A

  • Abbas, Sagheer Evaluation of Planet Factors of Smart City through Multi-layer Fuzzy Logic (MFL) [Volume 11, Issue 3, 2019, Pages 51-58]

  • Abbas, Sagheer An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling [Volume 11, Issue 3, 2019, Pages 145-151]

  • Adnan Khan, Muhammad Evaluation of Planet Factors of Smart City through Multi-layer Fuzzy Logic (MFL) [Volume 11, Issue 3, 2019, Pages 51-58]

  • Adnan Khan, Muhammad An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling [Volume 11, Issue 3, 2019, Pages 145-151]

  • Ahmad, Gulzar Cloud and IoT based Smart Car Parking System by using Mamdani Fuzzy Inference System (MFIS) [Volume 11, Issue 3, 2019, Pages 153-160]

  • Ahmadi, Siavash Biclique Cryptanalysis of Block Ciphers LBlock and TWINE-80 with Practical Data Complexity [Volume 11, Issue 1, 2019, Pages 57-74]

  • Ahmadi, Siavash New Fixed Point Attacks on GOST2 Block Cipher [Volume 11, Issue 2, 2019, Pages 145-158]

  • Ahmadian, Zahra Biclique Cryptanalysis of Block Ciphers LBlock and TWINE-80 with Practical Data Complexity [Volume 11, Issue 1, 2019, Pages 57-74]

  • Akram, Ali An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling [Volume 11, Issue 3, 2019, Pages 145-151]

  • Alahmari, Saad Ali Using Machine Learning ARIMA to Predict the Price of Cryptocurrencies [Volume 11, Issue 3, 2019, Pages 139-144]

  • Aljedaibi, Wajdi Towards Measuring the Project Management Process During Large Scale Software System Implementation Phase [Volume 11, Issue 3, 2019, Pages 161-172]

  • Alpcan, Tansu Interdependent Security Game Design over Constrained Linear Influence Networks [Volume 11, Issue 2, 2019, Pages 95-111]

  • Alyas, Tahir Cloud and IoT based Smart Car Parking System by using Mamdani Fuzzy Inference System (MFIS) [Volume 11, Issue 3, 2019, Pages 153-160]

  • Amiri, Mohammad Amin Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives [Volume 11, Issue 1, 2019, Pages 35-46]

  • Anum, Leena Evaluation of Planet Factors of Smart City through Multi-layer Fuzzy Logic (MFL) [Volume 11, Issue 3, 2019, Pages 51-58]

  • Anum, Leena An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling [Volume 11, Issue 3, 2019, Pages 145-151]

  • Aqel, Musbah A Comparison Study between Intelligent Decision Support Systems and Decision Support Systems [Volume 11, Issue 3, 2019, Pages 187-194]

  • Aqel, Musbah The Impact of The Biometric System on Election Fraud Elimination: Case of The North of IRAQ [Volume 11, Issue 3, 2019, Pages 195-207]

  • Aref, Mohammad Reza Biclique Cryptanalysis of Block Ciphers LBlock and TWINE-80 with Practical Data Complexity [Volume 11, Issue 1, 2019, Pages 57-74]

  • Aref, Mohammad Reza Editorial [Volume 11, Issue 1, 2019, Pages 1-2]

  • Aref, Mohammad Reza New Fixed Point Attacks on GOST2 Block Cipher [Volume 11, Issue 2, 2019, Pages 145-158]

  • Aref, Mohammad Reza A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications [Volume 11, Issue 2, 2019, Pages 113-128]

  • Aref, Mohammad Reza Editorial [Volume 11, Issue 2, 2019, Pages 93-94]

  • Aref, Mohammad Reza Editorial [Volume 11, Issue 3, 2019]

  • Asenov, Ivaylo Access and Mobility Policy Control at the Network Edge [Volume 11, Issue 3, 2019, Pages 105-111]

  • Asif, Muhammad Evaluation of Planet Factors of Smart City through Multi-layer Fuzzy Logic (MFL) [Volume 11, Issue 3, 2019, Pages 51-58]

  • Asif, Muhammad Cloud and IoT based Smart Car Parking System by using Mamdani Fuzzy Inference System (MFIS) [Volume 11, Issue 3, 2019, Pages 153-160]

  • Atanasov, Ivaylo Access and Mobility Policy Control at the Network Edge [Volume 11, Issue 3, 2019, Pages 105-111]

  • Atia, Ayman Hand Gestures Classification with Multi-Core DTW [Volume 11, Issue 3, 2019, Pages 91-96]

B

  • Bagheri, Nasour Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives [Volume 11, Issue 1, 2019, Pages 35-46]

  • Bagheri, Nasour Relaxed Differential Fault Analysis of SHA-3 [Volume 11, Issue 2, 2019, Pages 129-143]

