A

  • Abaei, Golnoush A Lightweight Anomaly Detection Model using SVM for WSNs in IoT through a Hybrid Feature Selection Algorithm based on GA and GWO [Volume 7, Issue 1, 2020, Pages 63-79]

  • Abbasi, Fereshteh Intrusion Detection in IoT With Logistic Regression and Artificial Neural Network: Further Investigations on N-BaIoT Dataset Devices [Volume 8, Issue 2, 2021, Pages 27-42]

  • Abdali-Mohammadi, Fardin Improving Face Recognition Systems Security Using Local Binary Patterns [Volume 2, Issue 1, 2015, Pages 55-62]

  • Abdali-Mohammadi, Fardin A Novel Grammar-Based Approach to Atrial Fibrillation Arrhythmia Detection for Pervasive Healthcare Environments [Volume 2, Issue 2, 2015, Pages 155-163]

  • Abdali-Mohammadi, Fardin Effect of Purposeful Feature Extraction in High-dimensional Kinship Verification Problem [Volume 3, Issue 3, 2016, Pages 183-191]

  • Abdellahi Khorasgani, Alireza A Lightweight Authentication Scheme for RFID with Permutation Operation on Passive Tags [Volume 8, Issue 2, 2021, Pages 71-86]

  • Abdollahi Azgomi, Mohammad Expected Coverage of Perfect Chains in the Hellman Time Memory Trade-Off [Volume 3, Issue 3, 2016, Pages 155-162]

  • Abdolrazzagh-Nezhad, Majid CSE: A Novel Dynamic Obfuscation Based on Control Flow, Signals and Encryption [Volume 6, Issue 2, 2019, Pages 53-63]

  • Abhari, Bardia Gamifault: A Gamified Motivational Framework for Software Debugging Process [Volume 10, Issue 1, 2023, Pages 17-33]

  • Adibi, Peyman A Growing Hierarchical Approach to Batch Linear Manifold Topographic Map Formation [Volume 1, Issue 1, 2014, Pages 47-59]

  • Ahmadi, Ali Persian Texts Part of Speech Tagging Using Artificial Neural Networks [Volume 3, Issue 4, 2016, Pages 233-241]

  • Ahmadi, Maedeh Adaptive Interval Type-2 Fuzzy Inference System for Facial Expression Recognition [Volume 2, Issue 3, 2015, Pages 125-207]

  • Ahmadi, Mahmood Performance Evaluation of Apache Spark MLlib Algorithms on an Intrusion Detection Dataset [Volume 9, Issue 1, 2022, Pages 57-69]

  • Ahmadi, Mahmood DiCuPIT: Distributed Cuckoo Filter-based Pending Interest Table [Volume 9, Issue 1, 2022, Pages 85-96]

  • Ajoudanian, Shohreh A Novel Solution for Author Attribution Problem in Anonymous E-mail [Volume 1, Issue 4, 2014, Pages 319-327]

  • Akhaee, Mohammad Ali Improved Secure and Privacy Preserving Keyword Searching Cryptography [Volume 2, Issue 3, 2015, Pages 185-194]

  • Akhoondi, Rana A GA Approach for Tuning Membership Functions of a Fuzzy Expert System for Heart Disease Prognosis Development Risk [Volume 4, Issue 1, 2017, Pages 13-23]

  • Alavi, Seyyed Enayatallah Intrusion Detection in IoT With Logistic Regression and Artificial Neural Network: Further Investigations on N-BaIoT Dataset Devices [Volume 8, Issue 2, 2021, Pages 27-42]

  • Alfraihi, Hessa eXtreme Modeling: an approach to agile model-based development [Volume 6, Issue 2, 2019, Pages 43-52]

  • Ali, Rosmah An Empirical Study of Students' Perceptions on the Technological Aspects of the E-Learning System [Volume 4, Issue 1, 2017, Pages 25-38]

  • Ali Asgari Renani, Fatemeh Indoor Path Tracking Using Combination of Viterbi and WKNN [Volume 8, Issue 2, 2021, Pages 19-26]

  • Alidoosti, Mitra BLProM: A black-box approach for detecting business-layer processes in the web applications [Volume 6, Issue 2, 2019, Pages 65-80]

  • Alikhani, Parastoo Gamifault: A Gamified Motivational Framework for Software Debugging Process [Volume 10, Issue 1, 2023, Pages 17-33]

  • Alimoradi, Dariush The Effect of Correlogram Properties on Blind Steganalysis in JPEG Images [Volume 1, Issue 1, 2014, Pages 39-46]

  • Alirezazadeh, Pendar Effect of Purposeful Feature Extraction in High-dimensional Kinship Verification Problem [Volume 3, Issue 3, 2016, Pages 183-191]

  • Alizadeh, Javad JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH [Volume 2, Issue 1, 2015, Pages 3-20]

  • Almasi, Ramin A High-Payload Audio Watermarking Scheme for Real-Time Applications [Volume 2, Issue 2, 2015, Pages 119-127]

  • Amini, Mohammad Effective Intrusion Detection with a Neural Network Ensemble Using Fuzzy Clustering and Stacking Combination Method [Volume 1, Issue 4, 2014, Pages 293-305]

  • Amirfattahi, Rasoul Semantic Segmentation of Aerial Images Using Fusion of Color and Texture Features [Volume 1, Issue 3, 2014, Pages 225-238]

  • Amiri, Maryam Illegal Miner Detection based on Pattern Mining: A Practical Approach [Volume 9, Issue 2, 2022, Pages 1-10]

  • Amirjamshidi, Zhale A High Speed Residue-to-Binary Converter for Balanced 4-Moduli Set [Volume 2, Issue 1, 2015, Pages 43-54]

  • Amouzadi, Azam HH-FRBC: Halving Hierarchical Fuzzy Rule-Based Classifier [Volume 1, Issue 3, 2014, Pages 215-224]

  • Analoui, Morteza Simulating the Resource Freeing Attack: Using Cloudsim Simulator [Volume 2, Issue 4, 2015, Pages 293-302]

  • Arabjafari, Monireh Evaluating Behavioral Intentions of Tourists in e-Tourism [Volume 1, Issue 2, 2014, Pages 95-109]

  • Arabnezhad, Hossein Toward A More Efficient Gröbner-based Algebraic Cryptanalysis [Volume 7, Issue 2, 2020, Pages 103-117]

  • Aref, Mohammad Reza JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH [Volume 2, Issue 1, 2015, Pages 3-20]

  • Asadi Amiri, Sekineh Robust Face Recognition Under Illumination Changes and Pose Variations [Volume 5, Issue 2, 2018, Pages 81-89]

  • Asadollahi, Hamid Multicollision Attack on a recently proposed hash function vMDC-2 [Volume 3, Issue 4, 2016, Pages 211-215]

