A

  • Acceptance Strategy DOPPONENT: A Socially Efficient Preference Model of Opponent in Bilateral Multi Issue Negotiations [Volume 1, Issue 4, 2014, Pages 283-292]

  • Accusation Packet Determining the Number of Accusations for Decision Making in Key Revocation Protocol for MANET [Volume 3, Issue 1, 2016, Pages 63-72]

  • Active Learning Improving Semi-supervised Constrained k-Means Clustering Method Using User Feedback [Volume 1, Issue 4, 2014, Pages 273-261]

  • Active Learning A Hybrid Method based on Statistical Features and Packet Content Analysis to Identify Major Network Tunneling Protocols [Volume 3, Issue 2, 2016, Pages 95-110]

  • Adaptive Mutation Adaptive Reinforcement-Based Genetic Algorithm for Combinatorial Optimization [Volume 9, Issue 1, 2022, Pages 71-84]

  • Ad Hoc Network Determining the Number of Accusations for Decision Making in Key Revocation Protocol for MANET [Volume 3, Issue 1, 2016, Pages 63-72]

  • Adversarial Attack Momentum Contrast Self-Supervised Based Training for Adversarial Robustness [Volume 8, Issue 1, 2021, Pages 33-43]

  • Aerial Images Semantic Segmentation of Aerial Images Using Fusion of Color and Texture Features [Volume 1, Issue 3, 2014, Pages 225-238]

  • Agile development eXtreme Modeling: an approach to agile model-based development [Volume 6, Issue 2, 2019, Pages 43-52]

  • Algebraic Cryptanalysis Toward A More Efficient Gröbner-based Algebraic Cryptanalysis [Volume 7, Issue 2, 2020, Pages 103-117]

  • Algebraic Operations A Sample-Based Approach to Data Quality Assessment in Spatial Databases with Application to Mobile Trajectory Nearest-Neighbor Search [Volume 1, Issue 3, 2014, Pages 239-249]

  • Anomaly Detection A Lightweight Anomaly Detection Model using SVM for WSNs in IoT through a Hybrid Feature Selection Algorithm based on GA and GWO [Volume 7, Issue 1, 2020, Pages 63-79]

  • Anomaly Detection Intrusion Detection in IoT With Logistic Regression and Artificial Neural Network: Further Investigations on N-BaIoT Dataset Devices [Volume 8, Issue 2, 2021, Pages 27-42]

  • Anonymity A CCA2-Secure Incomparable Public Key Encryption Scheme [Volume 3, Issue 1, 2016, Pages 3-12]

  • Anonymous A Novel Solution for Author Attribution Problem in Anonymous E-mail [Volume 1, Issue 4, 2014, Pages 319-327]

  • Answer Selection BAS: An Answer Selection Method Using BERT Language Model [Volume 8, Issue 2, 2021, Pages 1-18]

  • Ant Colony Optimization (ACO) Applying Meta-Heuristics Algorithms in Model-Driven Approaches for Solving the CRA Problem [Volume 7, Issue 2, 2020, Pages 141-161]

  • Anti-CSRF token Automatic Black-Box Detection of Resistance Against CSRF Vulnerabilities in Web Applications [Volume 8, Issue 1, 2021, Pages 19-32]

  • Anti-Spoofing Improving Face Recognition Systems Security Using Local Binary Patterns [Volume 2, Issue 1, 2015, Pages 55-62]

  • Apache spark Performance Evaluation of Apache Spark MLlib Algorithms on an Intrusion Detection Dataset [Volume 9, Issue 1, 2022, Pages 57-69]

  • Architectural Style A Method for Assessing Maintainability of Software Architectural Styles in Self-healing Systems by Measuring Coupling and Cohesion [Volume 2, Issue 1, 2015, Pages 31-42]

  • Artificial Neural Networks Effective Intrusion Detection with a Neural Network Ensemble Using Fuzzy Clustering and Stacking Combination Method [Volume 1, Issue 4, 2014, Pages 293-305]

  • Association Rules MRAR: Mining Multi-Relation Association Rules [Volume 1, Issue 2, 2014, Pages 133-158]

  • Association Rules Identifying Explicit Features of Persian Comments [Volume 6, Issue 1, 2019, Pages 1-11]

  • Association Rules Mining Association Rules from Semantic Web Data without User Intervention [Volume 7, Issue 1, 2020, Pages 81-94]

  • Asymmetric Encryption Improved Secure and Privacy Preserving Keyword Searching Cryptography [Volume 2, Issue 3, 2015, Pages 185-194]

  • Atrial Fibrillation Arrhythmia A Novel Grammar-Based Approach to Atrial Fibrillation Arrhythmia Detection for Pervasive Healthcare Environments [Volume 2, Issue 2, 2015, Pages 155-163]

  • Attack Parameters Robust Cooperative Spectrum Sensing under Primary User Emulation Attack in Cognitive Radio Networks [Volume 2, Issue 2, 2015, Pages 109-117]

  • Augmented Reality Enhancing the Sense of Immersion and Quality of Experience in Mobile Games Using Augmented Reality [Volume 3, Issue 1, 2016, Pages 53-62]

  • Authenticated Encryption JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH [Volume 2, Issue 1, 2015, Pages 3-20]

  • Authenti cation On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol [Volume 3, Issue 4, 2016, Pages 201-209]

  • Authentication Protocol Full Secret Disclosure Attack against an EPC- C1 G2 Compliant Authentication Protocol [Volume 6, Issue 1, 2019, Pages 13-23]

  • Author Name Disambiguation A more Accurate Clustering Method by using Co-author Social Networks for Author Name Disambiguation [Volume 1, Issue 4, 2014, Pages 307-317]

  • Authorship Attribution A Study on Intelligent Authorship Methods in Persian Language [Volume 2, Issue 1, 2015, Pages 63-76]

  • Authorship Identification A Novel Solution for Author Attribution Problem in Anonymous E-mail [Volume 1, Issue 4, 2014, Pages 319-327]

  • Auto-Scaling A Workload-Adaptable Method for Migrated Software to the Cloud [Volume 2, Issue 4, 2015, Pages 271-279]

B

  • Backward Secrecy An Improvement Over Lee et al.'s Key Agreement Protocol [Volume 5, Issue 1, 2018, Pages 3-12]

  • Bayesian Linear Regression Gaussian Linear Regression Crossover for Genetic Algorithms [Volume 9, Issue 1, 2022, Pages 45-56]

  • Bayesian network A Risk Estimation Framework for Security Threats in Computer Networks [Volume 7, Issue 1, 2020, Pages 19-33]

  • Betweenness Centrality Randomized SVD Based Probabilistic Caching Strategy in Named Data Networks [Volume 3, Issue 4, 2016, Pages 217-231]

  • Betweenness Centrality Capability-Based Team Formation in Researchers Social Networks [Volume 4, Issue 2, 2017, Pages 63-79]

  • Bibliometrics Model-Driven Software Engineering: A Bibliometric Analysis [Volume 8, Issue 1, 2021, Pages 93-108]

  • Bidding Strategy DOPPONENT: A Socially Efficient Preference Model of Opponent in Bilateral Multi Issue Negotiations [Volume 1, Issue 4, 2014, Pages 283-292]

  • Big Data A New Scheme for Storage and Retrieval of Shared Text Files [Volume 2, Issue 3, 2015, Pages 223-231]

  • Bilateral Multi Issue Negotiations DOPPONENT: A Socially Efficient Preference Model of Opponent in Bilateral Multi Issue Negotiations [Volume 1, Issue 4, 2014, Pages 283-292]

  • Binding Site Combination of Genetic Programming and Support Vector Machine-Based Prediction of Protein-Peptide Binding Sites With Sequence and Structure-Based Features [Volume 8, Issue 1, 2021, Pages 45-63]

  • Bit-Parallel Architecture Bit-Parallel ECC Coprocessor resistant to Differential Power Analysis Attacks in GF(2m) [Volume 8, Issue 1, 2021, Pages 1-18]

  • BKZ 2.0 Rejecting Claimed Speedup of 2^𝛽/2 in Extreme Pruning and Revising BKZ 2.0 for Better Speedup [Volume 8, Issue 1, 2021, Pages 65-91]

  • BKZ Revised Rejecting Claimed Speedup of 2^𝛽/2 in Extreme Pruning and Revising BKZ 2.0 for Better Speedup [Volume 8, Issue 1, 2021, Pages 65-91]

  • Blind Steganalysis The Effect of Correlogram Properties on Blind Steganalysis in JPEG Images [Volume 1, Issue 1, 2014, Pages 39-46]

  • Blind Steganalysis Steganography of Halftone Images by Group Alteration of Grayscale Pixels [Volume 2, Issue 1, 2015, Pages 21-30]

  • Block Cipher 3D Unified Byte Permutations for the Block Cipher 3D [Volume 1, Issue 1, 2014, Pages 15-22]

  • Bloom Filter A Trust-Based Approach for Correctness verification of Query Results in Data Outsourcing [Volume 1, Issue 1, 2014, Pages 3-14]

  • Botnet Intrusion Detection in IoT With Logistic Regression and Artificial Neural Network: Further Investigations on N-BaIoT Dataset Devices [Volume 8, Issue 2, 2021, Pages 27-42]

  • Boundary data Improving Semi-supervised Constrained k-Means Clustering Method Using User Feedback [Volume 1, Issue 4, 2014, Pages 273-261]

  • Business layer BLProM: A black-box approach for detecting business-layer processes in the web applications [Volume 6, Issue 2, 2019, Pages 65-80]

  • Business process adaptation A Context Model for Business Process Adaptation based on Ontology Reasoning [Volume 7, Issue 2, 2020, Pages 119-140]

C

  • Caching Strategy Randomized SVD Based Probabilistic Caching Strategy in Named Data Networks [Volume 3, Issue 4, 2016, Pages 217-231]

  • CAESAR JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH [Volume 2, Issue 1, 2015, Pages 3-20]

