Abaei, Golnoush
A Lightweight Anomaly Detection Model using SVM for WSNs in IoT through a Hybrid Feature Selection Algorithm based on GA and GWO [Volume 7, Issue 1, 2020, Pages 63-79]
Abbasi, Fereshteh
Intrusion Detection in IoT With Logistic Regression and Artificial Neural Network: Further Investigations on N-BaIoT Dataset Devices [Volume 8, Issue 2, 2021, Pages 27-42]
Abdali-Mohammadi, Fardin
Improving Face Recognition Systems Security Using Local Binary Patterns [Volume 2, Issue 1, 2015, Pages 55-62]
Abdali-Mohammadi, Fardin
A Novel Grammar-Based Approach to Atrial Fibrillation Arrhythmia Detection for Pervasive Healthcare Environments [Volume 2, Issue 2, 2015, Pages 155-163]
Abdali-Mohammadi, Fardin
Effect of Purposeful Feature Extraction in High-dimensional Kinship Verification Problem [Volume 3, Issue 3, 2016, Pages 183-191]
Abdellahi Khorasgani, Alireza
A Lightweight Authentication Scheme for RFID with Permutation Operation on Passive Tags [Volume 8, Issue 2, 2021, Pages 71-86]
Abdollahi Azgomi, Mohammad
Expected Coverage of Perfect Chains in the Hellman Time Memory Trade-Off [Volume 3, Issue 3, 2016, Pages 155-162]
Abdolrazzagh-Nezhad, Majid
CSE: A Novel Dynamic Obfuscation Based on Control Flow, Signals and Encryption [Volume 6, Issue 2, 2019, Pages 53-63]
Adibi, Peyman
A Growing Hierarchical Approach to Batch Linear Manifold Topographic Map Formation [Volume 1, Issue 1, 2014, Pages 47-59]
Ahmadi, Ali
Persian Texts Part of Speech Tagging Using Artificial Neural Networks [Volume 3, Issue 4, 2016, Pages 233-241]
Ahmadi, Maedeh
Adaptive Interval Type-2 Fuzzy Inference System for Facial Expression Recognition [Volume 2, Issue 3, 2015, Pages 125-207]
Ahmadi, Mahmood
Performance Evaluation of Apache Spark MLlib Algorithms on an Intrusion Detection Dataset [Volume 9, Issue 1, 2022, Pages 57-69]
Ajoudanian, Shohreh
A Novel Solution for Author Attribution Problem in Anonymous E-mail [Volume 1, Issue 4, 2014, Pages 319-327]
Akhaee, Mohammad Ali
Improved Secure and Privacy Preserving Keyword Searching Cryptography [Volume 2, Issue 3, 2015, Pages 185-194]
Akhoondi, Rana
A GA Approach for Tuning Membership Functions of a Fuzzy Expert System for Heart Disease Prognosis Development Risk [Volume 4, Issue 1, 2017, Pages 13-23]
Alavi, Seyyed Enayatallah
Intrusion Detection in IoT With Logistic Regression and Artificial Neural Network: Further Investigations on N-BaIoT Dataset Devices [Volume 8, Issue 2, 2021, Pages 27-42]
Alfraihi, Hessa
eXtreme Modeling: an approach to agile model-based development [Volume 6, Issue 2, 2019, Pages 43-52]
Ali, Rosmah
An Empirical Study of Students' Perceptions on the Technological Aspects of the E-Learning System [Volume 4, Issue 1, 2017, Pages 25-38]
Ali Asgari Renani, Fatemeh
Indoor Path Tracking Using Combination of Viterbi and WKNN [Volume 8, Issue 2, 2021, Pages 19-26]
Alidoosti, Mitra
BLProM: A black-box approach for detecting business-layer processes in the web applications [Volume 6, Issue 2, 2019, Pages 65-80]
Alimoradi, Dariush
The Effect of Correlogram Properties on Blind Steganalysis in JPEG Images [Volume 1, Issue 1, 2014, Pages 39-46]
Alirezazadeh, Pendar
Effect of Purposeful Feature Extraction in High-dimensional Kinship Verification Problem [Volume 3, Issue 3, 2016, Pages 183-191]
Alizadeh, Javad
JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH [Volume 2, Issue 1, 2015, Pages 3-20]
Almasi, Ramin
A High-Payload Audio Watermarking Scheme for Real-Time Applications [Volume 2, Issue 2, 2015, Pages 119-127]
Amini, Mohammad
Effective Intrusion Detection with a Neural Network Ensemble Using Fuzzy Clustering and Stacking Combination Method [Volume 1, Issue 4, 2014, Pages 293-305]
Amirfattahi, Rasoul
Semantic Segmentation of Aerial Images Using Fusion of Color and Texture Features [Volume 1, Issue 3, 2014, Pages 225-238]
Amirjamshidi, Zhale
A High Speed Residue-to-Binary Converter for Balanced 4-Moduli Set [Volume 2, Issue 1, 2015, Pages 43-54]
Askarian, Ahmad
An Optimal Traffic Distribution Method Supporting End-to-End Delay Bound [Volume 1, Issue 1, 2014, Pages 61-71]
Atefinia, Ramin
Performance Evaluation of Apache Spark MLlib Algorithms on an Intrusion Detection Dataset [Volume 9, Issue 1, 2022, Pages 57-69]
B
Babamir, Seyed Morteza
Ranking of Common Architectural Styles Based on Availability, Security and Performance Quality Attributes [Volume 1, Issue 2, 2014, Pages 83-93]
