A
-
A. Hammoudeh, Mohammad Ali
Secure Coding Guidelines — Python [Volume 13, Issue 3, 2021, Pages 31-38]
-
Alabdali, Ruyuf
Broken Authentication and Session Management Vulnerabilities [Volume 13, Issue 3, 2021, Pages 11-19]
-
Alajlan, Norah
Data Enhancement for Date Fruit Classification Using DCGAN [Volume 13, Issue 3, 2021, Pages 39-48]
-
Alawad, Wedad
Forensic-Enabled Security as a Service (FESaaS) - A Readiness Framework for Cloud Forensics [Volume 13, Issue 3, 2021, Pages 49-57]
-
Alghasham, Noorah
Data Enhancement for Date Fruit Classification Using DCGAN [Volume 13, Issue 3, 2021, Pages 39-48]
-
Alghufaili, Lujain
Cross Site Scripting Attack Review [Volume 13, Issue 3, 2021, Pages 21-30]
-
Alhumidan, Ragad
Secure Coding Guidelines — Python [Volume 13, Issue 3, 2021, Pages 31-38]
-
Aljoaey, Hanan
Broken Authentication and Session Management Vulnerabilities [Volume 13, Issue 3, 2021, Pages 11-19]
-
Almutawa, Khawla
Broken Authentication and Session Management Vulnerabilities [Volume 13, Issue 3, 2021, Pages 11-19]
-
Alnomise, Manar
Secure Coding Guidelines — Python [Volume 13, Issue 3, 2021, Pages 31-38]
-
Alotaibi, Afnan
Cross Site Scripting Attack Review [Volume 13, Issue 3, 2021, Pages 21-30]
-
Alqwifli, Hutaf
A Review Study on SQL Injection Attacks, Prevention, and Detection [Volume 13, Issue 3, 2021, Pages 1-10]
-
Alsalamah, Mona
A Review Study on SQL Injection Attacks, Prevention, and Detection [Volume 13, Issue 3, 2021, Pages 1-10]
-
Alshraryan, Lama
Secure Coding Guidelines — Python [Volume 13, Issue 3, 2021, Pages 31-38]
-
Alwabli, Huda
A Review Study on SQL Injection Attacks, Prevention, and Detection [Volume 13, Issue 3, 2021, Pages 1-10]
-
Alyahya, Meshael
Data Enhancement for Date Fruit Classification Using DCGAN [Volume 13, Issue 3, 2021, Pages 39-48]
-
Aqel, Musbah
Human Activity Recognition Based on Multi-Sensors in a Smart Home Using Deep Learning [Volume 13, Issue 3, 2021, Pages 69-78]
B
-
Bagherdaei, Arash
IDOT: Black-Box Detection of Access Control Violations in Web Applications [Volume 13, Issue 2, 2021, Pages 117-129]
-
Balobaid, Awatef
Forensic-Enabled Security as a Service (FESaaS) - A Readiness Framework for Cloud Forensics [Volume 13, Issue 3, 2021, Pages 49-57]
-
Bayat, Majid
Privacy Preserving Attribute-Based Encryption with Conjunctive Keyword Search for E-health Records in Cloud [Volume 13, Issue 2, 2021, Pages 87-100]
-
Bayat Sarmadi, Siavash
A Trusted Design Platform for Trojan Detection in FPGA Bitstreams Using Partial Reconfiguration [Volume 13, Issue 1, 2021, Pages 29-45]
-
Bel, K. Nalini Sujantha
OT-Feature Extraction on Scrambled Images with Instantaneous Clustering for CBIR Scheme in Cloud Computing [Volume 13, Issue 1, 2021, Pages 1-17]
C
-
Chegeni, Vahid
Providing a Hybrid Cryptography Algorithm for Lightweight Authentication Protocol in RFID with Urban Traffic Usage Case [Volume 13, Issue 1, 2021, Pages 73-85]
E
-
Erfan, Mina
File Fragment Type Classification by Bag-Of-Visual-Words [Volume 13, Issue 2, 2021, Pages 101-116]
-
Eslami, Ziba
Blind Multipurpose Image Watermarking with Perfect Security [Volume 13, Issue 2, 2021, Pages 145-156]
-
Etemadi Borujeni, Shahram
Hardware Trojan Prevention and Detection by Filling Unused Space Using Shift registers, Gate-chain and Extra Routing [Volume 13, Issue 1, 2021, Pages 47-57]
-
Etemadi Borujeni, Shahram
An Obfuscation Method Based on CFGLUTs for Security of FPGAs [Volume 13, Issue 2, 2021, Pages 157-162]
G
-
Ghasemi, Simin
IDOT: Black-Box Detection of Access Control Violations in Web Applications [Volume 13, Issue 2, 2021, Pages 117-129]
H
-
Hadavi, Mohammad Ali
IDOT: Black-Box Detection of Access Control Violations in Web Applications [Volume 13, Issue 2, 2021, Pages 117-129]
-
Haj Seyyed Javadi, Hamid
Providing a Hybrid Cryptography Algorithm for Lightweight Authentication Protocol in RFID with Urban Traffic Usage Case [Volume 13, Issue 1, 2021, Pages 73-85]
-
Haj Seyyed Javadi, Hamid
Privacy Preserving Attribute-Based Encryption with Conjunctive Keyword Search for E-health Records in Cloud [Volume 13, Issue 2, 2021, Pages 87-100]
-
Hasan, Hayyan
Curious-Monkey: Evolved Monkey for Triggering Malicious Payloads in Android Malware [Volume 13, Issue 2, 2021, Pages 131-143]
I
-
Ibrahim, Renad
