A
-
Abbasi, Rabeeh
Identifying Entrepreneurial Influencers on Twitter [Volume 12, Issue 3, 2020, Pages 59-72]
-
Abdul, Wadood
Modeling a Cloud-Based Smart Parking WLAN Networks Using IEEE802.11AC Technology [Volume 12, Issue 3, 2020, Pages 101-109]
-
Abdullah, Manal
Identifying Entrepreneurial Influencers on Twitter [Volume 12, Issue 3, 2020, Pages 59-72]
-
Abdullah Alkharmani, Hanan
The Impact of Mobile Payment Quality on User’s Continuance Intention Toward Mobile Payment in Saudi Arabia [Volume 12, Issue 3, 2020, Pages 45-53]
-
Agil, Abeer
Anomaly-Based Network Intrusion Detection Using Bidirectional Long Short Term Memory and Convolutional Neural Network [Volume 12, Issue 3, 2020, Pages 37-44]
-
Agoyi, Mary
A Hybrid Encryption Algorithm for Mitigating the Effects of Attacks in Ad Hoc Networks [Volume 12, Issue 3, 2020, Pages 19-27]
-
Ahmed Albliwi, Saja
The Impact of Mobile Payment Quality on User’s Continuance Intention Toward Mobile Payment in Saudi Arabia [Volume 12, Issue 3, 2020, Pages 45-53]
-
Al-Anazi, Sumayia
CEMD: A Cluster-based Ensemble Motif Discovery Tool [Volume 12, Issue 3, 2020, Pages 29-36]
-
Al-Hammad, Abeer Salman
Reverse Image-Based Search Engine for IP Trademarks [Volume 12, Issue 3, 2020, Pages 117-127]
-
Alharbi, sara
Anomaly-Based Network Intrusion Detection Using Bidirectional Long Short Term Memory and Convolutional Neural Network [Volume 12, Issue 3, 2020, Pages 37-44]
-
Al-Hudhud, Ghada
A Multilingual Infobot in Airports [Volume 12, Issue 3, 2020, Pages 111-115]
-
Al-Hudhud, Ghada
Reverse Image-Based Search Engine for IP Trademarks [Volume 12, Issue 3, 2020, Pages 117-127]
-
Al-Humaimeedy, Abeer Sulaiman
Reverse Image-Based Search Engine for IP Trademarks [Volume 12, Issue 3, 2020, Pages 117-127]
-
Al-Humamidi, Abeer
A Multilingual Infobot in Airports [Volume 12, Issue 3, 2020, Pages 111-115]
-
Ali Awad, Osama
Evaluation of a Wireless ZigBee with PID Controller for Networked Control System Using True Time Toolbox [Volume 12, Issue 3, 2020, Pages 13-17]
-
Aljodhi, Haya
Anomaly-Based Network Intrusion Detection Using Bidirectional Long Short Term Memory and Convolutional Neural Network [Volume 12, Issue 3, 2020, Pages 37-44]
-
Alkenazan, Wafa Abdulaziz
Modeling a Cloud-Based Smart Parking WLAN Networks Using IEEE802.11AC Technology [Volume 12, Issue 3, 2020, Pages 101-109]
-
Almotairy, Bodor
Identifying Entrepreneurial Influencers on Twitter [Volume 12, Issue 3, 2020, Pages 59-72]
-
Alqassem, Lina
Anomaly-Based Network Intrusion Detection Using Bidirectional Long Short Term Memory and Convolutional Neural Network [Volume 12, Issue 3, 2020, Pages 37-44]
-
Al-Turaiki, Isra
CEMD: A Cluster-based Ensemble Motif Discovery Tool [Volume 12, Issue 3, 2020, Pages 29-36]
-
Al-Turaiki, Isra
Anomaly-Based Network Intrusion Detection Using Bidirectional Long Short Term Memory and Convolutional Neural Network [Volume 12, Issue 3, 2020, Pages 37-44]
-
Altwaijry, Najwa
CEMD: A Cluster-based Ensemble Motif Discovery Tool [Volume 12, Issue 3, 2020, Pages 29-36]
-
Altwaijry, Najwa
Anomaly-Based Network Intrusion Detection Using Bidirectional Long Short Term Memory and Convolutional Neural Network [Volume 12, Issue 3, 2020, Pages 37-44]
-
A. Mohammed Ali, Salim
Suspended Stripline Low-pass Filter Design for Wide Stopband Attenuation Applications [Volume 12, Issue 3, 2020, Pages 7-12]
-
Aref, Mohammad Reza
Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants [Volume 12, Issue 1, 2020, Pages 13-23]
-
Ashouri-Talouki, Maede
Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems [Volume 12, Issue 2, 2020, Pages 129-140]
