 |
پویشگر
A [Volume 3, Number 2] |
 |
AE
An Overview of Security attacks and Software Implementation of Authenticated Encryption Algorithms in CAESAR Competition [Volume 4, Number 2] |
 |
Accuracy
A New Model for Email Spam Detection using Hybrid of Magnetic Optimization Algorithm with Harmony Search Algorithm [Volume 9, Number 1] |
 |
Adversary
Review of the security models with emphasis on leakage-resilient key exchange protocols [Volume 12, Number 1] |
 |
Aghajari Oil & Gas Utilization Company
Identification and ranking of occupational and technical stress factors of information security in Aghajari oil and gas Exploitation Company [Volume 8, Number 2] |
 |
Anonymization
An overview of privacy preserving Data Publishing Techniques [Volume 5, Number 2] |
 |
Artificial Bee Colony Algorithm.
Performance assessment Bio- Inspired algorithms for solving backpack in the form of objective function minimization. [Volume 5, Number 1] |
 |
Attack Tree
Identifying Security Risks in Smartphone App Distribution Ecosystem [Volume 6, Number 1] |
 |
Attacks
Security and Privacy in the Internet of Things [Volume 4, Number 2] |
 |
Australian Cyber Skills Framework (ASD)
Analysis of global trends in providing educational frameworks for training cyber security professionals [Volume 12, Number 2] |
 |
BAN
A Secure Authentication and Key Agreement Scheme for LoRaWAN [Volume 12, Number 2] |
 |
C channels.
A review of the smart phone botnets and their confronting Techniques [Volume 4, Number 1] |
 |
COVID-19
Analysis of Cybercrime and Cyber Attacks during the COVID-19 Pandemic [Volume 9, Number 2] |
 |
Challenge.
Evaluating Challenges of the National Cryptocurrency [Volume 9, Number 1] |
 |
Clock
A Survey on Lightweight Hardware Implementation of AES [Volume 6, Number 2] |
 |
Cloud Computing Security Challenge
A survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions [Volume 8, Number 2] |
 |
Cloud storagei· Searchable encryptioni· Privacy preservingi· Search functionalityi· Security
Browse searchable encryption schemes: Classification, methods and recent developments [Volume 9, Number 2] |
 |
Collective signature
Consensus Method with High Security and Low Communication Load [Volume 11, Number 2] |
 |
Collusion Attack.
Survey of group location privacy approaches in location-based services and its challenges [Volume 5, Number 2] |
 |
Confidentiality
Review of Image Steganography Based on LSB and Pixel Classification and Providing a New Method in This Area [Volume 5, Number 2] |
 |
Content analysis
Analysis of strategic issues in the field of general data protection regulations [Volume 13, Number 2] |
 |
Convolutional Network
Electrocardiogram Signal Authentication System based on Deep Learning [Volume 12, Number 2] |
 |
Convolutional neural network
A comprehensive evaluation of deep learning based steganalysis performance in detecting spatial methods [Volume 12, Number 2] |
 |
Criminalization
Fundamental Issues in Criminalization of Virtal Cybercrime
[Volume 7, Number 2] |
 |
DOM method
Investigation of Power Analysis Attack on the SPEEDY Block Cipher and Countermeasure Using Domain-Oriented Masking (DOM) Method [Volume 13, Number 2] |
 |
Data and software security.