  • Cellular Genetic Algorithm Multiple-Fault Tolerant Hardware Structure for Cellular Genetic Algorithm [Volume 3, Issue 1, 2016, Pages 27-42]

  • Certificateless cryptography Security Analysis of Two Lightweight Certificateless Signature Schemes [Volume 5, Issue 2, 2018, Pages 59-65]

  • Chaos Generating dynamical S-boxes using 1D Chebyshev chaotic maps [Volume 7, Issue 1, 2020, Pages 1-17]

  • Chebyshev Generating dynamical S-boxes using 1D Chebyshev chaotic maps [Volume 7, Issue 1, 2020, Pages 1-17]

  • Cipher Algorithm A Novel Block Cipher Algorithm with Feistel-Like Structure [Volume 3, Issue 1, 2016, Pages 13-26]

  • Classification Semantic Segmentation of Aerial Images Using Fusion of Color and Texture Features [Volume 1, Issue 3, 2014, Pages 225-238]

  • Cloud Computing A New Scheme for Storage and Retrieval of Shared Text Files [Volume 2, Issue 3, 2015, Pages 223-231]

  • Cloud Computing Web Service Matchmaking based on Functional Similarity in Service Cloud [Volume 2, Issue 4, 2015, Pages 257-270]

  • Cloudlet Simulating the Resource Freeing Attack: Using Cloudsim Simulator [Volume 2, Issue 4, 2015, Pages 293-302]

  • Cloudsim Simulating the Resource Freeing Attack: Using Cloudsim Simulator [Volume 2, Issue 4, 2015, Pages 293-302]

  • Clustering Improving Semi-supervised Constrained k-Means Clustering Method Using User Feedback [Volume 1, Issue 4, 2014, Pages 273-261]

  • CNFET A New Implementation for a 2^n-1 Modular Adder Through Carbon Nanotube Field Effect Transistors [Volume 2, Issue 2, 2015, Pages 129-139]

  • Coding Signature Codes for Energy-Efficient Data Movement in On-chip Networks [Volume 7, Issue 2, 2020, Pages 95-101]

  • Cognitive Radio Robust Cooperative Spectrum Sensing under Primary User Emulation Attack in Cognitive Radio Networks [Volume 2, Issue 2, 2015, Pages 109-117]

  • Cohesion A Method for Assessing Maintainability of Software Architectural Styles in Self-healing Systems by Measuring Coupling and Cohesion [Volume 2, Issue 1, 2015, Pages 31-42]

  • Collaborative Business Process Toward automatic Transformation of Service Choreography into UML State Machine [Volume 2, Issue 3, 2015, Pages 209-222]

  • Collision Attack Multicollision Attack on a recently proposed hash function vMDC-2 [Volume 3, Issue 4, 2016, Pages 211-215]

  • Color Selection AUBUE: An Adaptive User-Interface Based on Users' Emotions [Volume 3, Issue 2, 2016, Pages 127-145]

  • Combi natorial Design An Efficient End to End Key Establishment Protocol for Wireless Sensor Networks [Volume 1, Issue 1, 2014, Pages 23-38]

  • Combinatorial Optimization Adaptive Reinforcement-Based Genetic Algorithm for Combinatorial Optimization [Volume 9, Issue 1, 2022, Pages 71-84]

  • Computational Security Verifiable Social Multi-Secret Sharing Secure in Active Adversarial Model [Volume 4, Issue 1, 2017, Pages 3-12]

  • Computer Networks A Risk Estimation Framework for Security Threats in Computer Networks [Volume 7, Issue 1, 2020, Pages 19-33]

  • Configurable Process Model Proxima: Process Mining for Extracting Configurable Process Models Using Software Product Line Concepts [Volume 9, Issue 1, 2022, Pages 1-29]

  • Consumer Behavior Evaluating Behavioral Intentions of Tourists in e-Tourism [Volume 1, Issue 2, 2014, Pages 95-109]

  • Context-Aware Adaptation A Context-Aware Reflective-State Framework to Reconfigure Service-Based Applications [Volume 2, Issue 4, 2015, Pages 281-292]

  • Context awareness A Context Model for Business Process Adaptation based on Ontology Reasoning [Volume 7, Issue 2, 2020, Pages 119-140]

  • Context information A Context Model for Business Process Adaptation based on Ontology Reasoning [Volume 7, Issue 2, 2020, Pages 119-140]

  • Control Flow CSE: A Novel Dynamic Obfuscation Based on Control Flow, Signals and Encryption [Volume 6, Issue 2, 2019, Pages 53-63]

  • Convex Optimization An Optimal Traffic Distribution Method Supporting End-to-End Delay Bound [Volume 1, Issue 1, 2014, Pages 61-71]

  • Co-occurrence Identifying Explicit Features of Persian Comments [Volume 6, Issue 1, 2019, Pages 1-11]

  • Copulative Entity MRAR: Mining Multi-Relation Association Rules [Volume 1, Issue 2, 2014, Pages 133-158]

  • Correctness Verification A Trust-Based Approach for Correctness verification of Query Results in Data Outsourcing [Volume 1, Issue 1, 2014, Pages 3-14]

  • Correctness Verification Privacy-Preserving Fine-grained Correctness Verification of Query Results in Outsourced Databases [Volume 2, Issue 2, 2015, Pages 87-107]

  • Correlogram Properties The Effect of Correlogram Properties on Blind Steganalysis in JPEG Images [Volume 1, Issue 1, 2014, Pages 39-46]

  • Cost Speedup Rejecting Claimed Speedup of 2^𝛽/2 in Extreme Pruning and Revising BKZ 2.0 for Better Speedup [Volume 8, Issue 1, 2021, Pages 65-91]

  • Coupling A Method for Assessing Maintainability of Software Architectural Styles in Self-healing Systems by Measuring Coupling and Cohesion [Volume 2, Issue 1, 2015, Pages 31-42]

  • Coverage Probability Scalability Analysis of a LoRa Network Under Inter-SF and Co-SF Interference with Poisson Point Process Model [Volume 8, Issue 2, 2021, Pages 43-57]

  • Cover Selection The Effect of Correlogram Properties on Blind Steganalysis in JPEG Images [Volume 1, Issue 1, 2014, Pages 39-46]

  • Crossover Gaussian Linear Regression Crossover for Genetic Algorithms [Volume 9, Issue 1, 2022, Pages 45-56]

  • Cross-Site Request Forgery (CSRF) Automatic Black-Box Detection of Resistance Against CSRF Vulnerabilities in Web Applications [Volume 8, Issue 1, 2021, Pages 19-32]

  • Cryptanalysis A Novel Block Cipher Algorithm with Feistel-Like Structure [Volume 3, Issue 1, 2016, Pages 13-26]

  • Cryptanalysis Security Analysis of Two Lightweight Certificateless Signature Schemes [Volume 5, Issue 2, 2018, Pages 59-65]

  • Cryptography A Novel Block Cipher Algorithm with Feistel-Like Structure [Volume 3, Issue 1, 2016, Pages 13-26]

  • CryptoPAi An Extension of CryptoPAi to the Formal Analysis of E-voting Protocols [Volume 6, Issue 1, 2019, Pages 25-42]

  • Curiosity Evaluating Behavioral Intentions of Tourists in e-Tourism [Volume 1, Issue 2, 2014, Pages 95-109]

  • Cybercriminals A Novel Solution for Author Attribution Problem in Anonymous E-mail [Volume 1, Issue 4, 2014, Pages 319-327]

D

  • Data Integration A Sample-Based Approach to Data Quality Assessment in Spatial Databases with Application to Mobile Trajectory Nearest-Neighbor Search [Volume 1, Issue 3, 2014, Pages 239-249]

  • Data Mining MRAR: Mining Multi-Relation Association Rules [Volume 1, Issue 2, 2014, Pages 133-158]

  • Data Mining Mining Association Rules from Semantic Web Data without User Intervention [Volume 7, Issue 1, 2020, Pages 81-94]

  • Data Movement Signature Codes for Energy-Efficient Data Movement in On-chip Networks [Volume 7, Issue 2, 2020, Pages 95-101]

  • Data Outsourcing A Trust-Based Approach for Correctness verification of Query Results in Data Outsourcing [Volume 1, Issue 1, 2014, Pages 3-14]

  • Data Outsourcing Privacy-Preserving Fine-grained Correctness Verification of Query Results in Outsourced Databases [Volume 2, Issue 2, 2015, Pages 87-107]

  • Data Outsourcing An Inference Resistant Indexing Technique to Enforce Access Control in Data Outsourcing [Volume 3, Issue 2, 2016, Pages 83-93]

  • Data Privacy A CCA2-Secure Incomparable Public Key Encryption Scheme [Volume 3, Issue 1, 2016, Pages 3-12]

  • DBL Compression Function Multicollision Attack on a recently proposed hash function vMDC-2 [Volume 3, Issue 4, 2016, Pages 211-215]

  • Decomposed TPB Model Evaluating Behavioral Intentions of Tourists in e-Tourism [Volume 1, Issue 2, 2014, Pages 95-109]

  • Dedekind Domains A Provably Secure Variant of ETRU Based on Extended Ideal Lattices Over Direct Product of Dedekind Domains [Volume 5, Issue 1, 2018, Pages 13-34]

  • Deep Learning BAS: An Answer Selection Method Using BERT Language Model [Volume 8, Issue 2, 2021, Pages 1-18]

  • Defense Momentum Contrast Self-Supervised Based Training for Adversarial Robustness [Volume 8, Issue 1, 2021, Pages 33-43]

  • Deployment Knowledge An Efficient End to End Key Establishment Protocol for Wireless Sensor Networks [Volume 1, Issue 1, 2014, Pages 23-38]

  • De-Synchronization Security Analysis of an EPC Class-1 Generation-2 Compliant RFID Authentication Protocol [Volume 3, Issue 3, 2016, Pages 163-174]

