A
-
Abaei, Golnoush
A Lightweight Anomaly Detection Model using SVM for WSNs in IoT through a Hybrid Feature Selection Algorithm based on GA and GWO [Volume 7, Issue 1, 2020, Pages 63-79]
-
Abbasi, Fereshteh
Intrusion Detection in IoT With Logistic Regression and Artificial Neural Network: Further Investigations on N-BaIoT Dataset Devices [Volume 8, Issue 2, 2021, Pages 27-42]
-
Abdali-Mohammadi, Fardin
Improving Face Recognition Systems Security Using Local Binary Patterns [Volume 2, Issue 1, 2015, Pages 55-62]
-
Abdali-Mohammadi, Fardin
A Novel Grammar-Based Approach to Atrial Fibrillation Arrhythmia Detection for Pervasive Healthcare Environments [Volume 2, Issue 2, 2015, Pages 155-163]
-
Abdali-Mohammadi, Fardin
Effect of Purposeful Feature Extraction in High-dimensional Kinship Verification Problem [Volume 3, Issue 3, 2016, Pages 183-191]
-
Abdellahi Khorasgani, Alireza
A Lightweight Authentication Scheme for RFID with Permutation Operation on Passive Tags [Volume 8, Issue 2, 2021, Pages 71-86]
-
Abdollahi Azgomi, Mohammad
Expected Coverage of Perfect Chains in the Hellman Time Memory Trade-Off [Volume 3, Issue 3, 2016, Pages 155-162]
-
Abdolrazzagh-Nezhad, Majid
CSE: A Novel Dynamic Obfuscation Based on Control Flow, Signals and Encryption [Volume 6, Issue 2, 2019, Pages 53-63]
-
Abdolrazzagh-Nezhad, Majid
A Generalized Spread Spectrum-Based Audio Watermarking Method with Adaptive Synchronization [Volume 10, Issue 2, 2023, Pages 31-44]
-
Abhari, Bardia
Gamifault: A Gamified Motivational Framework for Software Debugging Process [Volume 10, Issue 1, 2023, Pages 17-34]
-
Adibi, Peyman
A Growing Hierarchical Approach to Batch Linear Manifold Topographic Map Formation [Volume 1, Issue 1, 2014, Pages 47-59]
-
Ahmadi, Ali
Persian Texts Part of Speech Tagging Using Artificial Neural Networks [Volume 3, Issue 4, 2016, Pages 233-241]
-
Ahmadi, Maedeh
Adaptive Interval Type-2 Fuzzy Inference System for Facial Expression Recognition [Volume 2, Issue 3, 2015, Pages 125-207]
-
Ahmadi, Mahmood
Performance Evaluation of Apache Spark MLlib Algorithms on an Intrusion Detection Dataset [Volume 9, Issue 1, 2022, Pages 57-69]
-
Ahmadi, Mahmood
DiCuPIT: Distributed Cuckoo Filter-based Pending Interest Table [Volume 9, Issue 1, 2022, Pages 85-96]
-
Ahmadi, Mahmood
Grey Wolf-Based Task Scheduling in Vehicular Fog Computing Systems [(Articles in Press)]
-
Aji, Ali
Domain-based Abbreviation Expansion using Topic Modelling for Data Cleaning [Volume 11, Issue 2, 2024, Pages 1-12]
-
Ajoudanian, Shohreh
A Novel Solution for Author Attribution Problem in Anonymous E-mail [Volume 1, Issue 4, 2014, Pages 319-327]
-
Akhaee, Mohammad Ali
Improved Secure and Privacy Preserving Keyword Searching Cryptography [Volume 2, Issue 3, 2015, Pages 185-194]
-
Akhoondi, Rana
A GA Approach for Tuning Membership Functions of a Fuzzy Expert System for Heart Disease Prognosis Development Risk [Volume 4, Issue 1, 2017, Pages 13-23]
-
Alavi, Seyyed Enayatallah
Intrusion Detection in IoT With Logistic Regression and Artificial Neural Network: Further Investigations on N-BaIoT Dataset Devices [Volume 8, Issue 2, 2021, Pages 27-42]
-
Alfraihi, Hessa
eXtreme Modeling: an approach to agile model-based development [Volume 6, Issue 2, 2019, Pages 43-52]
-
Ali, Rosmah
An Empirical Study of Students' Perceptions on the Technological Aspects of the E-Learning System [Volume 4, Issue 1, 2017, Pages 25-38]
-
Ali Asgari Renani, Fatemeh
Indoor Path Tracking Using Combination of Viterbi and WKNN [Volume 8, Issue 2, 2021, Pages 19-26]
-
Alidoosti, Mitra
BLProM: A black-box approach for detecting business-layer processes in the web applications [Volume 6, Issue 2, 2019, Pages 65-80]
-
Aligholizadeh, Hossein
Sentiment Analysis of Persian Sentences using Efficient Deep Learning in Fiction [Volume 11, Issue 1, 2024, Pages 67-86]
-
Alikhani, Parastoo
Gamifault: A Gamified Motivational Framework for Software Debugging Process [Volume 10, Issue 1, 2023, Pages 17-34]
-
Alimoradi, Dariush
The Effect of Correlogram Properties on Blind Steganalysis in JPEG Images [Volume 1, Issue 1, 2014, Pages 39-46]
-
Alirezazadeh, Pendar
Effect of Purposeful Feature Extraction in High-dimensional Kinship Verification Problem [Volume 3, Issue 3, 2016, Pages 183-191]
-
Alizadeh, Javad
JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH [Volume 2, Issue 1, 2015, Pages 3-20]
-
Almasi, Ramin
A High-Payload Audio Watermarking Scheme for Real-Time Applications [Volume 2, Issue 2, 2015, Pages 119-127]
-
Amini, Mohammad
Effective Intrusion Detection with a Neural Network Ensemble Using Fuzzy Clustering and Stacking Combination Method [Volume 1, Issue 4, 2014, Pages 293-305]
-
Amirfattahi, Rasoul
Semantic Segmentation of Aerial Images Using Fusion of Color and Texture Features [Volume 1, Issue 3, 2014, Pages 225-238]
-
Amiri, Maryam
Illegal Miner Detection based on Pattern Mining: A Practical Approach [Volume 9, Issue 2, 2022, Pages 1-10]
-
Amirjamshidi, Zhale
A High Speed Residue-to-Binary Converter for Balanced 4-Moduli Set [Volume 2, Issue 1, 2015, Pages 43-54]
-
Amouzadi, Azam
HH-FRBC: Halving Hierarchical Fuzzy Rule-Based Classifier [Volume 1, Issue 3, 2014, Pages 215-224]
-
Analoui, Morteza
Simulating the Resource Freeing Attack: Using Cloudsim Simulator [Volume 2, Issue 4, 2015, Pages 293-302]
-
Arabjafari, Monireh
Evaluating Behavioral Intentions of Tourists in e-Tourism [Volume 1, Issue 2, 2014, Pages 95-109]
-
Arabnezhad, Hossein
Toward A More Efficient Gröbner-based Algebraic Cryptanalysis [Volume 7, Issue 2, 2020, Pages 103-117]
-
Aref, Mohammad Reza
JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH [Volume 2, Issue 1, 2015, Pages 3-20]
-
Asadi Amiri, Sekineh
Robust Face Recognition Under Illumination Changes and Pose Variations [Volume 5, Issue 2, 2018, Pages 81-89]
-
Asadollahi, Hamid
Multicollision Attack on a recently proposed hash function vMDC-2 [Volume 3, Issue 4, 2016, Pages 211-215]
-
Asgarian, Ehsan
Improving Semi-supervised Constrained k-Means Clustering Method Using User Feedback [Volume 1, Issue 4, 2014, Pages 273-261]
-
Ashooriyan, Peyman
Multiple-Fault Tolerant Hardware Structure for Cellular Genetic Algorithm [Volume 3, Issue 1, 2016, Pages 27-42]