-
A. Taha, Ashraf
Modeling a Cloud-Based Smart Parking WLAN Networks Using IEEE802.11AC Technology [Volume 12, Issue 3, 2020, Pages 101-109]
B
-
Bagheri, Nasour
Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants [Volume 12, Issue 1, 2020, Pages 13-23]
-
Bagheri, Nasour
CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking [Volume 12, Issue 2, 2020, Pages 67-80]
-
Bagherpour, Bagher
A Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions [Volume 12, Issue 2, 2020, Pages 91-99]
-
Bassiri, Mustapha
The Establishment of a Distance Training Device within the Regional Center of the Taza Education and Training: Administrative Cycle Case [Volume 12, Issue 3, 2020, Pages 87-93]
-
Belaaouad, Said
The Establishment of a Distance Training Device within the Regional Center of the Taza Education and Training: Administrative Cycle Case [Volume 12, Issue 3, 2020, Pages 87-93]
-
Belaaouad, Said
The Establishment of a Distance Training Device within the Regional Center of the Taza Education and Training: Administrative Cycle Case [Volume 12, Issue 3, 2020, Pages 87-93]
D
-
D. R. Assis, Karcius
A New Derivation of the Leftover Hash Lemma [Volume 12, Issue 3, 2020, Pages 55-58]
E
-
Esaid, Abdllkader
A Hybrid Encryption Algorithm for Mitigating the Effects of Attacks in Ad Hoc Networks [Volume 12, Issue 3, 2020, Pages 19-27]
-
Eskandari, Zahra
Extension of Cube Attack with Probabilistic Equations and its Application on Cryptanalysis of KATAN Cipher [Volume 12, Issue 1, 2020, Pages 1-12]
G
-
Ghaemi Bafghi, Abbas
Extension of Cube Attack with Probabilistic Equations and its Application on Cryptanalysis of KATAN Cipher [Volume 12, Issue 1, 2020, Pages 1-12]
H
-
Hachem, Elkaber
The Use of Local Sensitive Hashing for E-learner Face Identification [Volume 12, Issue 3, 2020, Pages 1-5]
-
H. Alaoui, Hachem
The Use of Local Sensitive Hashing for E-learner Face Identification [Volume 12, Issue 3, 2020, Pages 1-5]
-
Hasan, Sami
Suspended Stripline Low-pass Filter Design for Wide Stopband Attenuation Applications [Volume 12, Issue 3, 2020, Pages 7-12]
-
Hasan, Sami
Indexed View Technique to Speed-up Data Warehouse Query Processing [Volume 12, Issue 3, 2020, Pages 81-85]
J
-
Jahanbani, Mohsen
CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking [Volume 12, Issue 2, 2020, Pages 67-80]
-
J.F. Alenazi, Mohammed
Modeling a Cloud-Based Smart Parking WLAN Networks Using IEEE802.11AC Technology [Volume 12, Issue 3, 2020, Pages 101-109]
K
-
K. Almazmomi, Najah
Knowledge Discovery in Cloud-Computing Environment and the Challenges [Volume 12, Issue 3, 2020, Pages 95-99]
-
Karim, Mohammed
The Use of Local Sensitive Hashing for E-learner Face Identification [Volume 12, Issue 3, 2020, Pages 1-5]
-
Kheiri, Hossein
Modified Sliding-Mode Control Method for Synchronization a Class of Chaotic Fractional-Order Systems with Application in Encryption [Volume 12, Issue 1, 2020, Pages 55-66]
L
-
Lamniai, Imad
The Establishment of a Distance Training Device within the Regional Center of the Taza Education and Training: Administrative Cycle Case [Volume 12, Issue 3, 2020, Pages 87-93]
M
-
Mahmoudzadeh Niknam, Majid
Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants [Volume 12, Issue 1, 2020, Pages 13-23]
-
M. Al-Kadhimi, Aymen
Suspended Stripline Low-pass Filter Design for Wide Stopband Attenuation Applications [Volume 12, Issue 3, 2020, Pages 7-12]
-
Mazouak, Abderrazak
The Establishment of a Distance Training Device within the Regional Center of the Taza Education and Training: Administrative Cycle Case [Volume 12, Issue 3, 2020, Pages 87-93]
