A

  • Access Control Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems [Volume 12, Issue 2, 2020, Pages 129-140]

  • Ad Hoc Network A Hybrid Encryption Algorithm for Mitigating the Effects of Attacks in Ad Hoc Networks [Volume 12, Issue 3, 2020, Pages 19-27]

  • AES Enhanced Flush+Reload Attack on AES [Volume 12, Issue 2, 2020, Pages 81-89]

  • Airport A Multilingual Infobot in Airports [Volume 12, Issue 3, 2020, Pages 111-115]

  • Anomaly Detection F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management [Volume 12, Issue 2, 2020, Pages 113-128]

  • AODV A Hybrid Encryption Algorithm for Mitigating the Effects of Attacks in Ad Hoc Networks [Volume 12, Issue 3, 2020, Pages 19-27]

  • Attribute-Based Encryption Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems [Volume 12, Issue 2, 2020, Pages 129-140]

  • Authenticated Cipher CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking [Volume 12, Issue 2, 2020, Pages 67-80]

  • Automated Identification Fuzzy Histogram Equalization and Computer Vision Automated Identification of Microcalcifications in Breast Cancer [Volume 12, Issue 3, 2020, Pages 73-79]

  • AVISPA GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication [Volume 12, Issue 2, 2020, Pages 101-111]

B

  • Big Data Knowledge Discovery in Cloud-Computing Environment and the Challenges [Volume 12, Issue 3, 2020, Pages 95-99]

  • Binary-mapped Historical-memory Management F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management [Volume 12, Issue 2, 2020, Pages 113-128]

C

  • CBIR Reverse Image-Based Search Engine for IP Trademarks [Volume 12, Issue 3, 2020, Pages 117-127]

  • Chatbot A Multilingual Infobot in Airports [Volume 12, Issue 3, 2020, Pages 111-115]

  • Chebychev Suspended Stripline Low-pass Filter Design for Wide Stopband Attenuation Applications [Volume 12, Issue 3, 2020, Pages 7-12]

  • CiliPadi Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants [Volume 12, Issue 1, 2020, Pages 13-23]

  • Cloud Storage Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems [Volume 12, Issue 2, 2020, Pages 129-140]

  • Clustering CEMD: A Cluster-based Ensemble Motif Discovery Tool [Volume 12, Issue 3, 2020, Pages 29-36]

  • CNN Anomaly-Based Network Intrusion Detection Using Bidirectional Long Short Term Memory and Convolutional Neural Network [Volume 12, Issue 3, 2020, Pages 37-44]

  • CNN Reverse Image-Based Search Engine for IP Trademarks [Volume 12, Issue 3, 2020, Pages 117-127]

  • Coding A New Derivation of the Leftover Hash Lemma [Volume 12, Issue 3, 2020, Pages 55-58]

  • COLM CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking [Volume 12, Issue 2, 2020, Pages 67-80]

  • CPA CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking [Volume 12, Issue 2, 2020, Pages 67-80]

  • Cryptography A Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions [Volume 12, Issue 2, 2020, Pages 91-99]

  • Cube Attack Extension of Cube Attack with Probabilistic Equations and its Application on Cryptanalysis of KATAN Cipher [Volume 12, Issue 1, 2020, Pages 1-12]

D

  • Data stream algorithm F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management [Volume 12, Issue 2, 2020, Pages 113-128]

  • Data Warehouse (Star Schema) Indexed View Technique to Speed-up Data Warehouse Query Processing [Volume 12, Issue 3, 2020, Pages 81-85]

  • DDoS detection F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management [Volume 12, Issue 2, 2020, Pages 113-128]

  • Deep Learning Anomaly-Based Network Intrusion Detection Using Bidirectional Long Short Term Memory and Convolutional Neural Network [Volume 12, Issue 3, 2020, Pages 37-44]

  • Deep seq2seq network Anomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism [Volume 12, Issue 1, 2020, Pages 44-54]

  • Diffie-Hellman A Hybrid Encryption Algorithm for Mitigating the Effects of Attacks in Ad Hoc Networks [Volume 12, Issue 3, 2020, Pages 19-27]

  • DNA Motif CEMD: A Cluster-based Ensemble Motif Discovery Tool [Volume 12, Issue 3, 2020, Pages 29-36]

  • DOM CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking [Volume 12, Issue 2, 2020, Pages 67-80]