Privacy-preserving data and function in cloud environments using homomorphic encryption [Volume 12, Number 1] |
 |
Data outsourcing
A review on attribute based access control in cloud environment [Volume 5, Number 1] |
 |
Differential Computation Analysis
An Introduction to Differential Computation Analysis (DCA) on the withe-box cryptography algorithms [Volume 8, Number 2] |
 |
Digital currency
A Review of Consensus Algorithms in Blockchain [Volume 8, Number 1] |
 |
Distributed Denial of Service Attack
A Review of Intrusion Detection Defense Solutions Based on Software Defined Network [Volume 9, Number 1] |
 |
Dynamic analysis
Metamorphic Malware Identification Combining Static and Dynamic Analyzes [Volume 7, Number 1] |
 |
Electronic Health Records
Search over Encrypted Data: Functionalities and Challenges [Volume 7, Number 1] |
 |
Encryption Key
A Performance Survey of Meta-Heuristic And Brute-Force Search Algorithms to Cryptanalysis The SDES Encryption Algorithm
[Volume 7, Number 2] |
 |
Extraction feature and Classification
Design Credit Card Fraud Detection System Using Support Vector Machine, Feature Selection and Cross Validation . [Volume 3, Number 1] |
 |
Feature Extraction
A Review on Website Fingerprinting Attacks [Volume 6, Number 2] |
 |
Feature Selection
Prevention and detection of botnet attacks in IoT using ensemble learning methods [Volume 13, Number 2] |
 |
Forgery attack
Practical key recovery attack on authentication and key agreement protocol SecAuthUAV in a network of drones and provide an
improved protocol [Volume 12, Number 2] |
 |
GDPR
Preserving privacy in the age of information technology development, lessons from the european general data protection regulation [Volume 13, Number 1] |
 |
GNY logic
Methods of analyzing and proving the security of security protocols [Volume 12, Number 1] |
 |
HB
[Volume 3, Number 2] |
 |
Healthcare systems
Violation of Integrity in an End-to-End Privacy-Preserving Protocol in IoT-Based Health Monitoring Systems [Volume 13, Number 2] |
 |
Homomorphic authenticators
Integrity checking of outsourced computations [Volume 12, Number 1] |
 |
Hyperledger fabric
A secure and privacy-preserving electronic invoice based on blockchain technology [Volume 14, Number 1] |
 |
ISA/IEC 62443 series.
Determining the appropriate methodology for the security evaluation of equipment related to information and communication technology in the power industry [Volume 9, Number 2] |
 |
ISA/IEC 62443 series
An Overview of Security Standards in the Field of ICT in order to Determining the Appropriate Methodology for the Security Evaluation of Equipment Related to Information and Communication Technology in the Power Industry [Volume 11, Number 1] |
 |
Insecure Channel
Survey of Secure Multiparty Summation protocols and their challenges [Volume 6, Number 1] |
 |
LTE Network
LTE network access security [Volume 4, Number 2] |
 |
Leagues
Analysis of frameworks, standards, platforms, and coalitions supporting the development of cyber threat intelligence in organizations [Volume 14, Number 1] |
 |
Linear Structures.
A Survey of Cube, Differential Fault Analysis Attacks and Linear Structures on Keccak Hash Function (SHA-3) [Volume 5, Number 2] |
 |
Logging
A Survey on Cloud Forensics [Volume 3, Number 1] |
 |
MILP Method
Cryptanalysis of Modular Operations [Volume 14, Number 1] |
 |
Multistage Attacks
Security Alert Correlation Survey and Study of These Features in OSSIM [Volume 3, Number 1] |
 |
NSS.
[Volume 3, Number 1] |
 |
Nano-based Communication
An Overview of the Methods for Enhancing the Communication Security in Designing Quantum-dot Cellular Automata Circuits [Volume 8, Number 1] |
 |
Neural Network
A survey of rumor detection methods in social networks [Volume 8, Number 1] |
 |
Neural network.