-
Askari, Hesam
Illegal Miner Detection based on Pattern Mining: A Practical Approach [Volume 9, Issue 2, 2022, Pages 1-10]
-
Askarian, Ahmad
An Optimal Traffic Distribution Method Supporting End-to-End Delay Bound [Volume 1, Issue 1, 2014, Pages 61-71]
-
Atefinia, Ramin
Performance Evaluation of Apache Spark MLlib Algorithms on an Intrusion Detection Dataset [Volume 9, Issue 1, 2022, Pages 57-69]
B
-
Babamir, Seyed Morteza
Ranking of Common Architectural Styles Based on Availability, Security and Performance Quality Attributes [Volume 1, Issue 2, 2014, Pages 83-93]
-
Babamir, Seyed Morteza
A Method for Assessing Maintainability of Software Architectural Styles in Self-healing Systems by Measuring Coupling and Cohesion [Volume 2, Issue 1, 2015, Pages 31-42]
-
Bagheri, Ayoub
PSA: A Hybrid Feature Selection Approach for Persian Text Classification [Volume 1, Issue 4, 2014, Pages 261-272]
-
Bagheri, Nasour
JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH [Volume 2, Issue 1, 2015, Pages 3-20]
-
Bagheri, Nasour
On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol [Volume 3, Issue 4, 2016, Pages 201-209]
-
Bagheri, Nasour
Multicollision Attack on a recently proposed hash function vMDC-2 [Volume 3, Issue 4, 2016, Pages 211-215]
-
Bahak, Hossein
Evaluating ChatGPT as a Question Answering System: a Comprehensive Analysis and Comparison with Existing Models [(Articles in Press)]
-
Bahrak, Behnam
Improved Secure and Privacy Preserving Keyword Searching Cryptography [Volume 2, Issue 3, 2015, Pages 185-194]
-
Bahraman, Kaveh
Momentum Contrast Self-Supervised Based Training for Adversarial Robustness [Volume 8, Issue 1, 2021, Pages 33-43]
-
Baleghi Damavandi, Yasser
Multiple-Fault Tolerant Hardware Structure for Cellular Genetic Algorithm [Volume 3, Issue 1, 2016, Pages 27-42]
-
Barangi, Hamed
Model-Driven Software Engineering: A Bibliometric Analysis [Volume 8, Issue 1, 2021, Pages 93-108]
-
Basereh, Zeinab
The Diagnosis of Epilepsy by Gravitational Search Algorithm and Support Vector Machines [Volume 3, Issue 2, 2016, Pages 111-125]
-
Bastanfard, Azam
Sentiment Analysis of Persian Sentences using Efficient Deep Learning in Fiction [Volume 11, Issue 1, 2024, Pages 67-86]
-
Bateni, Mehdi
Uplift Modeling Using Artificial Immune System [Volume 10, Issue 2, 2023, Pages 45-60]
-
Berenjkoub, Mehdi
An Efficient End to End Key Establishment Protocol for Wireless Sensor Networks [Volume 1, Issue 1, 2014, Pages 23-38]
-
Bohlooli, Ali
Distributed Rule Anomaly Detection in SDN-based IoT: Towards a Comprehensive Approach [Volume 10, Issue 1, 2023, Pages 75-84]
-
Bozorgi, Arastoo
Improving Semi-supervised Constrained k-Means Clustering Method Using User Feedback [Volume 1, Issue 4, 2014, Pages 273-261]
-
Bushehrian, Omid
Web Service Matchmaking based on Functional Similarity in Service Cloud [Volume 2, Issue 4, 2015, Pages 257-270]
-
Bushehrian, Omid
A Workload-Adaptable Method for Migrated Software to the Cloud [Volume 2, Issue 4, 2015, Pages 271-279]
-
Bushehrian, Omid
Change Impact Analysis by Concept Propagation [Volume 5, Issue 1, 2018, Pages 51-56]
C
-
Chegeni, Mastaneh
Indoor Path Tracking Using Combination of Viterbi and WKNN [Volume 8, Issue 2, 2021, Pages 19-26]
D
-
Dakhilalian, Mohammad
Some Primitives Based on Jumping LFSRs with Determined Period [Volume 2, Issue 3, 2015, Pages 175-184]
-
Davahli, Azam
A Lightweight Anomaly Detection Model using SVM for WSNs in IoT through a Hybrid Feature Selection Algorithm based on GA and GWO [Volume 7, Issue 1, 2020, Pages 63-79]
-
Dehyadegari, Masoud
Signature Codes for Energy-Efficient Data Movement in On-chip Networks [Volume 7, Issue 2, 2020, Pages 95-101]
-
Deypir, Mahmood
A Novel Block Cipher Algorithm with Feistel-Like Structure [Volume 3, Issue 1, 2016, Pages 13-26]
-
Doostari, Mohammad Ali
Determining the Number of Accusations for Decision Making in Key Revocation Protocol for MANET [Volume 3, Issue 1, 2016, Pages 63-72]
-
Dorri Nogoorani, Sadegh
Decentralized App Store and License Management Using Smart Contracts and Self-Sovereign Identities [Volume 9, Issue 2, 2022, Pages 39-54]
E
-
Ebrahim Ghajari, Negin
Detection and Classification of Lung Cancer in Histopathology Images Using Deep Learning [Volume 11, Issue 1, 2024, Pages 19-28]
-
Ebrahimi, Seyyed Ashkan
A New Implementation for a 2^n-1 Modular Adder Through Carbon Nanotube Field Effect Transistors [Volume 2, Issue 2, 2015, Pages 129-139]
-
Ebrahimi Atani, Reza
A Provably Secure Variant of ETRU Based on Extended Ideal Lattices Over Direct Product of Dedekind Domains [Volume 5, Issue 1, 2018, Pages 13-34]
-
Ebrahimi Atani, Shahabaddin
A Provably Secure Variant of ETRU Based on Extended Ideal Lattices Over Direct Product of Dedekind Domains [Volume 5, Issue 1, 2018, Pages 13-34]
-
Ebrahimi Mood, Sepehr
New Functions for Mass Calculation in Gravitational Search Algorithm [Volume 2, Issue 3, 2015, Pages 233-246]
-
Eftekhari, Mahdi
A New Hybrid Approach for Modeling Accurate Fuzzy Rule Based Classification Systems [Volume 1, Issue 2, 2014, Pages 111-122]
-
Eftekhari, Mahdi
Comparison of Hybrid and Filter Feature Selection Methods to Identify Candidate Single Nucleotide Polymorphisms [Volume 1, Issue 3, 2014, Pages 205-2013]
-
Eftekhari, Mahdi
Momentum Contrast Self-Supervised Based Training for Adversarial Robustness [Volume 8, Issue 1, 2021, Pages 33-43]
-
Eslami, Ziba
A CCA2-Secure Incomparable Public Key Encryption Scheme [Volume 3, Issue 1, 2016, Pages 3-12]
-
Eslami, Ziba
Verifiable Social Multi-Secret Sharing Secure in Active Adversarial Model [Volume 4, Issue 1, 2017, Pages 3-12]
-
Esmaeildoust, Mohammad
A High Speed Residue-to-Binary Converter for Balanced 4-Moduli Set [Volume 2, Issue 1, 2015, Pages 43-54]
-
Esmailizadeh, Ali
Comparison of Hybrid and Filter Feature Selection Methods to Identify Candidate Single Nucleotide Polymorphisms [Volume 1, Issue 3, 2014, Pages 205-2013]
F
-
Fakhrahmad, Seyed Mostafa
Word Sense Disambiguation Based on Lexical and Semantic Features Using Naive Bayes Classifier [Volume 1, Issue 2, 2014, Pages 123-132]
-
Fallah-Mehrjardi, Omid
