Abadi, M.
A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs [Volume 2, Issue 1, 2010, Pages 13-32]
Abadi, M.
BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms [Volume 4, Issue 1, 2012, Pages 25-39]
Abadi, M.
BotOnus: an online unsupervised method for Botnet detection [Volume 4, Issue 1, 2012, Pages 51-62]
Abbas, Sagheer
Evaluation of Planet Factors of Smart City through Multi-layer Fuzzy Logic (MFL) [Volume 11, Issue 3, 2019, Pages 51-58]
Abbas, Sagheer
An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling [Volume 11, Issue 3, 2019, Pages 145-151]
Abdollahi Azgomi, M.
Quantitative evaluation of software security: an approach based on UML/SecAM and evidence theory [Volume 8, Issue 2, 2016, Pages 141-153]
Abdolmaleki, B.
Enhancing privacy of recent authentication schemes for low-cost RFID systems [Volume 7, Issue 2, 2015, Pages 135-149]
Abolghasemi, M.
Detection of perturbed quantization (PQ) steganography based on empirical matrix [Volume 2, Issue 2, 2010, Pages 119-128]
Abolghasemi, M. S.
A novel key management scheme for heterogeneous sensor networks based on the position of nodes [Volume 8, Issue 2, 2016, Pages 115-130]
Adnan Khan, Muhammad
Evaluation of Planet Factors of Smart City through Multi-layer Fuzzy Logic (MFL) [Volume 11, Issue 3, 2019, Pages 51-58]
Adnan Khan, Muhammad
An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling [Volume 11, Issue 3, 2019, Pages 145-151]
Aerabi, E.
Side channel parameter characteristics of code injection attacks [Volume 9, Issue 1, 2017, Pages 17-26]
Afzali, H.
Private Key based query on encrypted data [Volume 4, Issue 1, 2012, Pages 41-50]
Aghaeinia, H.
Detection of perturbed quantization (PQ) steganography based on empirical matrix [Volume 2, Issue 2, 2010, Pages 119-128]
Ahadipour, A. R.
LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring [Volume 9, Issue 1, 2017, Pages 27-39]
Ahmad, Gulzar
Cloud and IoT based Smart Car Parking System by using Mamdani Fuzzy Inference System (MFIS) [Volume 11, Issue 3, 2019, Pages 153-160]
Ahmadi, Siavash
Biclique Cryptanalysis of Block Ciphers LBlock and TWINE-80 with Practical Data Complexity [Volume 11, Issue 1, 2019, Pages 57-74]
Ahmadi, Siavash
New Fixed Point Attacks on GOST2 Block Cipher [Volume 11, Issue 2, 2019, Pages 145-158]
Ahmadian, Z.
Total break of Zorro using linear and differential attacks [Volume 6, Issue 1, 2014, Pages 23-34]
Ahmadian, Zahra
Biclique Cryptanalysis of Block Ciphers LBlock and TWINE-80 with Practical Data Complexity [Volume 11, Issue 1, 2019, Pages 57-74]
Ahmadian Attari, M.
Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC [Volume 5, Issue 1, 2013, Pages 55-70]
Akbari, A.
Side channel parameter characteristics of code injection attacks [Volume 9, Issue 1, 2017, Pages 17-26]
Akhaee, M. A.
A survey on digital data hiding schemes: principals, algorithms, and applications [Volume 5, Issue 1, 2013, Pages 5-36]
Akhaee, M. A.
Robust multiplicative video watermarking using statistical modeling [Volume 5, Issue 1, 2013, Pages 83-95]
Akhbari, B.
Enhancing privacy of recent authentication schemes for low-cost RFID systems [Volume 7, Issue 2, 2015, Pages 135-149]
Akram, Ali
An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling [Volume 11, Issue 3, 2019, Pages 145-151]
Alahmari, Saad Ali
Using Machine Learning ARIMA to Predict the Price of Cryptocurrencies [Volume 11, Issue 3, 2019, Pages 139-144]
Alamifar, F.
An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks [Volume 6, Issue 2, 2014, Pages 141-153]
Alizadeh, J.
Artemia: a family of provably secure authenticated encryption schemes [Volume 6, Issue 2, 2014, Pages 125-139]
Alizadeh, J.
Cryptanalysis of some first round CAESAR candidates [Volume 7, Issue 2, 2015, Pages 127-134]
Aljedaibi, Wajdi
Towards Measuring the Project Management Process During Large Scale Software System Implementation Phase [Volume 11, Issue 3, 2019, Pages 161-172]
Al-Nazer, A. A.
High capacity steganography tool for Arabic text using 'Kashida' [Volume 2, Issue 2, 2010, Pages 107-118]
Alpcan, Tansu
Interdependent Security Game Design over Constrained Linear Influence Networks [Volume 11, Issue 2, 2019, Pages 95-111]
Alrahem, T.
Security testing of session initiation protocol implementations [Volume 1, Issue 2, 2009, Pages 91-103]
Alyas, Tahir
Cloud and IoT based Smart Car Parking System by using Mamdani Fuzzy Inference System (MFIS) [Volume 11, Issue 3, 2019, Pages 153-160]
Ameri, M.H.
On the Security of O-PSI: A Delegated Private Set Intersection on Outsourced Datasets (Extended Version) [Volume 10, Issue 2, 2018, Pages 117-127]
Amin Ghafari, V.
Cryptanalysis of GSM encryption algorithm A5/1 [Volume 4, Issue 2, 2012, Pages 107-114]
Amini, M.
A semantic-aware role-based access control model for pervasive computing environments [Volume 5, Issue 2, 2013, Pages 119-140]
Amini, M.
CAMAC: a context-aware mandatory access control model [Volume 1, Issue 1, 2009, Pages 35-54]
Amini, M.
A combination of semantic and attribute-based access control model for virtual organizations [Volume 7, Issue 1, 2015, Pages 27-45]
Amini Khorasgani, H. R.
On the design and security of a lattice-based threshold secret sharing scheme [Volume 8, Issue 1, 2016, Pages 25-38]
Aminmansour, F.
Aggrandizing the beast's limbs: patulous code reuse attack on ARM architecture [Volume 8, Issue 1, 2016, Pages 39-52]
Aminmansour, F.
Dwarf Frankenstein is still in your memory: tiny code reuse attacks [Volume 9, Issue 1, 2017, Pages 53-72]
AmirHaeri, M.
Alert correlation and prediction using data mining and HMM [Volume 3, Issue 2, 2011, Pages 77-101]
Amiri, Mohammad Amin
Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives [Volume 11, Issue 1, 2019, Pages 35-46]
Amoozgar, M.
A computational model and convergence theorem for rumor dissemination in social networks [Volume 5, Issue 2, 2013, Pages 141-154]
Anum, Leena
Evaluation of Planet Factors of Smart City through Multi-layer Fuzzy Logic (MFL) [Volume 11, Issue 3, 2019, Pages 51-58]
Anum, Leena
An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling [Volume 11, Issue 3, 2019, Pages 145-151]
Aqel, Musbah
A Comparison Study between Intelligent Decision Support Systems and Decision Support Systems [Volume 11, Issue 3, 2019, Pages 187-194]
Aqel, Musbah
The Impact of The Biometric System on Election Fraud Elimination: Case of The North of IRAQ [Volume 11, Issue 3, 2019, Pages 195-207]
Arasteh, M.
A combination of semantic and attribute-based access control model for virtual organizations [Volume 7, Issue 1, 2015, Pages 27-45]
Aref, M. R.
Editorial [Volume 1, Issue 1, 2009, Pages 1-2]
Aref, M. R.
Editorial [Volume 8, Issue 1, 2016, Pages 1-2]
Aref, Mohammad Reza
Biclique Cryptanalysis of Block Ciphers LBlock and TWINE-80 with Practical Data Complexity [Volume 11, Issue 1, 2019, Pages 57-74]
Aref, Mohammad Reza
Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants [Volume 12, Issue 1, 2020, Pages 13-23]
Aref, M. R.
