Author Index

A

  • Abdolrazzagh-Nezhad, Majid CSE: A Novel Dynamic Obfuscation Based on Control Flow, Signals and Encryption [Volume 6, Issue 2, 2019, Pages 53-63]
  • Alfraihi, Hessa eXtreme Modeling: an approach to agile model-based development [Volume 6, Issue 2, 2019, Pages 43-52]
  • Alidoosti, Mitra BLProM: A black-box approach for detecting business-layer processes in the web applications [Volume 6, Issue 2, 2019, Pages 65-80]

H

  • Hashemzade, Bahare CSE: A Novel Dynamic Obfuscation Based on Control Flow, Signals and Encryption [Volume 6, Issue 2, 2019, Pages 53-63]

J

  • Jalili, Rasool An Extension of CryptoPAi to the Formal Analysis of E-voting Protocols [Volume 6, Issue 1, 2019, Pages 25-42]

K

L

  • Lano, Kevin eXtreme Modeling: an approach to agile model-based development [Volume 6, Issue 2, 2019, Pages 43-52]

M

  • Mahrooghi, Hamid Reza An Extension of CryptoPAi to the Formal Analysis of E-voting Protocols [Volume 6, Issue 1, 2019, Pages 25-42]
  • Mohammadi, Atefeh Identifying Explicit Features of Persian Comments [Volume 6, Issue 1, 2019, Pages 1-11]
  • Montazeri, Morteza Identifying Explicit Features of Persian Comments [Volume 6, Issue 1, 2019, Pages 1-11]

N

  • Nematbakhsh, MohammadAli Identifying Explicit Features of Persian Comments [Volume 6, Issue 1, 2019, Pages 1-11]
  • Nickabadi, Ahmad BLProM: A black-box approach for detecting business-layer processes in the web applications [Volume 6, Issue 2, 2019, Pages 65-80]
  • Nowroozi, Alireza BLProM: A black-box approach for detecting business-layer processes in the web applications [Volume 6, Issue 2, 2019, Pages 65-80]

P

  • Pajoohan, Mohammad-Reza Identifying Explicit Features of Persian Comments [Volume 6, Issue 1, 2019, Pages 1-11]
  • P.Haughton, Howard eXtreme Modeling: an approach to agile model-based development [Volume 6, Issue 2, 2019, Pages 43-52]

S

  • Safkhani, Masoumeh Full Secret Disclosure Attack against an EPC- C1 G2 Compliant Authentication Protocol [Volume 6, Issue 1, 2019, Pages 13-23]