A
-
Access Control
Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems [Volume 12, Issue 2, 2020, Pages 129-140]
-
Ad Hoc Network
A Hybrid Encryption Algorithm for Mitigating the Effects of Attacks in Ad Hoc Networks [Volume 12, Issue 3, 2020, Pages 19-27]
-
AES
Enhanced Flush+Reload Attack on AES [Volume 12, Issue 2, 2020, Pages 81-89]
-
Airport
A Multilingual Infobot in Airports [Volume 12, Issue 3, 2020, Pages 111-115]
-
Anomaly Detection
F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management [Volume 12, Issue 2, 2020, Pages 113-128]
-
AODV
A Hybrid Encryption Algorithm for Mitigating the Effects of Attacks in Ad Hoc Networks [Volume 12, Issue 3, 2020, Pages 19-27]
-
Attribute-Based Encryption
Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems [Volume 12, Issue 2, 2020, Pages 129-140]
-
Authenticated Cipher
CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking [Volume 12, Issue 2, 2020, Pages 67-80]
-
Automated Identification
Fuzzy Histogram Equalization and Computer Vision Automated Identification of Microcalcifications in Breast Cancer [Volume 12, Issue 3, 2020, Pages 73-79]
-
AVISPA
GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication [Volume 12, Issue 2, 2020, Pages 101-111]
B
-
Big Data
Knowledge Discovery in Cloud-Computing Environment and the Challenges [Volume 12, Issue 3, 2020, Pages 95-99]
-
Binary-mapped Historical-memory Management
F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management [Volume 12, Issue 2, 2020, Pages 113-128]
C
-
CBIR
Reverse Image-Based Search Engine for IP Trademarks [Volume 12, Issue 3, 2020, Pages 117-127]
-
Chatbot
A Multilingual Infobot in Airports [Volume 12, Issue 3, 2020, Pages 111-115]
-
Chebychev
Suspended Stripline Low-pass Filter Design for Wide Stopband Attenuation Applications [Volume 12, Issue 3, 2020, Pages 7-12]
-
CiliPadi
Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants [Volume 12, Issue 1, 2020, Pages 13-23]
-
Cloud Storage
Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems [Volume 12, Issue 2, 2020, Pages 129-140]
-
Clustering
CEMD: A Cluster-based Ensemble Motif Discovery Tool [Volume 12, Issue 3, 2020, Pages 29-36]
-
CNN
Anomaly-Based Network Intrusion Detection Using Bidirectional Long Short Term Memory and Convolutional Neural Network [Volume 12, Issue 3, 2020, Pages 37-44]
-
CNN
Reverse Image-Based Search Engine for IP Trademarks [Volume 12, Issue 3, 2020, Pages 117-127]
-
Coding
A New Derivation of the Leftover Hash Lemma [Volume 12, Issue 3, 2020, Pages 55-58]
-
COLM
CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking [Volume 12, Issue 2, 2020, Pages 67-80]
-
CPA
CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking [Volume 12, Issue 2, 2020, Pages 67-80]
-
Cryptography
A Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions [Volume 12, Issue 2, 2020, Pages 91-99]
-
Cube Attack
Extension of Cube Attack with Probabilistic Equations and its Application on Cryptanalysis of KATAN Cipher [Volume 12, Issue 1, 2020, Pages 1-12]
D
-
Data stream algorithm
F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management [Volume 12, Issue 2, 2020, Pages 113-128]
-
Data Warehouse (Star Schema)
Indexed View Technique to Speed-up Data Warehouse Query Processing [Volume 12, Issue 3, 2020, Pages 81-85]
-
DDoS detection
F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management [Volume 12, Issue 2, 2020, Pages 113-128]
-
Deep Learning
Anomaly-Based Network Intrusion Detection Using Bidirectional Long Short Term Memory and Convolutional Neural Network [Volume 12, Issue 3, 2020, Pages 37-44]
-
Deep seq2seq network
Anomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism [Volume 12, Issue 1, 2020, Pages 44-54]
-
Diffie-Hellman
A Hybrid Encryption Algorithm for Mitigating the Effects of Attacks in Ad Hoc Networks [Volume 12, Issue 3, 2020, Pages 19-27]
-
DNA Motif
CEMD: A Cluster-based Ensemble Motif Discovery Tool [Volume 12, Issue 3, 2020, Pages 29-36]
-
DOM
CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking [Volume 12, Issue 2, 2020, Pages 67-80]
-
DT
The Establishment of a Distance Training Device within the Regional Center of the Taza Education and Training: Administrative Cycle Case [Volume 12, Issue 3, 2020, Pages 87-93]
E
-
EHR
Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems [Volume 12, Issue 2, 2020, Pages 129-140]
-
Electronic health record
Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems [Volume 12, Issue 2, 2020, Pages 129-140]
-
Embedding
Anomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism [Volume 12, Issue 1, 2020, Pages 44-54]
-
End to End Delay
Modeling a Cloud-Based Smart Parking WLAN Networks Using IEEE802.11AC Technology [Volume 12, Issue 3, 2020, Pages 101-109]
-
Entepreneurial Influencers
Identifying Entrepreneurial Influencers on Twitter [Volume 12, Issue 3, 2020, Pages 59-72]
-
Entrepreneurship
Identifying Entrepreneurial Influencers on Twitter [Volume 12, Issue 3, 2020, Pages 59-72]
-
Expected Profile Update Time
F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management [Volume 12, Issue 2, 2020, Pages 113-128]
F
-
Facial Image
The Use of Local Sensitive Hashing for E-learner Face Identification [Volume 12, Issue 3, 2020, Pages 1-5]
-
Flush+Reload attack
Enhanced Flush+Reload Attack on AES [Volume 12, Issue 2, 2020, Pages 81-89]
-
Fractional-order systems
Modified Sliding-Mode Control Method for Synchronization a Class of Chaotic Fractional-Order Systems with Application in Encryption [Volume 12, Issue 1, 2020, Pages 55-66]
-
Fuzzy Histogram Equalization
Fuzzy Histogram Equalization and Computer Vision Automated Identification of Microcalcifications in Breast Cancer [Volume 12, Issue 3, 2020, Pages 73-79]
G
-
GAGE
Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants [Volume 12, Issue 1, 2020, Pages 13-23]
-
Group-based handover authentication
GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication [Volume 12, Issue 2, 2020, Pages 101-111]
H
-
Hash Lemma
A New Derivation of the Leftover Hash Lemma [Volume 12, Issue 3, 2020, Pages 55-58]
I
-
IEEE 802.11ac
Modeling a Cloud-Based Smart Parking WLAN Networks Using IEEE802.11AC Technology [Volume 12, Issue 3, 2020, Pages 101-109]
-
IEEE 802.11b
Modeling a Cloud-Based Smart Parking WLAN Networks Using IEEE802.11AC Technology [Volume 12, Issue 3, 2020, Pages 101-109]
-
IEEE 802.15.4
Modeling a Cloud-Based Smart Parking WLAN Networks Using IEEE802.11AC Technology [Volume 12, Issue 3, 2020, Pages 101-109]
-
Indexed View
Indexed View Technique to Speed-up Data Warehouse Query Processing [Volume 12, Issue 3, 2020, Pages 81-85]
-
Information Quality (SYSQ)
The Impact of Mobile Payment Quality on User’s Continuance Intention Toward Mobile Payment in Saudi Arabia [Volume 12, Issue 3, 2020, Pages 45-53]
-
Information System Success Model
The Impact of Mobile Payment Quality on User’s Continuance Intention Toward Mobile Payment in Saudi Arabia [Volume 12, Issue 3, 2020, Pages 45-53]
-
InGAGE
Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants [Volume 12, Issue 1, 2020, Pages 13-23]
-
Instrumentation-Professional Skills
The Establishment of a Distance Training Device within the Regional Center of the Taza Education and Training: Administrative Cycle Case [Volume 12, Issue 3, 2020, Pages 87-93]
-
Intrusion Detection
A Hybrid Encryption Algorithm for Mitigating the Effects of Attacks in Ad Hoc Networks [Volume 12, Issue 3, 2020, Pages 19-27]
-
IoT
GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication [Volume 12, Issue 2, 2020, Pages 101-111]
-
IoT
Modeling a Cloud-Based Smart Parking WLAN Networks Using IEEE802.11AC Technology [Volume 12, Issue 3, 2020, Pages 101-109]
J
-
J48
The Use of Local Sensitive Hashing for E-learner Face Identification [Volume 12, Issue 3, 2020, Pages 1-5]
K
-
Knowledge discovery
Knowledge Discovery in Cloud-Computing Environment and the Challenges [Volume 12, Issue 3, 2020, Pages 95-99]
-
Knowledge Management
Knowledge Discovery in Cloud-Computing Environment and the Challenges [Volume 12, Issue 3, 2020, Pages 95-99]