  • DT The Establishment of a Distance Training Device within the Regional Center of the Taza Education and Training: Administrative Cycle Case [Volume 12, Issue 3, 2020, Pages 87-93]

E

  • EHR Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems [Volume 12, Issue 2, 2020, Pages 129-140]

  • Electronic health record Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems [Volume 12, Issue 2, 2020, Pages 129-140]

  • Embedding Anomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism [Volume 12, Issue 1, 2020, Pages 44-54]

  • End to End Delay Modeling a Cloud-Based Smart Parking WLAN Networks Using IEEE802.11AC Technology [Volume 12, Issue 3, 2020, Pages 101-109]

  • Entepreneurial Influencers Identifying Entrepreneurial Influencers on Twitter [Volume 12, Issue 3, 2020, Pages 59-72]

  • Entrepreneurship Identifying Entrepreneurial Influencers on Twitter [Volume 12, Issue 3, 2020, Pages 59-72]

  • Expected Profile Update Time F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management [Volume 12, Issue 2, 2020, Pages 113-128]

F

  • Facial Image The Use of Local Sensitive Hashing for E-learner Face Identification [Volume 12, Issue 3, 2020, Pages 1-5]

  • Flush+Reload attack Enhanced Flush+Reload Attack on AES [Volume 12, Issue 2, 2020, Pages 81-89]

  • Fractional-order systems Modified Sliding-Mode Control Method for Synchronization a Class of Chaotic Fractional-Order Systems with Application in Encryption [Volume 12, Issue 1, 2020, Pages 55-66]

  • Fuzzy Histogram Equalization Fuzzy Histogram Equalization and Computer Vision Automated Identification of Microcalcifications in Breast Cancer [Volume 12, Issue 3, 2020, Pages 73-79]

G

  • GAGE Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants [Volume 12, Issue 1, 2020, Pages 13-23]

  • Group-based handover authentication GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication [Volume 12, Issue 2, 2020, Pages 101-111]

H

  • Hash Lemma A New Derivation of the Leftover Hash Lemma [Volume 12, Issue 3, 2020, Pages 55-58]

I

  • IEEE 802.11ac Modeling a Cloud-Based Smart Parking WLAN Networks Using IEEE802.11AC Technology [Volume 12, Issue 3, 2020, Pages 101-109]

  • IEEE 802.11b Modeling a Cloud-Based Smart Parking WLAN Networks Using IEEE802.11AC Technology [Volume 12, Issue 3, 2020, Pages 101-109]

  • IEEE 802.15.4 Modeling a Cloud-Based Smart Parking WLAN Networks Using IEEE802.11AC Technology [Volume 12, Issue 3, 2020, Pages 101-109]

  • Indexed View Indexed View Technique to Speed-up Data Warehouse Query Processing [Volume 12, Issue 3, 2020, Pages 81-85]

  • Information Quality (SYSQ) The Impact of Mobile Payment Quality on User’s Continuance Intention Toward Mobile Payment in Saudi Arabia [Volume 12, Issue 3, 2020, Pages 45-53]

  • Information System Success Model The Impact of Mobile Payment Quality on User’s Continuance Intention Toward Mobile Payment in Saudi Arabia [Volume 12, Issue 3, 2020, Pages 45-53]

  • InGAGE Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants [Volume 12, Issue 1, 2020, Pages 13-23]

  • Instrumentation-Professional Skills The Establishment of a Distance Training Device within the Regional Center of the Taza Education and Training: Administrative Cycle Case [Volume 12, Issue 3, 2020, Pages 87-93]

  • Intrusion Detection A Hybrid Encryption Algorithm for Mitigating the Effects of Attacks in Ad Hoc Networks [Volume 12, Issue 3, 2020, Pages 19-27]

  • IoT GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication [Volume 12, Issue 2, 2020, Pages 101-111]

  • IoT Modeling a Cloud-Based Smart Parking WLAN Networks Using IEEE802.11AC Technology [Volume 12, Issue 3, 2020, Pages 101-109]

J

  • J48 The Use of Local Sensitive Hashing for E-learner Face Identification [Volume 12, Issue 3, 2020, Pages 1-5]

K

  • Knowledge discovery Knowledge Discovery in Cloud-Computing Environment and the Challenges [Volume 12, Issue 3, 2020, Pages 95-99]

  • Knowledge Management Knowledge Discovery in Cloud-Computing Environment and the Challenges [Volume 12, Issue 3, 2020, Pages 95-99]

