A

  • A. Hammoudeh, Mohammad Ali Secure Coding Guidelines — Python [Volume 13, Issue 3, 2021, Pages 31-38]

  • Alabdali, Ruyuf Broken Authentication and Session Management Vulnerabilities [Volume 13, Issue 3, 2021, Pages 11-19]

  • Alajlan, Norah Data Enhancement for Date Fruit Classification Using DCGAN [Volume 13, Issue 3, 2021, Pages 39-48]

  • Alawad, Wedad Forensic-Enabled Security as a Service (FESaaS) - A Readiness Framework for Cloud Forensics [Volume 13, Issue 3, 2021, Pages 49-57]

  • Alghasham, Noorah Data Enhancement for Date Fruit Classification Using DCGAN [Volume 13, Issue 3, 2021, Pages 39-48]

  • Alghufaili, Lujain Cross Site Scripting Attack Review [Volume 13, Issue 3, 2021, Pages 21-30]

  • Alhumidan, Ragad Secure Coding Guidelines — Python [Volume 13, Issue 3, 2021, Pages 31-38]

  • Aljoaey, Hanan Broken Authentication and Session Management Vulnerabilities [Volume 13, Issue 3, 2021, Pages 11-19]

  • Almutawa, Khawla Broken Authentication and Session Management Vulnerabilities [Volume 13, Issue 3, 2021, Pages 11-19]

  • Alnomise, Manar Secure Coding Guidelines — Python [Volume 13, Issue 3, 2021, Pages 31-38]

  • Alotaibi, Afnan Cross Site Scripting Attack Review [Volume 13, Issue 3, 2021, Pages 21-30]

  • Alqwifli, Hutaf A Review Study on SQL Injection Attacks, Prevention, and Detection [Volume 13, Issue 3, 2021, Pages 1-10]

  • Alsalamah, Mona A Review Study on SQL Injection Attacks, Prevention, and Detection [Volume 13, Issue 3, 2021, Pages 1-10]

  • Alshraryan, Lama Secure Coding Guidelines — Python [Volume 13, Issue 3, 2021, Pages 31-38]

  • Alwabli, Huda A Review Study on SQL Injection Attacks, Prevention, and Detection [Volume 13, Issue 3, 2021, Pages 1-10]

  • Alyahya, Meshael Data Enhancement for Date Fruit Classification Using DCGAN [Volume 13, Issue 3, 2021, Pages 39-48]

  • Aqel, Musbah Human Activity Recognition Based on Multi-Sensors in a Smart Home Using Deep Learning [Volume 13, Issue 3, 2021, Pages 69-78]

B

  • Bagherdaei, Arash IDOT: Black-Box Detection of Access Control Violations in Web Applications [Volume 13, Issue 2, 2021, Pages 117-129]

  • Balobaid, Awatef Forensic-Enabled Security as a Service (FESaaS) - A Readiness Framework for Cloud Forensics [Volume 13, Issue 3, 2021, Pages 49-57]

  • Bayat, Majid Privacy Preserving Attribute-Based Encryption with Conjunctive Keyword Search for E-health Records in Cloud [Volume 13, Issue 2, 2021, Pages 87-100]

  • Bayat Sarmadi, Siavash A Trusted Design Platform for Trojan Detection in FPGA Bitstreams Using Partial Reconfiguration [Volume 13, Issue 1, 2021, Pages 29-45]

  • Bel, K. Nalini Sujantha OT-Feature Extraction on Scrambled Images with Instantaneous Clustering for CBIR Scheme in Cloud Computing [Volume 13, Issue 1, 2021, Pages 1-17]

C

  • Chegeni, Vahid Providing a Hybrid Cryptography Algorithm for Lightweight Authentication Protocol in RFID with Urban Traffic Usage Case [Volume 13, Issue 1, 2021, Pages 73-85]

E

  • Erfan, Mina File Fragment Type Classification by Bag-Of-Visual-Words [Volume 13, Issue 2, 2021, Pages 101-116]

  • Eslami, Ziba Blind Multipurpose Image Watermarking with Perfect Security [Volume 13, Issue 2, 2021, Pages 145-156]

  • Etemadi Borujeni, Shahram Hardware Trojan Prevention and Detection by Filling Unused Space Using Shift registers, Gate-chain and Extra Routing [Volume 13, Issue 1, 2021, Pages 47-57]

  • Etemadi Borujeni, Shahram An Obfuscation Method Based on CFGLUTs for Security of FPGAs [Volume 13, Issue 2, 2021, Pages 157-162]

G

  • Ghasemi, Simin IDOT: Black-Box Detection of Access Control Violations in Web Applications [Volume 13, Issue 2, 2021, Pages 117-129]

H

  • Hadavi, Mohammad Ali IDOT: Black-Box Detection of Access Control Violations in Web Applications [Volume 13, Issue 2, 2021, Pages 117-129]

  • Haj Seyyed Javadi, Hamid Providing a Hybrid Cryptography Algorithm for Lightweight Authentication Protocol in RFID with Urban Traffic Usage Case [Volume 13, Issue 1, 2021, Pages 73-85]

  • Haj Seyyed Javadi, Hamid Privacy Preserving Attribute-Based Encryption with Conjunctive Keyword Search for E-health Records in Cloud [Volume 13, Issue 2, 2021, Pages 87-100]

  • Hasan, Hayyan Curious-Monkey: Evolved Monkey for Triggering Malicious Payloads in Android Malware [Volume 13, Issue 2, 2021, Pages 131-143]