  • Differential Power Analysis Bit-Parallel ECC Coprocessor resistant to Differential Power Analysis Attacks in GF(2m) [Volume 8, Issue 1, 2021, Pages 1-18]

  • Diffusion Unified Byte Permutations for the Block Cipher 3D [Volume 1, Issue 1, 2014, Pages 15-22]

  • Digital Data Network A New Hybrid Method for VoIP Stream Steganography [Volume 3, Issue 3, 2016, Pages 175-182]

  • Digital Library A more Accurate Clustering Method by using Co-author Social Networks for Author Name Disambiguation [Volume 1, Issue 4, 2014, Pages 307-317]

  • Distance Based Learning DOPPONENT: A Socially Efficient Preference Model of Opponent in Bilateral Multi Issue Negotiations [Volume 1, Issue 4, 2014, Pages 283-292]

  • Dynamic Obfuscation CSE: A Novel Dynamic Obfuscation Based on Control Flow, Signals and Encryption [Volume 6, Issue 2, 2019, Pages 53-63]

E

  • ECC Processor Bit-Parallel ECC Coprocessor resistant to Differential Power Analysis Attacks in GF(2m) [Volume 8, Issue 1, 2021, Pages 1-18]

  • ECG Segmentation A Novel Grammar-Based Approach to Atrial Fibrillation Arrhythmia Detection for Pervasive Healthcare Environments [Volume 2, Issue 2, 2015, Pages 155-163]

  • Edge Computing Analyzing the Impact of Wireless Channels on the Efficiency of Edge Computing in IoT Applications [Volume 8, Issue 2, 2021, Pages 59-70]

  • E-Learning An Empirical Study of Students' Perceptions on the Technological Aspects of the E-Learning System [Volume 4, Issue 1, 2017, Pages 25-38]

  • Electrocardiogram A Novel Grammar-Based Approach to Atrial Fibrillation Arrhythmia Detection for Pervasive Healthcare Environments [Volume 2, Issue 2, 2015, Pages 155-163]

  • Emergency Response Environments Towards a Model-Driven Framework for Simulating Interactive Emergency Response Environments [Volume 5, Issue 1, 2018, Pages 35-49]

  • Encryption CSE: A Novel Dynamic Obfuscation Based on Control Flow, Signals and Encryption [Volume 6, Issue 2, 2019, Pages 53-63]

  • Endpoint Entity MRAR: Mining Multi-Relation Association Rules [Volume 1, Issue 2, 2014, Pages 133-158]

  • Ensemble classifiers Effective Intrusion Detection with a Neural Network Ensemble Using Fuzzy Clustering and Stacking Combination Method [Volume 1, Issue 4, 2014, Pages 293-305]

  • EPC-C1 G2 Full Secret Disclosure Attack against an EPC- C1 G2 Compliant Authentication Protocol [Volume 6, Issue 1, 2019, Pages 13-23]

  • EPC-C1G2 Standard Security Analysis of an EPC Class-1 Generation-2 Compliant RFID Authentication Protocol [Volume 3, Issue 3, 2016, Pages 163-174]

  • Epilepsy Diagnosis The Diagnosis of Epilepsy by Gravitational Search Algorithm and Support Vector Machines [Volume 3, Issue 2, 2016, Pages 111-125]

  • ERE-ML 2.0 Towards a Model-Driven Framework for Simulating Interactive Emergency Response Environments [Volume 5, Issue 1, 2018, Pages 35-49]

  • E-Tourism Evaluating Behavioral Intentions of Tourists in e-Tourism [Volume 1, Issue 2, 2014, Pages 95-109]

  • ETRU A Provably Secure Variant of ETRU Based on Extended Ideal Lattices Over Direct Product of Dedekind Domains [Volume 5, Issue 1, 2018, Pages 13-34]

  • Event Log Proxima: Process Mining for Extracting Configurable Process Models Using Software Product Line Concepts [Volume 9, Issue 1, 2022, Pages 1-29]

  • Evolutionary Algorithms Adaptive Reinforcement-Based Genetic Algorithm for Combinatorial Optimization [Volume 9, Issue 1, 2022, Pages 71-84]

  • E-voting Protocols An Extension of CryptoPAi to the Formal Analysis of E-voting Protocols [Volume 6, Issue 1, 2019, Pages 25-42]

  • Expected Value Expected Coverage of Perfect Chains in the Hellman Time Memory Trade-Off [Volume 3, Issue 3, 2016, Pages 155-162]

  • Explicit Feature Identifying Explicit Features of Persian Comments [Volume 6, Issue 1, 2019, Pages 1-11]

  • Exploration and Exploitation New Functions for Mass Calculation in Gravitational Search Algorithm [Volume 2, Issue 3, 2015, Pages 233-246]

  • Extreme Pruning Rejecting Claimed Speedup of 2^𝛽/2 in Extreme Pruning and Revising BKZ 2.0 for Better Speedup [Volume 8, Issue 1, 2021, Pages 65-91]

F

  • Face Recognition Improving Face Recognition Systems Security Using Local Binary Patterns [Volume 2, Issue 1, 2015, Pages 55-62]

  • Face Recognition Robust Face Recognition Under Illumination Changes and Pose Variations [Volume 5, Issue 2, 2018, Pages 81-89]

  • Facial Expression Recognition Adaptive Interval Type-2 Fuzzy Inference System for Facial Expression Recognition [Volume 2, Issue 3, 2015, Pages 125-207]

  • Fairness Demand based Resource Allocation to Balance the Utilization and User Level Fairness in Femtocell Networks [Volume 1, Issue 3, 2014, Pages 187-204]

  • Fault Tolerance Multiple-Fault Tolerant Hardware Structure for Cellular Genetic Algorithm [Volume 3, Issue 1, 2016, Pages 27-42]

  • Feature Extraction Robust Face Recognition Under Illumination Changes and Pose Variations [Volume 5, Issue 2, 2018, Pages 81-89]

  • Feature Fusion Semantic Segmentation of Aerial Images Using Fusion of Color and Texture Features [Volume 1, Issue 3, 2014, Pages 225-238]

  • Feature Selection PSA: A Hybrid Feature Selection Approach for Persian Text Classification [Volume 1, Issue 4, 2014, Pages 261-272]

  • Feature Selection Comparison of Hybrid and Filter Feature Selection Methods to Identify Candidate Single Nucleotide Polymorphisms [Volume 1, Issue 3, 2014, Pages 205-2013]

  • Feature Selection The Diagnosis of Epilepsy by Gravitational Search Algorithm and Support Vector Machines [Volume 3, Issue 2, 2016, Pages 111-125]

  • Feature Selection Effect of Purposeful Feature Extraction in High-dimensional Kinship Verification Problem [Volume 3, Issue 3, 2016, Pages 183-191]

  • Femtocell Demand based Resource Allocation to Balance the Utilization and User Level Fairness in Femtocell Networks [Volume 1, Issue 3, 2014, Pages 187-204]

  • FES A GA Approach for Tuning Membership Functions of a Fuzzy Expert System for Heart Disease Prognosis Development Risk [Volume 4, Issue 1, 2017, Pages 13-23]

  • Fog Computing Deploying IoT, Based on NDN Protocol in a Fog Computing Infrastructure [Volume 9, Issue 1, 2022, Pages 31-44]

  • Formal model Formalizing the main characteristics of QVT-based model transformation languages [Volume 7, Issue 1, 2020, Pages 35-62]

  • Formal Specification and Verification An Extension of CryptoPAi to the Formal Analysis of E-voting Protocols [Volume 6, Issue 1, 2019, Pages 25-42]

  • Forward Secrecy An Improvement Over Lee et al.'s Key Agreement Protocol [Volume 5, Issue 1, 2018, Pages 3-12]

  • FRBCSs A New Hybrid Approach for Modeling Accurate Fuzzy Rule Based Classification Systems [Volume 1, Issue 2, 2014, Pages 111-122]

  • Frequent Pattern A Novel Solution for Author Attribution Problem in Anonymous E-mail [Volume 1, Issue 4, 2014, Pages 319-327]

  • Fuzzy Clustering Effective Intrusion Detection with a Neural Network Ensemble Using Fuzzy Clustering and Stacking Combination Method [Volume 1, Issue 4, 2014, Pages 293-305]

  • Fuzzy Entropy HH-FRBC: Halving Hierarchical Fuzzy Rule-Based Classifier [Volume 1, Issue 3, 2014, Pages 215-224]

  • Fuzzy-GA System A GA Approach for Tuning Membership Functions of a Fuzzy Expert System for Heart Disease Prognosis Development Risk [Volume 4, Issue 1, 2017, Pages 13-23]

  • Fuzzy Inference System Adaptive Interval Type-2 Fuzzy Inference System for Facial Expression Recognition [Volume 2, Issue 3, 2015, Pages 125-207]

  • Fuzzy Rule Based Classification Systems A New Hybrid Approach for Modeling Accurate Fuzzy Rule Based Classification Systems [Volume 1, Issue 2, 2014, Pages 111-122]

G

  • Gaussian Process Gaussian Linear Regression Crossover for Genetic Algorithms [Volume 9, Issue 1, 2022, Pages 45-56]

  • Genetic Algorithm A GA Approach for Tuning Membership Functions of a Fuzzy Expert System for Heart Disease Prognosis Development Risk [Volume 4, Issue 1, 2017, Pages 13-23]

  • Genetic Algorithm Gaussian Linear Regression Crossover for Genetic Algorithms [Volume 9, Issue 1, 2022, Pages 45-56]

  • Genetic Algorithm Adaptive Reinforcement-Based Genetic Algorithm for Combinatorial Optimization [Volume 9, Issue 1, 2022, Pages 71-84]

  • Genetic Network Programming A New Hybrid Approach for Modeling Accurate Fuzzy Rule Based Classification Systems [Volume 1, Issue 2, 2014, Pages 111-122]

  • Genetic Programming Combination of Genetic Programming and Support Vector Machine-Based Prediction of Protein-Peptide Binding Sites With Sequence and Structure-Based Features [Volume 8, Issue 1, 2021, Pages 45-63]