Babamir, Seyed Morteza
A Method for Assessing Maintainability of Software Architectural Styles in Self-healing Systems by Measuring Coupling and Cohesion [Volume 2, Issue 1, 2015, Pages 31-42]
Bagheri, Ayoub
PSA: A Hybrid Feature Selection Approach for Persian Text Classification [Volume 1, Issue 4, 2014, Pages 261-272]
Bagheri, Nasour
JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH [Volume 2, Issue 1, 2015, Pages 3-20]
Bagheri, Nasour
On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol [Volume 3, Issue 4, 2016, Pages 201-209]
Bagheri, Nasour
Multicollision Attack on a recently proposed hash function vMDC-2 [Volume 3, Issue 4, 2016, Pages 211-215]
Chegeni, Mastaneh
Indoor Path Tracking Using Combination of Viterbi and WKNN [Volume 8, Issue 2, 2021, Pages 19-26]
D
Dakhilalian, Mohammad
Some Primitives Based on Jumping LFSRs with Determined Period [Volume 2, Issue 3, 2015, Pages 175-184]
Davahli, Azam
A Lightweight Anomaly Detection Model using SVM for WSNs in IoT through a Hybrid Feature Selection Algorithm based on GA and GWO [Volume 7, Issue 1, 2020, Pages 63-79]
Dehyadegari, Masoud
Signature Codes for Energy-Efficient Data Movement in On-chip Networks [Volume 7, Issue 2, 2020, Pages 95-101]
Deypir, Mahmood
A Novel Block Cipher Algorithm with Feistel-Like Structure [Volume 3, Issue 1, 2016, Pages 13-26]
Doostari, Mohammad Ali
Determining the Number of Accusations for Decision Making in Key Revocation Protocol for MANET [Volume 3, Issue 1, 2016, Pages 63-72]
E
Ebrahimi, Seyyed Ashkan
A New Implementation for a 2^n-1 Modular Adder Through Carbon Nanotube Field Effect Transistors [Volume 2, Issue 2, 2015, Pages 129-139]
Ebrahimi Atani, Reza
A Provably Secure Variant of ETRU Based on Extended Ideal Lattices Over Direct Product of Dedekind Domains [Volume 5, Issue 1, 2018, Pages 13-34]
Ebrahimi Atani, Shahabaddin
A Provably Secure Variant of ETRU Based on Extended Ideal Lattices Over Direct Product of Dedekind Domains [Volume 5, Issue 1, 2018, Pages 13-34]
Ebrahimi Mood, Sepehr
New Functions for Mass Calculation in Gravitational Search Algorithm [Volume 2, Issue 3, 2015, Pages 233-246]
Eftekhari, Mahdi
A New Hybrid Approach for Modeling Accurate Fuzzy Rule Based Classification Systems [Volume 1, Issue 2, 2014, Pages 111-122]
Eftekhari, Mahdi
Comparison of Hybrid and Filter Feature Selection Methods to Identify Candidate Single Nucleotide Polymorphisms [Volume 1, Issue 3, 2014, Pages 205-2013]
Eftekhari, Mahdi
Momentum Contrast Self-Supervised Based Training for Adversarial Robustness [Volume 8, Issue 1, 2021, Pages 33-43]
Eslami, Ziba
A CCA2-Secure Incomparable Public Key Encryption Scheme [Volume 3, Issue 1, 2016, Pages 3-12]
Eslami, Ziba
Verifiable Social Multi-Secret Sharing Secure in Active Adversarial Model [Volume 4, Issue 1, 2017, Pages 3-12]
Esmaeildoust, Mohammad
A High Speed Residue-to-Binary Converter for Balanced 4-Moduli Set [Volume 2, Issue 1, 2015, Pages 43-54]
Esmailizadeh, Ali
Comparison of Hybrid and Filter Feature Selection Methods to Identify Candidate Single Nucleotide Polymorphisms [Volume 1, Issue 3, 2014, Pages 205-2013]
F
Fakhrahmad, Seyed Mostafa
Word Sense Disambiguation Based on Lexical and Semantic Features Using Naive Bayes Classifier [Volume 1, Issue 2, 2014, Pages 123-132]
Fallah-Mehrjardi, Omid
Demand based Resource Allocation to Balance the Utilization and User Level Fairness in Femtocell Networks [Volume 1, Issue 3, 2014, Pages 187-204]
Fanian, Ali
An Efficient End to End Key Establishment Protocol for Wireless Sensor Networks [Volume 1, Issue 1, 2014, Pages 23-38]
Fanian, Ali
A Hybrid Method based on Statistical Features and Packet Content Analysis to Identify Major Network Tunneling Protocols [Volume 3, Issue 2, 2016, Pages 95-110]
Farahani, Gholamreza
Scalability Analysis of a LoRa Network Under Inter-SF and Co-SF Interference with Poisson Point Process Model [Volume 8, Issue 2, 2021, Pages 43-57]
Farahbod, Fahimeh
A New Hybrid Approach for Modeling Accurate Fuzzy Rule Based Classification Systems [Volume 1, Issue 2, 2014, Pages 111-122]
Farahmandpour, Zeinab
A Study on Intelligent Authorship Methods in Persian Language [Volume 2, Issue 1, 2015, Pages 63-76]
Faridmoayer, Sogol
Applying Meta-Heuristics Algorithms in Model-Driven Approaches for Solving the CRA Problem [Volume 7, Issue 2, 2020, Pages 141-161]
Farmani, Vahid
