A

  • Access Control IDOT: Black-Box Detection of Access Control Violations in Web Applications [Volume 13, Issue 2, 2021, Pages 117-129]

  • ADL Human Activity Recognition Based on Multi-Sensors in a Smart Home Using Deep Learning [Volume 13, Issue 3, 2021, Pages 69-78]

  • Android Curious-Monkey: Evolved Monkey for Triggering Malicious Payloads in Android Malware [Volume 13, Issue 2, 2021, Pages 131-143]

  • Android Malware Curious-Monkey: Evolved Monkey for Triggering Malicious Payloads in Android Malware [Volume 13, Issue 2, 2021, Pages 131-143]

  • Attribute-Based Searchable Encryption Privacy Preserving Attribute-Based Encryption with Conjunctive Keyword Search for E-health Records in Cloud [Volume 13, Issue 2, 2021, Pages 87-100]

  • Authentication Providing a Hybrid Cryptography Algorithm for Lightweight Authentication Protocol in RFID with Urban Traffic Usage Case [Volume 13, Issue 1, 2021, Pages 73-85]

B

  • Bag-Of-Visual-Words (BOVW) File Fragment Type Classification by Bag-Of-Visual-Words [Volume 13, Issue 2, 2021, Pages 101-116]

  • BKZ Simulation Better Sampling Method of Enumeration Solution for BKZ-Simulation [Volume 13, Issue 2, 2021, Pages 177-208]

  • Blind Signature An Efficient Pairing-Free Identity Based Proxy Blind Signature Scheme with Message Recovery [Volume 13, Issue 1, 2021, Pages 59-72]

  • Broken Authentication Broken Authentication and Session Management Vulnerabilities [Volume 13, Issue 3, 2021, Pages 11-19]

C

  • Cloud Forensic Forensic-Enabled Security as a Service (FESaaS) - A Readiness Framework for Cloud Forensics [Volume 13, Issue 3, 2021, Pages 49-57]

  • Cloud Security Forensic-Enabled Security as a Service (FESaaS) - A Readiness Framework for Cloud Forensics [Volume 13, Issue 3, 2021, Pages 49-57]

  • Clustering OT-Feature Extraction on Scrambled Images with Instantaneous Clustering for CBIR Scheme in Cloud Computing [Volume 13, Issue 1, 2021, Pages 1-17]

  • Coding Guidelines Secure Coding Guidelines — Python [Volume 13, Issue 3, 2021, Pages 31-38]

  • Coefficient Vector Better Sampling Method of Enumeration Solution for BKZ-Simulation [Volume 13, Issue 2, 2021, Pages 177-208]

  • Configurable Look Up Tables(CFGLUTs) An Obfuscation Method Based on CFGLUTs for Security of FPGAs [Volume 13, Issue 2, 2021, Pages 157-162]

  • Content-Based Image Retrieval(CBIR) OT-Feature Extraction on Scrambled Images with Instantaneous Clustering for CBIR Scheme in Cloud Computing [Volume 13, Issue 1, 2021, Pages 1-17]

  • Controllable point Hardware Trojan Prevention and Detection by Filling Unused Space Using Shift registers, Gate-chain and Extra Routing [Volume 13, Issue 1, 2021, Pages 47-57]

  • Convolution Neural Networks Data Enhancement for Date Fruit Classification Using DCGAN [Volume 13, Issue 3, 2021, Pages 39-48]

  • CPA Intensive Analysis of Physical Parameters of Power Sensors for Remote Side-Channel Attacks [Volume 13, Issue 2, 2021, Pages 163-176]

  • Credential Stuffing Broken Authentication and Session Management Vulnerabilities [Volume 13, Issue 3, 2021, Pages 11-19]

  • Cross Site Scripting Cross Site Scripting Attack Review [Volume 13, Issue 3, 2021, Pages 21-30]

  • Curious-Monkey Curious-Monkey: Evolved Monkey for Triggering Malicious Payloads in Android Malware [Volume 13, Issue 2, 2021, Pages 131-143]

  • Cybersecurity Secure Coding Guidelines — Python [Volume 13, Issue 3, 2021, Pages 31-38]

  • Cyber Security A Review Study on SQL Injection Attacks, Prevention, and Detection [Volume 13, Issue 3, 2021, Pages 1-10]

  • Cyber Security Cross Site Scripting Attack Review [Volume 13, Issue 3, 2021, Pages 21-30]

D

  • Data Augmentation Data Enhancement for Date Fruit Classification Using DCGAN [Volume 13, Issue 3, 2021, Pages 39-48]

  • Dates Fruits Data Enhancement for Date Fruit Classification Using DCGAN [Volume 13, Issue 3, 2021, Pages 39-48]

  • DCGAN Data Enhancement for Date Fruit Classification Using DCGAN [Volume 13, Issue 3, 2021, Pages 39-48]

  • Deep Learning Data Enhancement for Date Fruit Classification Using DCGAN [Volume 13, Issue 3, 2021, Pages 39-48]

  • Digital Forensic Forensic-Enabled Security as a Service (FESaaS) - A Readiness Framework for Cloud Forensics [Volume 13, Issue 3, 2021, Pages 49-57]

