A
-
Agile development
eXtreme Modeling: an approach to agile model-based development [Volume 6, Issue 2, 2019, Pages 43-52]
-
Association Rules
Identifying Explicit Features of Persian Comments [Volume 6, Issue 1, 2019, Pages 1-11]
-
Authentication Protocol
Full Secret Disclosure Attack against an EPC- C1 G2 Compliant Authentication Protocol [Volume 6, Issue 1, 2019, Pages 13-23]
B
-
Business layer
BLProM: A black-box approach for detecting business-layer processes in the web applications [Volume 6, Issue 2, 2019, Pages 65-80]
C
-
Control Flow
CSE: A Novel Dynamic Obfuscation Based on Control Flow, Signals and Encryption [Volume 6, Issue 2, 2019, Pages 53-63]
-
Co-occurrence
Identifying Explicit Features of Persian Comments [Volume 6, Issue 1, 2019, Pages 1-11]
-
CryptoPAi
An Extension of CryptoPAi to the Formal Analysis of E-voting Protocols [Volume 6, Issue 1, 2019, Pages 25-42]
D
-
Dynamic Obfuscation
CSE: A Novel Dynamic Obfuscation Based on Control Flow, Signals and Encryption [Volume 6, Issue 2, 2019, Pages 53-63]
E
-
Encryption
CSE: A Novel Dynamic Obfuscation Based on Control Flow, Signals and Encryption [Volume 6, Issue 2, 2019, Pages 53-63]
-
EPC-C1 G2
Full Secret Disclosure Attack against an EPC- C1 G2 Compliant Authentication Protocol [Volume 6, Issue 1, 2019, Pages 13-23]
-
E-voting Protocols
An Extension of CryptoPAi to the Formal Analysis of E-voting Protocols [Volume 6, Issue 1, 2019, Pages 25-42]
-
Explicit Feature
Identifying Explicit Features of Persian Comments [Volume 6, Issue 1, 2019, Pages 1-11]
G
-
GNY Logic
Full Secret Disclosure Attack against an EPC- C1 G2 Compliant Authentication Protocol [Volume 6, Issue 1, 2019, Pages 13-23]
I
-
Implicit Feature
Identifying Explicit Features of Persian Comments [Volume 6, Issue 1, 2019, Pages 1-11]
M
-
Management Table
CSE: A Novel Dynamic Obfuscation Based on Control Flow, Signals and Encryption [Volume 6, Issue 2, 2019, Pages 53-63]
-
Model-based development (MBD)
eXtreme Modeling: an approach to agile model-based development [Volume 6, Issue 2, 2019, Pages 43-52]
-
Model-driven development (MDD)
eXtreme Modeling: an approach to agile model-based development [Volume 6, Issue 2, 2019, Pages 43-52]
P
-
Process Algebra
An Extension of CryptoPAi to the Formal Analysis of E-voting Protocols [Volume 6, Issue 1, 2019, Pages 25-42]
R
-
RFID
Full Secret Disclosure Attack against an EPC- C1 G2 Compliant Authentication Protocol [Volume 6, Issue 1, 2019, Pages 13-23]
S
-
Secret Disclosure Attack
Full Secret Disclosure Attack against an EPC- C1 G2 Compliant Authentication Protocol [Volume 6, Issue 1, 2019, Pages 13-23]
-
Signals
CSE: A Novel Dynamic Obfuscation Based on Control Flow, Signals and Encryption [Volume 6, Issue 2, 2019, Pages 53-63]