Eigenvalues-based LSB steganalysis [Volume 4, Issue 2, 2012, Pages 97-106]
Aref, M. R.
Total break of Zorro using linear and differential attacks [Volume 6, Issue 1, 2014, Pages 23-34]
Aref, M. R.
Toward an energy efficient PKC-based key management system for wireless sensor networks [Volume 6, Issue 1, 2014, Pages 53-66]
Aref, M. R.
Artemia: a family of provably secure authenticated encryption schemes [Volume 6, Issue 2, 2014, Pages 125-139]
Aref, M. R.
Improving the Rao-Nam secret key cryptosystem using regular EDF-QC-LDPC codes [Volume 4, Issue 1, 2012, Pages 3-14]
Aref, M. R.
Cryptanalysis of some first round CAESAR candidates [Volume 7, Issue 2, 2015, Pages 127-134]
Aref, M. R.
Enhancing privacy of recent authentication schemes for low-cost RFID systems [Volume 7, Issue 2, 2015, Pages 135-149]
Aref, M. R.
On the design and security of a lattice-based threshold secret sharing scheme [Volume 8, Issue 1, 2016, Pages 25-38]
Aref, M. R.
Optimum decoder for multiplicative spread spectrum image watermarking with Laplacian modeling [Volume 8, Issue 2, 2016, Pages 131-139]
Aref, M. R.
Editorial [Volume 8, Issue 2, 2016, Pages 91-92]
Aref, M. R.
Editorial [Volume 9, Issue 1, 2017, Pages 1-2]
Aref, M. R.
Editorial [Volume 9, Issue 2, 2017, Pages 99-100]
Aref, M. R.
Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version) [Volume 10, Issue 1, 2018, Pages 3-13]
Aref, M.R.
On the Security of O-PSI: A Delegated Private Set Intersection on Outsourced Datasets (Extended Version) [Volume 10, Issue 2, 2018, Pages 117-127]
Asaad, S.
On the design and security of a lattice-based threshold secret sharing scheme [Volume 8, Issue 1, 2016, Pages 25-38]
Asenov, Ivaylo
Access and Mobility Policy Control at the Network Edge [Volume 11, Issue 3, 2019, Pages 105-111]
A. Shah, N.
Image flip CAPTCHA [Volume 1, Issue 2, 2009, Pages 105-123]
Ashouri-Talouki, M.
An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks [Volume 10, Issue 1, 2018, Pages 15-27]
Ashouri-Talouki, Maede
Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems [Volume 12, Issue 2, 2020, Pages 129-140]
Asif, Muhammad
Evaluation of Planet Factors of Smart City through Multi-layer Fuzzy Logic (MFL) [Volume 11, Issue 3, 2019, Pages 51-58]
Asif, Muhammad
Cloud and IoT based Smart Car Parking System by using Mamdani Fuzzy Inference System (MFIS) [Volume 11, Issue 3, 2019, Pages 153-160]
Atanasov, Ivaylo
Access and Mobility Policy Control at the Network Edge [Volume 11, Issue 3, 2019, Pages 105-111]
Atia, Ayman
Hand Gestures Classification with Multi-Core DTW [Volume 11, Issue 3, 2019, Pages 91-96]
Avizheh, S.
Convertible limited (multi-) verifier signature: new constructions and applications [Volume 5, Issue 2, 2013, Pages 189-208]
Azimi, A.
Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version) [Volume 10, Issue 1, 2018, Pages 3-13]
Azmi, R.
STLR: a novel danger theory based structural TLR algorithm [Volume 5, Issue 2, 2013, Pages 209-225]
Azmi, R.
Private Key based query on encrypted data [Volume 4, Issue 1, 2012, Pages 41-50]
B
Bagheri, N.
Artemia: a family of provably secure authenticated encryption schemes [Volume 6, Issue 2, 2014, Pages 125-139]
Bagheri, N.
Cryptanalysis of some first round CAESAR candidates [Volume 7, Issue 2, 2015, Pages 127-134]
Bagheri, N.
A note on the security of two improved RFID protocols [Volume 8, Issue 2, 2016, Pages 155-160]
Bagheri, Nasour
Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants [Volume 12, Issue 1, 2020, Pages 13-23]
Bagheri, Nasour
CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking [Volume 12, Issue 2, 2020, Pages 67-80]
Bagherpour, Bagher
A Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions [Volume 12, Issue 2, 2020, Pages 91-99]
Baghery, K.
Enhancing privacy of recent authentication schemes for low-cost RFID systems [Volume 7, Issue 2, 2015, Pages 135-149]
Bahramgiri, H.
A new method for accelerating impossible differential cryptanalysis and its application on LBlock [Volume 8, Issue 1, 2016, Pages 73-84]
BaniMustafa, Ahmed
Enhancing Learning from Imbalanced Classes via Data Preprocessing: A Data-Driven Application in Metabolomics Data Mining [Volume 11, Issue 3, 2019, Pages 79-89]
Barani, F.
BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms [Volume 4, Issue 1, 2012, Pages 25-39]
Baseri, Y.
Double voter perceptible blind signature based electronic voting protocol [Volume 3, Issue 1, 2011, Pages 43-50]
Bayat, Majid
A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications [Volume 11, Issue 2, 2019, Pages 113-128]
Bayat Sarmadi, Siavash
A Trusted Design Platform for Trojan Detection in FPGA Bitstreams Using Partial Reconfiguration [Volume 13, Issue 1, 2021, Pages 29-45]
Behniafar, M.
A Survey of Anomaly Detection Approaches in Internet of Things [Volume 10, Issue 2, 2018, Pages 79-92]
Bel, K. Nalini Sujantha
OT-Feature Extraction on Scrambled Images with Instantaneous Clustering for CBIR Scheme in Cloud Computing [Volume 13, Issue 1, 2021, Pages 1-17]
Berenjkoub, M.
An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks [Volume 6, Issue 2, 2014, Pages 141-153]
Berenjkoub, M.
A TESLA-based mutual authentication protocol for GSM networks [Volume 1, Issue 1, 2009, Pages 3-15]
Berenjkoub, M.
An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks [Volume 2, Issue 2, 2010, Pages 89-105]
Berenjkoub, M.
An efficient certificateless signcryption scheme in the standard model [Volume 9, Issue 1, 2017, Pages 3-16]
Bishop, M.
Computer security in the future [Volume 3, Issue 1, 2011, Pages 3-27]
Bohlooli, R.
Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version) [Volume 10, Issue 2, 2018, Pages 129-139]
Böhm, Markus
Critical Success Factors for Data Virtualization: A Literature Review [Volume 11, Issue 3, 2019, Pages 131-137]
C
Carlsson, M.
Security testing of session initiation protocol implementations [Volume 1, Issue 2, 2009, Pages 91-103]
Chegeni, Vahid
Providing a Hybrid Cryptography Algorithm for Lightweight Authentication Protocol in RFID with Urban Traffic Usage Case [Volume 13, Issue 1, 2021, Pages 73-85]
Chen, A.
Security testing of session initiation protocol implementations [Volume 1, Issue 2, 2009, Pages 91-103]
Cimato, S.
A risk model for cloud processes [Volume 6, Issue 2, 2014, Pages 99-123]
Córdova, Felisa
Cognitive Strategic Model applied to a Port System [Volume 11, Issue 3, 2019, Pages 73-78]
D
Dahri, Kamran
Aspect Oriented UML to ECORE Model Transformation [Volume 11, Issue 3, 2019, Pages 97-103]
Damiani, E.
A risk model for cloud processes [Volume 6, Issue 2, 2014, Pages 99-123]
Daneshgar, A.
A new security proof for FMNV continuous non-malleable encoding scheme [Volume 9, Issue 1, 2017, Pages 41-51]
Danyali, H.
Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms [Volume 3, Issue 1, 2011, Pages 51-66]
Davarpanah Jazi, M.
A centralized privacy-preserving framework for online social networks [Volume 6, Issue 1, 2014, Pages 35-52]
Dawson, E.
Authorization models for secure information sharing: a survey and research agenda [Volume 2, Issue 2, 2010, Pages 69-87]
Dehnavi, S. M.
Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives [Volume 11, Issue 1, 2019, Pages 35-46]
Delavar, M.
On the Security of O-PSI: A Delegated Private Set Intersection on Outsourced Datasets (Extended Version) [Volume 10, Issue 2, 2018, Pages 117-127]
Deljavan Amiri, M.
Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms [Volume 3, Issue 1, 2011, Pages 51-66]
Derakhshandeh, Z.
A model for specification, composition and verification of access control policies and its application to web services [Volume 3, Issue 2, 2011, Pages 103-120]
DiGiuseppe, N.
Security testing of session initiation protocol implementations [Volume 1, Issue 2, 2009, Pages 91-103]
Diyanat, A.
Robust multiplicative video watermarking using statistical modeling [Volume 5, Issue 1, 2013, Pages 83-95]
Doroudian, M.
A hybrid approach for database intrusion detection at transaction and inter-transaction levels [Volume 6, Issue 2, 2014, Pages 155-167]
Dorri Nogoorani, S.
A collusion mitigation scheme for reputation systems [Volume 7, Issue 2, 2015, Pages 151-166]
Dousti, Mohammad Sadeq
SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing [Volume 11, Issue 1, 2019, Pages 15-34]
D. R. Assis, Karcius
A Fair Power Allocation for Non-Orthogonal Multiple Access in the Power Domain [Volume 11, Issue 3, 2019, Pages 123-130]
Durán, Claudia
Cognitive Strategic Model applied to a Port System [Volume 11, Issue 3, 2019, Pages 73-78]
E
Ebrahimi Atani, R.
Improving Tor security against timing and traffic analysis attacks with fair randomization [Volume 6, Issue 1, 2014, Pages 67-76]
Ebrahimi Atani, R.
EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations [Volume 7, Issue 2, 2015, Pages 115-126]
Ebrahimi Atani, R.
A novel key management scheme for heterogeneous sensor networks based on the position of nodes [Volume 8, Issue 2, 2016, Pages 115-130]
Ebrahimi Atani, Reza
NETRU: A Non-commutative and Secure Variant of CTRU Cryptosystem [Volume 10, Issue 1, 2018, Pages 45-53]
Ebrahimi Atani, Reza
A New Ring-Based SPHF and PAKE Protocol On Ideal Lattices [Volume 11, Issue 1, 2019, Pages 75-86]
Ebrahimi Atani, Sh.
EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations [Volume 7, Issue 2, 2015, Pages 115-126]
Ebrahimi Atani, Shahabaddin
NETRU: A Non-commutative and Secure Variant of CTRU Cryptosystem [Volume 10, Issue 1, 2018, Pages 45-53]
Ebrahimi Atani, Shahabaddin
A New Ring-Based SPHF and PAKE Protocol On Ideal Lattices [Volume 11, Issue 1, 2019, Pages 75-86]
E. Cordeiro Junior, Joel
A Fair Power Allocation for Non-Orthogonal Multiple Access in the Power Domain [Volume 11, Issue 3, 2019, Pages 123-130]
Eghlidos, T.
Improving the Rao-Nam secret key cryptosystem using regular EDF-QC-LDPC codes [Volume 4, Issue 1, 2012, Pages 3-14]
Eghlidos, T.
On the design and security of a lattice-based threshold secret sharing scheme [Volume 8, Issue 1, 2016, Pages 25-38]
Eghlidos, T.
An efficient secure channel coding scheme based on polar codes [Volume 9, Issue 2, 2017, Pages 111-118]
Elmahdy, Hesham
Medical Image Compression Based on Region of Interest [Volume 11, Issue 3, 2019, Pages 29-34]
Eshghi, M.
Image encryption based on chaotic tent map in time and frequency domains [Volume 5, Issue 1, 2013, Pages 97-110]
Eskandari, Zahra
Extension of Cube Attack with Probabilistic Equations and its Application on Cryptanalysis of KATAN Cipher [Volume 12, Issue 1, 2020, Pages 1-12]
Esmaeili, J.
Access control in ultra-large-scale systems using a data-centric middleware [Volume 6, Issue 1, 2014, Pages 3-22]
Etemadi Borujeni, Shahram
Hardware Trojan Prevention and Detection by Filling Unused Space Using Shift registers, Gate-chain and Extra Routing [Volume 13, Issue 1, 2021, Pages 47-57]
Ezhei, M.
GTrust: a group based trust model [Volume 5, Issue 2, 2013, Pages 155-170]
F
Faez, K.
Detection of perturbed quantization (PQ) steganography based on empirical matrix [Volume 2, Issue 2, 2010, Pages 119-128]
Fanian, A.
A TESLA-based mutual authentication protocol for GSM networks [Volume 1, Issue 1, 2009, Pages 3-15]
Fanian, A.
An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks [Volume 2, Issue 2, 2010, Pages 89-105]
Farhadi, H.
Alert correlation and prediction using data mining and HMM [Volume 3, Issue 2, 2011, Pages 77-101]
Farooq, Umer
Cloud and IoT based Smart Car Parking System by using Mamdani Fuzzy Inference System (MFIS) [Volume 11, Issue 3, 2019, Pages 153-160]
Fatima, Areej
Evaluation of Planet Factors of Smart City through Multi-layer Fuzzy Logic (MFL) [Volume 11, Issue 3, 2019, Pages 51-58]
Fatima, Areej
An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling [Volume 11, Issue 3, 2019, Pages 145-151]
Fazeli, M.
Unauthenticated event detection in wireless sensor networks using sensors co-coverage [Volume 8, Issue 1, 2016, Pages 61-71]
Fazeli, M.
Side channel parameter characteristics of code injection attacks [Volume 9, Issue 1, 2017, Pages 17-26]
Flifel, Rawan
The Role of Packet Tracer in Learning Wireless Networks and Managing IoT Devices [Volume 11, Issue 3, 2019, Pages 35-38]
Fuhrmann, Isabel
Critical Success Factors for Data Virtualization: A Literature Review [Volume 11, Issue 3, 2019, Pages 131-137]
G
Ganjavi, R.
A traceable optimistic fair exchange protocol in the standard model [Volume 7, Issue 1, 2015, Pages 3-14]
Gee, J.
Security testing of session initiation protocol implementations [Volume 1, Issue 2, 2009, Pages 91-103]
Ghaemi Bafghi, A.
A confidence-aware interval-based trust model [Volume 4, Issue 2, 2012, Pages 151-165]
Ghaemi Bafghi, A.
Design and formal verification of DZMBE+ [Volume 5, Issue 1, 2013, Pages 37-53]
Ghaemi Bafghi, A.
SEIMCHA: a new semantic image CAPTCHA using geometric transformations [Volume 4, Issue 1, 2012, Pages 63-76]
Ghaemi Bafghi, Abbas
Extension of Cube Attack with Probabilistic Equations and its Application on Cryptanalysis of KATAN Cipher [Volume 12, Issue 1, 2020, Pages 1-12]
Ghaemmaghami, Sh.
Robust multiplicative video watermarking using statistical modeling [Volume 5, Issue 1, 2013, Pages 83-95]
Ghaemmaghami, Sh.
An extended feature set for blind image steganalysis in contourlet domain [Volume 6, Issue 2, 2014, Pages 169-181]
Gharaee Garakani, Hossein
Anomaly Detection Using SVM as Classifier and Decision Tree for Optimizing Feature Vectors [Volume 11, Issue 2, 2019, Pages 159-171]
Ghareh Chamani, Javad
SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing [Volume 11, Issue 1, 2019, Pages 15-34]
Ghasemi, S.
GGRA: a grouped gossip-based reputation aggregation algorithm [Volume 7, Issue 1, 2015, Pages 59-74]
Ghasemi, Simin
A Trust Based Probabilistic Method for Efficient Correctness Verification in Database Outsourcing [Volume 11, Issue 1, 2019, Pages 3-14]
Ghasemi Falavarjani, S.
GGRA: a grouped gossip-based reputation aggregation algorithm [Volume 7, Issue 1, 2015, Pages 59-74]
Ghasemzadeh, H.
