A

  • Abbasi, Rabeeh Identifying Entrepreneurial Influencers on Twitter [Volume 12, Issue 3, 2020, Pages 59-72]

  • Abdul, Wadood Modeling a Cloud-Based Smart Parking WLAN Networks Using IEEE802.11AC Technology [Volume 12, Issue 3, 2020, Pages 101-109]

  • Abdullah, Manal Identifying Entrepreneurial Influencers on Twitter [Volume 12, Issue 3, 2020, Pages 59-72]

  • Abdullah Alkharmani, Hanan The Impact of Mobile Payment Quality on User’s Continuance Intention Toward Mobile Payment in Saudi Arabia [Volume 12, Issue 3, 2020, Pages 45-53]

  • Agil, Abeer Anomaly-Based Network Intrusion Detection Using Bidirectional Long Short Term Memory and Convolutional Neural Network [Volume 12, Issue 3, 2020, Pages 37-44]

  • Agoyi, Mary A Hybrid Encryption Algorithm for Mitigating the Effects of Attacks in Ad Hoc Networks [Volume 12, Issue 3, 2020, Pages 19-27]

  • Ahmed Albliwi, Saja The Impact of Mobile Payment Quality on User’s Continuance Intention Toward Mobile Payment in Saudi Arabia [Volume 12, Issue 3, 2020, Pages 45-53]

  • Al-Anazi, Sumayia CEMD: A Cluster-based Ensemble Motif Discovery Tool [Volume 12, Issue 3, 2020, Pages 29-36]

  • Al-Hammad, Abeer Salman Reverse Image-Based Search Engine for IP Trademarks [Volume 12, Issue 3, 2020, Pages 117-127]

  • Alharbi, sara Anomaly-Based Network Intrusion Detection Using Bidirectional Long Short Term Memory and Convolutional Neural Network [Volume 12, Issue 3, 2020, Pages 37-44]

  • Al-Hudhud, Ghada A Multilingual Infobot in Airports [Volume 12, Issue 3, 2020, Pages 111-115]

  • Al-Hudhud, Ghada Reverse Image-Based Search Engine for IP Trademarks [Volume 12, Issue 3, 2020, Pages 117-127]

  • Al-Humaimeedy, Abeer Sulaiman Reverse Image-Based Search Engine for IP Trademarks [Volume 12, Issue 3, 2020, Pages 117-127]

  • Al-Humamidi, Abeer A Multilingual Infobot in Airports [Volume 12, Issue 3, 2020, Pages 111-115]

  • Ali Awad, Osama Evaluation of a Wireless ZigBee with PID Controller for Networked Control System Using True Time Toolbox [Volume 12, Issue 3, 2020, Pages 13-17]

  • Aljodhi, Haya Anomaly-Based Network Intrusion Detection Using Bidirectional Long Short Term Memory and Convolutional Neural Network [Volume 12, Issue 3, 2020, Pages 37-44]

  • Alkenazan, Wafa Abdulaziz Modeling a Cloud-Based Smart Parking WLAN Networks Using IEEE802.11AC Technology [Volume 12, Issue 3, 2020, Pages 101-109]

  • Almotairy, Bodor Identifying Entrepreneurial Influencers on Twitter [Volume 12, Issue 3, 2020, Pages 59-72]

  • Alqassem, Lina Anomaly-Based Network Intrusion Detection Using Bidirectional Long Short Term Memory and Convolutional Neural Network [Volume 12, Issue 3, 2020, Pages 37-44]

  • Al-Turaiki, Isra CEMD: A Cluster-based Ensemble Motif Discovery Tool [Volume 12, Issue 3, 2020, Pages 29-36]

  • Al-Turaiki, Isra Anomaly-Based Network Intrusion Detection Using Bidirectional Long Short Term Memory and Convolutional Neural Network [Volume 12, Issue 3, 2020, Pages 37-44]

  • Altwaijry, Najwa CEMD: A Cluster-based Ensemble Motif Discovery Tool [Volume 12, Issue 3, 2020, Pages 29-36]

  • Altwaijry, Najwa Anomaly-Based Network Intrusion Detection Using Bidirectional Long Short Term Memory and Convolutional Neural Network [Volume 12, Issue 3, 2020, Pages 37-44]