A Comprehensive Exploration of Deep Learning Approaches in Differential Cryptanalysis of Lightweight Block Ciphers [Volume 12, Number 1] |
 |
Non-criminal prevention
Criminology Analysis of Cybercrime [Volume 8, Number 1] |
 |
Optimization
A New Hybrid Approach of K-Nearest Neighbors Algorithm with Particle Swarm Optimization for E-Mail Spam Detection [Volume 8, Number 1] |
 |
Outage Probability
Relay Selection for Secure Device to Device Communications [Volume 3, Number 2] |
 |
Partialy Blind Signatue
A New Mixing Scheme to Improve Privacy in Bitcoin Cryptocurrency Transactions [Volume 12, Number 2] |
 |
Passwordless
FIDO Authentication Standard: Key Applications for Securing Information Exchange [Volume 13, Number 1] |
 |
Physical Layer Features
An Overview of Physical-Layer Authentication Methods, Performance Metrics, and Their Vulnerabilities to Attacks [Volume 13, Number 1] |
 |
Polynomial Multiplication
FPGA Implementation of Polynomial Multiplication in NTRU Prime PQC Algorithms [Volume 12, Number 2] |
 |
Preventive strategies
Prevention Management of Realization and continuity of the futile cycle of cyber-crimes [Volume 7, Number 1] |
 |
Privacy Policy
A Study on evolutional process of privacy and security in identity managment system [Volume 5, Number 2] |
 |
Prohibited Search
Provide a New Way to Detect emails's Spam and Phishing and Bank Phishing Using Genetic Algorithms and Prohibited Search [Volume 9, Number 2] |
 |
Public key cryptography
A Survey Of Code-Based Cryptography Schemes and the Standardization Process of Post-Quantum Cryptography: The Beginning of a New Era [Volume 13, Number 1] |
 |
Public verifiability
A review of blockchain-based data auditing protocols and analyzing their general framework [Volume 13, Number 1] |
 |
Ranking and negative SEO
Survey Security Aspects in Components and Architecture Local Search Engines [Volume 6, Number 1] |
 |
Ransomware Classification
An automated approach to analysis and classification of Crypto-ransomwares’ family [Volume 8, Number 2] |
 |
Receipt-Free
Survey of Electronic Election Based on HomomorphicEncryption [Volume 6, Number 2] |
 |
Reinforcement Learning
Intelligent Automation of Scenario Execution in Cyber Ranges Using Machine Learning Techniques [Volume 13, Number 2] |
 |
Risk Assessment
A Survey on the Important Security Attacks on Industrial Control Systems from 2000 up to Now [Volume 7, Number 1] |
 |
Rough set theory.
Provida Method Based onSupport VectorMachinesForIntrusion DetectioninComputer Networks [Volume 3, Number 2] |
 |
SCADA
IEC 60870-5-104 Protocol Security Challenges and Countermeasures Identification [Volume 7, Number 2] |
 |
SHA-512 hash function
IEPS image encryption: Encryption based on PWLCM and SHA-512 hash function [Volume 13, Number 2] |
 |
Safety in C++ Codes
Check the Safe coding standards in language C++ [Volume 7, Number 1] |
 |
Secret disclosure attack
Security Analysis of a Lightweight Ownership Transfer Protocol in RFID Systems [Volume 13, Number 2] |
 |
Secure outsourcing
Verifiable Database Supporting Range Query [Volume 12, Number 2] |
 |
Security Architecture.
Security Architecture Improving In Cloud Computing Basic Services [Volume 3, Number 2] |
 |
Security in RPL
A survey on RPL attacks and their countermeasures [Volume 9, Number 1] |
 |
Security policies.
Awareness and Standards in the Field of Information Security_ [Volume 4, Number 2] |
 |
Sensor node impersonation attack
Security Analysis of an Anonymous Authentication and Key Agreement Scheme in Wireless Body Area Network [Volume 11, Number 2] |
 |
Signal Pre-Processing
An overview of secure authentication methods using ECG biometrics with deep learning algorithms [Volume 12, Number 1] |
 |
TACT
Overview of Jamming Operation in Smart Network [Volume 5, Number 2] |
 |
Threat.
Risk Management in Local Search Engine Systems [Volume 6, Number 2] |
 |
Threshold implementation
Threshold Implementation as a Countermeasure against Power Analysis Attacks [Volume 8, Number 2] |
 |
Time Memory Trade Off
Introduction of TMTO attack on Hash Functions [Volume 6, Number 1] |
 |
Verifiable excerpts
A Secure Auditable Log based on Blockchain [Volume 13, Number 2] |
 |
Verifier .