Demand based Resource Allocation to Balance the Utilization and User Level Fairness in Femtocell Networks [Volume 1, Issue 3, 2014, Pages 187-204]
-
Fanian, Ali
An Efficient End to End Key Establishment Protocol for Wireless Sensor Networks [Volume 1, Issue 1, 2014, Pages 23-38]
-
Fanian, Ali
A Hybrid Method based on Statistical Features and Packet Content Analysis to Identify Major Network Tunneling Protocols [Volume 3, Issue 2, 2016, Pages 95-110]
-
Farahani, Gholamreza
Scalability Analysis of a LoRa Network Under Inter-SF and Co-SF Interference with Poisson Point Process Model [Volume 8, Issue 2, 2021, Pages 43-57]
-
Farahbod, Fahimeh
A New Hybrid Approach for Modeling Accurate Fuzzy Rule Based Classification Systems [Volume 1, Issue 2, 2014, Pages 111-122]
-
Farahmandpour, Zeinab
A Study on Intelligent Authorship Methods in Persian Language [Volume 2, Issue 1, 2015, Pages 63-76]
-
Faridmoayer, Sogol
Applying Meta-Heuristics Algorithms in Model-Driven Approaches for Solving the CRA Problem [Volume 7, Issue 2, 2020, Pages 141-161]
-
Farmani, Vahid
Adaptive Interval Type-2 Fuzzy Inference System for Facial Expression Recognition [Volume 2, Issue 3, 2015, Pages 125-207]
-
Farokh, Azam
A Method for Assessing Maintainability of Software Architectural Styles in Self-healing Systems by Measuring Coupling and Cohesion [Volume 2, Issue 1, 2015, Pages 31-42]
-
Farsi, Hassan
Training-Free Object Matching and Retrieval Using Speeded Up Robust Features [Volume 2, Issue 2, 2015, Pages 141-153]
-
Fatehi, Kavan
Improving Semi-supervised Constrained k-Means Clustering Method Using User Feedback [Volume 1, Issue 4, 2014, Pages 273-261]
-
Fatemi, Afsaneh
Capability-Based Team Formation in Researchers Social Networks [Volume 4, Issue 2, 2017, Pages 63-79]
-
Fatemi, Afsaneh
Towards a Model-Driven Framework for Simulating Interactive Emergency Response Environments [Volume 5, Issue 1, 2018, Pages 35-49]
-
Fatemi, Afsaneh
BAS: An Answer Selection Method Using BERT Language Model [Volume 8, Issue 2, 2021, Pages 1-18]
-
Fatemi, Afsaneh
Applying Heuristic-Based Greedy Approaches for Influence Maximization-Cost Minimization in Social Networks [Volume 11, Issue 1, 2024, Pages 29-37]
-
Fatemi, Afsaneh
Domain-based Abbreviation Expansion using Topic Modelling for Data Cleaning [Volume 11, Issue 2, 2024, Pages 1-12]
-
Fathi, Abdolhossein
Improving Face Recognition Systems Security Using Local Binary Patterns [Volume 2, Issue 1, 2015, Pages 55-62]
-
Fathi, Abdolhossein
A Novel Grammar-Based Approach to Atrial Fibrillation Arrhythmia Detection for Pervasive Healthcare Environments [Volume 2, Issue 2, 2015, Pages 155-163]
-
Fathi, Abdolhossein
Effect of Purposeful Feature Extraction in High-dimensional Kinship Verification Problem [Volume 3, Issue 3, 2016, Pages 183-191]
-
Fathi, Abdolhossein
Combination of Genetic Programming and Support Vector Machine-Based Prediction of Protein-Peptide Binding Sites With Sequence and Structure-Based Features [Volume 8, Issue 1, 2021, Pages 45-63]
-
Fathi, Abdolhossein
Detection and Classification of Lung Cancer in Histopathology Images Using Deep Learning [Volume 11, Issue 1, 2024, Pages 19-28]
G
-
Ghaderi, Mahnaz
A Generalized Spread Spectrum-Based Audio Watermarking Method with Adaptive Synchronization [Volume 10, Issue 2, 2023, Pages 31-44]
-
Ghadiri, Nasser
A Sample-Based Approach to Data Quality Assessment in Spatial Databases with Application to Mobile Trajectory Nearest-Neighbor Search [Volume 1, Issue 3, 2014, Pages 239-249]
-
Ghaemi Bafghi, Abbas
A Risk Estimation Framework for Security Threats in Computer Networks [Volume 7, Issue 1, 2020, Pages 19-33]
-
Ghaffarian, Hossein
Indoor Path Tracking Using Combination of Viterbi and WKNN [Volume 8, Issue 2, 2021, Pages 19-26]
-
Ghaffarian, Hossein
Indoor Localization Performance Optimization Using Modified kd-Tree Algorithm [Volume 9, Issue 2, 2022, Pages 55-64]
-
Gharavi, Naser Hossein
Expected Coverage of Perfect Chains in the Hellman Time Memory Trade-Off [Volume 3, Issue 3, 2016, Pages 155-162]
-
Ghareh Chamani, Javad
Privacy-Preserving Fine-grained Correctness Verification of Query Results in Outsourced Databases [Volume 2, Issue 2, 2015, Pages 87-107]
-
Ghasemi, Simin
A Trust-Based Approach for Correctness verification of Query Results in Data Outsourcing [Volume 1, Issue 1, 2014, Pages 3-14]
-
Ghatee, Mehdi
Solution of the Generalized Interval Linear Programming Problems: Pessimistic and Optimistic Approaches [Volume 1, Issue 2, 2014, Pages 159-167]
-
Ghiasian, Ali
Analyzing the Impact of Wireless Channels on the Efficiency of Edge Computing in IoT Applications [Volume 8, Issue 2, 2021, Pages 59-70]
-
Gholamnezhad, Pezhman
Gaussian Linear Regression Crossover for Genetic Algorithms [Volume 9, Issue 1, 2022, Pages 45-56]
-
Golzari, Shahram
The Diagnosis of Epilepsy by Gravitational Search Algorithm and Support Vector Machines [Volume 3, Issue 2, 2016, Pages 111-125]
H
-
Hadavandi, Esmaeil
Effective Intrusion Detection with a Neural Network Ensemble Using Fuzzy Clustering and Stacking Combination Method [Volume 1, Issue 4, 2014, Pages 293-305]
-
Hadavi, Mohammad Ali
An Inference Resistant Indexing Technique to Enforce Access Control in Data Outsourcing [Volume 3, Issue 2, 2016, Pages 83-93]
-
Hadavi, Mohammad Ali
A Trust-Based Approach for Correctness verification of Query Results in Data Outsourcing [Volume 1, Issue 1, 2014, Pages 3-14]
-
Hadavi, Mohammad Ali
Privacy-Preserving Fine-grained Correctness Verification of Query Results in Outsourced Databases [Volume 2, Issue 2, 2015, Pages 87-107]
-
Hadavi, Mohammad Ali
Automatic Black-Box Detection of Resistance Against CSRF Vulnerabilities in Web Applications [Volume 8, Issue 1, 2021, Pages 19-32]
-
Haj Seyyed Javadi, Seyyed Hamid
Determining the Number of Accusations for Decision Making in Key Revocation Protocol for MANET [Volume 3, Issue 1, 2016, Pages 63-72]
-
Halakou, Farideh
Comparison of Hybrid and Filter Feature Selection Methods to Identify Candidate Single Nucleotide Polymorphisms [Volume 1, Issue 3, 2014, Pages 205-2013]
-
Halvachi, Hadi
An Inference Resistant Indexing Technique to Enforce Access Control in Data Outsourcing [Volume 3, Issue 2, 2016, Pages 83-93]