Adaptive Interval Type-2 Fuzzy Inference System for Facial Expression Recognition [Volume 2, Issue 3, 2015, Pages 125-207]
Farokh, Azam
A Method for Assessing Maintainability of Software Architectural Styles in Self-healing Systems by Measuring Coupling and Cohesion [Volume 2, Issue 1, 2015, Pages 31-42]
Farsi, Hassan
Training-Free Object Matching and Retrieval Using Speeded Up Robust Features [Volume 2, Issue 2, 2015, Pages 141-153]
Fatehi, Kavan
Improving Semi-supervised Constrained k-Means Clustering Method Using User Feedback [Volume 1, Issue 4, 2014, Pages 273-261]
Fatemi, Afsaneh
Capability-Based Team Formation in Researchers Social Networks [Volume 4, Issue 2, 2017, Pages 63-79]
Fatemi, Afsaneh
Towards a Model-Driven Framework for Simulating Interactive Emergency Response Environments [Volume 5, Issue 1, 2018, Pages 35-49]
Fatemi, Afsaneh
BAS: An Answer Selection Method Using BERT Language Model [Volume 8, Issue 2, 2021, Pages 1-18]
Fathi, Abdolhossein
Improving Face Recognition Systems Security Using Local Binary Patterns [Volume 2, Issue 1, 2015, Pages 55-62]
Fathi, Abdolhossein
A Novel Grammar-Based Approach to Atrial Fibrillation Arrhythmia Detection for Pervasive Healthcare Environments [Volume 2, Issue 2, 2015, Pages 155-163]
Fathi, Abdolhossein
Effect of Purposeful Feature Extraction in High-dimensional Kinship Verification Problem [Volume 3, Issue 3, 2016, Pages 183-191]
Fathi, Abdolhossein
Combination of Genetic Programming and Support Vector Machine-Based Prediction of Protein-Peptide Binding Sites With Sequence and Structure-Based Features [Volume 8, Issue 1, 2021, Pages 45-63]
G
Ghadiri, Nasser
A Sample-Based Approach to Data Quality Assessment in Spatial Databases with Application to Mobile Trajectory Nearest-Neighbor Search [Volume 1, Issue 3, 2014, Pages 239-249]
Ghaemi Bafghi, Abbas
A Risk Estimation Framework for Security Threats in Computer Networks [Volume 7, Issue 1, 2020, Pages 19-33]
Ghaffarian, Hossein
Indoor Path Tracking Using Combination of Viterbi and WKNN [Volume 8, Issue 2, 2021, Pages 19-26]
Gharavi, Naser Hossein
Expected Coverage of Perfect Chains in the Hellman Time Memory Trade-Off [Volume 3, Issue 3, 2016, Pages 155-162]
Ghareh Chamani, Javad
Privacy-Preserving Fine-grained Correctness Verification of Query Results in Outsourced Databases [Volume 2, Issue 2, 2015, Pages 87-107]
Ghasemi, Simin
A Trust-Based Approach for Correctness verification of Query Results in Data Outsourcing [Volume 1, Issue 1, 2014, Pages 3-14]
Ghatee, Mehdi
Solution of the Generalized Interval Linear Programming Problems: Pessimistic and Optimistic Approaches [Volume 1, Issue 2, 2014, Pages 159-167]
Ghiasian, Ali
Analyzing the Impact of Wireless Channels on the Efficiency of Edge Computing in IoT Applications [Volume 8, Issue 2, 2021, Pages 59-70]
Gholamnezhad, Pezhman
Gaussian Linear Regression Crossover for Genetic Algorithms [Volume 9, Issue 1, 2022, Pages 45-56]
Golzari, Shahram
The Diagnosis of Epilepsy by Gravitational Search Algorithm and Support Vector Machines [Volume 3, Issue 2, 2016, Pages 111-125]
H
Hadavandi, Esmaeil
Effective Intrusion Detection with a Neural Network Ensemble Using Fuzzy Clustering and Stacking Combination Method [Volume 1, Issue 4, 2014, Pages 293-305]
Hadavi, Mohammad Ali
An Inference Resistant Indexing Technique to Enforce Access Control in Data Outsourcing [Volume 3, Issue 2, 2016, Pages 83-93]
Hadavi, Mohammad Ali
A Trust-Based Approach for Correctness verification of Query Results in Data Outsourcing [Volume 1, Issue 1, 2014, Pages 3-14]
Hadavi, Mohammad Ali
Privacy-Preserving Fine-grained Correctness Verification of Query Results in Outsourced Databases [Volume 2, Issue 2, 2015, Pages 87-107]
Hadavi, Mohammad Ali
Automatic Black-Box Detection of Resistance Against CSRF Vulnerabilities in Web Applications [Volume 8, Issue 1, 2021, Pages 19-32]
Haj Seyyed Javadi, Seyyed Hamid
Determining the Number of Accusations for Decision Making in Key Revocation Protocol for MANET [Volume 3, Issue 1, 2016, Pages 63-72]
Halakou, Farideh
Comparison of Hybrid and Filter Feature Selection Methods to Identify Candidate Single Nucleotide Polymorphisms [Volume 1, Issue 3, 2014, Pages 205-2013]
Halvachi, Hadi
An Inference Resistant Indexing Technique to Enforce Access Control in Data Outsourcing [Volume 3, Issue 2, 2016, Pages 83-93]
Harifi, Abbas