Secure Coding Guidelines — Python [Volume 13, Issue 3, 2021, Pages 31-38]
J
-
Jahanian, Ali
Intensive Analysis of Physical Parameters of Power Sensors for Remote Side-Channel Attacks [Volume 13, Issue 2, 2021, Pages 163-176]
-
Jalili, Saeed
File Fragment Type Classification by Bag-Of-Visual-Words [Volume 13, Issue 2, 2021, Pages 101-116]
-
James, Salome
An Efficient Pairing-Free Identity Based Proxy Blind Signature Scheme with Message Recovery [Volume 13, Issue 1, 2021, Pages 59-72]
L
-
Labafniya, Mansoureh
An Obfuscation Method Based on CFGLUTs for Security of FPGAs [Volume 13, Issue 2, 2021, Pages 157-162]
-
Labbafniya, Mansoureh
Hardware Trojan Prevention and Detection by Filling Unused Space Using Shift registers, Gate-chain and Extra Routing [Volume 13, Issue 1, 2021, Pages 47-57]
M
-
Meraji, Vahid
Evict+Time Attack on Intel CPUs without Explicit Knowledge of Address Offsets [Volume 13, Issue 1, 2021, Pages 19-27]
-
M. Ibrahim, Dina
A Review Study on SQL Injection Attacks, Prevention, and Detection [Volume 13, Issue 3, 2021, Pages 1-10]
-
M. Ibrahim, Dina
Data Enhancement for Date Fruit Classification Using DCGAN [Volume 13, Issue 3, 2021, Pages 39-48]
-
M. Ibrahim, Dina
Open Web Application Security Project Components with Known Vulnerabilities: A Comprehensive Study [Volume 13, Issue 3, 2021, Pages 59-67]
-
M.Ibrahim, Dina
Broken Authentication and Session Management Vulnerabilities [Volume 13, Issue 3, 2021, Pages 11-19]
-
M.Ibrahim, Dina
Cross Site Scripting Attack Review [Volume 13, Issue 3, 2021, Pages 21-30]
-
Moazami Goudarzi, Mohammad Reza
Providing a Hybrid Cryptography Algorithm for Lightweight Authentication Protocol in RFID with Urban Traffic Usage Case [Volume 13, Issue 1, 2021, Pages 73-85]
-
Moghissi, Gholam Reza
Better Sampling Method of Enumeration Solution for BKZ-Simulation [Volume 13, Issue 2, 2021, Pages 177-208]
-
Mosanaei Boorani, hatameh
A Trusted Design Platform for Trojan Detection in FPGA Bitstreams Using Partial Reconfiguration [Volume 13, Issue 1, 2021, Pages 29-45]
N
-
Najafi, Aniseh
Privacy Preserving Attribute-Based Encryption with Conjunctive Keyword Search for E-health Records in Cloud [Volume 13, Issue 2, 2021, Pages 87-100]
P
-
Payandeh, Ali
Better Sampling Method of Enumeration Solution for BKZ-Simulation [Volume 13, Issue 2, 2021, Pages 177-208]
R
-
Reddy, P.Vasudeva
An Efficient Pairing-Free Identity Based Proxy Blind Signature Scheme with Message Recovery [Volume 13, Issue 1, 2021, Pages 59-72]
-
Rezakhani, Afshin
Providing a Hybrid Cryptography Algorithm for Lightweight Authentication Protocol in RFID with Urban Traffic Usage Case [Volume 13, Issue 1, 2021, Pages 73-85]
S
-
Saeidi, Roghaye
Hardware Trojan Prevention and Detection by Filling Unused Space Using Shift registers, Gate-chain and Extra Routing [Volume 13, Issue 1, 2021, Pages 47-57]
-
S. Albulayhi, Mohammed
Open Web Application Security Project Components with Known Vulnerabilities: A Comprehensive Study [Volume 13, Issue 3, 2021, Pages 59-67]
-
Salimian, Milad
Intensive Analysis of Physical Parameters of Power Sensors for Remote Side-Channel Attacks [Volume 13, Issue 2, 2021, Pages 163-176]
-
Sam, I.Shatheesh
OT-Feature Extraction on Scrambled Images with Instantaneous Clustering for CBIR Scheme in Cloud Computing [Volume 13, Issue 1, 2021, Pages 1-17]
-
Sheidani, Sorour
Blind Multipurpose Image Watermarking with Perfect Security [Volume 13, Issue 2, 2021, Pages 145-156]
-
Shekofte, Nastaran
A Trusted Design Platform for Trojan Detection in FPGA Bitstreams Using Partial Reconfiguration [Volume 13, Issue 1, 2021, Pages 29-45]
-
Sokiyna, Munsif
Human Activity Recognition Based on Multi-Sensors in a Smart Home Using Deep Learning [Volume 13, Issue 3, 2021, Pages 69-78]
-
Soleimany, Hadi
Evict+Time Attack on Intel CPUs without Explicit Knowledge of Address Offsets [Volume 13, Issue 1, 2021, Pages 19-27]
T
-
Thumbur, Gowri
An Efficient Pairing-Free Identity Based Proxy Blind Signature Scheme with Message Recovery [Volume 13, Issue 1, 2021, Pages 59-72]
-
Tork Ladani, Behrouz
Curious-Monkey: Evolved Monkey for Triggering Malicious Payloads in Android Malware [Volume 13, Issue 2, 2021, Pages 131-143]
Z
-
Zamani, Bahman
Curious-Monkey: Evolved Monkey for Triggering Malicious Payloads in Android Malware [Volume 13, Issue 2, 2021, Pages 131-143]