  • Asgarian, Ehsan Improving Semi-supervised Constrained k-Means Clustering Method Using User Feedback [Volume 1, Issue 4, 2014, Pages 273-261]

  • Ashooriyan, Peyman Multiple-Fault Tolerant Hardware Structure for Cellular Genetic Algorithm [Volume 3, Issue 1, 2016, Pages 27-42]

  • Askari, Hesam Illegal Miner Detection based on Pattern Mining: A Practical Approach [Volume 9, Issue 2, 2022, Pages 1-10]

  • Askarian, Ahmad An Optimal Traffic Distribution Method Supporting End-to-End Delay Bound [Volume 1, Issue 1, 2014, Pages 61-71]

  • Atefinia, Ramin Performance Evaluation of Apache Spark MLlib Algorithms on an Intrusion Detection Dataset [Volume 9, Issue 1, 2022, Pages 57-69]

B

  • Babamir, Seyed Morteza Ranking of Common Architectural Styles Based on Availability, Security and Performance Quality Attributes [Volume 1, Issue 2, 2014, Pages 83-93]

  • Babamir, Seyed Morteza A Method for Assessing Maintainability of Software Architectural Styles in Self-healing Systems by Measuring Coupling and Cohesion [Volume 2, Issue 1, 2015, Pages 31-42]

  • Bagheri, Ayoub PSA: A Hybrid Feature Selection Approach for Persian Text Classification [Volume 1, Issue 4, 2014, Pages 261-272]

  • Bagheri, Nasour JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH [Volume 2, Issue 1, 2015, Pages 3-20]

  • Bagheri, Nasour On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol [Volume 3, Issue 4, 2016, Pages 201-209]

  • Bagheri, Nasour Multicollision Attack on a recently proposed hash function vMDC-2 [Volume 3, Issue 4, 2016, Pages 211-215]

  • Bahrak, Behnam Improved Secure and Privacy Preserving Keyword Searching Cryptography [Volume 2, Issue 3, 2015, Pages 185-194]

  • Bahraman, Kaveh Momentum Contrast Self-Supervised Based Training for Adversarial Robustness [Volume 8, Issue 1, 2021, Pages 33-43]

  • Baleghi Damavandi, Yasser Multiple-Fault Tolerant Hardware Structure for Cellular Genetic Algorithm [Volume 3, Issue 1, 2016, Pages 27-42]

  • Barangi, Hamed Model-Driven Software Engineering: A Bibliometric Analysis [Volume 8, Issue 1, 2021, Pages 93-108]

  • Basereh, Zeinab The Diagnosis of Epilepsy by Gravitational Search Algorithm and Support Vector Machines [Volume 3, Issue 2, 2016, Pages 111-125]

  • Berenjkoub, Mehdi An Efficient End to End Key Establishment Protocol for Wireless Sensor Networks [Volume 1, Issue 1, 2014, Pages 23-38]

  • Bozorgi, Arastoo Improving Semi-supervised Constrained k-Means Clustering Method Using User Feedback [Volume 1, Issue 4, 2014, Pages 273-261]

  • Bushehrian, Omid Web Service Matchmaking based on Functional Similarity in Service Cloud [Volume 2, Issue 4, 2015, Pages 257-270]

  • Bushehrian, Omid A Workload-Adaptable Method for Migrated Software to the Cloud [Volume 2, Issue 4, 2015, Pages 271-279]

  • Bushehrian, Omid Change Impact Analysis by Concept Propagation [Volume 5, Issue 1, 2018, Pages 51-56]

C

  • Chegeni, Mastaneh Indoor Path Tracking Using Combination of Viterbi and WKNN [Volume 8, Issue 2, 2021, Pages 19-26]

D

  • Dakhilalian, Mohammad Some Primitives Based on Jumping LFSRs with Determined Period [Volume 2, Issue 3, 2015, Pages 175-184]

  • Davahli, Azam A Lightweight Anomaly Detection Model using SVM for WSNs in IoT through a Hybrid Feature Selection Algorithm based on GA and GWO [Volume 7, Issue 1, 2020, Pages 63-79]

  • Dehyadegari, Masoud Signature Codes for Energy-Efficient Data Movement in On-chip Networks [Volume 7, Issue 2, 2020, Pages 95-101]

  • Deypir, Mahmood A Novel Block Cipher Algorithm with Feistel-Like Structure [Volume 3, Issue 1, 2016, Pages 13-26]

  • Doostari, Mohammad Ali Determining the Number of Accusations for Decision Making in Key Revocation Protocol for MANET [Volume 3, Issue 1, 2016, Pages 63-72]

  • Dorri Nogoorani, Sadegh Decentralized App Store and License Management Using Smart Contracts and Self-Sovereign Identities [Volume 9, Issue 2, 2022, Pages 39-54]

E

  • Ebrahimi, Seyyed Ashkan A New Implementation for a 2^n-1 Modular Adder Through Carbon Nanotube Field Effect Transistors [Volume 2, Issue 2, 2015, Pages 129-139]

  • Ebrahimi Atani, Reza A Provably Secure Variant of ETRU Based on Extended Ideal Lattices Over Direct Product of Dedekind Domains [Volume 5, Issue 1, 2018, Pages 13-34]

  • Ebrahimi Atani, Shahabaddin A Provably Secure Variant of ETRU Based on Extended Ideal Lattices Over Direct Product of Dedekind Domains [Volume 5, Issue 1, 2018, Pages 13-34]

  • Ebrahimi Mood, Sepehr New Functions for Mass Calculation in Gravitational Search Algorithm [Volume 2, Issue 3, 2015, Pages 233-246]

  • Eftekhari, Mahdi A New Hybrid Approach for Modeling Accurate Fuzzy Rule Based Classification Systems [Volume 1, Issue 2, 2014, Pages 111-122]

  • Eftekhari, Mahdi Comparison of Hybrid and Filter Feature Selection Methods to Identify Candidate Single Nucleotide Polymorphisms [Volume 1, Issue 3, 2014, Pages 205-2013]

  • Eftekhari, Mahdi Momentum Contrast Self-Supervised Based Training for Adversarial Robustness [Volume 8, Issue 1, 2021, Pages 33-43]

  • Eslami, Ziba A CCA2-Secure Incomparable Public Key Encryption Scheme [Volume 3, Issue 1, 2016, Pages 3-12]

  • Eslami, Ziba Verifiable Social Multi-Secret Sharing Secure in Active Adversarial Model [Volume 4, Issue 1, 2017, Pages 3-12]

  • Esmaeildoust, Mohammad A High Speed Residue-to-Binary Converter for Balanced 4-Moduli Set [Volume 2, Issue 1, 2015, Pages 43-54]

