A
-
Abdolrazzagh-Nezhad, Majid
CSE: A Novel Dynamic Obfuscation Based on Control Flow, Signals and Encryption [Volume 6, Issue 2, 2019, Pages 53-63]
-
Alfraihi, Hessa
eXtreme Modeling: an approach to agile model-based development [Volume 6, Issue 2, 2019, Pages 43-52]
-
Alidoosti, Mitra
BLProM: A black-box approach for detecting business-layer processes in the web applications [Volume 6, Issue 2, 2019, Pages 65-80]
H
-
Hashemzade, Bahare
CSE: A Novel Dynamic Obfuscation Based on Control Flow, Signals and Encryption [Volume 6, Issue 2, 2019, Pages 53-63]
J
-
Jalili, Rasool
An Extension of CryptoPAi to the Formal Analysis of E-voting Protocols [Volume 6, Issue 1, 2019, Pages 25-42]
L
-
Lano, Kevin
eXtreme Modeling: an approach to agile model-based development [Volume 6, Issue 2, 2019, Pages 43-52]
M
-
Mahrooghi, Hamid Reza
An Extension of CryptoPAi to the Formal Analysis of E-voting Protocols [Volume 6, Issue 1, 2019, Pages 25-42]
-
Mohammadi, Atefeh
Identifying Explicit Features of Persian Comments [Volume 6, Issue 1, 2019, Pages 1-11]
-
Montazeri, Morteza
Identifying Explicit Features of Persian Comments [Volume 6, Issue 1, 2019, Pages 1-11]
N
-
Nematbakhsh, MohammadAli
Identifying Explicit Features of Persian Comments [Volume 6, Issue 1, 2019, Pages 1-11]
-
Nickabadi, Ahmad
BLProM: A black-box approach for detecting business-layer processes in the web applications [Volume 6, Issue 2, 2019, Pages 65-80]
-
Nowroozi, Alireza
BLProM: A black-box approach for detecting business-layer processes in the web applications [Volume 6, Issue 2, 2019, Pages 65-80]
P
-
Pajoohan, Mohammad-Reza
Identifying Explicit Features of Persian Comments [Volume 6, Issue 1, 2019, Pages 1-11]
-
P.Haughton, Howard
eXtreme Modeling: an approach to agile model-based development [Volume 6, Issue 2, 2019, Pages 43-52]
S
-
Safkhani, Masoumeh
Full Secret Disclosure Attack against an EPC- C1 G2 Compliant Authentication Protocol [Volume 6, Issue 1, 2019, Pages 13-23]
Your query does not match with any item