A

  • Algebraic Cryptanalysis Toward A More Efficient Gröbner-based Algebraic Cryptanalysis [Volume 7, Issue 2, 2020, Pages 103-117]

  • Anomaly Detection A Lightweight Anomaly Detection Model using SVM for WSNs in IoT through a Hybrid Feature Selection Algorithm based on GA and GWO [Volume 7, Issue 1, 2020, Pages 63-79]

  • Ant Colony Optimization (ACO) Applying Meta-Heuristics Algorithms in Model-Driven Approaches for Solving the CRA Problem [Volume 7, Issue 2, 2020, Pages 141-161]

  • Association Rules Mining Association Rules from Semantic Web Data without User Intervention [Volume 7, Issue 1, 2020, Pages 81-94]

B

  • Bayesian network A Risk Estimation Framework for Security Threats in Computer Networks [Volume 7, Issue 1, 2020, Pages 19-33]

  • Business process adaptation A Context Model for Business Process Adaptation based on Ontology Reasoning [Volume 7, Issue 2, 2020, Pages 119-140]

C

  • Chaos Generating dynamical S-boxes using 1D Chebyshev chaotic maps [Volume 7, Issue 1, 2020, Pages 1-17]

  • Chebyshev Generating dynamical S-boxes using 1D Chebyshev chaotic maps [Volume 7, Issue 1, 2020, Pages 1-17]

  • Coding Signature Codes for Energy-Efficient Data Movement in On-chip Networks [Volume 7, Issue 2, 2020, Pages 95-101]

  • Computer Networks A Risk Estimation Framework for Security Threats in Computer Networks [Volume 7, Issue 1, 2020, Pages 19-33]

  • Context awareness A Context Model for Business Process Adaptation based on Ontology Reasoning [Volume 7, Issue 2, 2020, Pages 119-140]

  • Context information A Context Model for Business Process Adaptation based on Ontology Reasoning [Volume 7, Issue 2, 2020, Pages 119-140]

D

  • Data Mining Mining Association Rules from Semantic Web Data without User Intervention [Volume 7, Issue 1, 2020, Pages 81-94]

  • Data Movement Signature Codes for Energy-Efficient Data Movement in On-chip Networks [Volume 7, Issue 2, 2020, Pages 95-101]

F

  • Formal model Formalizing the main characteristics of QVT-based model transformation languages [Volume 7, Issue 1, 2020, Pages 35-62]

G

  • Grey Wolf Optimizer (GWO) A Lightweight Anomaly Detection Model using SVM for WSNs in IoT through a Hybrid Feature Selection Algorithm based on GA and GWO [Volume 7, Issue 1, 2020, Pages 63-79]

  • Gröbner basis Toward A More Efficient Gröbner-based Algebraic Cryptanalysis [Volume 7, Issue 2, 2020, Pages 103-117]

I

  • Interconnection Networks Signature Codes for Energy-Efficient Data Movement in On-chip Networks [Volume 7, Issue 2, 2020, Pages 95-101]

  • Internet of Things (IoT) A Lightweight Anomaly Detection Model using SVM for WSNs in IoT through a Hybrid Feature Selection Algorithm based on GA and GWO [Volume 7, Issue 1, 2020, Pages 63-79]

M

  • Metaheuristic Algorithms A Lightweight Anomaly Detection Model using SVM for WSNs in IoT through a Hybrid Feature Selection Algorithm based on GA and GWO [Volume 7, Issue 1, 2020, Pages 63-79]

  • Model-driven development (MDD) Formalizing the main characteristics of QVT-based model transformation languages [Volume 7, Issue 1, 2020, Pages 35-62]

  • Model-Driven Software Engineering Applying Meta-Heuristics Algorithms in Model-Driven Approaches for Solving the CRA Problem [Volume 7, Issue 2, 2020, Pages 141-161]

  • Model transformation Formalizing the main characteristics of QVT-based model transformation languages [Volume 7, Issue 1, 2020, Pages 35-62]

  • Model transformation Applying Meta-Heuristics Algorithms in Model-Driven Approaches for Solving the CRA Problem [Volume 7, Issue 2, 2020, Pages 141-161]

N

  • Network on Chip Signature Codes for Energy-Efficient Data Movement in On-chip Networks [Volume 7, Issue 2, 2020, Pages 95-101]

O

  • Ontology A Context Model for Business Process Adaptation based on Ontology Reasoning [Volume 7, Issue 2, 2020, Pages 119-140]

P

  • Particle Swarm Optimization (PSO) Applying Meta-Heuristics Algorithms in Model-Driven Approaches for Solving the CRA Problem [Volume 7, Issue 2, 2020, Pages 141-161]

Q

  • QVTr Formalizing the main characteristics of QVT-based model transformation languages [Volume 7, Issue 1, 2020, Pages 35-62]

R

  • Risk Estimation A Risk Estimation Framework for Security Threats in Computer Networks [Volume 7, Issue 1, 2020, Pages 19-33]

S

  • S-box representation Toward A More Efficient Gröbner-based Algebraic Cryptanalysis [Volume 7, Issue 2, 2020, Pages 103-117]

  • Search-Based Optimization Applying Meta-Heuristics Algorithms in Model-Driven Approaches for Solving the CRA Problem [Volume 7, Issue 2, 2020, Pages 141-161]

  • Security Threat A Risk Estimation Framework for Security Threats in Computer Networks [Volume 7, Issue 1, 2020, Pages 19-33]

  • Semantic Web Mining Association Rules from Semantic Web Data without User Intervention [Volume 7, Issue 1, 2020, Pages 81-94]

  • Support Vector Machine (SVM) A Lightweight Anomaly Detection Model using SVM for WSNs in IoT through a Hybrid Feature Selection Algorithm based on GA and GWO [Volume 7, Issue 1, 2020, Pages 63-79]

  • SWApriori Mining Association Rules from Semantic Web Data without User Intervention [Volume 7, Issue 1, 2020, Pages 81-94]

U

  • Universal Proning Toward A More Efficient Gröbner-based Algebraic Cryptanalysis [Volume 7, Issue 2, 2020, Pages 103-117]

W

  • Wireless Networks A Lightweight Anomaly Detection Model using SVM for WSNs in IoT through a Hybrid Feature Selection Algorithm based on GA and GWO [Volume 7, Issue 1, 2020, Pages 63-79]

  • Wrapper Feature Selection A Lightweight Anomaly Detection Model using SVM for WSNs in IoT through a Hybrid Feature Selection Algorithm based on GA and GWO [Volume 7, Issue 1, 2020, Pages 63-79]

Z

  • Z notation Formalizing the main characteristics of QVT-based model transformation languages [Volume 7, Issue 1, 2020, Pages 35-62]