  • Esmailizadeh, Ali Comparison of Hybrid and Filter Feature Selection Methods to Identify Candidate Single Nucleotide Polymorphisms [Volume 1, Issue 3, 2014, Pages 205-2013]

F

  • Fakhrahmad, Seyed Mostafa Word Sense Disambiguation Based on Lexical and Semantic Features Using Naive Bayes Classifier [Volume 1, Issue 2, 2014, Pages 123-132]

  • Fallah-Mehrjardi, Omid Demand based Resource Allocation to Balance the Utilization and User Level Fairness in Femtocell Networks [Volume 1, Issue 3, 2014, Pages 187-204]

  • Fanian, Ali An Efficient End to End Key Establishment Protocol for Wireless Sensor Networks [Volume 1, Issue 1, 2014, Pages 23-38]

  • Fanian, Ali A Hybrid Method based on Statistical Features and Packet Content Analysis to Identify Major Network Tunneling Protocols [Volume 3, Issue 2, 2016, Pages 95-110]

  • Farahani, Gholamreza Scalability Analysis of a LoRa Network Under Inter-SF and Co-SF Interference with Poisson Point Process Model [Volume 8, Issue 2, 2021, Pages 43-57]

  • Farahbod, Fahimeh A New Hybrid Approach for Modeling Accurate Fuzzy Rule Based Classification Systems [Volume 1, Issue 2, 2014, Pages 111-122]

  • Farahmandpour, Zeinab A Study on Intelligent Authorship Methods in Persian Language [Volume 2, Issue 1, 2015, Pages 63-76]

  • Faridmoayer, Sogol Applying Meta-Heuristics Algorithms in Model-Driven Approaches for Solving the CRA Problem [Volume 7, Issue 2, 2020, Pages 141-161]

  • Farmani, Vahid Adaptive Interval Type-2 Fuzzy Inference System for Facial Expression Recognition [Volume 2, Issue 3, 2015, Pages 125-207]

  • Farokh, Azam A Method for Assessing Maintainability of Software Architectural Styles in Self-healing Systems by Measuring Coupling and Cohesion [Volume 2, Issue 1, 2015, Pages 31-42]

  • Farsi, Hassan Training-Free Object Matching and Retrieval Using Speeded Up Robust Features [Volume 2, Issue 2, 2015, Pages 141-153]

  • Fatehi, Kavan Improving Semi-supervised Constrained k-Means Clustering Method Using User Feedback [Volume 1, Issue 4, 2014, Pages 273-261]

  • Fatemi, Afsaneh Capability-Based Team Formation in Researchers Social Networks [Volume 4, Issue 2, 2017, Pages 63-79]

  • Fatemi, Afsaneh Towards a Model-Driven Framework for Simulating Interactive Emergency Response Environments [Volume 5, Issue 1, 2018, Pages 35-49]

  • Fatemi, Afsaneh BAS: An Answer Selection Method Using BERT Language Model [Volume 8, Issue 2, 2021, Pages 1-18]

  • Fathi, Abdolhossein Improving Face Recognition Systems Security Using Local Binary Patterns [Volume 2, Issue 1, 2015, Pages 55-62]

  • Fathi, Abdolhossein A Novel Grammar-Based Approach to Atrial Fibrillation Arrhythmia Detection for Pervasive Healthcare Environments [Volume 2, Issue 2, 2015, Pages 155-163]

  • Fathi, Abdolhossein Effect of Purposeful Feature Extraction in High-dimensional Kinship Verification Problem [Volume 3, Issue 3, 2016, Pages 183-191]

  • Fathi, Abdolhossein Combination of Genetic Programming and Support Vector Machine-Based Prediction of Protein-Peptide Binding Sites With Sequence and Structure-Based Features [Volume 8, Issue 1, 2021, Pages 45-63]

G

  • Ghadiri, Nasser A Sample-Based Approach to Data Quality Assessment in Spatial Databases with Application to Mobile Trajectory Nearest-Neighbor Search [Volume 1, Issue 3, 2014, Pages 239-249]

  • Ghaemi Bafghi, Abbas A Risk Estimation Framework for Security Threats in Computer Networks [Volume 7, Issue 1, 2020, Pages 19-33]

  • Ghaffarian, Hossein Indoor Path Tracking Using Combination of Viterbi and WKNN [Volume 8, Issue 2, 2021, Pages 19-26]

  • Ghaffarian, Hossein Indoor Localization Performance Optimization Using Modified kd-Tree Algorithm [Volume 9, Issue 2, 2022, Pages 55-64]

  • Gharavi, Naser Hossein Expected Coverage of Perfect Chains in the Hellman Time Memory Trade-Off [Volume 3, Issue 3, 2016, Pages 155-162]

  • Ghareh Chamani, Javad Privacy-Preserving Fine-grained Correctness Verification of Query Results in Outsourced Databases [Volume 2, Issue 2, 2015, Pages 87-107]

  • Ghasemi, Simin A Trust-Based Approach for Correctness verification of Query Results in Data Outsourcing [Volume 1, Issue 1, 2014, Pages 3-14]

  • Ghatee, Mehdi Solution of the Generalized Interval Linear Programming Problems: Pessimistic and Optimistic Approaches [Volume 1, Issue 2, 2014, Pages 159-167]

  • Ghiasian, Ali Analyzing the Impact of Wireless Channels on the Efficiency of Edge Computing in IoT Applications [Volume 8, Issue 2, 2021, Pages 59-70]

  • Gholamnezhad, Pezhman Gaussian Linear Regression Crossover for Genetic Algorithms [Volume 9, Issue 1, 2022, Pages 45-56]

  • Golzari, Shahram The Diagnosis of Epilepsy by Gravitational Search Algorithm and Support Vector Machines [Volume 3, Issue 2, 2016, Pages 111-125]

H

  • Hadavandi, Esmaeil Effective Intrusion Detection with a Neural Network Ensemble Using Fuzzy Clustering and Stacking Combination Method [Volume 1, Issue 4, 2014, Pages 293-305]

  • Hadavi, Mohammad Ali An Inference Resistant Indexing Technique to Enforce Access Control in Data Outsourcing [Volume 3, Issue 2, 2016, Pages 83-93]

  • Hadavi, Mohammad Ali A Trust-Based Approach for Correctness verification of Query Results in Data Outsourcing [Volume 1, Issue 1, 2014, Pages 3-14]

  • Hadavi, Mohammad Ali Privacy-Preserving Fine-grained Correctness Verification of Query Results in Outsourced Databases [Volume 2, Issue 2, 2015, Pages 87-107]

  • Hadavi, Mohammad Ali Automatic Black-Box Detection of Resistance Against CSRF Vulnerabilities in Web Applications [Volume 8, Issue 1, 2021, Pages 19-32]

