A

  • Agile development eXtreme Modeling: an approach to agile model-based development [Volume 6, Issue 2, 2019, Pages 43-52]

  • Association Rules Identifying Explicit Features of Persian Comments [Volume 6, Issue 1, 2019, Pages 1-11]

  • Authentication Protocol Full Secret Disclosure Attack against an EPC- C1 G2 Compliant Authentication Protocol [Volume 6, Issue 1, 2019, Pages 13-23]

B

  • Business layer BLProM: A black-box approach for detecting business-layer processes in the web applications [Volume 6, Issue 2, 2019, Pages 65-80]

C

  • Control Flow CSE: A Novel Dynamic Obfuscation Based on Control Flow, Signals and Encryption [Volume 6, Issue 2, 2019, Pages 53-63]

  • Co-occurrence Identifying Explicit Features of Persian Comments [Volume 6, Issue 1, 2019, Pages 1-11]

  • CryptoPAi An Extension of CryptoPAi to the Formal Analysis of E-voting Protocols [Volume 6, Issue 1, 2019, Pages 25-42]

D

  • Dynamic Obfuscation CSE: A Novel Dynamic Obfuscation Based on Control Flow, Signals and Encryption [Volume 6, Issue 2, 2019, Pages 53-63]

E

  • Encryption CSE: A Novel Dynamic Obfuscation Based on Control Flow, Signals and Encryption [Volume 6, Issue 2, 2019, Pages 53-63]

  • EPC-C1 G2 Full Secret Disclosure Attack against an EPC- C1 G2 Compliant Authentication Protocol [Volume 6, Issue 1, 2019, Pages 13-23]

  • E-voting Protocols An Extension of CryptoPAi to the Formal Analysis of E-voting Protocols [Volume 6, Issue 1, 2019, Pages 25-42]

  • Explicit Feature Identifying Explicit Features of Persian Comments [Volume 6, Issue 1, 2019, Pages 1-11]

F

G

  • GNY Logic Full Secret Disclosure Attack against an EPC- C1 G2 Compliant Authentication Protocol [Volume 6, Issue 1, 2019, Pages 13-23]

I

  • Implicit Feature Identifying Explicit Features of Persian Comments [Volume 6, Issue 1, 2019, Pages 1-11]

M

  • Management Table CSE: A Novel Dynamic Obfuscation Based on Control Flow, Signals and Encryption [Volume 6, Issue 2, 2019, Pages 53-63]

  • Model-based development (MBD) eXtreme Modeling: an approach to agile model-based development [Volume 6, Issue 2, 2019, Pages 43-52]

  • Model-driven development (MDD) eXtreme Modeling: an approach to agile model-based development [Volume 6, Issue 2, 2019, Pages 43-52]

P

  • Process Algebra An Extension of CryptoPAi to the Formal Analysis of E-voting Protocols [Volume 6, Issue 1, 2019, Pages 25-42]

R

  • RFID Full Secret Disclosure Attack against an EPC- C1 G2 Compliant Authentication Protocol [Volume 6, Issue 1, 2019, Pages 13-23]

S

  • Secret Disclosure Attack Full Secret Disclosure Attack against an EPC- C1 G2 Compliant Authentication Protocol [Volume 6, Issue 1, 2019, Pages 13-23]

  • Signals CSE: A Novel Dynamic Obfuscation Based on Control Flow, Signals and Encryption [Volume 6, Issue 2, 2019, Pages 53-63]