  • Digital Forensics File Fragment Type Classification by Bag-Of-Visual-Words [Volume 13, Issue 2, 2021, Pages 101-116]

  • DL Human Activity Recognition Based on Multi-Sensors in a Smart Home Using Deep Learning [Volume 13, Issue 3, 2021, Pages 69-78]

  • Dynamic analysis Curious-Monkey: Evolved Monkey for Triggering Malicious Payloads in Android Malware [Volume 13, Issue 2, 2021, Pages 131-143]

E

  • ECDLP An Efficient Pairing-Free Identity Based Proxy Blind Signature Scheme with Message Recovery [Volume 13, Issue 1, 2021, Pages 59-72]

  • Event Generator Curious-Monkey: Evolved Monkey for Triggering Malicious Payloads in Android Malware [Volume 13, Issue 2, 2021, Pages 131-143]

  • Evict+Time attack Evict+Time Attack on Intel CPUs without Explicit Knowledge of Address Offsets [Volume 13, Issue 1, 2021, Pages 19-27]

F

  • Feature Extraction OT-Feature Extraction on Scrambled Images with Instantaneous Clustering for CBIR Scheme in Cloud Computing [Volume 13, Issue 1, 2021, Pages 1-17]

  • Field Programmable Gate Array Hardware Trojan Prevention and Detection by Filling Unused Space Using Shift registers, Gate-chain and Extra Routing [Volume 13, Issue 1, 2021, Pages 47-57]

  • File Type Classification File Fragment Type Classification by Bag-Of-Visual-Words [Volume 13, Issue 2, 2021, Pages 101-116]

  • FPGA Intensive Analysis of Physical Parameters of Power Sensors for Remote Side-Channel Attacks [Volume 13, Issue 2, 2021, Pages 163-176]

  • FPGA‎ A Trusted Design Platform for Trojan Detection in FPGA Bitstreams Using Partial Reconfiguration [Volume 13, Issue 1, 2021, Pages 29-45]

G

  • GNR Enumeration Better Sampling Method of Enumeration Solution for BKZ-Simulation [Volume 13, Issue 2, 2021, Pages 177-208]

H

  • Hardware Security An Obfuscation Method Based on CFGLUTs for Security of FPGAs [Volume 13, Issue 2, 2021, Pages 157-162]

  • Hardware Trojan Horses (HTHs) An Obfuscation Method Based on CFGLUTs for Security of FPGAs [Volume 13, Issue 2, 2021, Pages 157-162]

  • Hidden Policy Privacy Preserving Attribute-Based Encryption with Conjunctive Keyword Search for E-health Records in Cloud [Volume 13, Issue 2, 2021, Pages 87-100]

I

  • ID-based Framework An Efficient Pairing-Free Identity Based Proxy Blind Signature Scheme with Message Recovery [Volume 13, Issue 1, 2021, Pages 59-72]

  • Inclusive memory Evict+Time Attack on Intel CPUs without Explicit Knowledge of Address Offsets [Volume 13, Issue 1, 2021, Pages 19-27]

  • Insecure Direct Object Reference (IDOR) IDOT: Black-Box Detection of Access Control Violations in Web Applications [Volume 13, Issue 2, 2021, Pages 117-129]

  • Internet of Things (IoT) Providing a Hybrid Cryptography Algorithm for Lightweight Authentication Protocol in RFID with Urban Traffic Usage Case [Volume 13, Issue 1, 2021, Pages 73-85]

K

  • Keyword Guessing Attack Privacy Preserving Attribute-Based Encryption with Conjunctive Keyword Search for E-health Records in Cloud [Volume 13, Issue 2, 2021, Pages 87-100]

L

  • LRU replacement policy Evict+Time Attack on Intel CPUs without Explicit Knowledge of Address Offsets [Volume 13, Issue 1, 2021, Pages 19-27]

  • LSTM Human Activity Recognition Based on Multi-Sensors in a Smart Home Using Deep Learning [Volume 13, Issue 3, 2021, Pages 69-78]

M

  • Message Recovery An Efficient Pairing-Free Identity Based Proxy Blind Signature Scheme with Message Recovery [Volume 13, Issue 1, 2021, Pages 59-72]

  • Monkey Curious-Monkey: Evolved Monkey for Triggering Malicious Payloads in Android Malware [Volume 13, Issue 2, 2021, Pages 131-143]

O

  • Obfuscation An Obfuscation Method Based on CFGLUTs for Security of FPGAs [Volume 13, Issue 2, 2021, Pages 157-162]

  • Observable points Hardware Trojan Prevention and Detection by Filling Unused Space Using Shift registers, Gate-chain and Extra Routing [Volume 13, Issue 1, 2021, Pages 47-57]

  • Optimal Bounding Function Better Sampling Method of Enumeration Solution for BKZ-Simulation [Volume 13, Issue 2, 2021, Pages 177-208]

  • Otsu’s threshold (OT) OT-Feature Extraction on Scrambled Images with Instantaneous Clustering for CBIR Scheme in Cloud Computing [Volume 13, Issue 1, 2021, Pages 1-17]