  • GNP A New Hybrid Approach for Modeling Accurate Fuzzy Rule Based Classification Systems [Volume 1, Issue 2, 2014, Pages 111-122]

  • GNR Enumeration Rejecting Claimed Speedup of 2^𝛽/2 in Extreme Pruning and Revising BKZ 2.0 for Better Speedup [Volume 8, Issue 1, 2021, Pages 65-91]

  • GNY Logic Full Secret Disclosure Attack against an EPC- C1 G2 Compliant Authentication Protocol [Volume 6, Issue 1, 2019, Pages 13-23]

  • Graph Pruning Capability-Based Team Formation in Researchers Social Networks [Volume 4, Issue 2, 2017, Pages 63-79]

  • Graph Theory Unified Byte Permutations for the Block Cipher 3D [Volume 1, Issue 1, 2014, Pages 15-22]

  • Gravitational Search Algorithm New Functions for Mass Calculation in Gravitational Search Algorithm [Volume 2, Issue 3, 2015, Pages 233-246]

  • Gravitational Search Algorithm The Diagnosis of Epilepsy by Gravitational Search Algorithm and Support Vector Machines [Volume 3, Issue 2, 2016, Pages 111-125]

  • Grey Wolf Optimizer (GWO) A Lightweight Anomaly Detection Model using SVM for WSNs in IoT through a Hybrid Feature Selection Algorithm based on GA and GWO [Volume 7, Issue 1, 2020, Pages 63-79]

  • Gröbner basis Toward A More Efficient Gröbner-based Algebraic Cryptanalysis [Volume 7, Issue 2, 2020, Pages 103-117]

  • Group Key Agreement An Improvement Over Lee et al.'s Key Agreement Protocol [Volume 5, Issue 1, 2018, Pages 3-12]

  • Growing A Growing Hierarchical Approach to Batch Linear Manifold Topographic Map Formation [Volume 1, Issue 1, 2014, Pages 47-59]

H

  • HDP A GA Approach for Tuning Membership Functions of a Fuzzy Expert System for Heart Disease Prognosis Development Risk [Volume 4, Issue 1, 2017, Pages 13-23]

  • Healthcare Wireless Sensor Networks Security Analysis of Two Lightweight Certificateless Signature Schemes [Volume 5, Issue 2, 2018, Pages 59-65]

  • Heuristic Hierarchical Clustering A more Accurate Clustering Method by using Co-author Social Networks for Author Name Disambiguation [Volume 1, Issue 4, 2014, Pages 307-317]

  • Heuristic Search Algorithm New Functions for Mass Calculation in Gravitational Search Algorithm [Volume 2, Issue 3, 2015, Pages 233-246]

  • Hidden Markov Model An HMM-based Method for Adapting Service-based Applications to Users’ Quality Preferences [Volume 5, Issue 2, 2018, Pages 67-79]

  • H ierarchical A Growing Hierarchical Approach to Batch Linear Manifold Topographic Map Formation [Volume 1, Issue 1, 2014, Pages 47-59]

  • Hierarchical Fuzzy Rules HH-FRBC: Halving Hierarchical Fuzzy Rule-Based Classifier [Volume 1, Issue 3, 2014, Pages 215-224]

  • Human-Computer Interaction, Affective Computing, Adaptive Interface, Emotion, Mood AUBUE: An Adaptive User-Interface Based on Users' Emotions [Volume 3, Issue 2, 2016, Pages 127-145]

  • Human Stylome A Study on Intelligent Authorship Methods in Persian Language [Volume 2, Issue 1, 2015, Pages 63-76]

I

  • Ideal Lattices A Provably Secure Variant of ETRU Based on Extended Ideal Lattices Over Direct Product of Dedekind Domains [Volume 5, Issue 1, 2018, Pages 13-34]

  • Image Halftoning Steganography of Halftone Images by Group Alteration of Grayscale Pixels [Volume 2, Issue 1, 2015, Pages 21-30]

  • Impact analysis Change Impact Analysis by Concept Propagation [Volume 5, Issue 1, 2018, Pages 51-56]

  • Impersonation Security Analysis of an EPC Class-1 Generation-2 Compliant RFID Authentication Protocol [Volume 3, Issue 3, 2016, Pages 163-174]

  • Implicit Feature Identifying Explicit Features of Persian Comments [Volume 6, Issue 1, 2019, Pages 1-11]

  • Incom parability A CCA2-Secure Incomparable Public Key Encryption Scheme [Volume 3, Issue 1, 2016, Pages 3-12]

  • Indoor Localization Indoor Path Tracking Using Combination of Viterbi and WKNN [Volume 8, Issue 2, 2021, Pages 19-26]

  • Industrial Internet of Things Security Analysis of Two Lightweight Certificateless Signature Schemes [Volume 5, Issue 2, 2018, Pages 59-65]

  • Instance Selection The Diagnosis of Epilepsy by Gravitational Search Algorithm and Support Vector Machines [Volume 3, Issue 2, 2016, Pages 111-125]

  • Integrity JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH [Volume 2, Issue 1, 2015, Pages 3-20]

  • Interactive Systems Towards a Model-Driven Framework for Simulating Interactive Emergency Response Environments [Volume 5, Issue 1, 2018, Pages 35-49]

  • Interconnection Networks Signature Codes for Energy-Efficient Data Movement in On-chip Networks [Volume 7, Issue 2, 2020, Pages 95-101]

  • Internet of Thing Intrusion Detection in IoT With Logistic Regression and Artificial Neural Network: Further Investigations on N-BaIoT Dataset Devices [Volume 8, Issue 2, 2021, Pages 27-42]

  • Internet of Things On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol [Volume 3, Issue 4, 2016, Pages 201-209]

  • Internet of Things Analyzing the Impact of Wireless Channels on the Efficiency of Edge Computing in IoT Applications [Volume 8, Issue 2, 2021, Pages 59-70]

  • Internet of Things (IoT) A Lightweight Anomaly Detection Model using SVM for WSNs in IoT through a Hybrid Feature Selection Algorithm based on GA and GWO [Volume 7, Issue 1, 2020, Pages 63-79]

  • Inter-SF and co-SF Interference Scalability Analysis of a LoRa Network Under Inter-SF and Co-SF Interference with Poisson Point Process Model [Volume 8, Issue 2, 2021, Pages 43-57]

  • Interval Field Solution of the Generalized Interval Linear Programming Problems: Pessimistic and Optimistic Approaches [Volume 1, Issue 2, 2014, Pages 159-167]

  • Interval Linear Programming Solution of the Generalized Interval Linear Programming Problems: Pessimistic and Optimistic Approaches [Volume 1, Issue 2, 2014, Pages 159-167]

  • Interval Type-2 Fuzzy Sets Adaptive Interval Type-2 Fuzzy Inference System for Facial Expression Recognition [Volume 2, Issue 3, 2015, Pages 125-207]

  • Intrusion Detection Effective Intrusion Detection with a Neural Network Ensemble Using Fuzzy Clustering and Stacking Combination Method [Volume 1, Issue 4, 2014, Pages 293-305]

  • Intrusion detection systems Performance Evaluation of Apache Spark MLlib Algorithms on an Intrusion Detection Dataset [Volume 9, Issue 1, 2022, Pages 57-69]

  • IoT Deploying IoT, Based on NDN Protocol in a Fog Computing Infrastructure [Volume 9, Issue 1, 2022, Pages 31-44]

  • ItemChain MRAR: Mining Multi-Relation Association Rules [Volume 1, Issue 2, 2014, Pages 133-158]

  • Iterated Hash Function Multicollision Attack on a recently proposed hash function vMDC-2 [Volume 3, Issue 4, 2016, Pages 211-215]

J

  • JPEG Image The Effect of Correlogram Properties on Blind Steganalysis in JPEG Images [Volume 1, Issue 1, 2014, Pages 39-46]

  • Jump Index Some Primitives Based on Jumping LFSRs with Determined Period [Volume 2, Issue 3, 2015, Pages 175-184]

K

  • Key Management An Efficient End to End Key Establishment Protocol for Wireless Sensor Networks [Volume 1, Issue 1, 2014, Pages 23-38]

  • Key Management Determining the Number of Accusations for Decision Making in Key Revocation Protocol for MANET [Volume 3, Issue 1, 2016, Pages 63-72]

  • Key Privacy A CCA2-Secure Incomparable Public Key Encryption Scheme [Volume 3, Issue 1, 2016, Pages 3-12]

  • Key Revocation Determining the Number of Accusations for Decision Making in Key Revocation Protocol for MANET [Volume 3, Issue 1, 2016, Pages 63-72]

  • Kinship Verification Effect of Purposeful Feature Extraction in High-dimensional Kinship Verification Problem [Volume 3, Issue 3, 2016, Pages 183-191]

  • K-Nearest Neighbor Comparison of Hybrid and Filter Feature Selection Methods to Identify Candidate Single Nucleotide Polymorphisms [Volume 1, Issue 3, 2014, Pages 205-2013]

  • Knowledge Discovery MRAR: Mining Multi-Relation Association Rules [Volume 1, Issue 2, 2014, Pages 133-158]

L

  • LACK A New Hybrid Method for VoIP Stream Steganography [Volume 3, Issue 3, 2016, Pages 175-182]

  • Language Modeling BAS: An Answer Selection Method Using BERT Language Model [Volume 8, Issue 2, 2021, Pages 1-18]

  • Lattice-Based Cryptography A Provably Secure Variant of ETRU Based on Extended Ideal Lattices Over Direct Product of Dedekind Domains [Volume 5, Issue 1, 2018, Pages 13-34]

  • Learning Automata A Workload-Adaptable Method for Migrated Software to the Cloud [Volume 2, Issue 4, 2015, Pages 271-279]

  • LFSR Some Primitives Based on Jumping LFSRs with Determined Period [Volume 2, Issue 3, 2015, Pages 175-184]