-
Harifi, Abbas
The Diagnosis of Epilepsy by Gravitational Search Algorithm and Support Vector Machines [Volume 3, Issue 2, 2016, Pages 111-125]
-
Hasanzadeh, Maryam
The Effect of Correlogram Properties on Blind Steganalysis in JPEG Images [Volume 1, Issue 1, 2014, Pages 39-46]
-
Haseme, Maxam
TFDF, not TF-IDF in Financial Analysis [Volume 10, Issue 2, 2023, Pages 13-30]
-
Hashemi, Massoud Reza
An Optimal Traffic Distribution Method Supporting End-to-End Delay Bound [Volume 1, Issue 1, 2014, Pages 61-71]
-
Hashemi, Massoud Reza
Deploying IoT, Based on NDN Protocol in a Fog Computing Infrastructure [Volume 9, Issue 1, 2022, Pages 31-44]
-
Hashemzade, Bahare
CSE: A Novel Dynamic Obfuscation Based on Control Flow, Signals and Encryption [Volume 6, Issue 2, 2019, Pages 53-63]
-
Hassani Karbasi, Amir
A Provably Secure Variant of ETRU Based on Extended Ideal Lattices Over Direct Product of Dedekind Domains [Volume 5, Issue 1, 2018, Pages 13-34]
-
Hassanpour, Hamid
Robust Face Recognition Under Illumination Changes and Pose Variations [Volume 5, Issue 2, 2018, Pages 81-89]
-
Horri, abbas
A Multi-Dimensional Framework for Virtual Machine Consolidation [Volume 10, Issue 2, 2023, Pages 82-92]
-
HoseinDoost, Samaneh
Towards a Model-Driven Framework for Simulating Interactive Emergency Response Environments [Volume 5, Issue 1, 2018, Pages 35-49]
-
HoseinDoost, Samaneh
Applying Meta-Heuristics Algorithms in Model-Driven Approaches for Solving the CRA Problem [Volume 7, Issue 2, 2020, Pages 141-161]
-
Hosseini, Rahil
A GA Approach for Tuning Membership Functions of a Fuzzy Expert System for Heart Disease Prognosis Development Risk [Volume 4, Issue 1, 2017, Pages 13-23]
-
Hosseini Pozveh, Zahra
Persian Texts Part of Speech Tagging Using Artificial Neural Networks [Volume 3, Issue 4, 2016, Pages 233-241]
-
Hosseini-Pozveh, Maryam
New Influence-Aware Centrality Measures for Influence Maximization in Social Networks [Volume 9, Issue 2, 2022, Pages 23-38]
-
Hosseini-Pozveh, Maryam
A New PageRank-Based Method for Influence Maximization in Signed Social Networks [Volume 10, Issue 1, 2023, Pages 61-74]
-
Hosseini-Pozveh, Maryam
Applying Heuristic-Based Greedy Approaches for Influence Maximization-Cost Minimization in Social Networks [Volume 11, Issue 1, 2024, Pages 29-37]
-
Hosseinzadeh, Mehdi
On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol [Volume 3, Issue 4, 2016, Pages 201-209]
J
-
Jabbari, Ghazal
Analyzing the Impact of Wireless Channels on the Efficiency of Edge Computing in IoT Applications [Volume 8, Issue 2, 2021, Pages 59-70]
-
Jalali, Mozhdeh
Applying Heuristic-Based Greedy Approaches for Influence Maximization-Cost Minimization in Social Networks [Volume 11, Issue 1, 2024, Pages 29-37]
-
Jalili, Rasool
A Trust-Based Approach for Correctness verification of Query Results in Data Outsourcing [Volume 1, Issue 1, 2014, Pages 3-14]
-
Jalili, Rasool
Privacy-Preserving Fine-grained Correctness Verification of Query Results in Outsourced Databases [Volume 2, Issue 2, 2015, Pages 87-107]
-
Jalili, Rasool
An Inference Resistant Indexing Technique to Enforce Access Control in Data Outsourcing [Volume 3, Issue 2, 2016, Pages 83-93]
-
Jalili, Rasool
An Extension of CryptoPAi to the Formal Analysis of E-voting Protocols [Volume 6, Issue 1, 2019, Pages 25-42]
-
Javidi, Mohammad Masoud
New Functions for Mass Calculation in Gravitational Search Algorithm [Volume 2, Issue 3, 2015, Pages 233-246]
K
-
Kabirirad, Saeideh
A Generalized Spread Spectrum-Based Audio Watermarking Method with Adaptive Synchronization [Volume 10, Issue 2, 2023, Pages 31-44]
-
Kaedi, Marjan
TFDF, not TF-IDF in Financial Analysis [Volume 10, Issue 2, 2023, Pages 13-30]
-
Karimi, Zahra
Using Data Mining to Investigate the Effect of Cognitive Style on Programming Habits [Volume 9, Issue 2, 2022, Pages 11-22]
-
Kazemi, Arefeh
Adaptive Reinforcement-Based Genetic Algorithm for Combinatorial Optimization [Volume 9, Issue 1, 2022, Pages 71-84]
-
Kazemi, Arefeh
Evaluating ChatGPT as a Question Answering System: a Comprehensive Analysis and Comparison with Existing Models [(Articles in Press)]
-
Kazemi, Keihan
A Hybrid Method based on Statistical Features and Packet Content Analysis to Identify Major Network Tunneling Protocols [Volume 3, Issue 2, 2016, Pages 95-110]
-
Kazemifard, Mohammad
AUBUE: An Adaptive User-Interface Based on Users' Emotions [Volume 3, Issue 2, 2016, Pages 127-145]
-
Khademzadeh, Ahmad
On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol [Volume 3, Issue 4, 2016, Pages 201-209]
-
Khalilian, Alireza
Gamifault: A Gamified Motivational Framework for Software Debugging Process [Volume 10, Issue 1, 2023, Pages 17-34]
-
Khasseh, Ali Akbar
Model-Driven Software Engineering: A Bibliometric Analysis [Volume 8, Issue 1, 2021, Pages 93-108]
-
Khodaei, Azadeh
Sentiment Analysis of Persian Sentences using Efficient Deep Learning in Fiction [Volume 11, Issue 1, 2024, Pages 67-86]
-
Khodambashi, Siavash
A Weak Blind Signature Based on Quantum Key Distribution [Volume 1, Issue 3, 2014, Pages 179-186]
-
Khodayari Tehraninejad, Dina
Proxima: Process Mining for Extracting Configurable Process Models Using Software Product Line Concepts [Volume 9, Issue 1, 2022, Pages 1-29]
-
Khoshnevis, Sedigheh
Proxima: Process Mining for Extracting Configurable Process Models Using Software Product Line Concepts [Volume 9, Issue 1, 2022, Pages 1-29]
-
Khoshnevis, Sedigheh
CIAOERP: A Method for Change Impact Analysis and Search-Based Decision Optimization in Cloud ERP Systems Using Feature Forests [(Articles in Press)]
-
Khosravi, Hadi
Structural and Non-Structural Similarity Combination of Users in Social Networks [Volume 3, Issue 1, 2016, Pages 43-52]
-
Kiani, Rasool
Distributed Rule Anomaly Detection in SDN-based IoT: Towards a Comprehensive Approach [Volume 10, Issue 1, 2023, Pages 75-84]
-
Kohansal, Omid
Robust Face Recognition Under Illumination Changes and Pose Variations [Volume 5, Issue 2, 2018, Pages 81-89]
-
Kolahdouz Rahimi, Shekoufeh
eXtreme Modeling: an approach to agile model-based development [Volume 6, Issue 2, 2019, Pages 43-52]
-
Kolahdouz Rahimi, Shekoufeh