L

  • Learning Platform The Use of Local Sensitive Hashing for E-learner Face Identification [Volume 12, Issue 3, 2020, Pages 1-5]

  • Long Short Term Memory Anomaly-Based Network Intrusion Detection Using Bidirectional Long Short Term Memory and Convolutional Neural Network [Volume 12, Issue 3, 2020, Pages 37-44]

  • Lowpass Filter Suspended Stripline Low-pass Filter Design for Wide Stopband Attenuation Applications [Volume 12, Issue 3, 2020, Pages 7-12]

  • LSH The Use of Local Sensitive Hashing for E-learner Face Identification [Volume 12, Issue 3, 2020, Pages 1-5]

  • LSTM Anomaly-Based Network Intrusion Detection Using Bidirectional Long Short Term Memory and Convolutional Neural Network [Volume 12, Issue 3, 2020, Pages 37-44]

  • Lumped-element Suspended Stripline Low-pass Filter Design for Wide Stopband Attenuation Applications [Volume 12, Issue 3, 2020, Pages 7-12]

M

  • M2M communication GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication [Volume 12, Issue 2, 2020, Pages 101-111]

  • Machine Learning A Multilingual Infobot in Airports [Volume 12, Issue 3, 2020, Pages 111-115]

  • Malicious Node A Hybrid Encryption Algorithm for Mitigating the Effects of Attacks in Ad Hoc Networks [Volume 12, Issue 3, 2020, Pages 19-27]

  • Memory de-duplication Enhanced Flush+Reload Attack on AES [Volume 12, Issue 2, 2020, Pages 81-89]

  • Microaggregation Improved Univariate Microaggregation for Integer Values [Volume 12, Issue 1, 2020, Pages 35-43]

  • Microcalcifications Breast Cancer Fuzzy Histogram Equalization and Computer Vision Automated Identification of Microcalcifications in Breast Cancer [Volume 12, Issue 3, 2020, Pages 73-79]

  • Microwave Suspended Stripline Low-pass Filter Design for Wide Stopband Attenuation Applications [Volume 12, Issue 3, 2020, Pages 7-12]

  • Mobile Payment The Impact of Mobile Payment Quality on User’s Continuance Intention Toward Mobile Payment in Saudi Arabia [Volume 12, Issue 3, 2020, Pages 45-53]

N

  • Natural Language A Multilingual Infobot in Airports [Volume 12, Issue 3, 2020, Pages 111-115]

  • Network Intrusion Detection Systems Anomaly-Based Network Intrusion Detection Using Bidirectional Long Short Term Memory and Convolutional Neural Network [Volume 12, Issue 3, 2020, Pages 37-44]

  • Network Security GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication [Volume 12, Issue 2, 2020, Pages 101-111]

  • NIST lightweight cryptography competition Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants [Volume 12, Issue 1, 2020, Pages 13-23]

  • Non-homogeneous linear recursions A Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions [Volume 12, Issue 2, 2020, Pages 91-99]

P

  • PID Evaluation of a Wireless ZigBee with PID Controller for Networked Control System Using True Time Toolbox [Volume 12, Issue 3, 2020, Pages 13-17]

  • Preimage attack Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants [Volume 12, Issue 1, 2020, Pages 13-23]

  • Probabilistic equation Extension of Cube Attack with Probabilistic Equations and its Application on Cryptanalysis of KATAN Cipher [Volume 12, Issue 1, 2020, Pages 1-12]

  • Professionalization The Establishment of a Distance Training Device within the Regional Center of the Taza Education and Training: Administrative Cycle Case [Volume 12, Issue 3, 2020, Pages 87-93]

  • PROFILE The Use of Local Sensitive Hashing for E-learner Face Identification [Volume 12, Issue 3, 2020, Pages 1-5]

  • Publicly verifiable secret sharing A Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions [Volume 12, Issue 2, 2020, Pages 91-99]

Q

  • Query Processing Indexed View Technique to Speed-up Data Warehouse Query Processing [Volume 12, Issue 3, 2020, Pages 81-85]

R

  • Ranking Identifying Entrepreneurial Influencers on Twitter [Volume 12, Issue 3, 2020, Pages 59-72]

  • Real time detection F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management [Volume 12, Issue 2, 2020, Pages 113-128]

  • Reverse Image-based Search Engine Reverse Image-Based Search Engine for IP Trademarks [Volume 12, Issue 3, 2020, Pages 117-127]