  • A. Mohammed Ali, Salim Suspended Stripline Low-pass Filter Design for Wide Stopband Attenuation Applications [Volume 12, Issue 3, 2020, Pages 7-12]

  • Aref, Mohammad Reza Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants [Volume 12, Issue 1, 2020, Pages 13-23]

  • Ashouri-Talouki, Maede Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems [Volume 12, Issue 2, 2020, Pages 129-140]

  • A. Taha, Ashraf Modeling a Cloud-Based Smart Parking WLAN Networks Using IEEE802.11AC Technology [Volume 12, Issue 3, 2020, Pages 101-109]

B

  • Bagheri, Nasour Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants [Volume 12, Issue 1, 2020, Pages 13-23]

  • Bagheri, Nasour CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking [Volume 12, Issue 2, 2020, Pages 67-80]

  • Bagherpour, Bagher A Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions [Volume 12, Issue 2, 2020, Pages 91-99]

  • Bassiri, Mustapha The Establishment of a Distance Training Device within the Regional Center of the Taza Education and Training: Administrative Cycle Case [Volume 12, Issue 3, 2020, Pages 87-93]

  • Belaaouad, Said The Establishment of a Distance Training Device within the Regional Center of the Taza Education and Training: Administrative Cycle Case [Volume 12, Issue 3, 2020, Pages 87-93]

  • Belaaouad, Said The Establishment of a Distance Training Device within the Regional Center of the Taza Education and Training: Administrative Cycle Case [Volume 12, Issue 3, 2020, Pages 87-93]

D

  • D. R. Assis, Karcius A New Derivation of the Leftover Hash Lemma [Volume 12, Issue 3, 2020, Pages 55-58]

E

  • Esaid, Abdllkader A Hybrid Encryption Algorithm for Mitigating the Effects of Attacks in Ad Hoc Networks [Volume 12, Issue 3, 2020, Pages 19-27]

  • Eskandari, Zahra Extension of Cube Attack with Probabilistic Equations and its Application on Cryptanalysis of KATAN Cipher [Volume 12, Issue 1, 2020, Pages 1-12]

G

  • Ghaemi Bafghi, Abbas Extension of Cube Attack with Probabilistic Equations and its Application on Cryptanalysis of KATAN Cipher [Volume 12, Issue 1, 2020, Pages 1-12]

H

  • Hachem, Elkaber The Use of Local Sensitive Hashing for E-learner Face Identification [Volume 12, Issue 3, 2020, Pages 1-5]

  • H. Alaoui, Hachem The Use of Local Sensitive Hashing for E-learner Face Identification [Volume 12, Issue 3, 2020, Pages 1-5]

  • Hasan, Sami Suspended Stripline Low-pass Filter Design for Wide Stopband Attenuation Applications [Volume 12, Issue 3, 2020, Pages 7-12]

  • Hasan, Sami Indexed View Technique to Speed-up Data Warehouse Query Processing [Volume 12, Issue 3, 2020, Pages 81-85]

J

  • Jahanbani, Mohsen CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking [Volume 12, Issue 2, 2020, Pages 67-80]

  • J.F. Alenazi, Mohammed Modeling a Cloud-Based Smart Parking WLAN Networks Using IEEE802.11AC Technology [Volume 12, Issue 3, 2020, Pages 101-109]

K

  • K. Almazmomi, Najah Knowledge Discovery in Cloud-Computing Environment and the Challenges [Volume 12, Issue 3, 2020, Pages 95-99]

  • Karim, Mohammed The Use of Local Sensitive Hashing for E-learner Face Identification [Volume 12, Issue 3, 2020, Pages 1-5]

  • Kheiri, Hossein Modified Sliding-Mode Control Method for Synchronization a Class of Chaotic Fractional-Order Systems with Application in Encryption [Volume 12, Issue 1, 2020, Pages 55-66]

L

  • Lamniai, Imad The Establishment of a Distance Training Device within the Regional Center of the Taza Education and Training: Administrative Cycle Case [Volume 12, Issue 3, 2020, Pages 87-93]

M

  • Mahmoudzadeh Niknam, Majid Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants [Volume 12, Issue 1, 2020, Pages 13-23]

  • M. Al-Kadhimi, Aymen Suspended Stripline Low-pass Filter Design for Wide Stopband Attenuation Applications [Volume 12, Issue 3, 2020, Pages 7-12]