L
-
Learning Platform
The Use of Local Sensitive Hashing for E-learner Face Identification [Volume 12, Issue 3, 2020, Pages 1-5]
-
Long Short Term Memory
Anomaly-Based Network Intrusion Detection Using Bidirectional Long Short Term Memory and Convolutional Neural Network [Volume 12, Issue 3, 2020, Pages 37-44]
-
Lowpass Filter
Suspended Stripline Low-pass Filter Design for Wide Stopband Attenuation Applications [Volume 12, Issue 3, 2020, Pages 7-12]
-
LSH
The Use of Local Sensitive Hashing for E-learner Face Identification [Volume 12, Issue 3, 2020, Pages 1-5]
-
LSTM
Anomaly-Based Network Intrusion Detection Using Bidirectional Long Short Term Memory and Convolutional Neural Network [Volume 12, Issue 3, 2020, Pages 37-44]
-
Lumped-element
Suspended Stripline Low-pass Filter Design for Wide Stopband Attenuation Applications [Volume 12, Issue 3, 2020, Pages 7-12]
M
-
M2M communication
GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication [Volume 12, Issue 2, 2020, Pages 101-111]
-
Machine Learning
A Multilingual Infobot in Airports [Volume 12, Issue 3, 2020, Pages 111-115]
-
Malicious Node
A Hybrid Encryption Algorithm for Mitigating the Effects of Attacks in Ad Hoc Networks [Volume 12, Issue 3, 2020, Pages 19-27]
-
Memory de-duplication
Enhanced Flush+Reload Attack on AES [Volume 12, Issue 2, 2020, Pages 81-89]
-
Microaggregation
Improved Univariate Microaggregation for Integer Values [Volume 12, Issue 1, 2020, Pages 35-43]
-
Microcalcifications Breast Cancer
Fuzzy Histogram Equalization and Computer Vision Automated Identification of Microcalcifications in Breast Cancer [Volume 12, Issue 3, 2020, Pages 73-79]
-
Microwave
Suspended Stripline Low-pass Filter Design for Wide Stopband Attenuation Applications [Volume 12, Issue 3, 2020, Pages 7-12]
-
Mobile Payment
The Impact of Mobile Payment Quality on User’s Continuance Intention Toward Mobile Payment in Saudi Arabia [Volume 12, Issue 3, 2020, Pages 45-53]
N
-
Natural Language
A Multilingual Infobot in Airports [Volume 12, Issue 3, 2020, Pages 111-115]
-
Network Intrusion Detection Systems
Anomaly-Based Network Intrusion Detection Using Bidirectional Long Short Term Memory and Convolutional Neural Network [Volume 12, Issue 3, 2020, Pages 37-44]
-
Network Security
GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication [Volume 12, Issue 2, 2020, Pages 101-111]
-
NIST lightweight cryptography competition
Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants [Volume 12, Issue 1, 2020, Pages 13-23]
-
Non-homogeneous linear recursions
A Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions [Volume 12, Issue 2, 2020, Pages 91-99]
P
-
PID
Evaluation of a Wireless ZigBee with PID Controller for Networked Control System Using True Time Toolbox [Volume 12, Issue 3, 2020, Pages 13-17]
-
Preimage attack
Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants [Volume 12, Issue 1, 2020, Pages 13-23]
-
Probabilistic equation
Extension of Cube Attack with Probabilistic Equations and its Application on Cryptanalysis of KATAN Cipher [Volume 12, Issue 1, 2020, Pages 1-12]
-
Professionalization
The Establishment of a Distance Training Device within the Regional Center of the Taza Education and Training: Administrative Cycle Case [Volume 12, Issue 3, 2020, Pages 87-93]
-
PROFILE
The Use of Local Sensitive Hashing for E-learner Face Identification [Volume 12, Issue 3, 2020, Pages 1-5]
-
Publicly verifiable secret sharing
A Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions [Volume 12, Issue 2, 2020, Pages 91-99]
Q
-
Query Processing
Indexed View Technique to Speed-up Data Warehouse Query Processing [Volume 12, Issue 3, 2020, Pages 81-85]
R
-
Ranking
Identifying Entrepreneurial Influencers on Twitter [Volume 12, Issue 3, 2020, Pages 59-72]
-
Real time detection
F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management [Volume 12, Issue 2, 2020, Pages 113-128]
-
Reverse Image-based Search Engine