I

  • Ibrahim, Renad Secure Coding Guidelines — Python [Volume 13, Issue 3, 2021, Pages 31-38]

J

  • Jahanian, Ali Intensive Analysis of Physical Parameters of Power Sensors for Remote Side-Channel Attacks [Volume 13, Issue 2, 2021, Pages 163-176]

  • Jalili, Saeed File Fragment Type Classification by Bag-Of-Visual-Words [Volume 13, Issue 2, 2021, Pages 101-116]

  • James, Salome An Efficient Pairing-Free Identity Based Proxy Blind Signature Scheme with Message Recovery [Volume 13, Issue 1, 2021, Pages 59-72]

L

  • Labafniya, Mansoureh An Obfuscation Method Based on CFGLUTs for Security of FPGAs [Volume 13, Issue 2, 2021, Pages 157-162]

  • Labbafniya, Mansoureh Hardware Trojan Prevention and Detection by Filling Unused Space Using Shift registers, Gate-chain and Extra Routing [Volume 13, Issue 1, 2021, Pages 47-57]

M

  • Meraji, Vahid Evict+Time Attack on Intel CPUs without Explicit Knowledge of Address Offsets [Volume 13, Issue 1, 2021, Pages 19-27]

  • M. Ibrahim, Dina A Review Study on SQL Injection Attacks, Prevention, and Detection [Volume 13, Issue 3, 2021, Pages 1-10]

  • M. Ibrahim, Dina Data Enhancement for Date Fruit Classification Using DCGAN [Volume 13, Issue 3, 2021, Pages 39-48]

  • M. Ibrahim, Dina Open Web Application Security Project Components with Known Vulnerabilities: A Comprehensive Study [Volume 13, Issue 3, 2021, Pages 59-67]

  • M.Ibrahim, Dina Broken Authentication and Session Management Vulnerabilities [Volume 13, Issue 3, 2021, Pages 11-19]

  • M.Ibrahim, Dina Cross Site Scripting Attack Review [Volume 13, Issue 3, 2021, Pages 21-30]

  • Moazami Goudarzi, Mohammad Reza Providing a Hybrid Cryptography Algorithm for Lightweight Authentication Protocol in RFID with Urban Traffic Usage Case [Volume 13, Issue 1, 2021, Pages 73-85]

  • Moghissi, Gholam Reza Better Sampling Method of Enumeration Solution for BKZ-Simulation [Volume 13, Issue 2, 2021, Pages 177-208]

  • Mosanaei Boorani, hatameh A Trusted Design Platform for Trojan Detection in FPGA Bitstreams Using Partial Reconfiguration [Volume 13, Issue 1, 2021, Pages 29-45]

N

  • Najafi, Aniseh Privacy Preserving Attribute-Based Encryption with Conjunctive Keyword Search for E-health Records in Cloud [Volume 13, Issue 2, 2021, Pages 87-100]

P

  • Payandeh, Ali Better Sampling Method of Enumeration Solution for BKZ-Simulation [Volume 13, Issue 2, 2021, Pages 177-208]

R

  • Reddy, P.Vasudeva An Efficient Pairing-Free Identity Based Proxy Blind Signature Scheme with Message Recovery [Volume 13, Issue 1, 2021, Pages 59-72]

  • Rezakhani, Afshin Providing a Hybrid Cryptography Algorithm for Lightweight Authentication Protocol in RFID with Urban Traffic Usage Case [Volume 13, Issue 1, 2021, Pages 73-85]

S

  • Saeidi, Roghaye Hardware Trojan Prevention and Detection by Filling Unused Space Using Shift registers, Gate-chain and Extra Routing [Volume 13, Issue 1, 2021, Pages 47-57]

  • S. Albulayhi, Mohammed Open Web Application Security Project Components with Known Vulnerabilities: A Comprehensive Study [Volume 13, Issue 3, 2021, Pages 59-67]

  • Salimian, Milad Intensive Analysis of Physical Parameters of Power Sensors for Remote Side-Channel Attacks [Volume 13, Issue 2, 2021, Pages 163-176]

  • Sam, I.Shatheesh OT-Feature Extraction on Scrambled Images with Instantaneous Clustering for CBIR Scheme in Cloud Computing [Volume 13, Issue 1, 2021, Pages 1-17]

  • Sheidani, Sorour Blind Multipurpose Image Watermarking with Perfect Security [Volume 13, Issue 2, 2021, Pages 145-156]

  • Shekofte, Nastaran A Trusted Design Platform for Trojan Detection in FPGA Bitstreams Using Partial Reconfiguration [Volume 13, Issue 1, 2021, Pages 29-45]

  • Sokiyna, Munsif Human Activity Recognition Based on Multi-Sensors in a Smart Home Using Deep Learning [Volume 13, Issue 3, 2021, Pages 69-78]

  • Soleimany, Hadi Evict+Time Attack on Intel CPUs without Explicit Knowledge of Address Offsets [Volume 13, Issue 1, 2021, Pages 19-27]

T

  • Thumbur, Gowri An Efficient Pairing-Free Identity Based Proxy Blind Signature Scheme with Message Recovery [Volume 13, Issue 1, 2021, Pages 59-72]

  • Tork Ladani, Behrouz Curious-Monkey: Evolved Monkey for Triggering Malicious Payloads in Android Malware [Volume 13, Issue 2, 2021, Pages 131-143]

Z

  • Zamani, Bahman Curious-Monkey: Evolved Monkey for Triggering Malicious Payloads in Android Malware [Volume 13, Issue 2, 2021, Pages 131-143]