The Diagnosis of Epilepsy by Gravitational Search Algorithm and Support Vector Machines [Volume 3, Issue 2, 2016, Pages 111-125]
Hasanzadeh, Maryam
The Effect of Correlogram Properties on Blind Steganalysis in JPEG Images [Volume 1, Issue 1, 2014, Pages 39-46]
Hashemi, Massoud Reza
An Optimal Traffic Distribution Method Supporting End-to-End Delay Bound [Volume 1, Issue 1, 2014, Pages 61-71]
Hashemi, Massoud Reza
Deploying IoT, Based on NDN Protocol in a Fog Computing Infrastructure [Volume 9, Issue 1, 2022, Pages 31-44]
Hashemzade, Bahare
CSE: A Novel Dynamic Obfuscation Based on Control Flow, Signals and Encryption [Volume 6, Issue 2, 2019, Pages 53-63]
Hassani Karbasi, Amir
A Provably Secure Variant of ETRU Based on Extended Ideal Lattices Over Direct Product of Dedekind Domains [Volume 5, Issue 1, 2018, Pages 13-34]
Hassanpour, Hamid
Robust Face Recognition Under Illumination Changes and Pose Variations [Volume 5, Issue 2, 2018, Pages 81-89]
HoseinDoost, Samaneh
Towards a Model-Driven Framework for Simulating Interactive Emergency Response Environments [Volume 5, Issue 1, 2018, Pages 35-49]
HoseinDoost, Samaneh
Applying Meta-Heuristics Algorithms in Model-Driven Approaches for Solving the CRA Problem [Volume 7, Issue 2, 2020, Pages 141-161]
Hosseini, Rahil
A GA Approach for Tuning Membership Functions of a Fuzzy Expert System for Heart Disease Prognosis Development Risk [Volume 4, Issue 1, 2017, Pages 13-23]
Hosseini Pozveh, Zahra
Persian Texts Part of Speech Tagging Using Artificial Neural Networks [Volume 3, Issue 4, 2016, Pages 233-241]
Hosseinzadeh, Mehdi
On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol [Volume 3, Issue 4, 2016, Pages 201-209]
J
Jabbari, Ghazal
Analyzing the Impact of Wireless Channels on the Efficiency of Edge Computing in IoT Applications [Volume 8, Issue 2, 2021, Pages 59-70]
Jalili, Rasool
A Trust-Based Approach for Correctness verification of Query Results in Data Outsourcing [Volume 1, Issue 1, 2014, Pages 3-14]
Jalili, Rasool
Privacy-Preserving Fine-grained Correctness Verification of Query Results in Outsourced Databases [Volume 2, Issue 2, 2015, Pages 87-107]
Jalili, Rasool
An Inference Resistant Indexing Technique to Enforce Access Control in Data Outsourcing [Volume 3, Issue 2, 2016, Pages 83-93]
Jalili, Rasool
An Extension of CryptoPAi to the Formal Analysis of E-voting Protocols [Volume 6, Issue 1, 2019, Pages 25-42]
Javidi, Mohammad Masoud
New Functions for Mass Calculation in Gravitational Search Algorithm [Volume 2, Issue 3, 2015, Pages 233-246]
Kazemi, Keihan
A Hybrid Method based on Statistical Features and Packet Content Analysis to Identify Major Network Tunneling Protocols [Volume 3, Issue 2, 2016, Pages 95-110]
Kazemifard, Mohammad
AUBUE: An Adaptive User-Interface Based on Users' Emotions [Volume 3, Issue 2, 2016, Pages 127-145]
Khademzadeh, Ahmad
On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol [Volume 3, Issue 4, 2016, Pages 201-209]
Khasseh, Ali Akbar
Model-Driven Software Engineering: A Bibliometric Analysis [Volume 8, Issue 1, 2021, Pages 93-108]
Khodambashi, Siavash
A Weak Blind Signature Based on Quantum Key Distribution [Volume 1, Issue 3, 2014, Pages 179-186]
Khodayari Tehraninejad, Dina
Proxima: Process Mining for Extracting Configurable Process Models Using Software Product Line Concepts [Volume 9, Issue 1, 2022, Pages 1-29]
Khoshnevis, Sedigheh
Proxima: Process Mining for Extracting Configurable Process Models Using Software Product Line Concepts [Volume 9, Issue 1, 2022, Pages 1-29]
Khosravi, Hadi
Structural and Non-Structural Similarity Combination of Users in Social Networks [Volume 3, Issue 1, 2016, Pages 43-52]
Kohansal, Omid
Robust Face Recognition Under Illumination Changes and Pose Variations [Volume 5, Issue 2, 2018, Pages 81-89]
Kolahdouz Rahimi, Shekoufeh
eXtreme Modeling: an approach to agile model-based development [Volume 6, Issue 2, 2019, Pages 43-52]
Kolahdouz Rahimi, Shekoufeh
Applying Meta-Heuristics Algorithms in Model-Driven Approaches for Solving the CRA Problem [Volume 7, Issue 2, 2020, Pages 141-161]
Kord Toudeshki, Leila
A Context Model for Business Process Adaptation based on Ontology Reasoning [Volume 7, Issue 2, 2020, Pages 119-140]
L
Lano, Kevin
eXtreme Modeling: an approach to agile model-based development [Volume 6, Issue 2, 2019, Pages 43-52]
Lano, Kevin
Formalizing the main characteristics of QVT-based model transformation languages [Volume 7, Issue 1, 2020, Pages 35-62]