Reverse Image-Based Search Engine for IP Trademarks [Volume 12, Issue 3, 2020, Pages 117-127]
-
Reverse Image Search
Reverse Image-Based Search Engine for IP Trademarks [Volume 12, Issue 3, 2020, Pages 117-127]
S
-
Saudi Arabia
The Impact of Mobile Payment Quality on User’s Continuance Intention Toward Mobile Payment in Saudi Arabia [Volume 12, Issue 3, 2020, Pages 45-53]
-
Secret Sharing
A Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions [Volume 12, Issue 2, 2020, Pages 91-99]
-
Secure communication
Modified Sliding-Mode Control Method for Synchronization a Class of Chaotic Fractional-Order Systems with Application in Encryption [Volume 12, Issue 1, 2020, Pages 55-66]
-
Security
A Hybrid Encryption Algorithm for Mitigating the Effects of Attacks in Ad Hoc Networks [Volume 12, Issue 3, 2020, Pages 19-27]
-
Service Quality(INFQ)
The Impact of Mobile Payment Quality on User’s Continuance Intention Toward Mobile Payment in Saudi Arabia [Volume 12, Issue 3, 2020, Pages 45-53]
-
Sliding mode control
Modified Sliding-Mode Control Method for Synchronization a Class of Chaotic Fractional-Order Systems with Application in Encryption [Volume 12, Issue 1, 2020, Pages 55-66]
-
Smart parking
Modeling a Cloud-Based Smart Parking WLAN Networks Using IEEE802.11AC Technology [Volume 12, Issue 3, 2020, Pages 101-109]
-
Social Media
Identifying Entrepreneurial Influencers on Twitter [Volume 12, Issue 3, 2020, Pages 59-72]
-
Solving noisy equation system
Extension of Cube Attack with Probabilistic Equations and its Application on Cryptanalysis of KATAN Cipher [Volume 12, Issue 1, 2020, Pages 1-12]
-
Steganalysis
New High Secure Network Steganography Method Based on Packet Length [Volume 12, Issue 1, 2020, Pages 24-44]
-
Stripline
Suspended Stripline Low-pass Filter Design for Wide Stopband Attenuation Applications [Volume 12, Issue 3, 2020, Pages 7-12]
-
Synchronization
Modified Sliding-Mode Control Method for Synchronization a Class of Chaotic Fractional-Order Systems with Application in Encryption [Volume 12, Issue 1, 2020, Pages 55-66]
-
System Quality (SERQ)
The Impact of Mobile Payment Quality on User’s Continuance Intention Toward Mobile Payment in Saudi Arabia [Volume 12, Issue 3, 2020, Pages 45-53]
T
-
Threshold access structures
A Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions [Volume 12, Issue 2, 2020, Pages 91-99]
-
Throughput
Modeling a Cloud-Based Smart Parking WLAN Networks Using IEEE802.11AC Technology [Volume 12, Issue 3, 2020, Pages 101-109]
-
Transcription Factor Binding Site
CEMD: A Cluster-based Ensemble Motif Discovery Tool [Volume 12, Issue 3, 2020, Pages 29-36]
-
True Time Toolbox
Evaluation of a Wireless ZigBee with PID Controller for Networked Control System Using True Time Toolbox [Volume 12, Issue 3, 2020, Pages 13-17]
-
T-table implementation
Enhanced Flush+Reload Attack on AES [Volume 12, Issue 2, 2020, Pages 81-89]
-
Twitter
Identifying Entrepreneurial Influencers on Twitter [Volume 12, Issue 3, 2020, Pages 59-72]
U
-
Users’Continuance Intention
The Impact of Mobile Payment Quality on User’s Continuance Intention Toward Mobile Payment in Saudi Arabia [Volume 12, Issue 3, 2020, Pages 45-53]
-
User’sContinuance Intention (CI)
The Impact of Mobile Payment Quality on User’s Continuance Intention Toward Mobile Payment in Saudi Arabia [Volume 12, Issue 3, 2020, Pages 45-53]
-
User’s Satisfaction (SAT)
The Impact of Mobile Payment Quality on User’s Continuance Intention Toward Mobile Payment in Saudi Arabia [Volume 12, Issue 3, 2020, Pages 45-53]
V
-
Verifiable Secret sharing
A Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions [Volume 12, Issue 2, 2020, Pages 91-99]
W
-
Wireless Network Control System(WNCS)
Evaluation of a Wireless ZigBee with PID Controller for Networked Control System Using True Time Toolbox [Volume 12, Issue 3, 2020, Pages 13-17]
Z
-
ZigBee
Evaluation of a Wireless ZigBee with PID Controller for Networked Control System Using True Time Toolbox [Volume 12, Issue 3, 2020, Pages 13-17]