  • Linear Manifold Top ographic Map A Growing Hierarchical Approach to Batch Linear Manifold Topographic Map Formation [Volume 1, Issue 1, 2014, Pages 47-59]

  • Linear Temporal Logic A Trust-Based Approach for Correctness verification of Query Results in Data Outsourcing [Volume 1, Issue 1, 2014, Pages 3-14]

  • Linear Utility DOPPONENT: A Socially Efficient Preference Model of Opponent in Bilateral Multi Issue Negotiations [Volume 1, Issue 4, 2014, Pages 283-292]

  • Linear Weighted Moving Average Randomized SVD Based Probabilistic Caching Strategy in Named Data Networks [Volume 3, Issue 4, 2016, Pages 217-231]

  • Literature Review Model-Driven Software Engineering: A Bibliometric Analysis [Volume 8, Issue 1, 2021, Pages 93-108]

  • Local Binary Patterns Semantic Segmentation of Aerial Images Using Fusion of Color and Texture Features [Volume 1, Issue 3, 2014, Pages 225-238]

  • Location Data A Sample-Based Approach to Data Quality Assessment in Spatial Databases with Application to Mobile Trajectory Nearest-Neighbor Search [Volume 1, Issue 3, 2014, Pages 239-249]

  • Logistic Regression Intrusion Detection in IoT With Logistic Regression and Artificial Neural Network: Further Investigations on N-BaIoT Dataset Devices [Volume 8, Issue 2, 2021, Pages 27-42]

  • Longest Common Substring A Novel Grammar-Based Approach to Atrial Fibrillation Arrhythmia Detection for Pervasive Healthcare Environments [Volume 2, Issue 2, 2015, Pages 155-163]

  • LoRaWAN Scalability Analysis of a LoRa Network Under Inter-SF and Co-SF Interference with Poisson Point Process Model [Volume 8, Issue 2, 2021, Pages 43-57]

M

  • Machine Learning Performance Evaluation of Apache Spark MLlib Algorithms on an Intrusion Detection Dataset [Volume 9, Issue 1, 2022, Pages 57-69]

  • Maintainability A Method for Assessing Maintainability of Software Architectural Styles in Self-healing Systems by Measuring Coupling and Cohesion [Volume 2, Issue 1, 2015, Pages 31-42]

  • Mamdani Fuzzy Rule-based Classification Systems HH-FRBC: Halving Hierarchical Fuzzy Rule-Based Classifier [Volume 1, Issue 3, 2014, Pages 215-224]

  • Management Table CSE: A Novel Dynamic Obfuscation Based on Control Flow, Signals and Encryption [Volume 6, Issue 2, 2019, Pages 53-63]

  • Manifold Learning A New Hybrid Approach for Modeling Accurate Fuzzy Rule Based Classification Systems [Volume 1, Issue 2, 2014, Pages 111-122]

  • Mass Calculation New Functions for Mass Calculation in Gravitational Search Algorithm [Volume 2, Issue 3, 2015, Pages 233-246]

  • Metaheuristic Algorithms A Lightweight Anomaly Detection Model using SVM for WSNs in IoT through a Hybrid Feature Selection Algorithm based on GA and GWO [Volume 7, Issue 1, 2020, Pages 63-79]

  • Migration to Cloud A Workload-Adaptable Method for Migrated Software to the Cloud [Volume 2, Issue 4, 2015, Pages 271-279]

  • Mixed Radix Conversion A High Speed Residue-to-Binary Converter for Balanced 4-Moduli Set [Volume 2, Issue 1, 2015, Pages 43-54]

  • MLlib Performance Evaluation of Apache Spark MLlib Algorithms on an Intrusion Detection Dataset [Volume 9, Issue 1, 2022, Pages 57-69]

  • Mobile Games Enhancing the Sense of Immersion and Quality of Experience in Mobile Games Using Augmented Reality [Volume 3, Issue 1, 2016, Pages 53-62]

  • Model-based development (MBD) eXtreme Modeling: an approach to agile model-based development [Volume 6, Issue 2, 2019, Pages 43-52]

  • Model Driven Development Towards a Model-Driven Framework for Simulating Interactive Emergency Response Environments [Volume 5, Issue 1, 2018, Pages 35-49]

  • Model-driven development (MDD) eXtreme Modeling: an approach to agile model-based development [Volume 6, Issue 2, 2019, Pages 43-52]

  • Model-driven development (MDD) Formalizing the main characteristics of QVT-based model transformation languages [Volume 7, Issue 1, 2020, Pages 35-62]

  • Model-Driven Framework Towards a Model-Driven Framework for Simulating Interactive Emergency Response Environments [Volume 5, Issue 1, 2018, Pages 35-49]

  • Model-Driven Software Engineering Applying Meta-Heuristics Algorithms in Model-Driven Approaches for Solving the CRA Problem [Volume 7, Issue 2, 2020, Pages 141-161]

  • Model-Driven Software Engineering Model-Driven Software Engineering: A Bibliometric Analysis [Volume 8, Issue 1, 2021, Pages 93-108]

  • Model-Driven Transformation Toward automatic Transformation of Service Choreography into UML State Machine [Volume 2, Issue 3, 2015, Pages 209-222]

  • Model transformation Formalizing the main characteristics of QVT-based model transformation languages [Volume 7, Issue 1, 2020, Pages 35-62]

  • Model transformation Applying Meta-Heuristics Algorithms in Model-Driven Approaches for Solving the CRA Problem [Volume 7, Issue 2, 2020, Pages 141-161]

  • Modulo Adder A New Implementation for a 2^n-1 Modular Adder Through Carbon Nanotube Field Effect Transistors [Volume 2, Issue 2, 2015, Pages 129-139]

  • Most Probable Path Indoor Path Tracking Using Combination of Viterbi and WKNN [Volume 8, Issue 2, 2021, Pages 19-26]

  • MQTT Deploying IoT, Based on NDN Protocol in a Fog Computing Infrastructure [Volume 9, Issue 1, 2022, Pages 31-44]

  • MRAR MRAR: Mining Multi-Relation Association Rules [Volume 1, Issue 2, 2014, Pages 133-158]

  • Multi-Agent Systems Towards a Model-Driven Framework for Simulating Interactive Emergency Response Environments [Volume 5, Issue 1, 2018, Pages 35-49]

  • Multicollision Attack Multicollision Attack on a recently proposed hash function vMDC-2 [Volume 3, Issue 4, 2016, Pages 211-215]

  • Multi-Relation Association Rules MRAR: Mining Multi-Relation Association Rules [Volume 1, Issue 2, 2014, Pages 133-158]

  • Multi-Secret Sharing Privacy-Preserving Fine-grained Correctness Verification of Query Results in Outsourced Databases [Volume 2, Issue 2, 2015, Pages 87-107]

  • Mutual Authentication Security Analysis of an EPC Class-1 Generation-2 Compliant RFID Authentication Protocol [Volume 3, Issue 3, 2016, Pages 163-174]

N

  • Named Data Network Randomized SVD Based Probabilistic Caching Strategy in Named Data Networks [Volume 3, Issue 4, 2016, Pages 217-231]

  • Named Data Networking Deploying IoT, Based on NDN Protocol in a Fog Computing Infrastructure [Volume 9, Issue 1, 2022, Pages 31-44]

  • Nano electronic A New Implementation for a 2^n-1 Modular Adder Through Carbon Nanotube Field Effect Transistors [Volume 2, Issue 2, 2015, Pages 129-139]

  • Natural Language Processing Word Sense Disambiguation Based on Lexical and Semantic Features Using Naive Bayes Classifier [Volume 1, Issue 2, 2014, Pages 123-132]

  • Nearest Neighb or Method DOPPONENT: A Socially Efficient Preference Model of Opponent in Bilateral Multi Issue Negotiations [Volume 1, Issue 4, 2014, Pages 283-292]

  • Network on Chip Signature Codes for Energy-Efficient Data Movement in On-chip Networks [Volume 7, Issue 2, 2020, Pages 95-101]

  • Network Security An Efficient End to End Key Establishment Protocol for Wireless Sensor Networks [Volume 1, Issue 1, 2014, Pages 23-38]

  • Neural Network Comparison of Hybrid and Filter Feature Selection Methods to Identify Candidate Single Nucleotide Polymorphisms [Volume 1, Issue 3, 2014, Pages 205-2013]

  • Neural Networks Persian Texts Part of Speech Tagging Using Artificial Neural Networks [Volume 3, Issue 4, 2016, Pages 233-241]

  • Neuro-Fuzzy Adaptive Interval Type-2 Fuzzy Inference System for Facial Expression Recognition [Volume 2, Issue 3, 2015, Pages 125-207]

  • Neuro-Fuzzy (NF) Multi-Constraint Optimal Path Finding for QoS-Enabled Smart Grids: A Combination Approach of Neural Network and Fuzzy System [Volume 4, Issue 2, 2017, Pages 47-61]

  • Non-Structural Similarity Structural and Non-Structural Similarity Combination of Users in Social Networks [Volume 3, Issue 1, 2016, Pages 43-52]

O

  • Object retrieval Training-Free Object Matching and Retrieval Using Speeded Up Robust Features [Volume 2, Issue 2, 2015, Pages 141-153]

  • Observation Sequence Indoor Path Tracking Using Combination of Viterbi and WKNN [Volume 8, Issue 2, 2021, Pages 19-26]

  • Ontologies A Survey on Transformation Methods of XML Documents to Ontologies [Volume 4, Issue 2, 2017, Pages 81-100]

  • Ontology Web Service Matchmaking based on Functional Similarity in Service Cloud [Volume 2, Issue 4, 2015, Pages 257-270]

  • Ontology A Context Model for Business Process Adaptation based on Ontology Reasoning [Volume 7, Issue 2, 2020, Pages 119-140]

  • Opponent Modeling DOPPONENT: A Socially Efficient Preference Model of Opponent in Bilateral Multi Issue Negotiations [Volume 1, Issue 4, 2014, Pages 283-292]