Lobabi-Mirghavami, Hanieh
A Novel Grammar-Based Approach to Atrial Fibrillation Arrhythmia Detection for Pervasive Healthcare Environments [Volume 2, Issue 2, 2015, Pages 155-163]
M
Mahdavi, Mojtaba
Steganography of Halftone Images by Group Alteration of Grayscale Pixels [Volume 2, Issue 1, 2015, Pages 21-30]
Mahrooghi, Hamid Reza
An Extension of CryptoPAi to the Formal Analysis of E-voting Protocols [Volume 6, Issue 1, 2019, Pages 25-42]
Mala, Hamid
Unified Byte Permutations for the Block Cipher 3D [Volume 1, Issue 1, 2014, Pages 15-22]
Mala, Hamid
Demand based Resource Allocation to Balance the Utilization and User Level Fairness in Femtocell Networks [Volume 1, Issue 3, 2014, Pages 187-204]
Mala, Hamid
Security Analysis of an EPC Class-1 Generation-2 Compliant RFID Authentication Protocol [Volume 3, Issue 3, 2016, Pages 163-174]
Malekmohammad, Azam
Structural and Non-Structural Similarity Combination of Users in Social Networks [Volume 3, Issue 1, 2016, Pages 43-52]
Mazinani, Mahdi
A GA Approach for Tuning Membership Functions of a Fuzzy Expert System for Heart Disease Prognosis Development Risk [Volume 4, Issue 1, 2017, Pages 13-23]
Mehran, Narges
Randomized SVD Based Probabilistic Caching Strategy in Named Data Networks [Volume 3, Issue 4, 2016, Pages 217-231]
Mirghadri, Abdorasool
Expected Coverage of Perfect Chains in the Hellman Time Memory Trade-Off [Volume 3, Issue 3, 2016, Pages 155-162]
Mirzaei, Abdolreza
Adaptive Interval Type-2 Fuzzy Inference System for Facial Expression Recognition [Volume 2, Issue 3, 2015, Pages 125-207]
Mirzaei, Arash
Some Primitives Based on Jumping LFSRs with Determined Period [Volume 2, Issue 3, 2015, Pages 175-184]
Moghissi, Gholam Reza
Rejecting Claimed Speedup of 2^𝛽/2 in Extreme Pruning and Revising BKZ 2.0 for Better Speedup [Volume 8, Issue 1, 2021, Pages 65-91]
Mohamadzadeh, Sajad
Training-Free Object Matching and Retrieval Using Speeded Up Robust Features [Volume 2, Issue 2, 2015, Pages 141-153]
Mohammadi, Atefeh
Identifying Explicit Features of Persian Comments [Volume 6, Issue 1, 2019, Pages 1-11]
Mohammadi, Solmaz
Scalability Analysis of a LoRa Network Under Inter-SF and Co-SF Interference with Poisson Point Process Model [Volume 8, Issue 2, 2021, Pages 43-57]
Mohd Zainuddin, Norziha Megat
An Empirical Study of Students' Perceptions on the Technological Aspects of the E-Learning System [Volume 4, Issue 1, 2017, Pages 25-38]
Monadjemi, Amirhassan
Persian Texts Part of Speech Tagging Using Artificial Neural Networks [Volume 3, Issue 4, 2016, Pages 233-241]
Montazeri, Morteza
Identifying Explicit Features of Persian Comments [Volume 6, Issue 1, 2019, Pages 1-11]
Moodi, Hossein
A New Hybrid Method for VoIP Stream Steganography [Volume 3, Issue 3, 2016, Pages 175-182]
Moradi, Fariba
Security Analysis of an EPC Class-1 Generation-2 Compliant RFID Authentication Protocol [Volume 3, Issue 3, 2016, Pages 163-174]
Moradi, Fereidoun
Security Analysis of an EPC Class-1 Generation-2 Compliant RFID Authentication Protocol [Volume 3, Issue 3, 2016, Pages 163-174]
Moradyan, Kourosh
Web Service Matchmaking based on Functional Similarity in Service Cloud [Volume 2, Issue 4, 2015, Pages 257-270]
Mosakhani, Mostafa
A more Accurate Clustering Method by using Co-author Social Networks for Author Name Disambiguation [Volume 1, Issue 4, 2014, Pages 307-317]
Moshavash, Monireh
Momentum Contrast Self-Supervised Based Training for Adversarial Robustness [Volume 8, Issue 1, 2021, Pages 33-43]
Mousavi, Sayyed Ahmad
Expected Coverage of Perfect Chains in the Hellman Time Memory Trade-Off [Volume 3, Issue 3, 2016, Pages 155-162]
Movahhedinia, Naser
Demand based Resource Allocation to Balance the Utilization and User Level Fairness in Femtocell Networks [Volume 1, Issue 3, 2014, Pages 187-204]
Movahhedinia, Naser
Randomized SVD Based Probabilistic Caching Strategy in Named Data Networks [Volume 3, Issue 4, 2016, Pages 217-231]
Mozafari, Jamshid
BAS: An Answer Selection Method Using BERT Language Model [Volume 8, Issue 2, 2021, Pages 1-18]
Musevi Niya, Mir Javad
Robust Cooperative Spectrum Sensing under Primary User Emulation Attack in Cognitive Radio Networks [Volume 2, Issue 2, 2015, Pages 109-117]
N
Naderan, Marjan
Intrusion Detection in IoT With Logistic Regression and Artificial Neural Network: Further Investigations on N-BaIoT Dataset Devices [Volume 8, Issue 2, 2021, Pages 27-42]