  • OWASP Open Web Application Security Project Components with Known Vulnerabilities: A Comprehensive Study [Volume 13, Issue 3, 2021, Pages 59-67]

  • OWSAP Secure Coding Guidelines — Python [Volume 13, Issue 3, 2021, Pages 31-38]

P

  • Partial Reconfiguration A Trusted Design Platform for Trojan Detection in FPGA Bitstreams Using Partial Reconfiguration [Volume 13, Issue 1, 2021, Pages 29-45]

  • Password Spraying Broken Authentication and Session Management Vulnerabilities [Volume 13, Issue 3, 2021, Pages 11-19]

  • Power Sensor Intensive Analysis of Physical Parameters of Power Sensors for Remote Side-Channel Attacks [Volume 13, Issue 2, 2021, Pages 163-176]

  • Privacy Providing a Hybrid Cryptography Algorithm for Lightweight Authentication Protocol in RFID with Urban Traffic Usage Case [Volume 13, Issue 1, 2021, Pages 73-85]

  • Proxy Signature An Efficient Pairing-Free Identity Based Proxy Blind Signature Scheme with Message Recovery [Volume 13, Issue 1, 2021, Pages 59-72]

  • Python Challenges Secure Coding Guidelines — Python [Volume 13, Issue 3, 2021, Pages 31-38]

R

  • Recurrent Neural Network Human Activity Recognition Based on Multi-Sensors in a Smart Home Using Deep Learning [Volume 13, Issue 3, 2021, Pages 69-78]

  • RFID Tag Providing a Hybrid Cryptography Algorithm for Lightweight Authentication Protocol in RFID with Urban Traffic Usage Case [Volume 13, Issue 1, 2021, Pages 73-85]

S

  • Sampling Method Better Sampling Method of Enumeration Solution for BKZ-Simulation [Volume 13, Issue 2, 2021, Pages 177-208]

  • Scrambled images OT-Feature Extraction on Scrambled Images with Instantaneous Clustering for CBIR Scheme in Cloud Computing [Volume 13, Issue 1, 2021, Pages 1-17]

  • Secure Channel Free Privacy Preserving Attribute-Based Encryption with Conjunctive Keyword Search for E-health Records in Cloud [Volume 13, Issue 2, 2021, Pages 87-100]

  • Secure Coding Practices Secure Coding Guidelines — Python [Volume 13, Issue 3, 2021, Pages 31-38]

  • Security Hardware Trojan Prevention and Detection by Filling Unused Space Using Shift registers, Gate-chain and Extra Routing [Volume 13, Issue 1, 2021, Pages 47-57]

  • Security IDOT: Black-Box Detection of Access Control Violations in Web Applications [Volume 13, Issue 2, 2021, Pages 117-129]

  • Session Management Broken Authentication and Session Management Vulnerabilities [Volume 13, Issue 3, 2021, Pages 11-19]

  • Side-Channel Intensive Analysis of Physical Parameters of Power Sensors for Remote Side-Channel Attacks [Volume 13, Issue 2, 2021, Pages 163-176]

  • Sliding Window Preprocessing Human Activity Recognition Based on Multi-Sensors in a Smart Home Using Deep Learning [Volume 13, Issue 3, 2021, Pages 69-78]

  • Solution Norm Better Sampling Method of Enumeration Solution for BKZ-Simulation [Volume 13, Issue 2, 2021, Pages 177-208]

  • Sql Injection A Review Study on SQL Injection Attacks, Prevention, and Detection [Volume 13, Issue 3, 2021, Pages 1-10]

  • Sql Injection Secure Coding Guidelines — Python [Volume 13, Issue 3, 2021, Pages 31-38]

  • Standard Model Privacy Preserving Attribute-Based Encryption with Conjunctive Keyword Search for E-health Records in Cloud [Volume 13, Issue 2, 2021, Pages 87-100]

  • SVM Human Activity Recognition Based on Multi-Sensors in a Smart Home Using Deep Learning [Volume 13, Issue 3, 2021, Pages 69-78]

T

  • TDC Intensive Analysis of Physical Parameters of Power Sensors for Remote Side-Channel Attacks [Volume 13, Issue 2, 2021, Pages 163-176]

  • TDL Intensive Analysis of Physical Parameters of Power Sensors for Remote Side-Channel Attacks [Volume 13, Issue 2, 2021, Pages 163-176]

  • Trusted Design Platform A Trusted Design Platform for Trojan Detection in FPGA Bitstreams Using Partial Reconfiguration [Volume 13, Issue 1, 2021, Pages 29-45]

U

  • Urban Traffic Providing a Hybrid Cryptography Algorithm for Lightweight Authentication Protocol in RFID with Urban Traffic Usage Case [Volume 13, Issue 1, 2021, Pages 73-85]

V

W

  • Web Application Security Open Web Application Security Project Components with Known Vulnerabilities: A Comprehensive Study [Volume 13, Issue 3, 2021, Pages 59-67]

  • Web-Based System A Review Study on SQL Injection Attacks, Prevention, and Detection [Volume 13, Issue 3, 2021, Pages 1-10]