Toward an energy efficient PKC-based key management system for wireless sensor networks [Volume 6, Issue 1, 2014, Pages 53-66]
Ghasemzadeh, H.
Cipher text only attack on speech time scrambling systems using correction of audio spectrogram [Volume 9, Issue 2, 2017, Pages 131-145]
Ghiasi, M.
DyVSoR: dynamic malware detection based on extracting patterns from value sets of registers [Volume 5, Issue 1, 2013, Pages 71-82]
Gianini, G.
A risk model for cloud processes [Volume 6, Issue 2, 2014, Pages 99-123]
Golic', J. Dj.
Moving dispersion method for statistical anomaly detection in intrusion detection systems [Volume 1, Issue 2, 2009, Pages 71-90]
Gottlieb, Matthias
Critical Success Factors for Data Virtualization: A Literature Review [Volume 11, Issue 3, 2019, Pages 131-137]
Gulliver, T. A.
An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks [Volume 2, Issue 2, 2010, Pages 89-105]
Gulliver, T. A.
A TESLA-based mutual authentication protocol for GSM networks [Volume 1, Issue 1, 2009, Pages 3-15]
Gutub, A. Abdul-Aziz
High capacity steganography tool for Arabic text using 'Kashida' [Volume 2, Issue 2, 2010, Pages 107-118]
H
Habibi, J.
A hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection [Volume 2, Issue 1, 2010, Pages 33-46]
Hadavi, M. A.
Separating indexes from data: a distributed scheme for secure database outsourcing [Volume 3, Issue 2, 2011, Pages 121-133]
Hadavi, Mohammad Ali
A Trust Based Probabilistic Method for Efficient Correctness Verification in Database Outsourcing [Volume 11, Issue 1, 2019, Pages 3-14]
Hadjer, Saadi
Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns [Volume 11, Issue 3, 2019, Pages 9-17]
Haghbin, A.
Traceability improvements of a new RFID protocol based on EPC C1 G2 [Volume 8, Issue 2, 2016, Pages 105-114]
Hajian Nezhad, J.
Analyzing new features of infected web content in detection of malicious web pages [Volume 9, Issue 2, 2017, Pages 161-181]
Haj Seyyed Javadi, Hamid
Providing a Hybrid Cryptography Algorithm for Lightweight Authentication Protocol in RFID with Urban Traffic Usage Case [Volume 13, Issue 1, 2021, Pages 73-85]
Hakimi, A.
A chaos-based video watermarking algorithm [Volume 4, Issue 1, 2012, Pages 77-86]
H. Al-Hemiary, Emad
IoT Protocols Based Fog/Cloud over High Traffic [Volume 11, Issue 3, 2019, Pages 173-180]
H. Al-Hemiary, Emad
Virtualized Network Management Laboratory for Educational Purposes [Volume 11, Issue 3, 2019, Pages 181-186]
Hamidzadeh, J.
A density based clustering approach to distinguish between web robot and human requests to a web server [Volume 6, Issue 1, 2014, Pages 77-89]
Harati, A.
SEIMCHA: a new semantic image CAPTCHA using geometric transformations [Volume 4, Issue 1, 2012, Pages 63-76]
Harris, I. G.
Security testing of session initiation protocol implementations [Volume 1, Issue 2, 2009, Pages 91-103]
Hashemi, M. R.
Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach [Volume 4, Issue 2, 2012, Pages 125-136]
Hasheminasab, Seyed Alireza
Interdependent Security Game Design over Constrained Linear Influence Networks [Volume 11, Issue 2, 2019, Pages 95-111]
Hassan, Zaira
Aspect Oriented UML to ECORE Model Transformation [Volume 11, Issue 3, 2019, Pages 97-103]
Hassan Ahmed, Omed
Face Recognition Based Rank Reduction SVD Approach [Volume 11, Issue 3, 2019, Pages 39-50]
Hassani, E.
Image encryption based on chaotic tent map in time and frequency domains [Volume 5, Issue 1, 2013, Pages 97-110]
Hassani Karbasi, A.
EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations [Volume 7, Issue 2, 2015, Pages 115-126]
Hassani Karbasi, A.
NETRU: A Non-commutative and Secure Variant of CTRU Cryptosystem [Volume 10, Issue 1, 2018, Pages 45-53]
Hassani Karbasi, Amir
A New Ring-Based SPHF and PAKE Protocol On Ideal Lattices [Volume 11, Issue 1, 2019, Pages 75-86]
Hassannejad, H.
Classification of encrypted traffic for applications based on statistical features [Volume 10, Issue 1, 2018, Pages 29-43]
Hryniuk, Yaroslav
Algebraic Matching of Vulnerabilities in a Low-Level Code [Volume 11, Issue 3, 2019, Pages 1-7]
Hsiao, Sh. P.
Security testing of session initiation protocol implementations [Volume 1, Issue 2, 2009, Pages 91-103]
I
Ibrahim, Dina
Proposed ST-Slotted-CS-ALOHA Protocol for Time Saving and Collision Avoidance [Volume 11, Issue 3, 2019, Pages 67-72]
Ibrahim, Soran
A Sudy on Information Privacy Issue on Social Networks [Volume 11, Issue 3, 2019, Pages 19-27]
Imani, M.
Phishing website detection using weighted feature line embedding [Volume 9, Issue 2, 2017, Pages 147-159]
J
Jafarian, J. H.
CAMAC: a context-aware mandatory access control model [Volume 1, Issue 1, 2009, Pages 35-54]
Jahanbani, Mohsen
CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking [Volume 12, Issue 2, 2020, Pages 67-80]
Jahanian, A.
Security-aware register placement to hinder malicious hardware updating and improve Trojan detectability [Volume 7, Issue 1, 2015, Pages 75-81]
Jahanian, A.
Self authentication path insertion in FPGA-based design flow for tamper-resistant purpose [Volume 8, Issue 1, 2016, Pages 53-60]
Jahanian, A.
ASIC design protection against reverse engineering during the fabrication process using automatic netlist obfuscation design flow [Volume 8, Issue 2, 2016, Pages 93-104]
Jalili, R.
Editorial [Volume 5, Issue 1, 2013, Pages 1-3]
Jalili, R.
Editorial [Volume 5, Issue 2, 2013, Pages 117-118]
Jalili, R.
Editorial [Volume 6, Issue 1, 2014, Pages 1-2]
Jalili, R.
Editorial [Volume 6, Issue 2, 2014, Pages 97-98]
Jalili, R.
Editorial [Volume 1, Issue 1, 2009, Pages 1-2]
Jalili, R.
Editorial [Volume 1, Issue 2, 2009, Pages 69-70]
Jalili, R.
Editorial [Volume 2, Issue 1, 2010, Pages 1-2]
Jalili, R.
Editorial [Volume 2, Issue 2, 2010, Pages 67-68]
Jalili, R.
Editorial [Volume 3, Issue 1, 2011, Pages 1-2]
Jalili, R.
Editorial [Volume 3, Issue 2, 2011, Pages 67-68]
Jalili, R.
Separating indexes from data: a distributed scheme for secure database outsourcing [Volume 3, Issue 2, 2011, Pages 121-133]
Jalili, R.
Editorial [Volume 4, Issue 1, 2012, Pages 1-2]
Jalili, R.
Editorial [Volume 7, Issue 1, 2015, Pages 1-2]
Jalili, R.
Editorial [Volume 7, Issue 2, 2015, Pages 89-90]
Jalili, R.
A collusion mitigation scheme for reputation systems [Volume 7, Issue 2, 2015, Pages 151-166]
Jalili, R.
Editorial [Volume 4, Issue 2, 2012, Pages 95-96]
Jalili, R.
Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version) [Volume 10, Issue 2, 2018, Pages 129-139]
Jalili, Rasool
SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing [Volume 11, Issue 1, 2019, Pages 15-34]
Jalili, S.
A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs [Volume 2, Issue 1, 2010, Pages 13-32]
Jalili, S.
