A

  • Abadi, M. BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms [Volume 4, Issue 1, 2012, Pages 25-39]

  • Abadi, M. BotOnus: an online unsupervised method for Botnet detection [Volume 4, Issue 1, 2012, Pages 51-62]

  • Afzali, H. Private Key based query on encrypted data [Volume 4, Issue 1, 2012, Pages 41-50]

  • Amin Ghafari, V. Cryptanalysis of GSM encryption algorithm A5/1 [Volume 4, Issue 2, 2012, Pages 107-114]

  • Aref, M. R. Eigenvalues-based LSB steganalysis [Volume 4, Issue 2, 2012, Pages 97-106]

  • Aref, M. R. Improving the Rao-Nam secret key cryptosystem using regular EDF-QC-LDPC codes [Volume 4, Issue 1, 2012, Pages 3-14]

  • Azmi, R. Private Key based query on encrypted data [Volume 4, Issue 1, 2012, Pages 41-50]

B

  • Barani, F. BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms [Volume 4, Issue 1, 2012, Pages 25-39]

D

  • Diyanat, A. Eigenvalues-based LSB steganalysis [Volume 4, Issue 2, 2012, Pages 97-106]

E

  • Eghlidos, T. Improving the Rao-Nam secret key cryptosystem using regular EDF-QC-LDPC codes [Volume 4, Issue 1, 2012, Pages 3-14]

F

  • Farhat, F. Eigenvalues-based LSB steganalysis [Volume 4, Issue 2, 2012, Pages 97-106]

G

  • Ghaemi Bafghi, A. A confidence-aware interval-based trust model [Volume 4, Issue 2, 2012, Pages 151-165]

  • Ghaemi Bafghi, A. SEIMCHA: a new semantic image CAPTCHA using geometric transformations [Volume 4, Issue 1, 2012, Pages 63-76]

  • Ghaemmaghami, Sh. Eigenvalues-based LSB steganalysis [Volume 4, Issue 2, 2012, Pages 97-106]

H

  • Hakimi, A. A Chaos-Based Video Watermarking Algorithm [Volume 4, Issue 1, 2012, Pages 77-86]

  • Harati, A. SEIMCHA: a new semantic image CAPTCHA using geometric transformations [Volume 4, Issue 1, 2012, Pages 63-76]

  • Hashemi, M. R. Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach [Volume 4, Issue 2, 2012, Pages 125-136]

  • Hooshmand, R. Improving the Rao-Nam secret key cryptosystem using regular EDF-QC-LDPC codes [Volume 4, Issue 1, 2012, Pages 3-14]

J

  • Jalili, R. Editorial [Volume 4, Issue 1, 2012, Pages 1-2]

  • Jalili, R. Editorial [Volume 4, Issue 2, 2012, Pages 95-96]

M

  • Mabuto, E. K. Analyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications [Volume 4, Issue 2, 2012, Pages 137-150]

  • Mehrnejad, M. SEIMCHA: a new semantic image CAPTCHA using geometric transformations [Volume 4, Issue 1, 2012, Pages 63-76]

  • Mohajeri, J. Cryptanalysis of GSM encryption algorithm A5/1 [Volume 4, Issue 2, 2012, Pages 107-114]

  • Mohajeri, J. On the multi _ chi-square tests and their data complexity [Volume 4, Issue 1, 2012, Pages 15-24]

  • Mohammadi, S. A Chaos-Based Video Watermarking Algorithm [Volume 4, Issue 1, 2012, Pages 77-86]

  • Mozaffari, S. Improving security of double random phase encoding with chaos theory using fractal images [Volume 4, Issue 2, 2012, Pages 115-124]

N

  • Nemati, H. Private Key based query on encrypted data [Volume 4, Issue 1, 2012, Pages 41-50]

S

  • Saidi, H. Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach [Volume 4, Issue 2, 2012, Pages 125-136]

  • Salmasizadeh, M. On the multi _ chi-square tests and their data complexity [Volume 4, Issue 1, 2012, Pages 15-24]

  • Shakeri, H. A confidence-aware interval-based trust model [Volume 4, Issue 2, 2012, Pages 151-165]

T

  • Taheri, M. Improving security of double random phase encoding with chaos theory using fractal images [Volume 4, Issue 2, 2012, Pages 115-124]

  • Toreini, E. SEIMCHA: a new semantic image CAPTCHA using geometric transformations [Volume 4, Issue 1, 2012, Pages 63-76]

V

  • Vardasbi, A. Cryptanalysis of GSM encryption algorithm A5/1 [Volume 4, Issue 2, 2012, Pages 107-114]

  • Vardasbi, A. On the multi _ chi-square tests and their data complexity [Volume 4, Issue 1, 2012, Pages 15-24]

  • Venter, H. S. Analyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications [Volume 4, Issue 2, 2012, Pages 137-150]

Y

  • Yahyazadeh, M. BotOnus: an online unsupervised method for Botnet detection [Volume 4, Issue 1, 2012, Pages 51-62]

Z

  • Zali, Z. Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach [Volume 4, Issue 2, 2012, Pages 125-136]