  • Order/Degree Problem Unified Byte Permutations for the Block Cipher 3D [Volume 1, Issue 1, 2014, Pages 15-22]

  • OWL-S Web Service Matchmaking based on Functional Similarity in Service Cloud [Volume 2, Issue 4, 2015, Pages 257-270]

P

  • Packet Payload Analysis A Hybrid Method based on Statistical Features and Packet Content Analysis to Identify Major Network Tunneling Protocols [Volume 3, Issue 2, 2016, Pages 95-110]

  • Parameters Optimization The Diagnosis of Epilepsy by Gravitational Search Algorithm and Support Vector Machines [Volume 3, Issue 2, 2016, Pages 111-125]

  • Particle Swarm Optimization (PSO) Applying Meta-Heuristics Algorithms in Model-Driven Approaches for Solving the CRA Problem [Volume 7, Issue 2, 2020, Pages 141-161]

  • Payload A High-Payload Audio Watermarking Scheme for Real-Time Applications [Volume 2, Issue 2, 2015, Pages 119-127]

  • PCA Robust Face Recognition Under Illumination Changes and Pose Variations [Volume 5, Issue 2, 2018, Pages 81-89]

  • Perceived Usefulness An Empirical Study of Students' Perceptions on the Technological Aspects of the E-Learning System [Volume 4, Issue 1, 2017, Pages 25-38]

  • Perfect Chains Expected Coverage of Perfect Chains in the Hellman Time Memory Trade-Off [Volume 3, Issue 3, 2016, Pages 155-162]

  • Performance Ranking of Common Architectural Styles Based on Availability, Security and Performance Quality Attributes [Volume 1, Issue 2, 2014, Pages 83-93]

  • Performance Improvement Multi-Constraint Optimal Path Finding for QoS-Enabled Smart Grids: A Combination Approach of Neural Network and Fuzzy System [Volume 4, Issue 2, 2017, Pages 47-61]

  • Period Some Primitives Based on Jumping LFSRs with Determined Period [Volume 2, Issue 3, 2015, Pages 175-184]

  • Permutation Unified Byte Permutations for the Block Cipher 3D [Volume 1, Issue 1, 2014, Pages 15-22]

  • Persian Persian Texts Part of Speech Tagging Using Artificial Neural Networks [Volume 3, Issue 4, 2016, Pages 233-241]

  • Persian Language PSA: A Hybrid Feature Selection Approach for Persian Text Classification [Volume 1, Issue 4, 2014, Pages 261-272]

  • POS Tagging Persian Texts Part of Speech Tagging Using Artificial Neural Networks [Volume 3, Issue 4, 2016, Pages 233-241]

  • Practical Security A Novel Block Cipher Algorithm with Feistel-Like Structure [Volume 3, Issue 1, 2016, Pages 13-26]

  • Primary User Emulation Attack Robust Cooperative Spectrum Sensing under Primary User Emulation Attack in Cognitive Radio Networks [Volume 2, Issue 2, 2015, Pages 109-117]

  • Privacy JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH [Volume 2, Issue 1, 2015, Pages 3-20]

  • Process Algebra An Extension of CryptoPAi to the Formal Analysis of E-voting Protocols [Volume 6, Issue 1, 2019, Pages 25-42]

  • Processing Element (PE) Multiple-Fault Tolerant Hardware Structure for Cellular Genetic Algorithm [Volume 3, Issue 1, 2016, Pages 27-42]

  • Process Mining Proxima: Process Mining for Extracting Configurable Process Models Using Software Product Line Concepts [Volume 9, Issue 1, 2022, Pages 1-29]

  • Projected Gradient Descent Momentum Contrast Self-Supervised Based Training for Adversarial Robustness [Volume 8, Issue 1, 2021, Pages 33-43]

  • Protein-Peptide Binding Prediction Combination of Genetic Programming and Support Vector Machine-Based Prediction of Protein-Peptide Binding Sites With Sequence and Structure-Based Features [Volume 8, Issue 1, 2021, Pages 45-63]

  • Provable Security JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH [Volume 2, Issue 1, 2015, Pages 3-20]

  • Provable Security A Novel Block Cipher Algorithm with Feistel-Like Structure [Volume 3, Issue 1, 2016, Pages 13-26]

  • Provable Security A Provably Secure Variant of ETRU Based on Extended Ideal Lattices Over Direct Product of Dedekind Domains [Volume 5, Issue 1, 2018, Pages 13-34]

  • Public Key Encryption A CCA2-Secure Incomparable Public Key Encryption Scheme [Volume 3, Issue 1, 2016, Pages 3-12]

  • Purposeful Feature Extraction Effect of Purposeful Feature Extraction in High-dimensional Kinship Verification Problem [Volume 3, Issue 3, 2016, Pages 183-191]

Q

  • Quality Attributes Ranking of Common Architectural Styles Based on Availability, Security and Performance Quality Attributes [Volume 1, Issue 2, 2014, Pages 83-93]

  • Quality Metrics A Sample-Based Approach to Data Quality Assessment in Spatial Databases with Application to Mobile Trajectory Nearest-Neighbor Search [Volume 1, Issue 3, 2014, Pages 239-249]

  • Quality of Experience Enhancing the Sense of Immersion and Quality of Experience in Mobile Games Using Augmented Reality [Volume 3, Issue 1, 2016, Pages 53-62]

  • Quality of Service An HMM-based Method for Adapting Service-based Applications to Users’ Quality Preferences [Volume 5, Issue 2, 2018, Pages 67-79]

  • Quality of Service (QoS) Multi-Constraint Optimal Path Finding for QoS-Enabled Smart Grids: A Combination Approach of Neural Network and Fuzzy System [Volume 4, Issue 2, 2017, Pages 47-61]

  • Quantum Cryptography A Weak Blind Signature Based on Quantum Key Distribution [Volume 1, Issue 3, 2014, Pages 179-186]

  • Quantum Key Distribution A Weak Blind Signature Based on Quantum Key Distribution [Volume 1, Issue 3, 2014, Pages 179-186]

  • Quantum Payment A Weak Blind Signature Based on Quantum Key Distribution [Volume 1, Issue 3, 2014, Pages 179-186]

  • Quantum Weak Blind Signature A Weak Blind Signature Based on Quantum Key Distribution [Volume 1, Issue 3, 2014, Pages 179-186]

  • Question Answering BAS: An Answer Selection Method Using BERT Language Model [Volume 8, Issue 2, 2021, Pages 1-18]

  • Queuing Delay Analyzing the Impact of Wireless Channels on the Efficiency of Edge Computing in IoT Applications [Volume 8, Issue 2, 2021, Pages 59-70]

  • QVTr Formalizing the main characteristics of QVT-based model transformation languages [Volume 7, Issue 1, 2020, Pages 35-62]

R

  • Random Forest Semantic Segmentation of Aerial Images Using Fusion of Color and Texture Features [Volume 1, Issue 3, 2014, Pages 225-238]

  • Randomized Montgomery Algorithm Bit-Parallel ECC Coprocessor resistant to Differential Power Analysis Attacks in GF(2m) [Volume 8, Issue 1, 2021, Pages 1-18]

  • Randomized-SVD Randomized SVD Based Probabilistic Caching Strategy in Named Data Networks [Volume 3, Issue 4, 2016, Pages 217-231]

  • Random Key Pre-distribution An Efficient End to End Key Establishment Protocol for Wireless Sensor Networks [Volume 1, Issue 1, 2014, Pages 23-38]

  • Random Mapping Expected Coverage of Perfect Chains in the Hellman Time Memory Trade-Off [Volume 3, Issue 3, 2016, Pages 155-162]

  • Ranking Functions Solution of the Generalized Interval Linear Programming Problems: Pessimistic and Optimistic Approaches [Volume 1, Issue 2, 2014, Pages 159-167]

  • Reader impersonation A Lightweight Authentication Scheme for RFID with Permutation Operation on Passive Tags [Volume 8, Issue 2, 2021, Pages 71-86]

  • Real-Time Audio Watermarking A High-Payload Audio Watermarking Scheme for Real-Time Applications [Volume 2, Issue 2, 2015, Pages 119-127]

  • Redundancy Effect of Purposeful Feature Extraction in High-dimensional Kinship Verification Problem [Volume 3, Issue 3, 2016, Pages 183-191]

  • Reflective-State Framework A Context-Aware Reflective-State Framework to Reconfigure Service-Based Applications [Volume 2, Issue 4, 2015, Pages 281-292]

  • Regular Expression A Novel Grammar-Based Approach to Atrial Fibrillation Arrhythmia Detection for Pervasive Healthcare Environments [Volume 2, Issue 2, 2015, Pages 155-163]

  • Reinforcement Learning Adaptive Reinforcement-Based Genetic Algorithm for Combinatorial Optimization [Volume 9, Issue 1, 2022, Pages 71-84]

  • Replay attacks A Lightweight Authentication Scheme for RFID with Permutation Operation on Passive Tags [Volume 8, Issue 2, 2021, Pages 71-86]

  • Residue Arithmetic A High Speed Residue-to-Binary Converter for Balanced 4-Moduli Set [Volume 2, Issue 1, 2015, Pages 43-54]

  • Residue Number System A High Speed Residue-to-Binary Converter for Balanced 4-Moduli Set [Volume 2, Issue 1, 2015, Pages 43-54]

  • Residue-to-Binary Converter A High Speed Residue-to-Binary Converter for Balanced 4-Moduli Set [Volume 2, Issue 1, 2015, Pages 43-54]

  • Resource Allocation Demand based Resource Allocation to Balance the Utilization and User Level Fairness in Femtocell Networks [Volume 1, Issue 3, 2014, Pages 187-204]

  • Resource Freeing Attack Simulating the Resource Freeing Attack: Using Cloudsim Simulator [Volume 2, Issue 4, 2015, Pages 293-302]