  • Mazouak, Abderrazak The Establishment of a Distance Training Device within the Regional Center of the Taza Education and Training: Administrative Cycle Case [Volume 12, Issue 3, 2020, Pages 87-93]

  • M. J. Al Taleb, Talib Indexed View Technique to Speed-up Data Warehouse Query Processing [Volume 12, Issue 3, 2020, Pages 81-85]

  • Modiri, Mohammad Mahdi GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication [Volume 12, Issue 2, 2020, Pages 101-111]

  • Mohajeri, Javad GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication [Volume 12, Issue 2, 2020, Pages 101-111]

  • Mohammadi, Shahriar Anomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism [Volume 12, Issue 1, 2020, Pages 44-54]

  • Mollamotalebi, Mahdi F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management [Volume 12, Issue 2, 2020, Pages 113-128]

  • Monqith, Mais Evaluation of a Wireless ZigBee with PID Controller for Networked Control System Using True Time Toolbox [Volume 12, Issue 3, 2020, Pages 13-17]

  • Mortazavi, Reza Improved Univariate Microaggregation for Integer Values [Volume 12, Issue 1, 2020, Pages 35-43]

N

  • Naderi, Bashir Modified Sliding-Mode Control Method for Synchronization a Class of Chaotic Fractional-Order Systems with Application in Encryption [Volume 12, Issue 1, 2020, Pages 55-66]

  • Namadchian, Amin Anomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism [Volume 12, Issue 1, 2020, Pages 44-54]

  • Nooribakhsh, Mahsa F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management [Volume 12, Issue 2, 2020, Pages 113-128]

  • Norozi, Zynolabedin CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking [Volume 12, Issue 2, 2020, Pages 67-80]

S

  • Sabeti, Vajiheh New High Secure Network Steganography Method Based on Packet Length [Volume 12, Issue 1, 2020, Pages 24-44]

  • Sadeghi, Sadegh Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants [Volume 12, Issue 1, 2020, Pages 13-23]

  • S. Alencar, Marcelo A New Derivation of the Leftover Hash Lemma [Volume 12, Issue 3, 2020, Pages 55-58]

  • Salmasizadeh, Mahmoud GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication [Volume 12, Issue 2, 2020, Pages 101-111]

  • Seddigh, Milad Enhanced Flush+Reload Attack on AES [Volume 12, Issue 2, 2020, Pages 81-89]

  • Shoaei, Minoo New High Secure Network Steganography Method Based on Packet Length [Volume 12, Issue 1, 2020, Pages 24-44]

  • Siavashi, Mohammad Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems [Volume 12, Issue 2, 2020, Pages 129-140]

  • S. Jumaa, Shereen Fuzzy Histogram Equalization and Computer Vision Automated Identification of Microcalcifications in Breast Cancer [Volume 12, Issue 3, 2020, Pages 73-79]

  • Soleimany, Hadi Enhanced Flush+Reload Attack on AES [Volume 12, Issue 2, 2020, Pages 81-89]

T

  • Tahboush, Muhannad A Hybrid Encryption Algorithm for Mitigating the Effects of Attacks in Ad Hoc Networks [Volume 12, Issue 3, 2020, Pages 19-27]

  • Tridane, Malika The Establishment of a Distance Training Device within the Regional Center of the Taza Education and Training: Administrative Cycle Case [Volume 12, Issue 3, 2020, Pages 87-93]

V

  • Vafaei, Vajiheh Modified Sliding-Mode Control Method for Synchronization a Class of Chaotic Fractional-Order Systems with Application in Encryption [Volume 12, Issue 1, 2020, Pages 55-66]

Y

  • Yousif Mahdi, Yaqoob Indexed View Technique to Speed-up Data Warehouse Query Processing [Volume 12, Issue 3, 2020, Pages 81-85]

Z

  • Zaghian, Ali A Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions [Volume 12, Issue 2, 2020, Pages 91-99]

  • Zarezadeh, Maryam Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems [Volume 12, Issue 2, 2020, Pages 129-140]

  • Ziti, Cherif The Use of Local Sensitive Hashing for E-learner Face Identification [Volume 12, Issue 3, 2020, Pages 1-5]