  • Haj Seyyed Javadi, Seyyed Hamid Determining the Number of Accusations for Decision Making in Key Revocation Protocol for MANET [Volume 3, Issue 1, 2016, Pages 63-72]

  • Halakou, Farideh Comparison of Hybrid and Filter Feature Selection Methods to Identify Candidate Single Nucleotide Polymorphisms [Volume 1, Issue 3, 2014, Pages 205-2013]

  • Halvachi, Hadi An Inference Resistant Indexing Technique to Enforce Access Control in Data Outsourcing [Volume 3, Issue 2, 2016, Pages 83-93]

  • Harifi, Abbas The Diagnosis of Epilepsy by Gravitational Search Algorithm and Support Vector Machines [Volume 3, Issue 2, 2016, Pages 111-125]

  • Hasanzadeh, Maryam The Effect of Correlogram Properties on Blind Steganalysis in JPEG Images [Volume 1, Issue 1, 2014, Pages 39-46]

  • Hashemi, Massoud Reza An Optimal Traffic Distribution Method Supporting End-to-End Delay Bound [Volume 1, Issue 1, 2014, Pages 61-71]

  • Hashemi, Massoud Reza Deploying IoT, Based on NDN Protocol in a Fog Computing Infrastructure [Volume 9, Issue 1, 2022, Pages 31-44]

  • Hashemzade, Bahare CSE: A Novel Dynamic Obfuscation Based on Control Flow, Signals and Encryption [Volume 6, Issue 2, 2019, Pages 53-63]

  • Hassani Karbasi, Amir A Provably Secure Variant of ETRU Based on Extended Ideal Lattices Over Direct Product of Dedekind Domains [Volume 5, Issue 1, 2018, Pages 13-34]

  • Hassanpour, Hamid Robust Face Recognition Under Illumination Changes and Pose Variations [Volume 5, Issue 2, 2018, Pages 81-89]

  • HoseinDoost, Samaneh Towards a Model-Driven Framework for Simulating Interactive Emergency Response Environments [Volume 5, Issue 1, 2018, Pages 35-49]

  • HoseinDoost, Samaneh Applying Meta-Heuristics Algorithms in Model-Driven Approaches for Solving the CRA Problem [Volume 7, Issue 2, 2020, Pages 141-161]

  • Hosseini, Rahil A GA Approach for Tuning Membership Functions of a Fuzzy Expert System for Heart Disease Prognosis Development Risk [Volume 4, Issue 1, 2017, Pages 13-23]

  • Hosseini Pozveh, Zahra Persian Texts Part of Speech Tagging Using Artificial Neural Networks [Volume 3, Issue 4, 2016, Pages 233-241]

  • Hosseini-Pozveh, Maryam New Influence-Aware Centrality Measures for Influence Maximization in Social Networks [Volume 9, Issue 2, 2022, Pages 23-38]

  • Hosseini-Pozveh, Maryam A new PageRank-based method for influence maximization in signed social networks [(Articles in Press)]

  • Hosseinzadeh, Mehdi On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol [Volume 3, Issue 4, 2016, Pages 201-209]

J

  • Jabbari, Ghazal Analyzing the Impact of Wireless Channels on the Efficiency of Edge Computing in IoT Applications [Volume 8, Issue 2, 2021, Pages 59-70]

  • Jalili, Rasool A Trust-Based Approach for Correctness verification of Query Results in Data Outsourcing [Volume 1, Issue 1, 2014, Pages 3-14]

  • Jalili, Rasool Privacy-Preserving Fine-grained Correctness Verification of Query Results in Outsourced Databases [Volume 2, Issue 2, 2015, Pages 87-107]

  • Jalili, Rasool An Inference Resistant Indexing Technique to Enforce Access Control in Data Outsourcing [Volume 3, Issue 2, 2016, Pages 83-93]

  • Jalili, Rasool An Extension of CryptoPAi to the Formal Analysis of E-voting Protocols [Volume 6, Issue 1, 2019, Pages 25-42]

  • Javidi, Mohammad Masoud New Functions for Mass Calculation in Gravitational Search Algorithm [Volume 2, Issue 3, 2015, Pages 233-246]

K

  • Karimi, Zahra Using Data Mining to Investigate the Effect of Cognitive Style on Programming Habits [Volume 9, Issue 2, 2022, Pages 11-22]

  • Kazemi, Arefeh Adaptive Reinforcement-Based Genetic Algorithm for Combinatorial Optimization [Volume 9, Issue 1, 2022, Pages 71-84]

  • Kazemi, Keihan A Hybrid Method based on Statistical Features and Packet Content Analysis to Identify Major Network Tunneling Protocols [Volume 3, Issue 2, 2016, Pages 95-110]

  • Kazemifard, Mohammad AUBUE: An Adaptive User-Interface Based on Users' Emotions [Volume 3, Issue 2, 2016, Pages 127-145]

  • Khademzadeh, Ahmad On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol [Volume 3, Issue 4, 2016, Pages 201-209]

  • Khalilian, Alireza Gamifault: A Gamified Motivational Framework for Software Debugging Process [Volume 10, Issue 1, 2023, Pages 17-33]

  • Khasseh, Ali Akbar Model-Driven Software Engineering: A Bibliometric Analysis [Volume 8, Issue 1, 2021, Pages 93-108]

  • Khodambashi, Siavash A Weak Blind Signature Based on Quantum Key Distribution [Volume 1, Issue 3, 2014, Pages 179-186]

  • Khodayari Tehraninejad, Dina Proxima: Process Mining for Extracting Configurable Process Models Using Software Product Line Concepts [Volume 9, Issue 1, 2022, Pages 1-29]

  • Khoshnevis, Sedigheh Proxima: Process Mining for Extracting Configurable Process Models Using Software Product Line Concepts [Volume 9, Issue 1, 2022, Pages 1-29]

  • Khosravi, Hadi Structural and Non-Structural Similarity Combination of Users in Social Networks [Volume 3, Issue 1, 2016, Pages 43-52]

  • Kohansal, Omid Robust Face Recognition Under Illumination Changes and Pose Variations [Volume 5, Issue 2, 2018, Pages 81-89]

  • Kolahdouz Rahimi, Shekoufeh eXtreme Modeling: an approach to agile model-based development [Volume 6, Issue 2, 2019, Pages 43-52]

  • Kolahdouz Rahimi, Shekoufeh Applying Meta-Heuristics Algorithms in Model-Driven Approaches for Solving the CRA Problem [Volume 7, Issue 2, 2020, Pages 141-161]

  • Kolahdouz Rahimi, Shekoufeh Model-Driven Software Engineering: A Bibliometric Analysis [Volume 8, Issue 1, 2021, Pages 93-108]

