Author Index

A

  • Abbasi, Fereshteh Intrusion Detection in IoT With Logistic Regression and Artificial Neural Network: Further Investigations on N-BaIoT Dataset Devices [Volume 8, Issue 2, 2021, Pages 27-42]
  • Abdellahi Khorasgani, Alireza A Lightweight Authentication Scheme for RFID with Permutation Operation on Passive Tags [Volume 8, Issue 2, 2021, Pages 71-86]
  • Alavi, Seyyed Enayatallah Intrusion Detection in IoT With Logistic Regression and Artificial Neural Network: Further Investigations on N-BaIoT Dataset Devices [Volume 8, Issue 2, 2021, Pages 27-42]
  • Ali Asgari Renani, Fatemeh Indoor Path Tracking Using Combination of Viterbi and WKNN [Volume 8, Issue 2, 2021, Pages 19-26]

B

  • Bahraman, Kaveh Momentum Contrast Self-Supervised Based Training for Adversarial Robustness [Volume 8, Issue 1, 2021, Pages 33-43]
  • Barangi, Hamed Model-Driven Software Engineering: A Bibliometric Analysis [Volume 8, Issue 1, 2021, Pages 93-108]

C

  • Chegeni, Mastaneh Indoor Path Tracking Using Combination of Viterbi and WKNN [Volume 8, Issue 2, 2021, Pages 19-26]

E

  • Eftekhari, Mahdi Momentum Contrast Self-Supervised Based Training for Adversarial Robustness [Volume 8, Issue 1, 2021, Pages 33-43]

F

  • Farahani, Gholamreza Scalability Analysis of a LoRa Network Under Inter-SF and Co-SF Interference with Poisson Point Process Model [Volume 8, Issue 2, 2021, Pages 43-57]
  • Fatemi, Afsaneh BAS: An Answer Selection Method Using BERT Language Model [Volume 8, Issue 2, 2021, Pages 1-18]
  • Fathi, Abdolhossein Combination of Genetic Programming and Support Vector Machine-Based Prediction of Protein-Peptide Binding Sites With Sequence and Structure-Based Features [Volume 8, Issue 1, 2021, Pages 45-63]

G

  • Ghaffarian, Hossein Indoor Path Tracking Using Combination of Viterbi and WKNN [Volume 8, Issue 2, 2021, Pages 19-26]
  • Ghiasian, Ali Analyzing the Impact of Wireless Channels on the Efficiency of Edge Computing in IoT Applications [Volume 8, Issue 2, 2021, Pages 59-70]

H

  • Hadavi, Mohammad Ali Automatic Black-Box Detection of Resistance Against CSRF Vulnerabilities in Web Applications [Volume 8, Issue 1, 2021, Pages 19-32]

J

  • Jabbari, Ghazal Analyzing the Impact of Wireless Channels on the Efficiency of Edge Computing in IoT Applications [Volume 8, Issue 2, 2021, Pages 59-70]

K

  • Khasseh, Ali Akbar Model-Driven Software Engineering: A Bibliometric Analysis [Volume 8, Issue 1, 2021, Pages 93-108]
  • Kolahdouz Rahimi, Shekoufeh Model-Driven Software Engineering: A Bibliometric Analysis [Volume 8, Issue 1, 2021, Pages 93-108]

M

  • Moghissi, Gholam Reza Rejecting Claimed Speedup of 2^𝛽/2 in Extreme Pruning and Revising BKZ 2.0 for Better Speedup [Volume 8, Issue 1, 2021, Pages 65-91]
  • Mohammadi, Solmaz Scalability Analysis of a LoRa Network Under Inter-SF and Co-SF Interference with Poisson Point Process Model [Volume 8, Issue 2, 2021, Pages 43-57]
  • Moshavash, Monireh Momentum Contrast Self-Supervised Based Training for Adversarial Robustness [Volume 8, Issue 1, 2021, Pages 33-43]
  • Mozafari, Jamshid BAS: An Answer Selection Method Using BERT Language Model [Volume 8, Issue 2, 2021, Pages 1-18]

N

  • Naderan, Marjan Intrusion Detection in IoT With Logistic Regression and Artificial Neural Network: Further Investigations on N-BaIoT Dataset Devices [Volume 8, Issue 2, 2021, Pages 27-42]
  • Nematbakhsh, Mohammad Ali BAS: An Answer Selection Method Using BERT Language Model [Volume 8, Issue 2, 2021, Pages 1-18]

P

  • Payandeh, Ali Rejecting Claimed Speedup of 2^𝛽/2 in Extreme Pruning and Revising BKZ 2.0 for Better Speedup [Volume 8, Issue 1, 2021, Pages 65-91]

R

  • Rezaei, Hashem Bit-Parallel ECC Coprocessor resistant to Differential Power Analysis Attacks in GF(2m) [Volume 8, Issue 1, 2021, Pages 1-18]

S

  • Sadeghi, Samira Automatic Black-Box Detection of Resistance Against CSRF Vulnerabilities in Web Applications [Volume 8, Issue 1, 2021, Pages 19-32]
  • Sadjadieh, Mahdi A Lightweight Authentication Scheme for RFID with Permutation Operation on Passive Tags [Volume 8, Issue 2, 2021, Pages 71-86]
  • Shafieinejad, Alireza Bit-Parallel ECC Coprocessor resistant to Differential Power Analysis Attacks in GF(2m) [Volume 8, Issue 1, 2021, Pages 1-18]

Y

  • Yazdani, Mohammad Rohollah A Lightweight Authentication Scheme for RFID with Permutation Operation on Passive Tags [Volume 8, Issue 2, 2021, Pages 71-86]

Z

  • Zamani, Bahman Model-Driven Software Engineering: A Bibliometric Analysis [Volume 8, Issue 1, 2021, Pages 93-108]