A
-
Abadi, M.
BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms [Volume 4, Issue 1, 2012, Pages 25-39]
-
Abadi, M.
BotOnus: an online unsupervised method for Botnet detection [Volume 4, Issue 1, 2012, Pages 51-62]
-
Afzali, H.
Private Key based query on encrypted data [Volume 4, Issue 1, 2012, Pages 41-50]
-
Amin Ghafari, V.
Cryptanalysis of GSM encryption algorithm A5/1 [Volume 4, Issue 2, 2012, Pages 107-114]
-
Aref, M. R.
Eigenvalues-based LSB steganalysis [Volume 4, Issue 2, 2012, Pages 97-106]
-
Aref, M. R.
Improving the Rao-Nam secret key cryptosystem using regular EDF-QC-LDPC codes [Volume 4, Issue 1, 2012, Pages 3-14]
-
Azmi, R.
Private Key based query on encrypted data [Volume 4, Issue 1, 2012, Pages 41-50]
B
-
Barani, F.
BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms [Volume 4, Issue 1, 2012, Pages 25-39]
D
-
Diyanat, A.
Eigenvalues-based LSB steganalysis [Volume 4, Issue 2, 2012, Pages 97-106]
E
-
Eghlidos, T.
Improving the Rao-Nam secret key cryptosystem using regular EDF-QC-LDPC codes [Volume 4, Issue 1, 2012, Pages 3-14]
F
-
Farhat, F.
Eigenvalues-based LSB steganalysis [Volume 4, Issue 2, 2012, Pages 97-106]
G
-
Ghaemi Bafghi, A.
A confidence-aware interval-based trust model [Volume 4, Issue 2, 2012, Pages 151-165]
-
Ghaemi Bafghi, A.
SEIMCHA: a new semantic image CAPTCHA using geometric transformations [Volume 4, Issue 1, 2012, Pages 63-76]
-
Ghaemmaghami, Sh.
Eigenvalues-based LSB steganalysis [Volume 4, Issue 2, 2012, Pages 97-106]
H
-
Hakimi, A.
A chaos-based video watermarking algorithm [Volume 4, Issue 1, 2012, Pages 77-86]
-
Harati, A.
SEIMCHA: a new semantic image CAPTCHA using geometric transformations [Volume 4, Issue 1, 2012, Pages 63-76]
-
Hashemi, M. R.
Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach [Volume 4, Issue 2, 2012, Pages 125-136]
-
Hooshmand, R.
Improving the Rao-Nam secret key cryptosystem using regular EDF-QC-LDPC codes [Volume 4, Issue 1, 2012, Pages 3-14]
J
-
Jalili, R.
Editorial [Volume 4, Issue 1, 2012, Pages 1-2]
-
Jalili, R.
Editorial [Volume 4, Issue 2, 2012, Pages 95-96]
M
-
Mabuto, E. K.
Analyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications [Volume 4, Issue 2, 2012, Pages 137-150]
-
Mehrnejad, M.
SEIMCHA: a new semantic image CAPTCHA using geometric transformations [Volume 4, Issue 1, 2012, Pages 63-76]
-
Mohajeri, J.
Cryptanalysis of GSM encryption algorithm A5/1 [Volume 4, Issue 2, 2012, Pages 107-114]
-
Mohajeri, J.
On the multi _ chi-square tests and their data complexity [Volume 4, Issue 1, 2012, Pages 15-24]
-
Mohammadi, S.
A chaos-based video watermarking algorithm [Volume 4, Issue 1, 2012, Pages 77-86]
-
Mozaffari, S.
Improving security of double random phase encoding with chaos theory using fractal images [Volume 4, Issue 2, 2012, Pages 115-124]
N
-
Nemati, H.
Private Key based query on encrypted data [Volume 4, Issue 1, 2012, Pages 41-50]
S
-
Saidi, H.
Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach [Volume 4, Issue 2, 2012, Pages 125-136]
-
Salmasizadeh, M.
On the multi _ chi-square tests and their data complexity [Volume 4, Issue 1, 2012, Pages 15-24]
-
Shakeri, H.
A confidence-aware interval-based trust model [Volume 4, Issue 2, 2012, Pages 151-165]
T
-
Taheri, M.
Improving security of double random phase encoding with chaos theory using fractal images [Volume 4, Issue 2, 2012, Pages 115-124]
-
Toreini, E.
SEIMCHA: a new semantic image CAPTCHA using geometric transformations [Volume 4, Issue 1, 2012, Pages 63-76]
V
-
Vardasbi, A.
Cryptanalysis of GSM encryption algorithm A5/1 [Volume 4, Issue 2, 2012, Pages 107-114]
-
Vardasbi, A.
On the multi _ chi-square tests and their data complexity [Volume 4, Issue 1, 2012, Pages 15-24]
-
Venter, H. S.
Analyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications [Volume 4, Issue 2, 2012, Pages 137-150]
Y
-
Yahyazadeh, M.
BotOnus: an online unsupervised method for Botnet detection [Volume 4, Issue 1, 2012, Pages 51-62]
Z
-
Zali, Z.
Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach [Volume 4, Issue 2, 2012, Pages 125-136]