  • Kord Toudeshki, Leila A Context Model for Business Process Adaptation based on Ontology Reasoning [Volume 7, Issue 2, 2020, Pages 119-140]

L

  • Lano, Kevin eXtreme Modeling: an approach to agile model-based development [Volume 6, Issue 2, 2019, Pages 43-52]

  • Lano, Kevin Formalizing the main characteristics of QVT-based model transformation languages [Volume 7, Issue 1, 2020, Pages 35-62]

  • Lobabi-Mirghavami, Hanieh A Novel Grammar-Based Approach to Atrial Fibrillation Arrhythmia Detection for Pervasive Healthcare Environments [Volume 2, Issue 2, 2015, Pages 155-163]

  • Lotfi Shahreza, Maryam Development of a CGAN-based method for aspect level text generation: encouragement and punishment factors in the aspect knowledge [(Articles in Press)]

  • Lotfi Shahreza, Maryam A new PageRank-based method for influence maximization in signed social networks [(Articles in Press)]

M

  • Mahdavi, Mojtaba Steganography of Halftone Images by Group Alteration of Grayscale Pixels [Volume 2, Issue 1, 2015, Pages 21-30]

  • Mahmoudi, Arman DiCuPIT: Distributed Cuckoo Filter-based Pending Interest Table [Volume 9, Issue 1, 2022, Pages 85-96]

  • Mahrooghi, Hamid Reza An Extension of CryptoPAi to the Formal Analysis of E-voting Protocols [Volume 6, Issue 1, 2019, Pages 25-42]

  • Mala, Hamid Unified Byte Permutations for the Block Cipher 3D [Volume 1, Issue 1, 2014, Pages 15-22]

  • Mala, Hamid Demand based Resource Allocation to Balance the Utilization and User Level Fairness in Femtocell Networks [Volume 1, Issue 3, 2014, Pages 187-204]

  • Mala, Hamid Security Analysis of an EPC Class-1 Generation-2 Compliant RFID Authentication Protocol [Volume 3, Issue 3, 2016, Pages 163-174]

  • Malekmohammad, Azam Structural and Non-Structural Similarity Combination of Users in Social Networks [Volume 3, Issue 1, 2016, Pages 43-52]

  • Mazinani, Mahdi A GA Approach for Tuning Membership Functions of a Fuzzy Expert System for Heart Disease Prognosis Development Risk [Volume 4, Issue 1, 2017, Pages 13-23]

  • Mehran, Narges Randomized SVD Based Probabilistic Caching Strategy in Named Data Networks [Volume 3, Issue 4, 2016, Pages 217-231]

  • Mirghadri, Abdorasool Expected Coverage of Perfect Chains in the Hellman Time Memory Trade-Off [Volume 3, Issue 3, 2016, Pages 155-162]

  • Mirzaei, Abdolreza HH-FRBC: Halving Hierarchical Fuzzy Rule-Based Classifier [Volume 1, Issue 3, 2014, Pages 215-224]

  • Mirzaei, Abdolreza Adaptive Interval Type-2 Fuzzy Inference System for Facial Expression Recognition [Volume 2, Issue 3, 2015, Pages 125-207]

  • Mirzaei, Arash Some Primitives Based on Jumping LFSRs with Determined Period [Volume 2, Issue 3, 2015, Pages 175-184]

  • Moghissi, Gholam Reza Rejecting Claimed Speedup of 2^𝛽/2 in Extreme Pruning and Revising BKZ 2.0 for Better Speedup [Volume 8, Issue 1, 2021, Pages 65-91]

  • Moghissi, Gholam Reza Design of Optimal Progressive BKZ with Increasing Success-Probabilities and Increasing Block-Sizes [Volume 9, Issue 2, 2022, Pages 65-93]

  • Mohamadzadeh, Sajad Training-Free Object Matching and Retrieval Using Speeded Up Robust Features [Volume 2, Issue 2, 2015, Pages 141-153]

  • Mohammadi, Atefeh Identifying Explicit Features of Persian Comments [Volume 6, Issue 1, 2019, Pages 1-11]

  • Mohammadi, Solmaz Scalability Analysis of a LoRa Network Under Inter-SF and Co-SF Interference with Poisson Point Process Model [Volume 8, Issue 2, 2021, Pages 43-57]

  • Mohd Zainuddin, Norziha Megat An Empirical Study of Students' Perceptions on the Technological Aspects of the E-Learning System [Volume 4, Issue 1, 2017, Pages 25-38]

  • Mollashahi, Hadid Summarization Algorithm for Data Stream to Speed up Outlier Data Detection [(Articles in Press)]

  • Monadjemi, Amirhassan Persian Texts Part of Speech Tagging Using Artificial Neural Networks [Volume 3, Issue 4, 2016, Pages 233-241]

  • Montazeri, Morteza Identifying Explicit Features of Persian Comments [Volume 6, Issue 1, 2019, Pages 1-11]

  • Moodi, Hossein A New Hybrid Method for VoIP Stream Steganography [Volume 3, Issue 3, 2016, Pages 175-182]

  • Moradi, Fariba Security Analysis of an EPC Class-1 Generation-2 Compliant RFID Authentication Protocol [Volume 3, Issue 3, 2016, Pages 163-174]

  • Moradi, Fereidoun Security Analysis of an EPC Class-1 Generation-2 Compliant RFID Authentication Protocol [Volume 3, Issue 3, 2016, Pages 163-174]

  • Moradyan, Kourosh Web Service Matchmaking based on Functional Similarity in Service Cloud [Volume 2, Issue 4, 2015, Pages 257-270]

  • Mosakhani, Mostafa A more Accurate Clustering Method by using Co-author Social Networks for Author Name Disambiguation [Volume 1, Issue 4, 2014, Pages 307-317]

  • Moshavash, Monireh Momentum Contrast Self-Supervised Based Training for Adversarial Robustness [Volume 8, Issue 1, 2021, Pages 33-43]

  • Mousavi, Sayyed Ahmad Expected Coverage of Perfect Chains in the Hellman Time Memory Trade-Off [Volume 3, Issue 3, 2016, Pages 155-162]

  • Mousavi Esfahani, Shahrzad Sadat Gamifault: A Gamified Motivational Framework for Software Debugging Process [Volume 10, Issue 1, 2023, Pages 17-33]

  • Movahhedinia, Naser Demand based Resource Allocation to Balance the Utilization and User Level Fairness in Femtocell Networks [Volume 1, Issue 3, 2014, Pages 187-204]

  • Movahhedinia, Naser Randomized SVD Based Probabilistic Caching Strategy in Named Data Networks [Volume 3, Issue 4, 2016, Pages 217-231]

  • Mozafari, Jamshid BAS: An Answer Selection Method Using BERT Language Model [Volume 8, Issue 2, 2021, Pages 1-18]

