-84

A. Khalesi; H. Bahramgiri; D. Mansuri


18. A note on the security of two improved RFID protocols

Volume 8, Issue 2, Summer and Autumn 2016, Page 155-160

M. Safkhani; N. Bagheri


19. An automatic test case generator for evaluating implementation of access control policies

Volume 9, Issue 1, Winter and Spring 2017, Page 73-91

M. Safarzadeh; M. Taghizadeh; B. Zamani; B. Tork Ladani


20. Analyzing new features of infected web content in detection of malicious web pages

Volume 9, Issue 2, Summer and Autumn 2017, Page 161-181

J. Hajian Nezhad; Majid Vafaei Jahan; M. Tayarani-N; Z. Sadrnezhad


21. A Decentralized Online Sortition Protocol

Volume 10, Issue 1, Winter and Spring 2018, Page 63-69

R. Ramezanian; M. Pourpouneh


22. Feature-based Malicious URL and Attack Type Detection Using Multi-class Classification

Volume 10, Issue 2, Summer and Autumn 2018, Page 141-162

D. Patil; J. Patil


23. A New Ring-Based SPHF and PAKE Protocol On Ideal Lattices

Volume 11, Issue 1, Winter and Spring 2019, Page 75-86

Reza Ebrahimi Atani; Shahabaddin Ebrahimi Atani; Amir Hassani Karbasi


24. Evaluation of Planet Factors of Smart City through Multi-layer Fuzzy Logic (MFL)

Volume 11, Special Issue, Summer and Autumn 2019, Page 51-58

Areej Fatima; Muhammad Adnan Khan; Sagheer Abbas; Muhammad Waqas; Leena Anum; Muhammad Asif


25. Detection of fake accounts in social networks based on One Class Classification

Articles in Press, Accepted Manuscript, Available Online from 29 July 2019

mohammadreza mohammadrezaei; Mohammad Ebrahim shiri; Amir Masoud Rahmani