Applying Meta-Heuristics Algorithms in Model-Driven Approaches for Solving the CRA Problem [Volume 7, Issue 2, 2020, Pages 141-161]
-
Kolahdouz Rahimi, Shekoufeh
Model-Driven Software Engineering: A Bibliometric Analysis [Volume 8, Issue 1, 2021, Pages 93-108]
-
Koohestani, Farnaz
CIAOERP: A Method for Change Impact Analysis and Search-Based Decision Optimization in Cloud ERP Systems Using Feature Forests [(Articles in Press)]
-
Kord Toudeshki, Leila
A Context Model for Business Process Adaptation based on Ontology Reasoning [Volume 7, Issue 2, 2020, Pages 119-140]
L
-
Lano, Kevin
eXtreme Modeling: an approach to agile model-based development [Volume 6, Issue 2, 2019, Pages 43-52]
-
Lano, Kevin
Formalizing the main characteristics of QVT-based model transformation languages [Volume 7, Issue 1, 2020, Pages 35-62]
-
Lobabi-Mirghavami, Hanieh
A Novel Grammar-Based Approach to Atrial Fibrillation Arrhythmia Detection for Pervasive Healthcare Environments [Volume 2, Issue 2, 2015, Pages 155-163]
-
Lotfi Shahreza, Maryam
Development of a CGAN-Based Method for Aspect Level Text Generation: Encouragement and Punishment Factors in the Aspect Knowledge [Volume 10, Issue 1, 2023, Pages 47-60]
-
Lotfi Shahreza, Maryam
A New PageRank-Based Method for Influence Maximization in Signed Social Networks [Volume 10, Issue 1, 2023, Pages 61-74]
M
-
Mahdavi, Mojtaba
Steganography of Halftone Images by Group Alteration of Grayscale Pixels [Volume 2, Issue 1, 2015, Pages 21-30]
-
Mahmoudi, Arman
DiCuPIT: Distributed Cuckoo Filter-based Pending Interest Table [Volume 9, Issue 1, 2022, Pages 85-96]
-
Mahrooghi, Hamid Reza
An Extension of CryptoPAi to the Formal Analysis of E-voting Protocols [Volume 6, Issue 1, 2019, Pages 25-42]
-
Mala, Hamid
Unified Byte Permutations for the Block Cipher 3D [Volume 1, Issue 1, 2014, Pages 15-22]
-
Mala, Hamid
Demand based Resource Allocation to Balance the Utilization and User Level Fairness in Femtocell Networks [Volume 1, Issue 3, 2014, Pages 187-204]
-
Mala, Hamid
Security Analysis of an EPC Class-1 Generation-2 Compliant RFID Authentication Protocol [Volume 3, Issue 3, 2016, Pages 163-174]
-
Malekmohammad, Azam
Structural and Non-Structural Similarity Combination of Users in Social Networks [Volume 3, Issue 1, 2016, Pages 43-52]
-
Mazinani, Mahdi
A GA Approach for Tuning Membership Functions of a Fuzzy Expert System for Heart Disease Prognosis Development Risk [Volume 4, Issue 1, 2017, Pages 13-23]
-
Mehran, Narges
Randomized SVD Based Probabilistic Caching Strategy in Named Data Networks [Volume 3, Issue 4, 2016, Pages 217-231]
-
Mirghadri, Abdorasool
Expected Coverage of Perfect Chains in the Hellman Time Memory Trade-Off [Volume 3, Issue 3, 2016, Pages 155-162]
-
Mirzaei, Abdolreza
HH-FRBC: Halving Hierarchical Fuzzy Rule-Based Classifier [Volume 1, Issue 3, 2014, Pages 215-224]
-
Mirzaei, Abdolreza
Adaptive Interval Type-2 Fuzzy Inference System for Facial Expression Recognition [Volume 2, Issue 3, 2015, Pages 125-207]
-
Mirzaei, Arash
Some Primitives Based on Jumping LFSRs with Determined Period [Volume 2, Issue 3, 2015, Pages 175-184]
-
Moghissi, Gholam Reza
Rejecting Claimed Speedup of 2^𝛽/2 in Extreme Pruning and Revising BKZ 2.0 for Better Speedup [Volume 8, Issue 1, 2021, Pages 65-91]
-
Moghissi, Gholam Reza
Design of Optimal Progressive BKZ with Increasing Success-Probabilities and Increasing Block-Sizes [Volume 9, Issue 2, 2022, Pages 65-93]
-
Mohamadzadeh, Sajad
Training-Free Object Matching and Retrieval Using Speeded Up Robust Features [Volume 2, Issue 2, 2015, Pages 141-153]
-
Mohammadi, Atefeh
Identifying Explicit Features of Persian Comments [Volume 6, Issue 1, 2019, Pages 1-11]
-
Mohammadi, Solmaz
Scalability Analysis of a LoRa Network Under Inter-SF and Co-SF Interference with Poisson Point Process Model [Volume 8, Issue 2, 2021, Pages 43-57]
-
Mohd Zainuddin, Norziha Megat
An Empirical Study of Students' Perceptions on the Technological Aspects of the E-Learning System [Volume 4, Issue 1, 2017, Pages 25-38]
-
Mollashahi, Hadid
Summarization Algorithm for Data Stream to Speed up Outlier Data Detection [Volume 10, Issue 1, 2023, Pages 35-46]
-
Monadjemi, Amirhassan
Persian Texts Part of Speech Tagging Using Artificial Neural Networks [Volume 3, Issue 4, 2016, Pages 233-241]
-
Montazeri, Morteza
Identifying Explicit Features of Persian Comments [Volume 6, Issue 1, 2019, Pages 1-11]
-
Moodi, Hossein
A New Hybrid Method for VoIP Stream Steganography [Volume 3, Issue 3, 2016, Pages 175-182]
-
Moradi, Fariba
Security Analysis of an EPC Class-1 Generation-2 Compliant RFID Authentication Protocol [Volume 3, Issue 3, 2016, Pages 163-174]
-
Moradi, Fereidoun
Security Analysis of an EPC Class-1 Generation-2 Compliant RFID Authentication Protocol [Volume 3, Issue 3, 2016, Pages 163-174]
-
Moradyan, Kourosh
Web Service Matchmaking based on Functional Similarity in Service Cloud [Volume 2, Issue 4, 2015, Pages 257-270]
-
Mosakhani, Mostafa
A more Accurate Clustering Method by using Co-author Social Networks for Author Name Disambiguation [Volume 1, Issue 4, 2014, Pages 307-317]
-
Moshavash, Monireh
Momentum Contrast Self-Supervised Based Training for Adversarial Robustness [Volume 8, Issue 1, 2021, Pages 33-43]
-
Motamed, Sara
Speech Emotion Recognition based on Improved SOAR Model [Volume 11, Issue 1, 2024, Pages 39-48]
-
Motameni, Homayun
New Attribute Relation-Based Access Control System via Hybrid Logic [Volume 10, Issue 2, 2023, Pages 1-12]
-
Mousavi, Sayyed Ahmad
Expected Coverage of Perfect Chains in the Hellman Time Memory Trade-Off [Volume 3, Issue 3, 2016, Pages 155-162]
-
Mousavi Esfahani, Shahrzad Sadat
Gamifault: A Gamified Motivational Framework for Software Debugging Process [Volume 10, Issue 1, 2023, Pages 17-34]
-
Movahhedinia, Naser
Demand based Resource Allocation to Balance the Utilization and User Level Fairness in Femtocell Networks [Volume 1, Issue 3, 2014, Pages 187-204]
-
Movahhedinia, Naser
Randomized SVD Based Probabilistic Caching Strategy in Named Data Networks [Volume 3, Issue 4, 2016, Pages 217-231]
-
Mozafari, Jamshid
BAS: An Answer Selection Method Using BERT Language Model [Volume 8, Issue 2, 2021, Pages 1-18]