  • Musevi Niya, Mir Javad Robust Cooperative Spectrum Sensing under Primary User Emulation Attack in Cognitive Radio Networks [Volume 2, Issue 2, 2015, Pages 109-117]

N

  • Naderan, Marjan Intrusion Detection in IoT With Logistic Regression and Artificial Neural Network: Further Investigations on N-BaIoT Dataset Devices [Volume 8, Issue 2, 2021, Pages 27-42]

  • Nadi, Shiva PSA: A Hybrid Feature Selection Approach for Persian Text Classification [Volume 1, Issue 4, 2014, Pages 261-272]

  • Nadimi, Mohammad Hossein A more Accurate Clustering Method by using Co-author Social Networks for Author Name Disambiguation [Volume 1, Issue 4, 2014, Pages 307-317]

  • Naghsh-Nilchi, Ahmad Reza Editorial Note [Volume 1, Issue 1, 2014, Pages 1-2]

  • Naghsh-Nilchi, Ahmad Reza Editorial Note [Volume 1, Issue 2, 2014, Pages 81-82]

  • Naghsh-Nilchi, Ahmad Reza A New Hybrid Method for VoIP Stream Steganography [Volume 3, Issue 3, 2016, Pages 175-182]

  • Nasiripour, Reza Training-Free Object Matching and Retrieval Using Speeded Up Robust Features [Volume 2, Issue 2, 2015, Pages 141-153]

  • Nassiri-Mofakham, Faria DOPPONENT: A Socially Efficient Preference Model of Opponent in Bilateral Multi Issue Negotiations [Volume 1, Issue 4, 2014, Pages 283-292]

  • Navi, Keivan A High Speed Residue-to-Binary Converter for Balanced 4-Moduli Set [Volume 2, Issue 1, 2015, Pages 43-54]

  • Nayebalsadr, Shakiba Simulating the Resource Freeing Attack: Using Cloudsim Simulator [Volume 2, Issue 4, 2015, Pages 293-302]

  • Nematbakhsh, MohammadAli Identifying Explicit Features of Persian Comments [Volume 6, Issue 1, 2019, Pages 1-11]

  • Nematbakhsh, Mohammad Ali MRAR: Mining Multi-Relation Association Rules [Volume 1, Issue 2, 2014, Pages 133-158]

  • Nematbakhsh, Mohammad Ali Mining Association Rules from Semantic Web Data without User Intervention [Volume 7, Issue 1, 2020, Pages 81-94]

  • Nematbakhsh, Mohammad Ali BAS: An Answer Selection Method Using BERT Language Model [Volume 8, Issue 2, 2021, Pages 1-18]

  • Nickabadi, Ahmad BLProM: A black-box approach for detecting business-layer processes in the web applications [Volume 6, Issue 2, 2019, Pages 65-80]

  • Nikmehr, Hooman A Study on Intelligent Authorship Methods in Persian Language [Volume 2, Issue 1, 2015, Pages 63-76]

  • Nikmehr, Hooman A High-Payload Audio Watermarking Scheme for Real-Time Applications [Volume 2, Issue 2, 2015, Pages 119-127]

  • Nilforoush, Mohammad Reza Deploying IoT, Based on NDN Protocol in a Fog Computing Infrastructure [Volume 9, Issue 1, 2022, Pages 31-44]

  • Noferesti, Morteza A Trust-Based Approach for Correctness verification of Query Results in Data Outsourcing [Volume 1, Issue 1, 2014, Pages 3-14]

  • Noorani, S.Fatemeh Using Data Mining to Investigate the Effect of Cognitive Style on Programming Habits [Volume 9, Issue 2, 2022, Pages 11-22]

  • Noorbehbahani, Fakhroddin RSAM: A Questionnaire for Ransomware Security Awareness Measurement [Volume 10, Issue 1, 2023, Pages 1-15]

  • Noori, Fariba AUBUE: An Adaptive User-Interface Based on Users' Emotions [Volume 3, Issue 2, 2016, Pages 127-145]

  • Nowroozi, Alireza BLProM: A black-box approach for detecting business-layer processes in the web applications [Volume 6, Issue 2, 2019, Pages 65-80]

O

  • Omoomi, Behnaz An Optimal Traffic Distribution Method Supporting End-to-End Delay Bound [Volume 1, Issue 1, 2014, Pages 61-71]

  • Oraei, Hossein An Improvement Over Lee et al.'s Key Agreement Protocol [Volume 5, Issue 1, 2018, Pages 3-12]

  • Osareh, Alireza A Survey on Transformation Methods of XML Documents to Ontologies [Volume 4, Issue 2, 2017, Pages 81-100]

P

  • Pajoohan, Mohammad-Reza Identifying Explicit Features of Persian Comments [Volume 6, Issue 1, 2019, Pages 1-11]

  • Pakniat, Nasrollah Verifiable Social Multi-Secret Sharing Secure in Active Adversarial Model [Volume 4, Issue 1, 2017, Pages 3-12]

  • Pakniat, Nasrollah Security Analysis of Two Lightweight Certificateless Signature Schemes [Volume 5, Issue 2, 2018, Pages 59-65]

  • Parsaei, Fahimeh Evaluating Behavioral Intentions of Tourists in e-Tourism [Volume 1, Issue 2, 2014, Pages 95-109]

  • Parsazadeh, Nadia An Empirical Study of Students' Perceptions on the Technological Aspects of the E-Learning System [Volume 4, Issue 1, 2017, Pages 25-38]

  • Payandeh, Ali Rejecting Claimed Speedup of 2^𝛽/2 in Extreme Pruning and Revising BKZ 2.0 for Better Speedup [Volume 8, Issue 1, 2021, Pages 65-91]

  • Payandeh, Ali Design of Optimal Progressive BKZ with Increasing Success-Probabilities and Increasing Block-Sizes [Volume 9, Issue 2, 2022, Pages 65-93]

  • P.Haughton, Howard eXtreme Modeling: an approach to agile model-based development [Volume 6, Issue 2, 2019, Pages 43-52]

  • Pourkhani, Mohammadereza A Survey on Transformation Methods of XML Documents to Ontologies [Volume 4, Issue 2, 2017, Pages 81-100]

  • Pourpouneh, Mohsen An Improvement Over Lee et al.'s Key Agreement Protocol [Volume 5, Issue 1, 2018, Pages 3-12]

  • Purebrahim, Yousef A Novel Block Cipher Algorithm with Feistel-Like Structure [Volume 3, Issue 1, 2016, Pages 13-26]

R

  • Rahimi, Alireza JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH [Volume 2, Issue 1, 2015, Pages 3-20]

  • Rajabi, Bahman A CCA2-Secure Incomparable Public Key Encryption Scheme [Volume 3, Issue 1, 2016, Pages 3-12]