  • BaniMustafa, Ahmed Enhancing Learning from Imbalanced Classes via Data Preprocessing: A Data-Driven Application in Metabolomics Data Mining [Volume 11, Issue 3, 2019, Pages 79-89]

  • Bayat, Majid A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications [Volume 11, Issue 2, 2019, Pages 113-128]

  • Böhm, Markus Critical Success Factors for Data Virtualization: A Literature Review [Volume 11, Issue 3, 2019, Pages 131-137]

C

  • Córdova, Felisa Cognitive Strategic Model applied to a Port System [Volume 11, Issue 3, 2019, Pages 73-78]

D

  • Dahri, Kamran Aspect Oriented UML to ECORE Model Transformation [Volume 11, Issue 3, 2019, Pages 97-103]

  • Dehnavi, S. M. Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives [Volume 11, Issue 1, 2019, Pages 35-46]

  • Dousti, Mohammad Sadeq SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing [Volume 11, Issue 1, 2019, Pages 15-34]

  • D. R. Assis, Karcius A Fair Power Allocation for Non-Orthogonal Multiple Access in the Power Domain [Volume 11, Issue 3, 2019, Pages 123-130]

  • Durán, Claudia Cognitive Strategic Model applied to a Port System [Volume 11, Issue 3, 2019, Pages 73-78]

E

  • Ebrahimi Atani, Reza A New Ring-Based SPHF and PAKE Protocol On Ideal Lattices [Volume 11, Issue 1, 2019, Pages 75-86]

  • Ebrahimi Atani, Shahabaddin A New Ring-Based SPHF and PAKE Protocol On Ideal Lattices [Volume 11, Issue 1, 2019, Pages 75-86]

  • E. Cordeiro Junior, Joel A Fair Power Allocation for Non-Orthogonal Multiple Access in the Power Domain [Volume 11, Issue 3, 2019, Pages 123-130]

  • Elmahdy, Hesham Medical Image Compression Based on Region of Interest [Volume 11, Issue 3, 2019, Pages 29-34]

F

  • Farooq, Umer Cloud and IoT based Smart Car Parking System by using Mamdani Fuzzy Inference System (MFIS) [Volume 11, Issue 3, 2019, Pages 153-160]

  • Fatima, Areej Evaluation of Planet Factors of Smart City through Multi-layer Fuzzy Logic (MFL) [Volume 11, Issue 3, 2019, Pages 51-58]

  • Fatima, Areej An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling [Volume 11, Issue 3, 2019, Pages 145-151]

  • Flifel, Rawan The Role of Packet Tracer in Learning Wireless Networks and Managing IoT Devices [Volume 11, Issue 3, 2019, Pages 35-38]

  • Fuhrmann, Isabel Critical Success Factors for Data Virtualization: A Literature Review [Volume 11, Issue 3, 2019, Pages 131-137]

G

  • Gharaee Garakani, Hossein Anomaly Detection Using SVM as Classifier and Decision Tree for Optimizing Feature Vectors [Volume 11, Issue 2, 2019, Pages 159-171]

  • Ghareh Chamani, Javad SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing [Volume 11, Issue 1, 2019, Pages 15-34]

  • Ghasemi, Simin A Trust Based Probabilistic Method for Efficient Correctness Verification in Database Outsourcing [Volume 11, Issue 1, 2019, Pages 3-14]

  • Gottlieb, Matthias Critical Success Factors for Data Virtualization: A Literature Review [Volume 11, Issue 3, 2019, Pages 131-137]

H

  • Hadavi, Mohammad Ali A Trust Based Probabilistic Method for Efficient Correctness Verification in Database Outsourcing [Volume 11, Issue 1, 2019, Pages 3-14]

  • Hadjer, Saadi Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns [Volume 11, Issue 3, 2019, Pages 9-17]

  • H. Al-Hemiary, Emad IoT Protocols Based Fog/Cloud over High Traffic [Volume 11, Issue 3, 2019, Pages 173-180]

  • H. Al-Hemiary, Emad Virtualized Network Management Laboratory for Educational Purposes [Volume 11, Issue 3, 2019, Pages 181-186]

  • Hasheminasab, Seyed Alireza Interdependent Security Game Design over Constrained Linear Influence Networks [Volume 11, Issue 2, 2019, Pages 95-111]

  • Hassan, Zaira Aspect Oriented UML to ECORE Model Transformation [Volume 11, Issue 3, 2019, Pages 97-103]

  • Hassan Ahmed, Omed Face Recognition Based Rank Reduction SVD Approach [Volume 11, Issue 3, 2019, Pages 39-50]

  • Hassani Karbasi, Amir A New Ring-Based SPHF and PAKE Protocol On Ideal Lattices [Volume 11, Issue 1, 2019, Pages 75-86]