A novel local search method for microaggregation [Volume 7, Issue 1, 2015, Pages 15-26]
James, Salome
An Efficient Pairing-Free Identity Based Proxy Blind Signature Scheme with Message Recovery [Volume 13, Issue 1, 2021, Pages 59-72]
Javadi, A.
A semantic-aware role-based access control model for pervasive computing environments [Volume 5, Issue 2, 2013, Pages 119-140]
J.F. Alenazi, Mohammed
Evaluating Multipath TCP Resilience against Link Failures [Volume 11, Issue 3, 2019, Pages 113-122]
K
Kamarei, M.
Unauthenticated event detection in wireless sensor networks using sensors co-coverage [Volume 8, Issue 1, 2016, Pages 61-71]
Kanwal, Asma
Cloud and IoT based Smart Car Parking System by using Mamdani Fuzzy Inference System (MFIS) [Volume 11, Issue 3, 2019, Pages 153-160]
Kaya, Tugberk
The Impact of The Biometric System on Election Fraud Elimination: Case of The North of IRAQ [Volume 11, Issue 3, 2019, Pages 195-207]
Kaykha, M.
Side channel parameter characteristics of code injection attacks [Volume 9, Issue 1, 2017, Pages 17-26]
Keshavarz-Haddad, A. R.
LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring [Volume 9, Issue 1, 2017, Pages 27-39]
Khalesi, A.
A new method for accelerating impossible differential cryptanalysis and its application on LBlock [Volume 8, Issue 1, 2016, Pages 73-84]
Khamis, Sufian
Towards Measuring the Project Management Process During Large Scale Software System Implementation Phase [Volume 11, Issue 3, 2019, Pages 161-172]
Khansari, M.
Alert correlation and prediction using data mining and HMM [Volume 3, Issue 2, 2011, Pages 77-101]
Khatter, Ehab
Proposed ST-Slotted-CS-ALOHA Protocol for Time Saving and Collision Avoidance [Volume 11, Issue 3, 2019, Pages 67-72]
Khazaei, Sh.
On the computational complexity of finding a minimal basis for the guess and determine attack [Volume 9, Issue 2, 2017, Pages 101-110]
Kheiri, Hossein
Modified Sliding-Mode Control Method for Synchronization a Class of Chaotic Fractional-Order Systems with Application in Encryption [Volume 12, Issue 1, 2020, Pages 55-66]
Khoshhalpour, E.
BotRevealer: Behavioral Detection of Botnets based on Botnet Life-cycle [Volume 10, Issue 1, 2018, Pages 55-61]
Krcmar, Helmut
Critical Success Factors for Data Virtualization: A Literature Review [Volume 11, Issue 3, 2019, Pages 131-137]
Kuchaki Rafsanjani, M.
Optimizing image steganography by combining the GA and ICA [Volume 7, Issue 1, 2015, Pages 47-58]
Labbafniya, Mansoureh
Hardware Trojan Prevention and Detection by Filling Unused Space Using Shift registers, Gate-chain and Extra Routing [Volume 13, Issue 1, 2021, Pages 47-57]
L. Abdulsattar, Oula
Virtualized Network Management Laboratory for Educational Purposes [Volume 11, Issue 3, 2019, Pages 181-186]
Letychevskyi, Oleksandr
Algebraic Matching of Vulnerabilities in a Low-Level Code [Volume 11, Issue 3, 2019, Pages 1-7]
Lu, Joan
Face Recognition Based Rank Reduction SVD Approach [Volume 11, Issue 3, 2019, Pages 39-50]
M
Mabuto, E. K.
Analyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications [Volume 4, Issue 2, 2012, Pages 137-150]
Madian, Ahmed
Medical Image Compression Based on Region of Interest [Volume 11, Issue 3, 2019, Pages 29-34]
Mafakheri, B.
An efficient secure channel coding scheme based on polar codes [Volume 9, Issue 2, 2017, Pages 111-118]
Mahdavi, E.
Classification of encrypted traffic for applications based on statistical features [Volume 10, Issue 1, 2018, Pages 29-43]
Mahdavi, M.
Steganalysis of embedding in difference of image pixel pairs by neural network [Volume 1, Issue 1, 2009, Pages 17-26]
Mahdavi, M.
An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks [Volume 10, Issue 1, 2018, Pages 15-27]
Mahdavi Oliaee, M.
On the Security of O-PSI: A Delegated Private Set Intersection on Outsourced Datasets (Extended Version) [Volume 10, Issue 2, 2018, Pages 117-127]
Mahmoodi Rishakani, Akbar
Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives [Volume 11, Issue 1, 2019, Pages 35-46]
Mahmoudzadeh Niknam, Majid
Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants [Volume 12, Issue 1, 2020, Pages 13-23]
Mehrnejad, M.
SEIMCHA: a new semantic image CAPTCHA using geometric transformations [Volume 4, Issue 1, 2012, Pages 63-76]
Memon, Muhammad Ali
Aspect Oriented UML to ECORE Model Transformation [Volume 11, Issue 3, 2019, Pages 97-103]
Meraji, Vahid
Evict+Time Attack on Intel CPUs without Explicit Knowledge of Address Offsets [Volume 13, Issue 1, 2021, Pages 19-27]
Miri, A.
A centralized privacy-preserving framework for online social networks [Volume 6, Issue 1, 2014, Pages 35-52]
Miri, A.
A collusion attack on the fuzzy vault scheme [Volume 1, Issue 1, 2009, Pages 27-34]
Mirmohseni, M.
Traceability improvements of a new RFID protocol based on EPC C1 G2 [Volume 8, Issue 2, 2016, Pages 105-114]
Mirzaee Shamsabad, Mohammad Reza
Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives [Volume 11, Issue 1, 2019, Pages 35-46]
Moazami, F.
On the computational complexity of finding a minimal basis for the guess and determine attack [Volume 9, Issue 2, 2017, Pages 101-110]
Moazami, F.
Impossible Differential Cryptanalysis on Deoxys-BC-256 [Volume 10, Issue 2, 2018, Pages 93-105]
Moazami Goudarzi, Mohammad Reza
Providing a Hybrid Cryptography Algorithm for Lightweight Authentication Protocol in RFID with Urban Traffic Usage Case [Volume 13, Issue 1, 2021, Pages 73-85]
Modiri, Mohammad Mahdi
GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication [Volume 12, Issue 2, 2020, Pages 101-111]
Mohajeri, J.
Cryptanalysis of GSM encryption algorithm A5/1 [Volume 4, Issue 2, 2012, Pages 107-114]
Mohajeri, J.
Double voter perceptible blind signature based electronic voting protocol [Volume 3, Issue 1, 2011, Pages 43-50]
Mohajeri, J.
On the multi _ chi-square tests and their data complexity [Volume 4, Issue 1, 2012, Pages 15-24]
Mohajeri, J.
Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version) [Volume 10, Issue 1, 2018, Pages 3-13]
Mohajeri, J.
On the Security of O-PSI: A Delegated Private Set Intersection on Outsourced Datasets (Extended Version) [Volume 10, Issue 2, 2018, Pages 117-127]
Mohajeri, Javad
Biclique Cryptanalysis of Block Ciphers LBlock and TWINE-80 with Practical Data Complexity [Volume 11, Issue 1, 2019, Pages 57-74]
Mohajeri, Javad
GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication [Volume 12, Issue 2, 2020, Pages 101-111]
Mohammadhassanzadeh, H.
Prediction of user's trustworthiness in web-based social networks via text mining [Volume 5, Issue 2, 2013, Pages 171-187]
Mohammadi, S.
A chaos-based video watermarking algorithm [Volume 4, Issue 1, 2012, Pages 77-86]
Mohammadi, Shahriar
Anomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism [Volume 12, Issue 1, 2020, Pages 44-54]
Mohammadrezaei, Mohammad Reza
Detection of Fake Accounts in Social Networks Based on One Class Classification [Volume 11, Issue 2, 2019, Pages 173-183]
Mohammadzadeh, Naser
Anomaly Detection Using SVM as Classifier and Decision Tree for Optimizing Feature Vectors [Volume 11, Issue 2, 2019, Pages 159-171]
Mohseni-Ejiyeh, A.