-
M. J. Al Taleb, Talib
Indexed View Technique to Speed-up Data Warehouse Query Processing [Volume 12, Issue 3, 2020, Pages 81-85]
-
Modiri, Mohammad Mahdi
GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication [Volume 12, Issue 2, 2020, Pages 101-111]
-
Mohajeri, Javad
GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication [Volume 12, Issue 2, 2020, Pages 101-111]
-
Mohammadi, Shahriar
Anomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism [Volume 12, Issue 1, 2020, Pages 44-54]
-
Mollamotalebi, Mahdi
F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management [Volume 12, Issue 2, 2020, Pages 113-128]
-
Monqith, Mais
Evaluation of a Wireless ZigBee with PID Controller for Networked Control System Using True Time Toolbox [Volume 12, Issue 3, 2020, Pages 13-17]
-
Mortazavi, Reza
Improved Univariate Microaggregation for Integer Values [Volume 12, Issue 1, 2020, Pages 35-43]
N
-
Naderi, Bashir
Modified Sliding-Mode Control Method for Synchronization a Class of Chaotic Fractional-Order Systems with Application in Encryption [Volume 12, Issue 1, 2020, Pages 55-66]
-
Namadchian, Amin
Anomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism [Volume 12, Issue 1, 2020, Pages 44-54]
-
Nooribakhsh, Mahsa
F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management [Volume 12, Issue 2, 2020, Pages 113-128]
-
Norozi, Zynolabedin
CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking [Volume 12, Issue 2, 2020, Pages 67-80]
S
-
Sabeti, Vajiheh
New High Secure Network Steganography Method Based on Packet Length [Volume 12, Issue 1, 2020, Pages 24-44]
-
Sadeghi, Sadegh
Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants [Volume 12, Issue 1, 2020, Pages 13-23]
-
S. Alencar, Marcelo
A New Derivation of the Leftover Hash Lemma [Volume 12, Issue 3, 2020, Pages 55-58]
-
Salmasizadeh, Mahmoud
GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication [Volume 12, Issue 2, 2020, Pages 101-111]
-
Seddigh, Milad
Enhanced Flush+Reload Attack on AES [Volume 12, Issue 2, 2020, Pages 81-89]
-
Shoaei, Minoo
New High Secure Network Steganography Method Based on Packet Length [Volume 12, Issue 1, 2020, Pages 24-44]
-
Siavashi, Mohammad
Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems [Volume 12, Issue 2, 2020, Pages 129-140]
-
S. Jumaa, Shereen
Fuzzy Histogram Equalization and Computer Vision Automated Identification of Microcalcifications in Breast Cancer [Volume 12, Issue 3, 2020, Pages 73-79]
-
Soleimany, Hadi
Enhanced Flush+Reload Attack on AES [Volume 12, Issue 2, 2020, Pages 81-89]
T
-
Tahboush, Muhannad
A Hybrid Encryption Algorithm for Mitigating the Effects of Attacks in Ad Hoc Networks [Volume 12, Issue 3, 2020, Pages 19-27]
-
Tridane, Malika
The Establishment of a Distance Training Device within the Regional Center of the Taza Education and Training: Administrative Cycle Case [Volume 12, Issue 3, 2020, Pages 87-93]
V
-
Vafaei, Vajiheh
Modified Sliding-Mode Control Method for Synchronization a Class of Chaotic Fractional-Order Systems with Application in Encryption [Volume 12, Issue 1, 2020, Pages 55-66]
Y
-
Yousif Mahdi, Yaqoob
Indexed View Technique to Speed-up Data Warehouse Query Processing [Volume 12, Issue 3, 2020, Pages 81-85]
Z
-
Zaghian, Ali
A Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions [Volume 12, Issue 2, 2020, Pages 91-99]
-
Zarezadeh, Maryam
Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems [Volume 12, Issue 2, 2020, Pages 129-140]
-
Ziti, Cherif
The Use of Local Sensitive Hashing for E-learner Face Identification [Volume 12, Issue 3, 2020, Pages 1-5]