  • Reverse Image Search Reverse Image-Based Search Engine for IP Trademarks [Volume 12, Issue 3, 2020, Pages 117-127]

S

  • Saudi Arabia The Impact of Mobile Payment Quality on User’s Continuance Intention Toward Mobile Payment in Saudi Arabia [Volume 12, Issue 3, 2020, Pages 45-53]

  • Secret Sharing A Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions [Volume 12, Issue 2, 2020, Pages 91-99]

  • Secure communication Modified Sliding-Mode Control Method for Synchronization a Class of Chaotic Fractional-Order Systems with Application in Encryption [Volume 12, Issue 1, 2020, Pages 55-66]

  • Security A Hybrid Encryption Algorithm for Mitigating the Effects of Attacks in Ad Hoc Networks [Volume 12, Issue 3, 2020, Pages 19-27]

  • Service Quality(INFQ) The Impact of Mobile Payment Quality on User’s Continuance Intention Toward Mobile Payment in Saudi Arabia [Volume 12, Issue 3, 2020, Pages 45-53]

  • Sliding mode control Modified Sliding-Mode Control Method for Synchronization a Class of Chaotic Fractional-Order Systems with Application in Encryption [Volume 12, Issue 1, 2020, Pages 55-66]

  • Smart parking Modeling a Cloud-Based Smart Parking WLAN Networks Using IEEE802.11AC Technology [Volume 12, Issue 3, 2020, Pages 101-109]

  • Social Media Identifying Entrepreneurial Influencers on Twitter [Volume 12, Issue 3, 2020, Pages 59-72]

  • Solving noisy equation system Extension of Cube Attack with Probabilistic Equations and its Application on Cryptanalysis of KATAN Cipher [Volume 12, Issue 1, 2020, Pages 1-12]

  • Steganalysis New High Secure Network Steganography Method Based on Packet Length [Volume 12, Issue 1, 2020, Pages 24-44]

  • Stripline Suspended Stripline Low-pass Filter Design for Wide Stopband Attenuation Applications [Volume 12, Issue 3, 2020, Pages 7-12]

  • Synchronization Modified Sliding-Mode Control Method for Synchronization a Class of Chaotic Fractional-Order Systems with Application in Encryption [Volume 12, Issue 1, 2020, Pages 55-66]

  • System Quality (SERQ) The Impact of Mobile Payment Quality on User’s Continuance Intention Toward Mobile Payment in Saudi Arabia [Volume 12, Issue 3, 2020, Pages 45-53]

T

  • Threshold access structures A Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions [Volume 12, Issue 2, 2020, Pages 91-99]

  • Throughput Modeling a Cloud-Based Smart Parking WLAN Networks Using IEEE802.11AC Technology [Volume 12, Issue 3, 2020, Pages 101-109]

  • Transcription Factor Binding Site CEMD: A Cluster-based Ensemble Motif Discovery Tool [Volume 12, Issue 3, 2020, Pages 29-36]

  • True Time Toolbox Evaluation of a Wireless ZigBee with PID Controller for Networked Control System Using True Time Toolbox [Volume 12, Issue 3, 2020, Pages 13-17]

  • T-table implementation Enhanced Flush+Reload Attack on AES [Volume 12, Issue 2, 2020, Pages 81-89]

  • Twitter Identifying Entrepreneurial Influencers on Twitter [Volume 12, Issue 3, 2020, Pages 59-72]

U

  • Users’Continuance Intention The Impact of Mobile Payment Quality on User’s Continuance Intention Toward Mobile Payment in Saudi Arabia [Volume 12, Issue 3, 2020, Pages 45-53]

  • User’sContinuance Intention (CI) The Impact of Mobile Payment Quality on User’s Continuance Intention Toward Mobile Payment in Saudi Arabia [Volume 12, Issue 3, 2020, Pages 45-53]

  • User’s Satisfaction (SAT) The Impact of Mobile Payment Quality on User’s Continuance Intention Toward Mobile Payment in Saudi Arabia [Volume 12, Issue 3, 2020, Pages 45-53]

V

  • Verifiable Secret sharing A Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions [Volume 12, Issue 2, 2020, Pages 91-99]

W

Z

  • ZigBee Evaluation of a Wireless ZigBee with PID Controller for Networked Control System Using True Time Toolbox [Volume 12, Issue 3, 2020, Pages 13-17]