Nadi, Shiva
PSA: A Hybrid Feature Selection Approach for Persian Text Classification [Volume 1, Issue 4, 2014, Pages 261-272]
Nadimi, Mohammad Hossein
A more Accurate Clustering Method by using Co-author Social Networks for Author Name Disambiguation [Volume 1, Issue 4, 2014, Pages 307-317]
Naghsh-Nilchi, Ahmad Reza
A New Hybrid Method for VoIP Stream Steganography [Volume 3, Issue 3, 2016, Pages 175-182]
Nasiripour, Reza
Training-Free Object Matching and Retrieval Using Speeded Up Robust Features [Volume 2, Issue 2, 2015, Pages 141-153]
Nassiri-Mofakham, Faria
DOPPONENT: A Socially Efficient Preference Model of Opponent in Bilateral Multi Issue Negotiations [Volume 1, Issue 4, 2014, Pages 283-292]
Navi, Keivan
A High Speed Residue-to-Binary Converter for Balanced 4-Moduli Set [Volume 2, Issue 1, 2015, Pages 43-54]
Nayebalsadr, Shakiba
Simulating the Resource Freeing Attack: Using Cloudsim Simulator [Volume 2, Issue 4, 2015, Pages 293-302]
Nematbakhsh, MohammadAli
Identifying Explicit Features of Persian Comments [Volume 6, Issue 1, 2019, Pages 1-11]
Nematbakhsh, Mohammad Ali
MRAR: Mining Multi-Relation Association Rules [Volume 1, Issue 2, 2014, Pages 133-158]
Nematbakhsh, Mohammad Ali
Mining Association Rules from Semantic Web Data without User Intervention [Volume 7, Issue 1, 2020, Pages 81-94]
Nematbakhsh, Mohammad Ali
BAS: An Answer Selection Method Using BERT Language Model [Volume 8, Issue 2, 2021, Pages 1-18]
Nickabadi, Ahmad
BLProM: A black-box approach for detecting business-layer processes in the web applications [Volume 6, Issue 2, 2019, Pages 65-80]
Nikmehr, Hooman
A Study on Intelligent Authorship Methods in Persian Language [Volume 2, Issue 1, 2015, Pages 63-76]
Nikmehr, Hooman
A High-Payload Audio Watermarking Scheme for Real-Time Applications [Volume 2, Issue 2, 2015, Pages 119-127]
Nilforoush, Mohammad Reza
Deploying IoT, Based on NDN Protocol in a Fog Computing Infrastructure [Volume 9, Issue 1, 2022, Pages 31-44]
Noferesti, Morteza
A Trust-Based Approach for Correctness verification of Query Results in Data Outsourcing [Volume 1, Issue 1, 2014, Pages 3-14]
Noori, Fariba
AUBUE: An Adaptive User-Interface Based on Users' Emotions [Volume 3, Issue 2, 2016, Pages 127-145]
Nowroozi, Alireza
BLProM: A black-box approach for detecting business-layer processes in the web applications [Volume 6, Issue 2, 2019, Pages 65-80]
O
Omoomi, Behnaz
An Optimal Traffic Distribution Method Supporting End-to-End Delay Bound [Volume 1, Issue 1, 2014, Pages 61-71]
Oraei, Hossein
An Improvement Over Lee et al.'s Key Agreement Protocol [Volume 5, Issue 1, 2018, Pages 3-12]
Osareh, Alireza
A Survey on Transformation Methods of XML Documents to Ontologies [Volume 4, Issue 2, 2017, Pages 81-100]
P
Pajoohan, Mohammad-Reza
Identifying Explicit Features of Persian Comments [Volume 6, Issue 1, 2019, Pages 1-11]
Pakniat, Nasrollah
Verifiable Social Multi-Secret Sharing Secure in Active Adversarial Model [Volume 4, Issue 1, 2017, Pages 3-12]
Pakniat, Nasrollah
Security Analysis of Two Lightweight Certificateless Signature Schemes [Volume 5, Issue 2, 2018, Pages 59-65]
Parsaei, Fahimeh
Evaluating Behavioral Intentions of Tourists in e-Tourism [Volume 1, Issue 2, 2014, Pages 95-109]
Parsazadeh, Nadia
An Empirical Study of Students' Perceptions on the Technological Aspects of the E-Learning System [Volume 4, Issue 1, 2017, Pages 25-38]
Payandeh, Ali
Rejecting Claimed Speedup of 2^𝛽/2 in Extreme Pruning and Revising BKZ 2.0 for Better Speedup [Volume 8, Issue 1, 2021, Pages 65-91]
P.Haughton, Howard
eXtreme Modeling: an approach to agile model-based development [Volume 6, Issue 2, 2019, Pages 43-52]
Pourkhani, Mohammadereza
A Survey on Transformation Methods of XML Documents to Ontologies [Volume 4, Issue 2, 2017, Pages 81-100]
Pourpouneh, Mohsen
An Improvement Over Lee et al.'s Key Agreement Protocol [Volume 5, Issue 1, 2018, Pages 3-12]
Purebrahim, Yousef
A Novel Block Cipher Algorithm with Feistel-Like Structure [Volume 3, Issue 1, 2016, Pages 13-26]
R
Rahimi, Alireza
JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH [Volume 2, Issue 1, 2015, Pages 3-20]
Rajabi, Bahman
A CCA2-Secure Incomparable Public Key Encryption Scheme [Volume 3, Issue 1, 2016, Pages 3-12]
Ramezani, Reza
Mining Association Rules from Semantic Web Data without User Intervention [Volume 7, Issue 1, 2020, Pages 81-94]