-
Musevi Niya, Mir Javad
Robust Cooperative Spectrum Sensing under Primary User Emulation Attack in Cognitive Radio Networks [Volume 2, Issue 2, 2015, Pages 109-117]
N
-
Naderan, Marjan
Intrusion Detection in IoT With Logistic Regression and Artificial Neural Network: Further Investigations on N-BaIoT Dataset Devices [Volume 8, Issue 2, 2021, Pages 27-42]
-
Nadi, Shiva
PSA: A Hybrid Feature Selection Approach for Persian Text Classification [Volume 1, Issue 4, 2014, Pages 261-272]
-
Nadimi, Mohammad Hossein
A more Accurate Clustering Method by using Co-author Social Networks for Author Name Disambiguation [Volume 1, Issue 4, 2014, Pages 307-317]
-
Naghsh-Nilchi, Ahmad Reza
Editorial Note [Volume 1, Issue 1, 2014, Pages 1-2]
-
Naghsh-Nilchi, Ahmad Reza
Editorial Note [Volume 1, Issue 2, 2014, Pages 81-82]
-
Naghsh-Nilchi, Ahmad Reza
A New Hybrid Method for VoIP Stream Steganography [Volume 3, Issue 3, 2016, Pages 175-182]
-
Nasiripour, Reza
Training-Free Object Matching and Retrieval Using Speeded Up Robust Features [Volume 2, Issue 2, 2015, Pages 141-153]
-
Nassiri-Mofakham, Faria
DOPPONENT: A Socially Efficient Preference Model of Opponent in Bilateral Multi Issue Negotiations [Volume 1, Issue 4, 2014, Pages 283-292]
-
Navi, Keivan
A High Speed Residue-to-Binary Converter for Balanced 4-Moduli Set [Volume 2, Issue 1, 2015, Pages 43-54]
-
Nayebalsadr, Shakiba
Simulating the Resource Freeing Attack: Using Cloudsim Simulator [Volume 2, Issue 4, 2015, Pages 293-302]
-
Nazerian, Fatemeh
New Attribute Relation-Based Access Control System via Hybrid Logic [Volume 10, Issue 2, 2023, Pages 1-12]
-
Nematbakhsh, MohammadAli
Identifying Explicit Features of Persian Comments [Volume 6, Issue 1, 2019, Pages 1-11]
-
Nematbakhsh, Mohammad Ali
MRAR: Mining Multi-Relation Association Rules [Volume 1, Issue 2, 2014, Pages 133-158]
-
Nematbakhsh, Mohammad Ali
Mining Association Rules from Semantic Web Data without User Intervention [Volume 7, Issue 1, 2020, Pages 81-94]
-
Nematbakhsh, Mohammad Ali
BAS: An Answer Selection Method Using BERT Language Model [Volume 8, Issue 2, 2021, Pages 1-18]
-
Nematbakhsh, Mohammad Ali
Domain-based Abbreviation Expansion using Topic Modelling for Data Cleaning [Volume 11, Issue 2, 2024, Pages 1-12]
-
Nickabadi, Ahmad
BLProM: A black-box approach for detecting business-layer processes in the web applications [Volume 6, Issue 2, 2019, Pages 65-80]
-
Nikmehr, Hooman
A Study on Intelligent Authorship Methods in Persian Language [Volume 2, Issue 1, 2015, Pages 63-76]
-
Nikmehr, Hooman
A High-Payload Audio Watermarking Scheme for Real-Time Applications [Volume 2, Issue 2, 2015, Pages 119-127]
-
Nilforoush, Mohammad Reza
Deploying IoT, Based on NDN Protocol in a Fog Computing Infrastructure [Volume 9, Issue 1, 2022, Pages 31-44]
-
Noferesti, Morteza
A Trust-Based Approach for Correctness verification of Query Results in Data Outsourcing [Volume 1, Issue 1, 2014, Pages 3-14]
-
Noorani, S.Fatemeh
Using Data Mining to Investigate the Effect of Cognitive Style on Programming Habits [Volume 9, Issue 2, 2022, Pages 11-22]
-
Noorbehbahani, Fakhroddin
RSAM: A Questionnaire for Ransomware Security Awareness Measurement [Volume 10, Issue 1, 2023, Pages 1-16]
-
Noori, Fariba
AUBUE: An Adaptive User-Interface Based on Users' Emotions [Volume 3, Issue 2, 2016, Pages 127-145]
-
Nowroozi, Alireza
BLProM: A black-box approach for detecting business-layer processes in the web applications [Volume 6, Issue 2, 2019, Pages 65-80]
O
-
Omoomi, Behnaz
An Optimal Traffic Distribution Method Supporting End-to-End Delay Bound [Volume 1, Issue 1, 2014, Pages 61-71]
-
Oraei, Hossein
An Improvement Over Lee et al.'s Key Agreement Protocol [Volume 5, Issue 1, 2018, Pages 3-12]
-
Osareh, Alireza
A Survey on Transformation Methods of XML Documents to Ontologies [Volume 4, Issue 2, 2017, Pages 81-100]
P
-
Pajoohan, Mohammad-Reza
Identifying Explicit Features of Persian Comments [Volume 6, Issue 1, 2019, Pages 1-11]
-
Pakniat, Nasrollah
Verifiable Social Multi-Secret Sharing Secure in Active Adversarial Model [Volume 4, Issue 1, 2017, Pages 3-12]
-
Pakniat, Nasrollah
Security Analysis of Two Lightweight Certificateless Signature Schemes [Volume 5, Issue 2, 2018, Pages 59-65]
-
Parsaei, Fahimeh
Evaluating Behavioral Intentions of Tourists in e-Tourism [Volume 1, Issue 2, 2014, Pages 95-109]
-
Parsazadeh, Nadia
An Empirical Study of Students' Perceptions on the Technological Aspects of the E-Learning System [Volume 4, Issue 1, 2017, Pages 25-38]
-
Payandeh, Ali
Rejecting Claimed Speedup of 2^𝛽/2 in Extreme Pruning and Revising BKZ 2.0 for Better Speedup [Volume 8, Issue 1, 2021, Pages 65-91]
-
Payandeh, Ali
Design of Optimal Progressive BKZ with Increasing Success-Probabilities and Increasing Block-Sizes [Volume 9, Issue 2, 2022, Pages 65-93]
-
P.Haughton, Howard
eXtreme Modeling: an approach to agile model-based development [Volume 6, Issue 2, 2019, Pages 43-52]
-
Pira, Einollah
A Surrogate Model-based Aquila Optimizer for Solving High-dimensional Computationally Expensive Problems [Volume 11, Issue 1, 2024, Pages 1-18]
-
Pourkhani, Mohammadereza
A Survey on Transformation Methods of XML Documents to Ontologies [Volume 4, Issue 2, 2017, Pages 81-100]
-
Pourpouneh, Mohsen
An Improvement Over Lee et al.'s Key Agreement Protocol [Volume 5, Issue 1, 2018, Pages 3-12]
-
Purebrahim, Yousef
A Novel Block Cipher Algorithm with Feistel-Like Structure [Volume 3, Issue 1, 2016, Pages 13-26]
R
-
Rahimi, Alireza
JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH [Volume 2, Issue 1, 2015, Pages 3-20]
-
Rahmanpour, Ehsan
CIAOERP: A Method for Change Impact Analysis and Search-Based Decision Optimization in Cloud ERP Systems Using Feature Forests [(Articles in Press)]
-
Rajabi, Bahman
A CCA2-Secure Incomparable Public Key Encryption Scheme [Volume 3, Issue 1, 2016, Pages 3-12]
-
Ramezani, Reza
MRAR: Mining Multi-Relation Association Rules [Volume 1, Issue 2, 2014, Pages 133-158]
-
Ramezani, Reza
Mining Association Rules from Semantic Web Data without User Intervention [Volume 7, Issue 1, 2020, Pages 81-94]
-
Ramezanian, Rasoul
An Improvement Over Lee et al.'s Key Agreement Protocol [Volume 5, Issue 1, 2018, Pages 3-12]