  • RFID Security Analysis of an EPC Class-1 Generation-2 Compliant RFID Authentication Protocol [Volume 3, Issue 3, 2016, Pages 163-174]

  • RFID On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol [Volume 3, Issue 4, 2016, Pages 201-209]

  • RFID Full Secret Disclosure Attack against an EPC- C1 G2 Compliant Authentication Protocol [Volume 6, Issue 1, 2019, Pages 13-23]

  • RFID A Lightweight Authentication Scheme for RFID with Permutation Operation on Passive Tags [Volume 8, Issue 2, 2021, Pages 71-86]

  • Ridge Regression Comparison of Hybrid and Filter Feature Selection Methods to Identify Candidate Single Nucleotide Polymorphisms [Volume 1, Issue 3, 2014, Pages 205-2013]

  • Risk Estimation A Risk Estimation Framework for Security Threats in Computer Networks [Volume 7, Issue 1, 2020, Pages 19-33]

  • RNS A New Implementation for a 2^n-1 Modular Adder Through Carbon Nanotube Field Effect Transistors [Volume 2, Issue 2, 2015, Pages 129-139]

  • Robust Accuracy Momentum Contrast Self-Supervised Based Training for Adversarial Robustness [Volume 8, Issue 1, 2021, Pages 33-43]

  • Robustness A High-Payload Audio Watermarking Scheme for Real-Time Applications [Volume 2, Issue 2, 2015, Pages 119-127]

  • Routing An Optimal Traffic Distribution Method Supporting End-to-End Delay Bound [Volume 1, Issue 1, 2014, Pages 61-71]

  • Routing Optimization Multi-Constraint Optimal Path Finding for QoS-Enabled Smart Grids: A Combination Approach of Neural Network and Fuzzy System [Volume 4, Issue 2, 2017, Pages 47-61]

  • Rule Weighting A New Hybrid Approach for Modeling Accurate Fuzzy Rule Based Classification Systems [Volume 1, Issue 2, 2014, Pages 111-122]

S

  • S-box representation Toward A More Efficient Gröbner-based Algebraic Cryptanalysis [Volume 7, Issue 2, 2020, Pages 103-117]

  • Scalability of LoRa Scalability Analysis of a LoRa Network Under Inter-SF and Co-SF Interference with Poisson Point Process Model [Volume 8, Issue 2, 2021, Pages 43-57]

  • Scaling Functions New Functions for Mass Calculation in Gravitational Search Algorithm [Volume 2, Issue 3, 2015, Pages 233-246]

  • Scene Texture Analysis Improving Face Recognition Systems Security Using Local Binary Patterns [Volume 2, Issue 1, 2015, Pages 55-62]

  • Scyther An Improvement Over Lee et al.'s Key Agreement Protocol [Volume 5, Issue 1, 2018, Pages 3-12]

  • Searchable Encryption Improved Secure and Privacy Preserving Keyword Searching Cryptography [Volume 2, Issue 3, 2015, Pages 185-194]

  • Search-Based Optimization Applying Meta-Heuristics Algorithms in Model-Driven Approaches for Solving the CRA Problem [Volume 7, Issue 2, 2020, Pages 141-161]

  • Secret Disclosure Attack Full Secret Disclosure Attack against an EPC- C1 G2 Compliant Authentication Protocol [Volume 6, Issue 1, 2019, Pages 13-23]

  • Secret Sharing Verifiable Social Multi-Secret Sharing Secure in Active Adversarial Model [Volume 4, Issue 1, 2017, Pages 3-12]

  • Secure Cloud Storage Improved Secure and Privacy Preserving Keyword Searching Cryptography [Volume 2, Issue 3, 2015, Pages 185-194]

  • Secure Encrypted Data Indexing An Inference Resistant Indexing Technique to Enforce Access Control in Data Outsourcing [Volume 3, Issue 2, 2016, Pages 83-93]

  • Security Ranking of Common Architectural Styles Based on Availability, Security and Performance Quality Attributes [Volume 1, Issue 2, 2014, Pages 83-93]

  • Security Simulating the Resource Freeing Attack: Using Cloudsim Simulator [Volume 2, Issue 4, 2015, Pages 293-302]

  • Security On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol [Volume 3, Issue 4, 2016, Pages 201-209]

  • Security Threat A Risk Estimation Framework for Security Threats in Computer Networks [Volume 7, Issue 1, 2020, Pages 19-33]

  • Self-Adaptive System A Method for Assessing Maintainability of Software Architectural Styles in Self-healing Systems by Measuring Coupling and Cohesion [Volume 2, Issue 1, 2015, Pages 31-42]

  • Self-Healing System A Method for Assessing Maintainability of Software Architectural Styles in Self-healing Systems by Measuring Coupling and Cohesion [Volume 2, Issue 1, 2015, Pages 31-42]

  • Semantic Segmentation Semantic Segmentation of Aerial Images Using Fusion of Color and Texture Features [Volume 1, Issue 3, 2014, Pages 225-238]

  • Semantic Web A Survey on Transformation Methods of XML Documents to Ontologies [Volume 4, Issue 2, 2017, Pages 81-100]

  • Semantic Web Mining Association Rules from Semantic Web Data without User Intervention [Volume 7, Issue 1, 2020, Pages 81-94]

  • Semantic Web Service Web Service Matchmaking based on Functional Similarity in Service Cloud [Volume 2, Issue 4, 2015, Pages 257-270]

  • Semi-Supervised Clustering A Hybrid Method based on Statistical Features and Packet Content Analysis to Identify Major Network Tunneling Protocols [Volume 3, Issue 2, 2016, Pages 95-110]

  • Semi-supervised using user feedback Improving Semi-supervised Constrained k-Means Clustering Method Using User Feedback [Volume 1, Issue 4, 2014, Pages 273-261]

  • Sense of Immersion Enhancing the Sense of Immersion and Quality of Experience in Mobile Games Using Augmented Reality [Volume 3, Issue 1, 2016, Pages 53-62]

  • Server-side Access Control Enforcement An Inference Resistant Indexing Technique to Enforce Access Control in Data Outsourcing [Volume 3, Issue 2, 2016, Pages 83-93]

  • Service-Based Application A Context-Aware Reflective-State Framework to Reconfigure Service-Based Applications [Volume 2, Issue 4, 2015, Pages 281-292]

  • Service-Based Applications An HMM-based Method for Adapting Service-based Applications to Users’ Quality Preferences [Volume 5, Issue 2, 2018, Pages 67-79]

  • Service Choreography Toward automatic Transformation of Service Choreography into UML State Machine [Volume 2, Issue 3, 2015, Pages 209-222]

  • SIFT Descriptor Robust Face Recognition Under Illumination Changes and Pose Variations [Volume 5, Issue 2, 2018, Pages 81-89]

  • Signal Processing Attacks A High-Payload Audio Watermarking Scheme for Real-Time Applications [Volume 2, Issue 2, 2015, Pages 119-127]

  • Signals CSE: A Novel Dynamic Obfuscation Based on Control Flow, Signals and Encryption [Volume 6, Issue 2, 2019, Pages 53-63]

  • Signature Security Analysis of Two Lightweight Certificateless Signature Schemes [Volume 5, Issue 2, 2018, Pages 59-65]

  • Similarity Measure A Novel Solution for Author Attribution Problem in Anonymous E-mail [Volume 1, Issue 4, 2014, Pages 319-327]

  • Simulated Annealing Algorithm PSA: A Hybrid Feature Selection Approach for Persian Text Classification [Volume 1, Issue 4, 2014, Pages 261-272]

  • Simulated Binary Crossover (SBX) Gaussian Linear Regression Crossover for Genetic Algorithms [Volume 9, Issue 1, 2022, Pages 45-56]

  • Single Event Upset (SEU) Multiple-Fault Tolerant Hardware Structure for Cellular Genetic Algorithm [Volume 3, Issue 1, 2016, Pages 27-42]

  • Single Nucleotide Polymorphisms Comparison of Hybrid and Filter Feature Selection Methods to Identify Candidate Single Nucleotide Polymorphisms [Volume 1, Issue 3, 2014, Pages 205-2013]

  • Skill Spreading Capability-Based Team Formation in Researchers Social Networks [Volume 4, Issue 2, 2017, Pages 63-79]

  • Smart Grid (SG) Multi-Constraint Optimal Path Finding for QoS-Enabled Smart Grids: A Combination Approach of Neural Network and Fuzzy System [Volume 4, Issue 2, 2017, Pages 47-61]

  • Social Network Capability-Based Team Formation in Researchers Social Networks [Volume 4, Issue 2, 2017, Pages 63-79]

  • Social Secret Sharing Verifiable Social Multi-Secret Sharing Secure in Active Adversarial Model [Volume 4, Issue 1, 2017, Pages 3-12]

  • Software Adaptation An HMM-based Method for Adapting Service-based Applications to Users’ Quality Preferences [Volume 5, Issue 2, 2018, Pages 67-79]

  • Software Architecture Ranking of Common Architectural Styles Based on Availability, Security and Performance Quality Attributes [Volume 1, Issue 2, 2014, Pages 83-93]

  • Software Product Line Proxima: Process Mining for Extracting Configurable Process Models Using Software Product Line Concepts [Volume 9, Issue 1, 2022, Pages 1-29]

  • Spatial Big Data A Sample-Based Approach to Data Quality Assessment in Spatial Databases with Application to Mobile Trajectory Nearest-Neighbor Search [Volume 1, Issue 3, 2014, Pages 239-249]

  • Spectrum Sensing Robust Cooperative Spectrum Sensing under Primary User Emulation Attack in Cognitive Radio Networks [Volume 2, Issue 2, 2015, Pages 109-117]

  • Speeded Up Robust Features (SURF) Training-Free Object Matching and Retrieval Using Speeded Up Robust Features [Volume 2, Issue 2, 2015, Pages 141-153]

  • Stacking Effective Intrusion Detection with a Neural Network Ensemble Using Fuzzy Clustering and Stacking Combination Method [Volume 1, Issue 4, 2014, Pages 293-305]