  • Ramezani, Reza MRAR: Mining Multi-Relation Association Rules [Volume 1, Issue 2, 2014, Pages 133-158]

  • Ramezani, Reza Mining Association Rules from Semantic Web Data without User Intervention [Volume 7, Issue 1, 2020, Pages 81-94]

  • Ramezanian, Rasoul An Improvement Over Lee et al.'s Key Agreement Protocol [Volume 5, Issue 1, 2018, Pages 3-12]

  • Rasekh, Amir Hossein Word Sense Disambiguation Based on Lexical and Semantic Features Using Naive Bayes Classifier [Volume 1, Issue 2, 2014, Pages 123-132]

  • Rashedi, Esmat New Functions for Mass Calculation in Gravitational Search Algorithm [Volume 2, Issue 3, 2015, Pages 233-246]

  • Rastegari, Yousef Toward automatic Transformation of Service Choreography into UML State Machine [Volume 2, Issue 3, 2015, Pages 209-222]

  • Rastegari, Yousef A Context-Aware Reflective-State Framework to Reconfigure Service-Based Applications [Volume 2, Issue 4, 2015, Pages 281-292]

  • Rastegari, Yousef An HMM-based Method for Adapting Service-based Applications to Users’ Quality Preferences [Volume 5, Issue 2, 2018, Pages 67-79]

  • Rastgoo, Razieh Multi-Constraint Optimal Path Finding for QoS-Enabled Smart Grids: A Combination Approach of Neural Network and Fuzzy System [Volume 4, Issue 2, 2017, Pages 47-61]

  • Reisi, Zahra A Workload-Adaptable Method for Migrated Software to the Cloud [Volume 2, Issue 4, 2015, Pages 271-279]

  • Reshadinezhad, Mohammad Reza A New Implementation for a 2^n-1 Modular Adder Through Carbon Nanotube Field Effect Transistors [Volume 2, Issue 2, 2015, Pages 129-139]

  • Rezaee, Razieh A Risk Estimation Framework for Security Threats in Computer Networks [Volume 7, Issue 1, 2020, Pages 19-33]

  • Rezaeenour, Jalal Effective Intrusion Detection with a Neural Network Ensemble Using Fuzzy Clustering and Stacking Combination Method [Volume 1, Issue 4, 2014, Pages 293-305]

  • Rezaei, Hashem Bit-Parallel ECC Coprocessor resistant to Differential Power Analysis Attacks in GF(2m) [Volume 8, Issue 1, 2021, Pages 1-18]

  • Rezaei, Mehran Evaluating Behavioral Intentions of Tourists in e-Tourism [Volume 1, Issue 2, 2014, Pages 95-109]

  • Rezaei, Mehran An Empirical Study of Students' Perceptions on the Technological Aspects of the E-Learning System [Volume 4, Issue 1, 2017, Pages 25-38]

  • Rezaeian, Mahdie Semantic Segmentation of Aerial Images Using Fusion of Color and Texture Features [Volume 1, Issue 3, 2014, Pages 225-238]

  • Rezaeian Zadeh, Farahnaz A Novel Solution for Author Attribution Problem in Anonymous E-mail [Volume 1, Issue 4, 2014, Pages 319-327]

  • Rezaeian Zadeh, Farahnaz A Workload-Adaptable Method for Migrated Software to the Cloud [Volume 2, Issue 4, 2015, Pages 271-279]

  • Rezvani, Azadeh RSAM: A Questionnaire for Ransomware Security Awareness Measurement [Volume 10, Issue 1, 2023, Pages 1-15]

  • Rostampour, Samad On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol [Volume 3, Issue 4, 2016, Pages 201-209]

  • Rouhi, Alireza Formalizing the main characteristics of QVT-based model transformation languages [Volume 7, Issue 1, 2020, Pages 35-62]

S

  • Saadatfar, Hamid Summarization Algorithm for Data Stream to Speed up Outlier Data Detection [(Articles in Press)]

  • Sabbaghi-nadooshan, Reza A High Speed Residue-to-Binary Converter for Balanced 4-Moduli Set [Volume 2, Issue 1, 2015, Pages 43-54]

  • Saberi, Bagher A Sample-Based Approach to Data Quality Assessment in Spatial Databases with Application to Mobile Trajectory Nearest-Neighbor Search [Volume 1, Issue 3, 2014, Pages 239-249]

  • Sadeghi, Samira Automatic Black-Box Detection of Resistance Against CSRF Vulnerabilities in Web Applications [Volume 8, Issue 1, 2021, Pages 19-32]

  • Sadeghian, Babak Toward A More Efficient Gröbner-based Algebraic Cryptanalysis [Volume 7, Issue 2, 2020, Pages 103-117]

  • Sadjadieh, Mahdi Some Primitives Based on Jumping LFSRs with Determined Period [Volume 2, Issue 3, 2015, Pages 175-184]

  • Sadjadieh, Mahdi A Lightweight Authentication Scheme for RFID with Permutation Operation on Passive Tags [Volume 8, Issue 2, 2021, Pages 71-86]

  • Sadreddini, Mohammad Hadi Word Sense Disambiguation Based on Lexical and Semantic Features Using Naive Bayes Classifier [Volume 1, Issue 2, 2014, Pages 123-132]

  • Sadri, Saeid Semantic Segmentation of Aerial Images Using Fusion of Color and Texture Features [Volume 1, Issue 3, 2014, Pages 225-238]

  • Safayani, Mehran Adaptive Interval Type-2 Fuzzy Inference System for Facial Expression Recognition [Volume 2, Issue 3, 2015, Pages 125-207]

  • Safkhani, Masoumeh Full Secret Disclosure Attack against an EPC- C1 G2 Compliant Authentication Protocol [Volume 6, Issue 1, 2019, Pages 13-23]

  • Salajegheh, Afshin A Context Model for Business Process Adaptation based on Ontology Reasoning [Volume 7, Issue 2, 2020, Pages 119-140]

  • Samavi, Shadrokh Steganography of Halftone Images by Group Alteration of Grayscale Pixels [Volume 2, Issue 1, 2015, Pages 21-30]

  • Saraee, Mohamad MRAR: Mining Multi-Relation Association Rules [Volume 1, Issue 2, 2014, Pages 133-158]

  • Saraee, Mohamad PSA: A Hybrid Feature Selection Approach for Persian Text Classification [Volume 1, Issue 4, 2014, Pages 261-272]

  • Saraee, Mohamad Mining Association Rules from Semantic Web Data without User Intervention [Volume 7, Issue 1, 2020, Pages 81-94]

  • Sattari-Naeini, Vahid Multi-Constraint Optimal Path Finding for QoS-Enabled Smart Grids: A Combination Approach of Neural Network and Fuzzy System [Volume 4, Issue 2, 2017, Pages 47-61]