  • Hidouci, Walid Khaled Considering Uncertainty in Modeling Historical Knowledge [Volume 11, Issue 3, 2019, Pages 59-65]

  • Hosiny Nezhad, S.Ehsan Relaxed Differential Fault Analysis of SHA-3 [Volume 11, Issue 2, 2019, Pages 129-143]

  • Hryniuk, Yaroslav Algebraic Matching of Vulnerabilities in a Low-Level Code [Volume 11, Issue 3, 2019, Pages 1-7]

I

  • Ibrahim, Dina Proposed ST-Slotted-CS-ALOHA Protocol for Time Saving and Collision Avoidance [Volume 11, Issue 3, 2019, Pages 67-72]

  • Ibrahim, Soran A Sudy on Information Privacy Issue on Social Networks [Volume 11, Issue 3, 2019, Pages 19-27]

J

  • Jalili, Rasool SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing [Volume 11, Issue 1, 2019, Pages 15-34]

  • J.F. Alenazi, Mohammed Evaluating Multipath TCP Resilience against Link Failures [Volume 11, Issue 3, 2019, Pages 113-122]

K

  • Kanwal, Asma Cloud and IoT based Smart Car Parking System by using Mamdani Fuzzy Inference System (MFIS) [Volume 11, Issue 3, 2019, Pages 153-160]

  • Kaya, Tugberk The Impact of The Biometric System on Election Fraud Elimination: Case of The North of IRAQ [Volume 11, Issue 3, 2019, Pages 195-207]

  • Khamis, Sufian Towards Measuring the Project Management Process During Large Scale Software System Implementation Phase [Volume 11, Issue 3, 2019, Pages 161-172]

  • Khatter, Ehab Proposed ST-Slotted-CS-ALOHA Protocol for Time Saving and Collision Avoidance [Volume 11, Issue 3, 2019, Pages 67-72]

  • Krcmar, Helmut Critical Success Factors for Data Virtualization: A Literature Review [Volume 11, Issue 3, 2019, Pages 131-137]

  • Kumar Das, Ashok A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications [Volume 11, Issue 2, 2019, Pages 113-128]

  • Kumari, Saru A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications [Volume 11, Issue 2, 2019, Pages 113-128]

L

  • Labbafniya, Mansoureh Secure FPGA Design by Filling Unused Spaces [Volume 11, Issue 1, 2019, Pages 47-56]

  • L. Abdulsattar, Oula Virtualized Network Management Laboratory for Educational Purposes [Volume 11, Issue 3, 2019, Pages 181-186]

  • Letychevskyi, Oleksandr Algebraic Matching of Vulnerabilities in a Low-Level Code [Volume 11, Issue 3, 2019, Pages 1-7]

  • Lu, Joan Face Recognition Based Rank Reduction SVD Approach [Volume 11, Issue 3, 2019, Pages 39-50]

M

  • Madian, Ahmed Medical Image Compression Based on Region of Interest [Volume 11, Issue 3, 2019, Pages 29-34]

  • Mahmoodi Rishakani, Akbar Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives [Volume 11, Issue 1, 2019, Pages 35-46]

  • Maimani, Hamidreza Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives [Volume 11, Issue 1, 2019, Pages 35-46]

  • M. Al-Joboury, Istabraq IoT Protocols Based Fog/Cloud over High Traffic [Volume 11, Issue 3, 2019, Pages 173-180]

  • Memon, Muhammad Ali Aspect Oriented UML to ECORE Model Transformation [Volume 11, Issue 3, 2019, Pages 97-103]

  • Mirzaee Shamsabad, Mohammad Reza Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives [Volume 11, Issue 1, 2019, Pages 35-46]

  • Mohajeri, Javad Biclique Cryptanalysis of Block Ciphers LBlock and TWINE-80 with Practical Data Complexity [Volume 11, Issue 1, 2019, Pages 57-74]

  • Mohammadrezaei, Mohammad Reza Detection of Fake Accounts in Social Networks Based on One Class Classification [Volume 11, Issue 2, 2019, Pages 173-183]

  • Mohammadzadeh, Naser Anomaly Detection Using SVM as Classifier and Decision Tree for Optimizing Feature Vectors [Volume 11, Issue 2, 2019, Pages 159-171]

  • Mustapha C.E., Yagoub Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns [Volume 11, Issue 3, 2019, Pages 9-17]

N

  • Niknafs, Mina A Trust Based Probabilistic Method for Efficient Correctness Verification in Database Outsourcing [Volume 11, Issue 1, 2019, Pages 3-14]

  • Nizamani, Muhammad Ali Aspect Oriented UML to ECORE Model Transformation [Volume 11, Issue 3, 2019, Pages 97-103]

P

  • Palominos, Fredi Cognitive Strategic Model applied to a Port System [Volume 11, Issue 3, 2019, Pages 73-78]