-
Ramzani Shahrestani, Matin
Speech Emotion Recognition based on Improved SOAR Model [Volume 11, Issue 1, 2024, Pages 39-48]
-
Rasekh, Amir Hossein
Word Sense Disambiguation Based on Lexical and Semantic Features Using Naive Bayes Classifier [Volume 1, Issue 2, 2014, Pages 123-132]
-
Rashedi, Esmat
New Functions for Mass Calculation in Gravitational Search Algorithm [Volume 2, Issue 3, 2015, Pages 233-246]
-
Rashidi, Hassan
Software Architecture Tools- A Classification and Survey with Recommendation for an Organization [Volume 10, Issue 2, 2023, Pages 61-81]
-
Rashidi, Zahra
Software Architecture Tools- A Classification and Survey with Recommendation for an Organization [Volume 10, Issue 2, 2023, Pages 61-81]
-
Rashidi, Zeynab
Software Architecture Tools- A Classification and Survey with Recommendation for an Organization [Volume 10, Issue 2, 2023, Pages 61-81]
-
Rastegari, Yousef
Toward automatic Transformation of Service Choreography into UML State Machine [Volume 2, Issue 3, 2015, Pages 209-222]
-
Rastegari, Yousef
A Context-Aware Reflective-State Framework to Reconfigure Service-Based Applications [Volume 2, Issue 4, 2015, Pages 281-292]
-
Rastegari, Yousef
An HMM-based Method for Adapting Service-based Applications to Users’ Quality Preferences [Volume 5, Issue 2, 2018, Pages 67-79]
-
Rastgoo, Razieh
Multi-Constraint Optimal Path Finding for QoS-Enabled Smart Grids: A Combination Approach of Neural Network and Fuzzy System [Volume 4, Issue 2, 2017, Pages 47-61]
-
Reisi, Zahra
A Workload-Adaptable Method for Migrated Software to the Cloud [Volume 2, Issue 4, 2015, Pages 271-279]
-
Reshadinezhad, Mohammad Reza
A New Implementation for a 2^n-1 Modular Adder Through Carbon Nanotube Field Effect Transistors [Volume 2, Issue 2, 2015, Pages 129-139]
-
Rezaee, Razieh
A Risk Estimation Framework for Security Threats in Computer Networks [Volume 7, Issue 1, 2020, Pages 19-33]
-
Rezaeenour, Jalal
Effective Intrusion Detection with a Neural Network Ensemble Using Fuzzy Clustering and Stacking Combination Method [Volume 1, Issue 4, 2014, Pages 293-305]
-
Rezaei, Hashem
Bit-Parallel ECC Coprocessor resistant to Differential Power Analysis Attacks in GF(2m) [Volume 8, Issue 1, 2021, Pages 1-18]
-
Rezaei, Mehran
Evaluating Behavioral Intentions of Tourists in e-Tourism [Volume 1, Issue 2, 2014, Pages 95-109]
-
Rezaei, Mehran
An Empirical Study of Students' Perceptions on the Technological Aspects of the E-Learning System [Volume 4, Issue 1, 2017, Pages 25-38]
-
Rezaeian, Mahdie
Semantic Segmentation of Aerial Images Using Fusion of Color and Texture Features [Volume 1, Issue 3, 2014, Pages 225-238]
-
Rezaeian Zadeh, Farahnaz
A Novel Solution for Author Attribution Problem in Anonymous E-mail [Volume 1, Issue 4, 2014, Pages 319-327]
-
Rezaeian Zadeh, Farahnaz
A Workload-Adaptable Method for Migrated Software to the Cloud [Volume 2, Issue 4, 2015, Pages 271-279]
-
Rezvani, Azadeh
RSAM: A Questionnaire for Ransomware Security Awareness Measurement [Volume 10, Issue 1, 2023, Pages 1-16]
-
Rostampour, Samad
On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol [Volume 3, Issue 4, 2016, Pages 201-209]
-
Rouhi, Alireza
Formalizing the main characteristics of QVT-based model transformation languages [Volume 7, Issue 1, 2020, Pages 35-62]
-
Rouhi, Alireza
A Surrogate Model-based Aquila Optimizer for Solving High-dimensional Computationally Expensive Problems [Volume 11, Issue 1, 2024, Pages 1-18]
S
-
Saadatfar, Hamid
Summarization Algorithm for Data Stream to Speed up Outlier Data Detection [Volume 10, Issue 1, 2023, Pages 35-46]
-
Sabbaghi-nadooshan, Reza
A High Speed Residue-to-Binary Converter for Balanced 4-Moduli Set [Volume 2, Issue 1, 2015, Pages 43-54]
-
Saberi, Bagher
A Sample-Based Approach to Data Quality Assessment in Spatial Databases with Application to Mobile Trajectory Nearest-Neighbor Search [Volume 1, Issue 3, 2014, Pages 239-249]
-
Saboohi, Hadi
Sentiment Analysis of Persian Sentences using Efficient Deep Learning in Fiction [Volume 11, Issue 1, 2024, Pages 67-86]
-
Sadeghi, Samira
Automatic Black-Box Detection of Resistance Against CSRF Vulnerabilities in Web Applications [Volume 8, Issue 1, 2021, Pages 19-32]
-
Sadeghian, Babak
Toward A More Efficient Gröbner-based Algebraic Cryptanalysis [Volume 7, Issue 2, 2020, Pages 103-117]
-
Sadjadieh, Mahdi
Some Primitives Based on Jumping LFSRs with Determined Period [Volume 2, Issue 3, 2015, Pages 175-184]
-
Sadjadieh, Mahdi
A Lightweight Authentication Scheme for RFID with Permutation Operation on Passive Tags [Volume 8, Issue 2, 2021, Pages 71-86]
-
Sadreddini, Mohammad Hadi
Word Sense Disambiguation Based on Lexical and Semantic Features Using Naive Bayes Classifier [Volume 1, Issue 2, 2014, Pages 123-132]
-
Sadri, Saeid
Semantic Segmentation of Aerial Images Using Fusion of Color and Texture Features [Volume 1, Issue 3, 2014, Pages 225-238]
-
Safayani, Mehran
Adaptive Interval Type-2 Fuzzy Inference System for Facial Expression Recognition [Volume 2, Issue 3, 2015, Pages 125-207]
-
Safkhani, Masoumeh
Full Secret Disclosure Attack against an EPC- C1 G2 Compliant Authentication Protocol [Volume 6, Issue 1, 2019, Pages 13-23]
-
Salajegheh, Afshin
A Context Model for Business Process Adaptation based on Ontology Reasoning [Volume 7, Issue 2, 2020, Pages 119-140]
-
Samavi, Shadrokh
Steganography of Halftone Images by Group Alteration of Grayscale Pixels [Volume 2, Issue 1, 2015, Pages 21-30]
-
Saraee, Mohamad
MRAR: Mining Multi-Relation Association Rules [Volume 1, Issue 2, 2014, Pages 133-158]
-
Saraee, Mohamad
PSA: A Hybrid Feature Selection Approach for Persian Text Classification [Volume 1, Issue 4, 2014, Pages 261-272]
-
Saraee, Mohamad
Mining Association Rules from Semantic Web Data without User Intervention [Volume 7, Issue 1, 2020, Pages 81-94]
-
Sattari-Naeini, Vahid
Multi-Constraint Optimal Path Finding for QoS-Enabled Smart Grids: A Combination Approach of Neural Network and Fuzzy System [Volume 4, Issue 2, 2017, Pages 47-61]
-
Sekhavat, Yoones A
Enhancing the Sense of Immersion and Quality of Experience in Mobile Games Using Augmented Reality [Volume 3, Issue 1, 2016, Pages 53-62]
