Hakimi, A.
A chaos-based video watermarking algorithm [Volume 4, Issue 1, 2012, Pages 77-86]
Harati, A.
SEIMCHA: a new semantic image CAPTCHA using geometric transformations [Volume 4, Issue 1, 2012, Pages 63-76]
Hashemi, M. R.
Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach [Volume 4, Issue 2, 2012, Pages 125-136]
Hooshmand, R.
Improving the Rao-Nam secret key cryptosystem using regular EDF-QC-LDPC codes [Volume 4, Issue 1, 2012, Pages 3-14]
J
Jalili, R.
Editorial [Volume 4, Issue 1, 2012, Pages 1-2]
Jalili, R.
Editorial [Volume 4, Issue 2, 2012, Pages 95-96]
M
Mabuto, E. K.
Analyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications [Volume 4, Issue 2, 2012, Pages 137-150]
Mehrnejad, M.
SEIMCHA: a new semantic image CAPTCHA using geometric transformations [Volume 4, Issue 1, 2012, Pages 63-76]
Mohajeri, J.
Cryptanalysis of GSM encryption algorithm A5/1 [Volume 4, Issue 2, 2012, Pages 107-114]
Mohajeri, J.
On the multi _ chi-square tests and their data complexity [Volume 4, Issue 1, 2012, Pages 15-24]
Mohammadi, S.
A chaos-based video watermarking algorithm [Volume 4, Issue 1, 2012, Pages 77-86]
Mozaffari, S.
Improving security of double random phase encoding with chaos theory using fractal images [Volume 4, Issue 2, 2012, Pages 115-124]
N
Nemati, H.
Private Key based query on encrypted data [Volume 4, Issue 1, 2012, Pages 41-50]
S
Saidi, H.
Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach [Volume 4, Issue 2, 2012, Pages 125-136]
Salmasizadeh, M.
On the multi _ chi-square tests and their data complexity [Volume 4, Issue 1, 2012, Pages 15-24]
Shakeri, H.
A confidence-aware interval-based trust model [Volume 4, Issue 2, 2012, Pages 151-165]
T
Taheri, M.
Improving security of double random phase encoding with chaos theory using fractal images [Volume 4, Issue 2, 2012, Pages 115-124]
Toreini, E.
SEIMCHA: a new semantic image CAPTCHA using geometric transformations [Volume 4, Issue 1, 2012, Pages 63-76]
V
Vardasbi, A.
Cryptanalysis of GSM encryption algorithm A5/1 [Volume 4, Issue 2, 2012, Pages 107-114]
Vardasbi, A.
On the multi _ chi-square tests and their data complexity [Volume 4, Issue 1, 2012, Pages 15-24]
Venter, H. S.
Analyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications [Volume 4, Issue 2, 2012, Pages 137-150]
Y
Yahyazadeh, M.
BotOnus: an online unsupervised method for Botnet detection [Volume 4, Issue 1, 2012, Pages 51-62]
Z
Zali, Z.
Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach [Volume 4, Issue 2, 2012, Pages 125-136]