Ramezanian, Rasoul
An Improvement Over Lee et al.'s Key Agreement Protocol [Volume 5, Issue 1, 2018, Pages 3-12]
Rasekh, Amir Hossein
Word Sense Disambiguation Based on Lexical and Semantic Features Using Naive Bayes Classifier [Volume 1, Issue 2, 2014, Pages 123-132]
Rashedi, Esmat
New Functions for Mass Calculation in Gravitational Search Algorithm [Volume 2, Issue 3, 2015, Pages 233-246]
Rastegari, Yousef
Toward automatic Transformation of Service Choreography into UML State Machine [Volume 2, Issue 3, 2015, Pages 209-222]
Rastegari, Yousef
A Context-Aware Reflective-State Framework to Reconfigure Service-Based Applications [Volume 2, Issue 4, 2015, Pages 281-292]
Rastegari, Yousef
An HMM-based Method for Adapting Service-based Applications to Users’ Quality Preferences [Volume 5, Issue 2, 2018, Pages 67-79]
Rastgoo, Razieh
Multi-Constraint Optimal Path Finding for QoS-Enabled Smart Grids: A Combination Approach of Neural Network and Fuzzy System [Volume 4, Issue 2, 2017, Pages 47-61]
Reisi, Zahra
A Workload-Adaptable Method for Migrated Software to the Cloud [Volume 2, Issue 4, 2015, Pages 271-279]
Reshadinezhad, Mohammad Reza
A New Implementation for a 2^n-1 Modular Adder Through Carbon Nanotube Field Effect Transistors [Volume 2, Issue 2, 2015, Pages 129-139]
Rezaee, Razieh
A Risk Estimation Framework for Security Threats in Computer Networks [Volume 7, Issue 1, 2020, Pages 19-33]
Rezaeenour, Jalal
Effective Intrusion Detection with a Neural Network Ensemble Using Fuzzy Clustering and Stacking Combination Method [Volume 1, Issue 4, 2014, Pages 293-305]
Rezaei, Hashem
Bit-Parallel ECC Coprocessor resistant to Differential Power Analysis Attacks in GF(2m) [Volume 8, Issue 1, 2021, Pages 1-18]
Rezaei, Mehran
Evaluating Behavioral Intentions of Tourists in e-Tourism [Volume 1, Issue 2, 2014, Pages 95-109]
Rezaei, Mehran
An Empirical Study of Students' Perceptions on the Technological Aspects of the E-Learning System [Volume 4, Issue 1, 2017, Pages 25-38]
Rezaeian, Mahdie
Semantic Segmentation of Aerial Images Using Fusion of Color and Texture Features [Volume 1, Issue 3, 2014, Pages 225-238]
Rezaeian Zadeh, Farahnaz
A Novel Solution for Author Attribution Problem in Anonymous E-mail [Volume 1, Issue 4, 2014, Pages 319-327]
Rezaeian Zadeh, Farahnaz
A Workload-Adaptable Method for Migrated Software to the Cloud [Volume 2, Issue 4, 2015, Pages 271-279]
Rostampour, Samad
On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol [Volume 3, Issue 4, 2016, Pages 201-209]
Rouhi, Alireza
Formalizing the main characteristics of QVT-based model transformation languages [Volume 7, Issue 1, 2020, Pages 35-62]
S
Sabbaghi-nadooshan, Reza
A High Speed Residue-to-Binary Converter for Balanced 4-Moduli Set [Volume 2, Issue 1, 2015, Pages 43-54]
Saberi, Bagher
A Sample-Based Approach to Data Quality Assessment in Spatial Databases with Application to Mobile Trajectory Nearest-Neighbor Search [Volume 1, Issue 3, 2014, Pages 239-249]
Sadeghi, Samira
Automatic Black-Box Detection of Resistance Against CSRF Vulnerabilities in Web Applications [Volume 8, Issue 1, 2021, Pages 19-32]
Sadeghian, Babak
Toward A More Efficient Gröbner-based Algebraic Cryptanalysis [Volume 7, Issue 2, 2020, Pages 103-117]
Sadjadieh, Mahdi
Some Primitives Based on Jumping LFSRs with Determined Period [Volume 2, Issue 3, 2015, Pages 175-184]
Sadjadieh, Mahdi
A Lightweight Authentication Scheme for RFID with Permutation Operation on Passive Tags [Volume 8, Issue 2, 2021, Pages 71-86]
Sadreddini, Mohammad Hadi
Word Sense Disambiguation Based on Lexical and Semantic Features Using Naive Bayes Classifier [Volume 1, Issue 2, 2014, Pages 123-132]
Sadri, Saeid
Semantic Segmentation of Aerial Images Using Fusion of Color and Texture Features [Volume 1, Issue 3, 2014, Pages 225-238]
Safayani, Mehran
Adaptive Interval Type-2 Fuzzy Inference System for Facial Expression Recognition [Volume 2, Issue 3, 2015, Pages 125-207]
Safkhani, Masoumeh
Full Secret Disclosure Attack against an EPC- C1 G2 Compliant Authentication Protocol [Volume 6, Issue 1, 2019, Pages 13-23]
Salajegheh, Afshin
A Context Model for Business Process Adaptation based on Ontology Reasoning [Volume 7, Issue 2, 2020, Pages 119-140]
Samavi, Shadrokh
Steganography of Halftone Images by Group Alteration of Grayscale Pixels [Volume 2, Issue 1, 2015, Pages 21-30]
