Number of Articles: 187
126. GGRA: a grouped gossip-based reputation aggregation algorithm

Volume 7, Issue 1, Winter and Spring 2015, Pages 59-74

S. Ghasemi Falavarjani; Behrouz Tork Ladani; S. Ghasemi


127. Enhancing privacy of recent authentication schemes for low-cost RFID systems

Volume 7, Issue 2, Summer and Autumn 2015, Pages 135-149

K. Baghery; B. Abdolmaleki; B. Akhbari; M. R. Aref


128. Unauthenticated event detection in wireless sensor networks using sensors co-coverage

Volume 8, Issue 1, Winter and Spring 2016, Pages 61-71

M. Kamarei; A. Patooghy; M. Fazeli


129. Quantitative evaluation of software security: an approach based on UML/SecAM and evidence theory

Volume 8, Issue 2, Summer and Autumn 2016, Pages 141-153

A. Sedaghatbaf; M. Abdollahi Azgomi


130. Dwarf Frankenstein is still in your memory: tiny code reuse attacks

Volume 9, Issue 1, Winter and Spring 2017, Pages 53-72

A.A Sadeghi; F. Aminmansour; H.R. Shahriari


131. Phishing website detection using weighted feature line embedding

Volume 9, Issue 2, Summer and Autumn 2017, Pages 147-159

M. Imani; Gh. A. Montazer


132. BotRevealer: Behavioral Detection of Botnets based on Botnet Life-cycle

Volume 10, Issue 1, Winter and Spring 2018, Pages 55-61

E. Khoshhalpour; H. R. Shahriari


133. Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)

Volume 10, Issue 2, Summer and Autumn 2018, Pages 129-139

N. Soltani; R. Bohlooli; R. Jalili


134. Biclique Cryptanalysis of Block Ciphers LBlock and TWINE-80 with Practical Data Complexity

Volume 11, Issue 1, Winter and Spring 2019, Pages 57-74

Siavash Ahmadi; Zahra Ahmadian; Javad Mohajeri; Mohammad Reza Aref


135. The Role of Packet Tracer in Learning Wireless Networks and Managing IoT Devices

Volume 11, Issue 3, Summer and Autumn 2019, Pages 35-38

Rawan Flifel


136. Anomaly Detection Using SVM as Classifier and Decision Tree for Optimizing Feature Vectors

Volume 11, Issue 2, Summer and Autumn 2019, Pages 159-171

Elham Serkani; Hossein Gharaee Garakani; Naser Mohammadzadeh


137. A confidence-aware interval-based trust model

Volume 4, Issue 2, Summer and Autumn 2012, Pages 151-165

H. Shakeri; A. Ghaemi Bafghi


138. Image encryption based on chaotic tent map in time and frequency domains

Volume 5, Issue 1, Winter and Spring 2013, Pages 97-110

E. Hassani; M. Eshghi


139. STLR: a novel danger theory based structural TLR algorithm

Volume 5, Issue 2, Summer and Autumn 2013, Pages 209-225

R. Azmi; B. Pishgoo


140. A density based clustering approach to distinguish between web robot and human requests to a web server

Volume 6, Issue 1, Winter and Spring 2014, Pages 77-89

M. Zabihi; M. Vafaei Jahan; J. Hamidzadeh


141. A two-phase wormhole attack detection scheme in MANETs

Volume 6, Issue 2, Summer and Autumn 2014, Pages 183-191

Sh. Shamaei; A. Movaghar


142. SEIMCHA: a new semantic image CAPTCHA using geometric transformations

Volume 4, Issue 1, Winter and Spring 2012, Pages 63-76

M. Mehrnejad; A. Ghaemi Bafghi; A. Harati; E. Toreini


143. Security-aware register placement to hinder malicious hardware updating and improve Trojan detectability

Volume 7, Issue 1, Winter and Spring 2015, Pages 75-81

M. Vosoughi; A. Jahanian


144. A collusion mitigation scheme for reputation systems

Volume 7, Issue 2, Summer and Autumn 2015, Pages 151-166

M. Niknafs; S. Dorri Nogoorani; R. Jalili


145. A new method for accelerating impossible differential cryptanalysis and its application on LBlock

Volume 8, Issue 1, Winter and Spring 2016, Pages 73-84

A. Khalesi; H. Bahramgiri; D. Mansuri


146. A note on the security of two improved RFID protocols

Volume 8, Issue 2, Summer and Autumn 2016, Pages 155-160

M. Safkhani; N. Bagheri


147. An automatic test case generator for evaluating implementation of access control policies

Volume 9, Issue 1, Winter and Spring 2017, Pages 73-91

M. Safarzadeh; M. Taghizadeh; B. Zamani; B. Tork Ladani


148. Analyzing new features of infected web content in detection of malicious web pages

Volume 9, Issue 2, Summer and Autumn 2017, Pages 161-181

J. Hajian Nezhad; Majid Vafaei Jahan; M. Tayarani-N; Z. Sadrnezhad


149. A Decentralized Online Sortition Protocol

Volume 10, Issue 1, Winter and Spring 2018, Pages 63-69

R. Ramezanian; M. Pourpouneh


150. Feature-based Malicious URL and Attack Type Detection Using Multi-class Classification

Volume 10, Issue 2, Summer and Autumn 2018, Pages 141-162

D. Patil; J. Patil