An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks [Volume 10, Issue 1, 2018, Pages 15-27]
Mollamotalebi, Mahdi
F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management [Volume 12, Issue 2, 2020, Pages 113-128]
Montazer, Gh. A.
Phishing website detection using weighted feature line embedding [Volume 9, Issue 2, 2017, Pages 147-159]
Mortazavi, A.
Double voter perceptible blind signature based electronic voting protocol [Volume 3, Issue 1, 2011, Pages 43-50]
Mortazavi, A.
A new security proof for FMNV continuous non-malleable encoding scheme [Volume 9, Issue 1, 2017, Pages 41-51]
Mortazavi, R.
A novel local search method for microaggregation [Volume 7, Issue 1, 2015, Pages 15-26]
Mosanaei Boorani, hatameh
A Trusted Design Platform for Trojan Detection in FPGA Bitstreams Using Partial Reconfiguration [Volume 13, Issue 1, 2021, Pages 29-45]
Movaghar, A.
A two-phase wormhole attack detection scheme in MANETs [Volume 6, Issue 2, 2014, Pages 183-191]
Mozaffari, S.
Improving security of double random phase encoding with chaos theory using fractal images [Volume 4, Issue 2, 2012, Pages 115-124]
Mustapha C.E., Yagoub
Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns [Volume 11, Issue 3, 2019, Pages 9-17]
N
Naderi, Bashir
Modified Sliding-Mode Control Method for Synchronization a Class of Chaotic Fractional-Order Systems with Application in Encryption [Volume 12, Issue 1, 2020, Pages 55-66]
Namadchian, Amin
Anomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism [Volume 12, Issue 1, 2020, Pages 44-54]
Nemati, H.
Private Key based query on encrypted data [Volume 4, Issue 1, 2012, Pages 41-50]
Niknafs, M.
A collusion mitigation scheme for reputation systems [Volume 7, Issue 2, 2015, Pages 151-166]
Niknafs, Mina
A Trust Based Probabilistic Method for Efficient Correctness Verification in Database Outsourcing [Volume 11, Issue 1, 2019, Pages 3-14]
Nikooghadam, M.
An efficient blind signature scheme based on the elliptic curve discrete logarithm problem [Volume 1, Issue 2, 2009, Pages 125-131]
Nizamani, Muhammad Ali
Aspect Oriented UML to ECORE Model Transformation [Volume 11, Issue 3, 2019, Pages 97-103]
Nooribakhsh, Mahsa
F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management [Volume 12, Issue 2, 2020, Pages 113-128]
Norozi, Zynolabedin
CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking [Volume 12, Issue 2, 2020, Pages 67-80]
Nowroozi, A.R.
A Survey of Anomaly Detection Approaches in Internet of Things [Volume 10, Issue 2, 2018, Pages 79-92]
P
Palominos, Fredi
Cognitive Strategic Model applied to a Port System [Volume 11, Issue 3, 2019, Pages 73-78]
Papadopoulos, Dimitrios
SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing [Volume 11, Issue 1, 2019, Pages 15-34]
Park, T.
Security testing of session initiation protocol implementations [Volume 1, Issue 2, 2009, Pages 91-103]
Patil, D.
Feature-based Malicious URL and Attack Type Detection Using Multi-class Classification [Volume 10, Issue 2, 2018, Pages 141-162]
Patil, J.
Feature-based Malicious URL and Attack Type Detection Using Multi-class Classification [Volume 10, Issue 2, 2018, Pages 141-162]
Patooghy, A.
Unauthenticated event detection in wireless sensor networks using sensors co-coverage [Volume 8, Issue 1, 2016, Pages 61-71]
Patooghy, A.
Side channel parameter characteristics of code injection attacks [Volume 9, Issue 1, 2017, Pages 17-26]
Payandeh, A.
Toward an energy efficient PKC-based key management system for wireless sensor networks [Volume 6, Issue 1, 2014, Pages 53-66]
Pencheva, Evelina
Access and Mobility Policy Control at the Network Edge [Volume 11, Issue 3, 2019, Pages 105-111]
Peschanenko, Volodymyr
Algebraic Matching of Vulnerabilities in a Low-Level Code [Volume 11, Issue 3, 2019, Pages 1-7]
Pilaram, H.
On the design and security of a lattice-based threshold secret sharing scheme [Volume 8, Issue 1, 2016, Pages 25-38]
Pilaram, H.
An efficient secure channel coding scheme based on polar codes [Volume 9, Issue 2, 2017, Pages 111-118]
Pishgoo, B.
STLR: a novel danger theory based structural TLR algorithm [Volume 5, Issue 2, 2013, Pages 209-225]
Poon, H. T.
A collusion attack on the fuzzy vault scheme [Volume 1, Issue 1, 2009, Pages 27-34]
Pourpouneh, M.
Double voter perceptible blind signature based electronic voting protocol [Volume 3, Issue 1, 2011, Pages 43-50]
Pourpouneh, M.
A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving [Volume 8, Issue 1, 2016, Pages 3-24]
Pourpouneh, M.
A Decentralized Online Sortition Protocol [Volume 10, Issue 1, 2018, Pages 63-69]
R
Radchenko, Viktor
Algebraic Matching of Vulnerabilities in a Low-Level Code [Volume 11, Issue 3, 2019, Pages 1-7]
Rahmani, Amir Masoud
Detection of Fake Accounts in Social Networks Based on One Class Classification [Volume 11, Issue 2, 2019, Pages 173-183]
Rajabzadeh Asaar, M.
Convertible limited (multi-) verifier signature: new constructions and applications [Volume 5, Issue 2, 2013, Pages 189-208]
Rajabzadeh Asaar, M.
Double voter perceptible blind signature based electronic voting protocol [Volume 3, Issue 1, 2011, Pages 43-50]
Rajabzadeh Asaar, M.
A traceable optimistic fair exchange protocol in the standard model [Volume 7, Issue 1, 2015, Pages 3-14]
Raji, F.
A centralized privacy-preserving framework for online social networks [Volume 6, Issue 1, 2014, Pages 35-52]
Ramezanian, R.
A computational model and convergence theorem for rumor dissemination in social networks [Volume 5, Issue 2, 2013, Pages 141-154]
Ramezanian, R.
Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions [Volume 1, Issue 1, 2009, Pages 55-67]
Ramezanian, R.
A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving [Volume 8, Issue 1, 2016, Pages 3-24]
Ramezanian, R.
A Decentralized Online Sortition Protocol [Volume 10, Issue 1, 2018, Pages 63-69]
Ramezanian, R.
Distributed Contingency Logic and Security [Volume 10, Issue 2, 2018, Pages 107-115]
Rashidi, B.
Efficient implementation of low time complexity and pipelined bit-parallel polynomial basis multiplier over binary finite fields [Volume 7, Issue 2, 2015, Pages 101-114]
Rasoolzadeh, Sh.
Total break of Zorro using linear and differential attacks [Volume 6, Issue 1, 2014, Pages 23-34]
Rastegari, P.
An efficient certificateless signcryption scheme in the standard model [Volume 9, Issue 1, 2017, Pages 3-16]
Reddy, P.Vasudeva
An Efficient Pairing-Free Identity Based Proxy Blind Signature Scheme with Message Recovery [Volume 13, Issue 1, 2021, Pages 59-72]
Reid, J.
Authorization models for secure information sharing: a survey and research agenda [Volume 2, Issue 2, 2010, Pages 69-87]
Rezaeian Farashahi, R.
Efficient implementation of low time complexity and pipelined bit-parallel polynomial basis multiplier over binary finite fields [Volume 7, Issue 2, 2015, Pages 101-114]
Rezaei Shahmirzdi, A.
Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version) [Volume 10, Issue 1, 2018, Pages 3-13]
Rezakhani, Afshin
Providing a Hybrid Cryptography Algorithm for Lightweight Authentication Protocol in RFID with Urban Traffic Usage Case [Volume 13, Issue 1, 2021, Pages 73-85]
Rezapour, T. Y.