Saraee, Mohamad
PSA: A Hybrid Feature Selection Approach for Persian Text Classification [Volume 1, Issue 4, 2014, Pages 261-272]
Saraee, Mohamad
Mining Association Rules from Semantic Web Data without User Intervention [Volume 7, Issue 1, 2020, Pages 81-94]
Sattari-Naeini, Vahid
Multi-Constraint Optimal Path Finding for QoS-Enabled Smart Grids: A Combination Approach of Neural Network and Fuzzy System [Volume 4, Issue 2, 2017, Pages 47-61]
Sekhavat, Yoones A
Enhancing the Sense of Immersion and Quality of Experience in Mobile Games Using Augmented Reality [Volume 3, Issue 1, 2016, Pages 53-62]
Seyyedi, Mir Ali
A Context Model for Business Process Adaptation based on Ontology Reasoning [Volume 7, Issue 2, 2020, Pages 119-140]
Shabanian, Touraj
An Optimal Traffic Distribution Method Supporting End-to-End Delay Bound [Volume 1, Issue 1, 2014, Pages 61-71]
Shadgar, Bita
A Survey on Transformation Methods of XML Documents to Ontologies [Volume 4, Issue 2, 2017, Pages 81-100]
Shafiee, Nasim
A High Speed Residue-to-Binary Converter for Balanced 4-Moduli Set [Volume 2, Issue 1, 2015, Pages 43-54]
Shafieinejad, Alireza
Bit-Parallel ECC Coprocessor resistant to Differential Power Analysis Attacks in GF(2m) [Volume 8, Issue 1, 2021, Pages 1-18]
Shahgholi Ghahfarokhi, Behrouz
Demand based Resource Allocation to Balance the Utilization and User Level Fairness in Femtocell Networks [Volume 1, Issue 3, 2014, Pages 187-204]
Shakiba, Ali
Generating dynamical S-boxes using 1D Chebyshev chaotic maps [Volume 7, Issue 1, 2020, Pages 1-17]
Shams, Fereidoon
Toward automatic Transformation of Service Choreography into UML State Machine [Volume 2, Issue 3, 2015, Pages 209-222]
Shams, Fereidoon
A Context-Aware Reflective-State Framework to Reconfigure Service-Based Applications [Volume 2, Issue 4, 2015, Pages 281-292]
Sharifi, Abbas Ali
Robust Cooperative Spectrum Sensing under Primary User Emulation Attack in Cognitive Radio Networks [Volume 2, Issue 2, 2015, Pages 109-117]
Shirvani, Hussein
A New Scheme for Storage and Retrieval of Shared Text Files [Volume 2, Issue 3, 2015, Pages 223-231]
T
Taheri, MohammadReza
A High Speed Residue-to-Binary Converter for Balanced 4-Moduli Set [Volume 2, Issue 1, 2015, Pages 43-54]
Tahmasebipour, Safieh
Ranking of Common Architectural Styles Based on Availability, Security and Performance Quality Attributes [Volume 1, Issue 2, 2014, Pages 83-93]
Tajiki, Mohammad Mahdi
Improved Secure and Privacy Preserving Keyword Searching Cryptography [Volume 2, Issue 3, 2015, Pages 185-194]
Tavakoli, Somayeh
Capability-Based Team Formation in Researchers Social Networks [Volume 4, Issue 2, 2017, Pages 63-79]
Tork Ladani, Behrouz
Security Analysis of an EPC Class-1 Generation-2 Compliant RFID Authentication Protocol [Volume 3, Issue 3, 2016, Pages 163-174]
V
Vahdat-Nejad, Hamed
A New Scheme for Storage and Retrieval of Shared Text Files [Volume 2, Issue 3, 2015, Pages 223-231]
Y
Yazdani, Mohammad Rohollah
A Lightweight Authentication Scheme for RFID with Permutation Operation on Passive Tags [Volume 8, Issue 2, 2021, Pages 71-86]
Z
Zafari, Farhad
DOPPONENT: A Socially Efficient Preference Model of Opponent in Bilateral Multi Issue Negotiations [Volume 1, Issue 4, 2014, Pages 283-292]
Zahedi, Mohammad Sadegh
Improving Semi-supervised Constrained k-Means Clustering Method Using User Feedback [Volume 1, Issue 4, 2014, Pages 273-261]
Zakerolhosseini, Ali
A Weak Blind Signature Based on Quantum Key Distribution [Volume 1, Issue 3, 2014, Pages 179-186]
Zali, Zeinab
Deploying IoT, Based on NDN Protocol in a Fog Computing Infrastructure [Volume 9, Issue 1, 2022, Pages 31-44]
Zamani, Bahman
Towards a Model-Driven Framework for Simulating Interactive Emergency Response Environments [Volume 5, Issue 1, 2018, Pages 35-49]
Zamani, Bahman
Applying Meta-Heuristics Algorithms in Model-Driven Approaches for Solving the CRA Problem [Volume 7, Issue 2, 2020, Pages 141-161]
Zarei, Hosein
Enhancing the Sense of Immersion and Quality of Experience in Mobile Games Using Augmented Reality [Volume 3, Issue 1, 2016, Pages 53-62]
Zarezadeh, Maryam
Determining the Number of Accusations for Decision Making in Key Revocation Protocol for MANET [Volume 3, Issue 1, 2016, Pages 63-72]
Zeinal Hamadani, Ali
DOPPONENT: A Socially Efficient Preference Model of Opponent in Bilateral Multi Issue Negotiations [Volume 1, Issue 4, 2014, Pages 283-292]