-
Seyyedi, Mir Ali
A Context Model for Business Process Adaptation based on Ontology Reasoning [Volume 7, Issue 2, 2020, Pages 119-140]
-
Shabanian, Touraj
An Optimal Traffic Distribution Method Supporting End-to-End Delay Bound [Volume 1, Issue 1, 2014, Pages 61-71]
-
Shadgar, Bita
A Survey on Transformation Methods of XML Documents to Ontologies [Volume 4, Issue 2, 2017, Pages 81-100]
-
Shafiee, Nasim
A High Speed Residue-to-Binary Converter for Balanced 4-Moduli Set [Volume 2, Issue 1, 2015, Pages 43-54]
-
Shafieinejad, Alireza
Bit-Parallel ECC Coprocessor resistant to Differential Power Analysis Attacks in GF(2m) [Volume 8, Issue 1, 2021, Pages 1-18]
-
Shahgholi Ghahfarokhi, Behrouz
Demand based Resource Allocation to Balance the Utilization and User Level Fairness in Femtocell Networks [Volume 1, Issue 3, 2014, Pages 187-204]
-
Shakiba, Ali
Generating dynamical S-boxes using 1D Chebyshev chaotic maps [Volume 7, Issue 1, 2020, Pages 1-17]
-
Shams, Fereidoon
Toward automatic Transformation of Service Choreography into UML State Machine [Volume 2, Issue 3, 2015, Pages 209-222]
-
Shams, Fereidoon
A Context-Aware Reflective-State Framework to Reconfigure Service-Based Applications [Volume 2, Issue 4, 2015, Pages 281-292]
-
Shams, Mohammadreza
Development of a CGAN-Based Method for Aspect Level Text Generation: Encouragement and Punishment Factors in the Aspect Knowledge [Volume 10, Issue 1, 2023, Pages 47-60]
-
Sharifi, Abbas Ali
Robust Cooperative Spectrum Sensing under Primary User Emulation Attack in Cognitive Radio Networks [Volume 2, Issue 2, 2015, Pages 109-117]
-
Shirvani, Hussein
A New Scheme for Storage and Retrieval of Shared Text Files [Volume 2, Issue 3, 2015, Pages 223-231]
-
Soleimani, Seyfollah
Indoor Localization Performance Optimization Using Modified kd-Tree Algorithm [Volume 9, Issue 2, 2022, Pages 55-64]
-
Soltani, Amir Masoud
Development of a CGAN-Based Method for Aspect Level Text Generation: Encouragement and Punishment Factors in the Aspect Knowledge [Volume 10, Issue 1, 2023, Pages 47-60]
T
-
Taghiyar, Anahita
RSAM: A Questionnaire for Ransomware Security Awareness Measurement [Volume 10, Issue 1, 2023, Pages 1-16]
-
Taghizadeh, Maryam
Grey Wolf-Based Task Scheduling in Vehicular Fog Computing Systems [(Articles in Press)]
-
Taheri, Farzaneh
Evaluating ChatGPT as a Question Answering System: a Comprehensive Analysis and Comparison with Existing Models [(Articles in Press)]
-
Taheri, MohammadReza
A High Speed Residue-to-Binary Converter for Balanced 4-Moduli Set [Volume 2, Issue 1, 2015, Pages 43-54]
-
Tahmasebipour, Safieh
Ranking of Common Architectural Styles Based on Availability, Security and Performance Quality Attributes [Volume 1, Issue 2, 2014, Pages 83-93]
-
Tajiki, Mohammad Mahdi
Improved Secure and Privacy Preserving Keyword Searching Cryptography [Volume 2, Issue 3, 2015, Pages 185-194]
-
Tariq, Hafsa
Comprehensive Security and Privacy Framework against Malicious Insider in Cloud-based Machine Learning [Volume 11, Issue 1, 2024, Pages 49-66]
-
Tavakoli, Somayeh
Capability-Based Team Formation in Researchers Social Networks [Volume 4, Issue 2, 2017, Pages 63-79]
-
Tork Ladani, Behrouz
Security Analysis of an EPC Class-1 Generation-2 Compliant RFID Authentication Protocol [Volume 3, Issue 3, 2016, Pages 163-174]
V
-
Vahdatnejad, Hamed
Summarization Algorithm for Data Stream to Speed up Outlier Data Detection [Volume 10, Issue 1, 2023, Pages 35-46]
-
Vahdat-Nejad, Hamed
A New Scheme for Storage and Retrieval of Shared Text Files [Volume 2, Issue 3, 2015, Pages 223-231]
-
Vahidi-Asl, Mojtaba
Gamifault: A Gamified Motivational Framework for Software Debugging Process [Volume 10, Issue 1, 2023, Pages 17-34]
Y
-
Yamaghani, Mohammadreza
Speech Emotion Recognition based on Improved SOAR Model [Volume 11, Issue 1, 2024, Pages 39-48]
-
Yazdani, Mohammad Rohollah
A Lightweight Authentication Scheme for RFID with Permutation Operation on Passive Tags [Volume 8, Issue 2, 2021, Pages 71-86]
Z
-
Zaamari, Masih
Uplift Modeling Using Artificial Immune System [Volume 10, Issue 2, 2023, Pages 45-60]
-
Zadsar, Seyedeh Habibe
Indoor Localization Performance Optimization Using Modified kd-Tree Algorithm [Volume 9, Issue 2, 2022, Pages 55-64]
-
Zafari, Farhad
DOPPONENT: A Socially Efficient Preference Model of Opponent in Bilateral Multi Issue Negotiations [Volume 1, Issue 4, 2014, Pages 283-292]
-
Zahedi, Mohammad Sadegh
Improving Semi-supervised Constrained k-Means Clustering Method Using User Feedback [Volume 1, Issue 4, 2014, Pages 273-261]
-
Zakerolhosseini, Ali
A Weak Blind Signature Based on Quantum Key Distribution [Volume 1, Issue 3, 2014, Pages 179-186]
-
Zali, Zeinab
Deploying IoT, Based on NDN Protocol in a Fog Computing Infrastructure [Volume 9, Issue 1, 2022, Pages 31-44]
-
Zamani, Bahman
Towards a Model-Driven Framework for Simulating Interactive Emergency Response Environments [Volume 5, Issue 1, 2018, Pages 35-49]
-
Zamani, Bahman
Applying Meta-Heuristics Algorithms in Model-Driven Approaches for Solving the CRA Problem [Volume 7, Issue 2, 2020, Pages 141-161]
-
Zamani, Bahman
Model-Driven Software Engineering: A Bibliometric Analysis [Volume 8, Issue 1, 2021, Pages 93-108]
-
Zarei, Hosein
Enhancing the Sense of Immersion and Quality of Experience in Mobile Games Using Augmented Reality [Volume 3, Issue 1, 2016, Pages 53-62]
-
Zarezadeh, Maryam
Determining the Number of Accusations for Decision Making in Key Revocation Protocol for MANET [Volume 3, Issue 1, 2016, Pages 63-72]
-
Zeinal Hamadani, Ali
DOPPONENT: A Socially Efficient Preference Model of Opponent in Bilateral Multi Issue Negotiations [Volume 1, Issue 4, 2014, Pages 283-292]
-
Zojaji, Zahra
Adaptive Reinforcement-Based Genetic Algorithm for Combinatorial Optimization [Volume 9, Issue 1, 2022, Pages 71-84]
-
Zojaji, Zahra
Evaluating ChatGPT as a Question Answering System: a Comprehensive Analysis and Comparison with Existing Models [(Articles in Press)]
-
Zolfaghari, Zahra
Multicollision Attack on a recently proposed hash function vMDC-2 [Volume 3, Issue 4, 2016, Pages 211-215]
Your query does not match with any item