A novel key management scheme for heterogeneous sensor networks based on the position of nodes [Volume 8, Issue 2, 2016, Pages 115-130]
Rijmen, V.
Stream ciphers and the eSTREAM project [Volume 2, Issue 1, 2010, Pages 3-11]
Saad, Mohamed
Medical Image Compression Based on Region of Interest [Volume 11, Issue 3, 2019, Pages 29-34]
Sabeti, V.
Steganalysis of embedding in difference of image pixel pairs by neural network [Volume 1, Issue 1, 2009, Pages 17-26]
Sabeti, Vajiheh
New High Secure Network Steganography Method Based on Packet Length [Volume 12, Issue 1, 2020, Pages 24-44]
Sabzinejad Farash, M.
Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC [Volume 5, Issue 1, 2013, Pages 55-70]
Sadat Emami, S.
A context-sensitive dynamic role-based access control model for pervasive computing environments [Volume 2, Issue 1, 2010, Pages 47-66]
Sadeghi, A.A
Dwarf Frankenstein is still in your memory: tiny code reuse attacks [Volume 9, Issue 1, 2017, Pages 53-72]
Sadeghi, F.
Optimizing image steganography by combining the GA and ICA [Volume 7, Issue 1, 2015, Pages 47-58]
Sadeghi, H.
Cryptanalysis of some first round CAESAR candidates [Volume 7, Issue 2, 2015, Pages 127-134]
Sadeghi, Sadegh
Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants [Volume 12, Issue 1, 2020, Pages 13-23]
Sadrnezhad, Z.
Analyzing new features of infected web content in detection of malicious web pages [Volume 9, Issue 2, 2017, Pages 161-181]
Saeed, Anwar
An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling [Volume 11, Issue 3, 2019, Pages 145-151]
Saeed, Yousaf
Cloud and IoT based Smart Car Parking System by using Mamdani Fuzzy Inference System (MFIS) [Volume 11, Issue 3, 2019, Pages 153-160]
Saeed Ali, Twana
The Impact of The Biometric System on Election Fraud Elimination: Case of The North of IRAQ [Volume 11, Issue 3, 2019, Pages 195-207]
Saeidi, Roghaye
Hardware Trojan Prevention and Detection by Filling Unused Space Using Shift registers, Gate-chain and Extra Routing [Volume 13, Issue 1, 2021, Pages 47-57]
Safaei Pour, M.
A new CPA resistant software implementation for symmetric ciphers with smoothed power consumption: SIMON case study [Volume 9, Issue 2, 2017, Pages 119-130]
Safarzadeh, M.
An automatic test case generator for evaluating implementation of access control policies [Volume 9, Issue 1, 2017, Pages 73-91]
Safkhani, M.
A note on the security of two improved RFID protocols [Volume 8, Issue 2, 2016, Pages 155-160]
Saidi, H.
Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach [Volume 4, Issue 2, 2012, Pages 125-136]
Saidi, H.
An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks [Volume 2, Issue 2, 2010, Pages 89-105]
Sajjadi Ghaemmaghami, S.
Traceability improvements of a new RFID protocol based on EPC C1 G2 [Volume 8, Issue 2, 2016, Pages 105-114]
Salehi, Z.
DyVSoR: dynamic malware detection based on extracting patterns from value sets of registers [Volume 5, Issue 1, 2013, Pages 71-82]
S. Alencar, Marcelo
A Fair Power Allocation for Non-Orthogonal Multiple Access in the Power Domain [Volume 11, Issue 3, 2019, Pages 123-130]
Salim, F.
Authorization models for secure information sharing: a survey and research agenda [Volume 2, Issue 2, 2010, Pages 69-87]
Salmasizadeh, M.
Convertible limited (multi-) verifier signature: new constructions and applications [Volume 5, Issue 2, 2013, Pages 189-208]
Salmasizadeh, M.
Total break of Zorro using linear and differential attacks [Volume 6, Issue 1, 2014, Pages 23-34]
Salmasizadeh, M.
On the multi _ chi-square tests and their data complexity [Volume 4, Issue 1, 2012, Pages 15-24]
Salmasizadeh, M.
A traceable optimistic fair exchange protocol in the standard model [Volume 7, Issue 1, 2015, Pages 3-14]
Salmasizadeh, M.
A new security proof for FMNV continuous non-malleable encoding scheme [Volume 9, Issue 1, 2017, Pages 41-51]
Salmasizadeh, M.
A new CPA resistant software implementation for symmetric ciphers with smoothed power consumption: SIMON case study [Volume 9, Issue 2, 2017, Pages 119-130]
Salmasizadeh, M.
Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version) [Volume 10, Issue 1, 2018, Pages 3-13]
Salmasizadeh, Mahmoud
GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication [Volume 12, Issue 2, 2020, Pages 101-111]
Sam, I.Shatheesh
OT-Feature Extraction on Scrambled Images with Instantaneous Clustering for CBIR Scheme in Cloud Computing [Volume 13, Issue 1, 2021, Pages 1-17]
Samavi, Sh.
Steganalysis of embedding in difference of image pixel pairs by neural network [Volume 1, Issue 1, 2009, Pages 17-26]
Sami, A.
DyVSoR: dynamic malware detection based on extracting patterns from value sets of registers [Volume 5, Issue 1, 2013, Pages 71-82]
Saniee Abadeh, M.
A hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection [Volume 2, Issue 1, 2010, Pages 33-46]
Sayedi, S. M.
Efficient implementation of low time complexity and pipelined bit-parallel polynomial basis multiplier over binary finite fields [Volume 7, Issue 2, 2015, Pages 101-114]
Sedaghatbaf, A.
Quantitative evaluation of software security: an approach based on UML/SecAM and evidence theory [Volume 8, Issue 2, 2016, Pages 141-153]
Selvaraj, S.
Security testing of session initiation protocol implementations [Volume 1, Issue 2, 2009, Pages 91-103]
Serkani, Elham
Anomaly Detection Using SVM as Classifier and Decision Tree for Optimizing Feature Vectors [Volume 11, Issue 2, 2019, Pages 159-171]
Shaaban, Dalia
Medical Image Compression Based on Region of Interest [Volume 11, Issue 3, 2019, Pages 29-34]
Shaban Al-Ani, Muzhir
Face Recognition Based Rank Reduction SVD Approach [Volume 11, Issue 3, 2019, Pages 39-50]
Shahriari, H. R.
Aggrandizing the beast's limbs: patulous code reuse attack on ARM architecture [Volume 8, Issue 1, 2016, Pages 39-52]
Shahriari, H. R.
Prediction of user's trustworthiness in web-based social networks via text mining [Volume 5, Issue 2, 2013, Pages 171-187]
Shahriari, H. R.
A hybrid approach for database intrusion detection at transaction and inter-transaction levels [Volume 6, Issue 2, 2014, Pages 155-167]
Shahriari, H. R.
BotRevealer: Behavioral Detection of Botnets based on Botnet Life-cycle [Volume 10, Issue 1, 2018, Pages 55-61]
Shahriari, H.R.
Dwarf Frankenstein is still in your memory: tiny code reuse attacks [Volume 9, Issue 1, 2017, Pages 53-72]
Shahriari, H.R.
A Survey of Anomaly Detection Approaches in Internet of Things [Volume 10, Issue 2, 2018, Pages 79-92]
Shaikh, Asadullah
Aspect Oriented UML to ECORE Model Transformation [Volume 11, Issue 3, 2019, Pages 97-103]
Shakeri, E.
An extended feature set for blind image steganalysis in contourlet domain [Volume 6, Issue 2, 2014, Pages 169-181]
Shakeri, H.
A confidence-aware interval-based trust model [Volume 4, Issue 2, 2012, Pages 151-165]
Shamaei, Sh.
A two-phase wormhole attack detection scheme in MANETs [Volume 6, Issue 2, 2014, Pages 183-191]
Shams, F.