  • Papadopoulos, Dimitrios SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing [Volume 11, Issue 1, 2019, Pages 15-34]

  • Pencheva, Evelina Access and Mobility Policy Control at the Network Edge [Volume 11, Issue 3, 2019, Pages 105-111]

  • Peschanenko, Volodymyr Algebraic Matching of Vulnerabilities in a Low-Level Code [Volume 11, Issue 3, 2019, Pages 1-7]

R

  • Radchenko, Viktor Algebraic Matching of Vulnerabilities in a Low-Level Code [Volume 11, Issue 3, 2019, Pages 1-7]

  • Rahmani, Amir Masoud Detection of Fake Accounts in Social Networks Based on One Class Classification [Volume 11, Issue 2, 2019, Pages 173-183]

S

  • Saad, Mohamed Medical Image Compression Based on Region of Interest [Volume 11, Issue 3, 2019, Pages 29-34]

  • Saeed, Anwar An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling [Volume 11, Issue 3, 2019, Pages 145-151]

  • Saeed, Yousaf Cloud and IoT based Smart Car Parking System by using Mamdani Fuzzy Inference System (MFIS) [Volume 11, Issue 3, 2019, Pages 153-160]

  • Saeed Ali, Twana The Impact of The Biometric System on Election Fraud Elimination: Case of The North of IRAQ [Volume 11, Issue 3, 2019, Pages 195-207]

  • Saeidi, Roghaye Secure FPGA Design by Filling Unused Spaces [Volume 11, Issue 1, 2019, Pages 47-56]

  • Safkhani, Masoumeh Relaxed Differential Fault Analysis of SHA-3 [Volume 11, Issue 2, 2019, Pages 129-143]

  • S. Alencar, Marcelo A Fair Power Allocation for Non-Orthogonal Multiple Access in the Power Domain [Volume 11, Issue 3, 2019, Pages 123-130]

  • Serkani, Elham Anomaly Detection Using SVM as Classifier and Decision Tree for Optimizing Feature Vectors [Volume 11, Issue 2, 2019, Pages 159-171]

  • Shaaban, Dalia Medical Image Compression Based on Region of Interest [Volume 11, Issue 3, 2019, Pages 29-34]

  • Shaban Al-Ani, Muzhir Face Recognition Based Rank Reduction SVD Approach [Volume 11, Issue 3, 2019, Pages 39-50]

  • Shaikh, Asadullah Aspect Oriented UML to ECORE Model Transformation [Volume 11, Issue 3, 2019, Pages 97-103]

  • Shiri, Mohammad Ebrahim Detection of Fake Accounts in Social Networks Based on One Class Classification [Volume 11, Issue 2, 2019, Pages 173-183]

  • Shorim, Nada Hand Gestures Classification with Multi-Core DTW [Volume 11, Issue 3, 2019, Pages 91-96]

  • Shraideh, Marwin Critical Success Factors for Data Virtualization: A Literature Review [Volume 11, Issue 3, 2019, Pages 131-137]

  • Singh, Pitam A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications [Volume 11, Issue 2, 2019, Pages 113-128]

T

  • Tan, Qing A Sudy on Information Privacy Issue on Social Networks [Volume 11, Issue 3, 2019, Pages 19-27]

  • Tork Ladani, Behrouz Interdependent Security Game Design over Constrained Linear Influence Networks [Volume 11, Issue 2, 2019, Pages 95-111]

  • TOUHAMI, Rachida Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns [Volume 11, Issue 3, 2019, Pages 9-17]

V

  • V. dos Santos Filho, José A Fair Power Allocation for Non-Orthogonal Multiple Access in the Power Domain [Volume 11, Issue 3, 2019, Pages 123-130]

W

  • Waqas, Muhammad Evaluation of Planet Factors of Smart City through Multi-layer Fuzzy Logic (MFL) [Volume 11, Issue 3, 2019, Pages 51-58]

X

  • Xu, Qiang Face Recognition Based Rank Reduction SVD Approach [Volume 11, Issue 3, 2019, Pages 39-50]

Y

  • Yakovlev, Viktor Algebraic Matching of Vulnerabilities in a Low-Level Code [Volume 11, Issue 3, 2019, Pages 1-7]

  • Yousif, Muhammad An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling [Volume 11, Issue 3, 2019, Pages 145-151]

Z

  • Zare Jousheghani, Zahra A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications [Volume 11, Issue 2, 2019, Pages 113-128]

  • Zeebaree, Mosleh A Comparison Study between Intelligent Decision Support Systems and Decision Support Systems [Volume 11, Issue 3, 2019, Pages 187-194]

  • Zendaoui, Fairouz Considering Uncertainty in Modeling Historical Knowledge [Volume 11, Issue 3, 2019, Pages 59-65]