  • Steganography Steganography of Halftone Images by Group Alteration of Grayscale Pixels [Volume 2, Issue 1, 2015, Pages 21-30]

  • Steganography A New Hybrid Method for VoIP Stream Steganography [Volume 3, Issue 3, 2016, Pages 175-182]

  • Storage Service A New Scheme for Storage and Retrieval of Shared Text Files [Volume 2, Issue 3, 2015, Pages 223-231]

  • Stream Ciphers Some Primitives Based on Jumping LFSRs with Determined Period [Volume 2, Issue 3, 2015, Pages 175-184]

  • Structural Similarity Structural and Non-Structural Similarity Combination of Users in Social Networks [Volume 3, Issue 1, 2016, Pages 43-52]

  • Structure Clustering Algorithm Combination of Genetic Programming and Support Vector Machine-Based Prediction of Protein-Peptide Binding Sites With Sequence and Structure-Based Features [Volume 8, Issue 1, 2021, Pages 45-63]

  • Student Perception An Empirical Study of Students' Perceptions on the Technological Aspects of the E-Learning System [Volume 4, Issue 1, 2017, Pages 25-38]

  • Subgradient Method An Optimal Traffic Distribution Method Supporting End-to-End Delay Bound [Volume 1, Issue 1, 2014, Pages 61-71]

  • Success Probability Scalability Analysis of a LoRa Network Under Inter-SF and Co-SF Interference with Poisson Point Process Model [Volume 8, Issue 2, 2021, Pages 43-57]

  • Support Vector Machine Semantic Segmentation of Aerial Images Using Fusion of Color and Texture Features [Volume 1, Issue 3, 2014, Pages 225-238]

  • Support Vector Machines The Diagnosis of Epilepsy by Gravitational Search Algorithm and Support Vector Machines [Volume 3, Issue 2, 2016, Pages 111-125]

  • Support Vector Machine (SVM) A Lightweight Anomaly Detection Model using SVM for WSNs in IoT through a Hybrid Feature Selection Algorithm based on GA and GWO [Volume 7, Issue 1, 2020, Pages 63-79]

  • Survey A Survey on Transformation Methods of XML Documents to Ontologies [Volume 4, Issue 2, 2017, Pages 81-100]

  • SWApriori Mining Association Rules from Semantic Web Data without User Intervention [Volume 7, Issue 1, 2020, Pages 81-94]

  • Symmetric Encryption Verifiable Social Multi-Secret Sharing Secure in Active Adversarial Model [Volume 4, Issue 1, 2017, Pages 3-12]

  • Symmetric Polynomial An Efficient End to End Key Establishment Protocol for Wireless Sensor Networks [Volume 1, Issue 1, 2014, Pages 23-38]

T

  • Tag tracking A Lightweight Authentication Scheme for RFID with Permutation Operation on Passive Tags [Volume 8, Issue 2, 2021, Pages 71-86]

  • Team Formation Capability-Based Team Formation in Researchers Social Networks [Volume 4, Issue 2, 2017, Pages 63-79]

  • Technological Aspects An Empirical Study of Students' Perceptions on the Technological Aspects of the E-Learning System [Volume 4, Issue 1, 2017, Pages 25-38]

  • Text Classification PSA: A Hybrid Feature Selection Approach for Persian Text Classification [Volume 1, Issue 4, 2014, Pages 261-272]

  • Text Mining Word Sense Disambiguation Based on Lexical and Semantic Features Using Naive Bayes Classifier [Volume 1, Issue 2, 2014, Pages 123-132]

  • Text Mining PSA: A Hybrid Feature Selection Approach for Persian Text Classification [Volume 1, Issue 4, 2014, Pages 261-272]

  • Time Memory Trade-Off Expected Coverage of Perfect Chains in the Hellman Time Memory Trade-Off [Volume 3, Issue 3, 2016, Pages 155-162]

  • Total Ordering Solution of the Generalized Interval Linear Programming Problems: Pessimistic and Optimistic Approaches [Volume 1, Issue 2, 2014, Pages 159-167]

  • Traffic analysis Automatic Black-Box Detection of Resistance Against CSRF Vulnerabilities in Web Applications [Volume 8, Issue 1, 2021, Pages 19-32]

  • Traffic Detection A Hybrid Method based on Statistical Features and Packet Content Analysis to Identify Major Network Tunneling Protocols [Volume 3, Issue 2, 2016, Pages 95-110]

  • Traffic Distribution An Optimal Traffic Distribution Method Supporting End-to-End Delay Bound [Volume 1, Issue 1, 2014, Pages 61-71]

  • Training-Free Training-Free Object Matching and Retrieval Using Speeded Up Robust Features [Volume 2, Issue 2, 2015, Pages 141-153]

  • Transformation A Survey on Transformation Methods of XML Documents to Ontologies [Volume 4, Issue 2, 2017, Pages 81-100]

  • Transient Workload A Workload-Adaptable Method for Migrated Software to the Cloud [Volume 2, Issue 4, 2015, Pages 271-279]

  • Transparency A High-Payload Audio Watermarking Scheme for Real-Time Applications [Volume 2, Issue 2, 2015, Pages 119-127]

  • Trust Model Verifiable Social Multi-Secret Sharing Secure in Active Adversarial Model [Volume 4, Issue 1, 2017, Pages 3-12]

  • Tunneling Protocols A Hybrid Method based on Statistical Features and Packet Content Analysis to Identify Major Network Tunneling Protocols [Volume 3, Issue 2, 2016, Pages 95-110]

U

  • UML State Machine Toward automatic Transformation of Service Choreography into UML State Machine [Volume 2, Issue 3, 2015, Pages 209-222]

  • Universal Proning Toward A More Efficient Gröbner-based Algebraic Cryptanalysis [Volume 7, Issue 2, 2020, Pages 103-117]

  • Unsup ervised Learning A Growing Hierarchical Approach to Batch Linear Manifold Topographic Map Formation [Volume 1, Issue 1, 2014, Pages 47-59]

  • User Demand Demand based Resource Allocation to Balance the Utilization and User Level Fairness in Femtocell Networks [Volume 1, Issue 3, 2014, Pages 187-204]

  • Utilization Demand based Resource Allocation to Balance the Utilization and User Level Fairness in Femtocell Networks [Volume 1, Issue 3, 2014, Pages 187-204]

V

  • Variability Modeling Proxima: Process Mining for Extracting Configurable Process Models Using Software Product Line Concepts [Volume 9, Issue 1, 2022, Pages 1-29]

  • Verification Object Privacy-Preserving Fine-grained Correctness Verification of Query Results in Outsourced Databases [Volume 2, Issue 2, 2015, Pages 87-107]

  • Virtualization Simulating the Resource Freeing Attack: Using Cloudsim Simulator [Volume 2, Issue 4, 2015, Pages 293-302]

  • Viterbi Indoor Path Tracking Using Combination of Viterbi and WKNN [Volume 8, Issue 2, 2021, Pages 19-26]

  • VoIP A New Hybrid Method for VoIP Stream Steganography [Volume 3, Issue 3, 2016, Pages 175-182]

  • Vulnerability detection Automatic Black-Box Detection of Resistance Against CSRF Vulnerabilities in Web Applications [Volume 8, Issue 1, 2021, Pages 19-32]

W

  • Web of Science Model-Driven Software Engineering: A Bibliometric Analysis [Volume 8, Issue 1, 2021, Pages 93-108]

  • Web security Automatic Black-Box Detection of Resistance Against CSRF Vulnerabilities in Web Applications [Volume 8, Issue 1, 2021, Pages 19-32]

  • Web Service Web Service Matchmaking based on Functional Similarity in Service Cloud [Volume 2, Issue 4, 2015, Pages 257-270]

  • Web Service Matchmaking Web Service Matchmaking based on Functional Similarity in Service Cloud [Volume 2, Issue 4, 2015, Pages 257-270]

  • Web Service Selection An HMM-based Method for Adapting Service-based Applications to Users’ Quality Preferences [Volume 5, Issue 2, 2018, Pages 67-79]

  • Wireless Channel Error Analyzing the Impact of Wireless Channels on the Efficiency of Edge Computing in IoT Applications [Volume 8, Issue 2, 2021, Pages 59-70]

  • Wireless Networks A Lightweight Anomaly Detection Model using SVM for WSNs in IoT through a Hybrid Feature Selection Algorithm based on GA and GWO [Volume 7, Issue 1, 2020, Pages 63-79]

  • Wireless Sensor Networks An Efficient End to End Key Establishment Protocol for Wireless Sensor Networks [Volume 1, Issue 1, 2014, Pages 23-38]

  • Word Sense Disambiguation Word Sense Disambiguation Based on Lexical and Semantic Features Using Naive Bayes Classifier [Volume 1, Issue 2, 2014, Pages 123-132]

  • Wrapper Feature Selection A Lightweight Anomaly Detection Model using SVM for WSNs in IoT through a Hybrid Feature Selection Algorithm based on GA and GWO [Volume 7, Issue 1, 2020, Pages 63-79]

  • Writeprint A Novel Solution for Author Attribution Problem in Anonymous E-mail [Volume 1, Issue 4, 2014, Pages 319-327]

  • Writeprint A Study on Intelligent Authorship Methods in Persian Language [Volume 2, Issue 1, 2015, Pages 63-76]

  • Writing Style A Study on Intelligent Authorship Methods in Persian Language [Volume 2, Issue 1, 2015, Pages 63-76]

  • WSMO Web Service Matchmaking based on Functional Similarity in Service Cloud [Volume 2, Issue 4, 2015, Pages 257-270]

X

  • XML Documents A Survey on Transformation Methods of XML Documents to Ontologies [Volume 4, Issue 2, 2017, Pages 81-100]

Z

  • Z notation Formalizing the main characteristics of QVT-based model transformation languages [Volume 7, Issue 1, 2020, Pages 35-62]