Access control in ultra-large-scale systems using a data-centric middleware [Volume 6, Issue 1, 2014, Pages 3-22]
Shekofte, Nastaran
A Trusted Design Platform for Trojan Detection in FPGA Bitstreams Using Partial Reconfiguration [Volume 13, Issue 1, 2021, Pages 29-45]
Shirani, Sh.
Steganalysis of embedding in difference of image pixel pairs by neural network [Volume 1, Issue 1, 2009, Pages 17-26]
Shiri, Mohammad Ebrahim
Detection of Fake Accounts in Social Networks Based on One Class Classification [Volume 11, Issue 2, 2019, Pages 173-183]
Shoaei, Minoo
New High Secure Network Steganography Method Based on Packet Length [Volume 12, Issue 1, 2020, Pages 24-44]
Shokrollahi, S.
Access control in ultra-large-scale systems using a data-centric middleware [Volume 6, Issue 1, 2014, Pages 3-22]
Shorim, Nada
Hand Gestures Classification with Multi-Core DTW [Volume 11, Issue 3, 2019, Pages 91-96]
Shraideh, Marwin
Critical Success Factors for Data Virtualization: A Literature Review [Volume 11, Issue 3, 2019, Pages 131-137]
Siavashi, Mohammad
Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems [Volume 12, Issue 2, 2020, Pages 129-140]
Singh, Pitam
A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications [Volume 11, Issue 2, 2019, Pages 113-128]
Soleimany, H.
Impossible Differential Cryptanalysis on Deoxys-BC-256 [Volume 10, Issue 2, 2018, Pages 93-105]
Soleimany, Hadi
Enhanced Flush+Reload Attack on AES [Volume 12, Issue 2, 2020, Pages 81-89]
Soleimany, Hadi
Evict+Time Attack on Intel CPUs without Explicit Knowledge of Address Offsets [Volume 13, Issue 1, 2021, Pages 19-27]
Soltani, N.
Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version) [Volume 10, Issue 2, 2018, Pages 129-139]
Soltani, S.
Separating indexes from data: a distributed scheme for secure database outsourcing [Volume 3, Issue 2, 2011, Pages 121-133]
Soodkhah Mohammadi, M.
Design and formal verification of DZMBE+ [Volume 5, Issue 1, 2013, Pages 37-53]
T
Taghizadeh, M.
An automatic test case generator for evaluating implementation of access control policies [Volume 9, Issue 1, 2017, Pages 73-91]
Taheri, M.
Improving security of double random phase encoding with chaos theory using fractal images [Volume 4, Issue 2, 2012, Pages 115-124]
Tajik Khasss, M.
Cipher text only attack on speech time scrambling systems using correction of audio spectrogram [Volume 9, Issue 2, 2017, Pages 131-145]
Tam, A.
Security testing of session initiation protocol implementations [Volume 1, Issue 2, 2009, Pages 91-103]
Tan, Qing
A Sudy on Information Privacy Issue on Social Networks [Volume 11, Issue 3, 2019, Pages 19-27]
Tavakoly, A.
Improving Tor security against timing and traffic analysis attacks with fair randomization [Volume 6, Issue 1, 2014, Pages 67-76]
Tayarani-N, M.
Analyzing new features of infected web content in detection of malicious web pages [Volume 9, Issue 2, 2017, Pages 161-181]
Thumbur, Gowri
An Efficient Pairing-Free Identity Based Proxy Blind Signature Scheme with Message Recovery [Volume 13, Issue 1, 2021, Pages 59-72]
Toreini, E.
SEIMCHA: a new semantic image CAPTCHA using geometric transformations [Volume 4, Issue 1, 2012, Pages 63-76]
Tork Ladani, B.
GTrust: a group based trust model [Volume 5, Issue 2, 2013, Pages 155-170]
Tork Ladani, B.
A model for specification, composition and verification of access control policies and its application to web services [Volume 3, Issue 2, 2011, Pages 103-120]
Tork Ladani, B.
An automatic test case generator for evaluating implementation of access control policies [Volume 9, Issue 1, 2017, Pages 73-91]
Tork Ladani, Behrouz
Interdependent Security Game Design over Constrained Linear Influence Networks [Volume 11, Issue 2, 2019, Pages 95-111]
TOUHAMI, Rachida
Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns [Volume 11, Issue 3, 2019, Pages 9-17]
V
Vafaei, Vajiheh
Modified Sliding-Mode Control Method for Synchronization a Class of Chaotic Fractional-Order Systems with Application in Encryption [Volume 12, Issue 1, 2020, Pages 55-66]
Vafaei Jahan, M.
A density based clustering approach to distinguish between web robot and human requests to a web server [Volume 6, Issue 1, 2014, Pages 77-89]
Vafaei Jahan, Majid
Analyzing new features of infected web content in detection of malicious web pages [Volume 9, Issue 2, 2017, Pages 161-181]
Vardasbi, A.
Cryptanalysis of GSM encryption algorithm A5/1 [Volume 4, Issue 2, 2012, Pages 107-114]
Vardasbi, A.
On the multi _ chi-square tests and their data complexity [Volume 4, Issue 1, 2012, Pages 15-24]
V. dos Santos Filho, José
A Fair Power Allocation for Non-Orthogonal Multiple Access in the Power Domain [Volume 11, Issue 3, 2019, Pages 123-130]
Venter, H. S.
Analyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications [Volume 4, Issue 2, 2012, Pages 137-150]
Vosoughi, M.
Security-aware register placement to hinder malicious hardware updating and improve Trojan detectability [Volume 7, Issue 1, 2015, Pages 75-81]
W
Waqas, Muhammad
Evaluation of Planet Factors of Smart City through Multi-layer Fuzzy Logic (MFL) [Volume 11, Issue 3, 2019, Pages 51-58]
X
Xu, Qiang
Face Recognition Based Rank Reduction SVD Approach [Volume 11, Issue 3, 2019, Pages 39-50]
Y
Yahyazadeh, M.
BotOnus: an online unsupervised method for Botnet detection [Volume 4, Issue 1, 2012, Pages 51-62]
Yakovlev, Viktor
Algebraic Matching of Vulnerabilities in a Low-Level Code [Volume 11, Issue 3, 2019, Pages 1-7]
Yousif, Muhammad
An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling [Volume 11, Issue 3, 2019, Pages 145-151]
Z
Zabihi, M.
A density based clustering approach to distinguish between web robot and human requests to a web server [Volume 6, Issue 1, 2014, Pages 77-89]
Zaghian, Ali
A Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions [Volume 12, Issue 2, 2020, Pages 91-99]
Zahir-Azami, B.
Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms [Volume 3, Issue 1, 2011, Pages 51-66]
Zakerolhosseini, A.
An efficient blind signature scheme based on the elliptic curve discrete logarithm problem [Volume 1, Issue 2, 2009, Pages 125-131]
Zakerolhosseini, A.
QTRU: quaternionic version of the NTRU public-key cryptosystems [Volume 3, Issue 1, 2011, Pages 29-42]
Zali, Z.
Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach [Volume 4, Issue 2, 2012, Pages 125-136]
Zamani, B.
An automatic test case generator for evaluating implementation of access control policies [Volume 9, Issue 1, 2017, Pages 73-91]
Zamanzadeh, Sh.
Self authentication path insertion in FPGA-based design flow for tamper-resistant purpose [Volume 8, Issue 1, 2016, Pages 53-60]
Zamanzadeh, Sh.
ASIC design protection against reverse engineering during the fabrication process using automatic netlist obfuscation design flow [Volume 8, Issue 2, 2016, Pages 93-104]
Zarezadeh, Maryam
Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems [Volume 12, Issue 2, 2020, Pages 129-140]
Zarisfi Kermani, F.
Optimizing image steganography by combining the GA and ICA [Volume 7, Issue 1, 2015, Pages 47-58]
Zarmehi, N.
Optimum decoder for multiplicative spread spectrum image watermarking with Laplacian modeling [Volume 8, Issue 2, 2016, Pages 131-139]
Zeebaree, Mosleh
A Comparison Study between Intelligent Decision Support Systems and Decision Support Systems [Volume 11, Issue 3, 2019, Pages 187-194]