  • Sekhavat, Yoones A Enhancing the Sense of Immersion and Quality of Experience in Mobile Games Using Augmented Reality [Volume 3, Issue 1, 2016, Pages 53-62]

  • Seyyedi, Mir Ali A Context Model for Business Process Adaptation based on Ontology Reasoning [Volume 7, Issue 2, 2020, Pages 119-140]

  • Shabanian, Touraj An Optimal Traffic Distribution Method Supporting End-to-End Delay Bound [Volume 1, Issue 1, 2014, Pages 61-71]

  • Shadgar, Bita A Survey on Transformation Methods of XML Documents to Ontologies [Volume 4, Issue 2, 2017, Pages 81-100]

  • Shafiee, Nasim A High Speed Residue-to-Binary Converter for Balanced 4-Moduli Set [Volume 2, Issue 1, 2015, Pages 43-54]

  • Shafieinejad, Alireza Bit-Parallel ECC Coprocessor resistant to Differential Power Analysis Attacks in GF(2m) [Volume 8, Issue 1, 2021, Pages 1-18]

  • Shahgholi Ghahfarokhi, Behrouz Demand based Resource Allocation to Balance the Utilization and User Level Fairness in Femtocell Networks [Volume 1, Issue 3, 2014, Pages 187-204]

  • Shakiba, Ali Generating dynamical S-boxes using 1D Chebyshev chaotic maps [Volume 7, Issue 1, 2020, Pages 1-17]

  • Shams, Fereidoon Toward automatic Transformation of Service Choreography into UML State Machine [Volume 2, Issue 3, 2015, Pages 209-222]

  • Shams, Fereidoon A Context-Aware Reflective-State Framework to Reconfigure Service-Based Applications [Volume 2, Issue 4, 2015, Pages 281-292]

  • Shams, Mohammadreza Development of a CGAN-based method for aspect level text generation: encouragement and punishment factors in the aspect knowledge [(Articles in Press)]

  • Sharifi, Abbas Ali Robust Cooperative Spectrum Sensing under Primary User Emulation Attack in Cognitive Radio Networks [Volume 2, Issue 2, 2015, Pages 109-117]

  • Shirvani, Hussein A New Scheme for Storage and Retrieval of Shared Text Files [Volume 2, Issue 3, 2015, Pages 223-231]

  • Soleimani, Seyfollah Indoor Localization Performance Optimization Using Modified kd-Tree Algorithm [Volume 9, Issue 2, 2022, Pages 55-64]

  • Soltani, Amir Masoud Development of a CGAN-based method for aspect level text generation: encouragement and punishment factors in the aspect knowledge [(Articles in Press)]

T

  • Taghiyar, Anahita RSAM: A Questionnaire for Ransomware Security Awareness Measurement [Volume 10, Issue 1, 2023, Pages 1-15]

  • Taheri, MohammadReza A High Speed Residue-to-Binary Converter for Balanced 4-Moduli Set [Volume 2, Issue 1, 2015, Pages 43-54]

  • Tahmasebipour, Safieh Ranking of Common Architectural Styles Based on Availability, Security and Performance Quality Attributes [Volume 1, Issue 2, 2014, Pages 83-93]

  • Tajiki, Mohammad Mahdi Improved Secure and Privacy Preserving Keyword Searching Cryptography [Volume 2, Issue 3, 2015, Pages 185-194]

  • Tavakoli, Somayeh Capability-Based Team Formation in Researchers Social Networks [Volume 4, Issue 2, 2017, Pages 63-79]

  • Tork Ladani, Behrouz Security Analysis of an EPC Class-1 Generation-2 Compliant RFID Authentication Protocol [Volume 3, Issue 3, 2016, Pages 163-174]

V

  • Vahdatnejad, Hamed Summarization Algorithm for Data Stream to Speed up Outlier Data Detection [(Articles in Press)]

  • Vahdat-Nejad, Hamed A New Scheme for Storage and Retrieval of Shared Text Files [Volume 2, Issue 3, 2015, Pages 223-231]

  • Vahidi-Asl, Mojtaba Gamifault: A Gamified Motivational Framework for Software Debugging Process [Volume 10, Issue 1, 2023, Pages 17-33]

Y

  • Yazdani, Mohammad Rohollah A Lightweight Authentication Scheme for RFID with Permutation Operation on Passive Tags [Volume 8, Issue 2, 2021, Pages 71-86]

Z

  • Zadsar, Seyedeh Habibe Indoor Localization Performance Optimization Using Modified kd-Tree Algorithm [Volume 9, Issue 2, 2022, Pages 55-64]

  • Zafari, Farhad DOPPONENT: A Socially Efficient Preference Model of Opponent in Bilateral Multi Issue Negotiations [Volume 1, Issue 4, 2014, Pages 283-292]

  • Zahedi, Mohammad Sadegh Improving Semi-supervised Constrained k-Means Clustering Method Using User Feedback [Volume 1, Issue 4, 2014, Pages 273-261]

  • Zakerolhosseini, Ali A Weak Blind Signature Based on Quantum Key Distribution [Volume 1, Issue 3, 2014, Pages 179-186]

  • Zali, Zeinab Deploying IoT, Based on NDN Protocol in a Fog Computing Infrastructure [Volume 9, Issue 1, 2022, Pages 31-44]

  • Zamani, Bahman Towards a Model-Driven Framework for Simulating Interactive Emergency Response Environments [Volume 5, Issue 1, 2018, Pages 35-49]

  • Zamani, Bahman Applying Meta-Heuristics Algorithms in Model-Driven Approaches for Solving the CRA Problem [Volume 7, Issue 2, 2020, Pages 141-161]

  • Zamani, Bahman Model-Driven Software Engineering: A Bibliometric Analysis [Volume 8, Issue 1, 2021, Pages 93-108]

  • Zarei, Hosein Enhancing the Sense of Immersion and Quality of Experience in Mobile Games Using Augmented Reality [Volume 3, Issue 1, 2016, Pages 53-62]

  • Zarezadeh, Maryam Determining the Number of Accusations for Decision Making in Key Revocation Protocol for MANET [Volume 3, Issue 1, 2016, Pages 63-72]

  • Zeinal Hamadani, Ali DOPPONENT: A Socially Efficient Preference Model of Opponent in Bilateral Multi Issue Negotiations [Volume 1, Issue 4, 2014, Pages 283-292]

  • Zojaji, Zahra Adaptive Reinforcement-Based Genetic Algorithm for Combinatorial Optimization [Volume 9, Issue 1, 2022, Pages 71-84]

  • Zolfaghari, Zahra Multicollision Attack on a recently proposed hash function vMDC-2 [Volume 3, Issue 4, 2016, Pages 211-215]