A Survey of Grouping Proof Protocols in Radio Frequency Identification Systems [Volume 3, Number 1] |
 |
WPA &WEP
A survey on the wi-fi wireless network systems penetration approaches [Volume 9, Number 1] |
 |
White-box cryptography
Approaches and challenges of the white-box model of the block cipher schemes implementation [Volume 7, Number 1] |
 |
Wireless Networks
Survey the Security Function of Integration of vehicular ad hoc Networks with Software-defiend Networks [Volume 7, Number 2] |
 |
access control
overview of ways to enhance the security of video surveillance networks using blockchain [Volume 9, Number 2] |
 |
and Challenge
On the Use of Fuzzy-WLC modeling technique for Evaluating Security of Cryptographic Module [Volume 12, Number 1] |
 |
authenticated encryption algorithm
Sponge structure; an introduction and its applications [Volume 8, Number 1] |
 |
backdoor
Investigating Methods of Kleptography [Volume 7, Number 2] |
 |
binding output
Security of Sponge structures [Volume 9, Number 1] |
 |
cloud
Management of Electronic Health Records with Preservation of Privacy using the Blockchain Technology [Volume 11, Number 1] |
 |
confidence-Aware Trust
A Confidence-Aware Trust Approach for Detecting Indirect Sybil Attacks in Wireless Sensor Networks Considering Time Factor [Volume 6, Number 2] |
 |
coordinator node
The study of the methods to increase the security of the public places using coverage improvement and their monitoring based on wireless sensor networks [Volume 6, Number 1] |
 |
crime investigation
Electronic Money Laundering Detection in Transactions of Payment Service Providers [Volume 11, Number 2] |
 |
cryption key
Evaluate The Performance Of Meta-heuristic Different Algorithms in the Discovery of the Cryption Key Vigenere Encryption Algorithm [Volume 4, Number 1] |
 |
database attacks
Overview of Intrusion Detection Techniques in Database
[Volume 7, Number 2] |
 |
denial of service attack.
Security challenges and solutions in software defined networks [Volume 5, Number 1] |
 |
dynamic analysis
A Tool for Detecting Man in the Browser (MitB) Attacks using Dynamic Analysis of Web Pages [Volume 11, Number 1] |
 |
evaluation of system performance tests
Designing and Implementing two Laboratory Samples of the Intelligent System for Detecting Encrypted VoIP Skype Traffic and the Lantern Escape Tool using Deep Learning Method [Volume 11, Number 2] |
 |
evolutionary programming algorithm
Intrusion Detection Using Evolutionary Hidden Markov Model [Volume 8, Number 2] |
 |
forgery attack
Key Discovery and Forgery Attack on a Key Agreement Protocol with Authentication for Wireless Sensor Network [Volume 11, Number 1] |
 |
great period
Jump Index in T-functions for designing a new basic structure of stream ciphers [Volume 5, Number 1] |
 |
heterogeneous networks.
a review of vertical handover in wireless networks:concept, protocols, Algorithms. [Volume 4, Number 1] |
 |
integer wavelet transform
Wavelet-based Image Steganography using the Idea of Embedding in Areas of High Frequency Subbands with Large Variations [Volume 11, Number 2] |
 |
internet of things
Inventing a Method to Save the Fog Node from Attacks [Volume 11, Number 1] |
 |
logic testing based detection
Vulnerability Analysis of Digital Circuits against Capacitor-based Timing Hardware Trojan [Volume 11, Number 1] |
 |
malicious attacks
Robustness Verification of Trust Systems [Volume 3, Number 2] |
 |
masking
Masking Midori64 against Correlation Power Analysis Attack [Volume 11, Number 1] |
 |
multi-user quantum dialogue
Multi-Party Quantum Dialogue with the Capability to Expand the Number of Users at Runtime [Volume 11, Number 2] |
 |
obfuscation
An overview of software protection techniques against static and dynamic Attacks [Volume 4, Number 1] |
 |
pairing.
Identity Based Cryptography In WSN [Volume 4, Number 1] |
 |
reliable routing
Providing an RPL-based Reliable Routing Method in the Internet of Things [Volume 11, Number 1] |
 |
scalar multiplication.
Hyper Elliptic Curve In Cryptography [Volume 4, Number 2] |
 |
security
A review of privacy in online social networks [Volume 6, Number 2] |
 |
security check
Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System [Volume 10, Number 2] |
 |
security components in development life cycle of local search engines
Security Indexes of Development Life Cycle of Local
Search Engines
[Volume 6, Number 1] |
 |
security requirements
The method of risk analysis of communication and information infrastructure modules and the extraction of preventive security requirements [Volume 13, Number 1] |
 |
semi-systolic architecture
A High-Speed Systolic Field Multiplication for Edwards 25519 Curve [Volume 11, Number 1] |
 |
sub-transmission substation
Unmanned Cyber Security Requirements in sub-Transmission Substation [Volume 11, Number 1] |
 |
system security
Modeling Attacker’s Capability Level Focusing on Injection Attacks on Web Applications [Volume 11, Number 2] |
 |
trust management
A Trust Management Approach for Sybil Attack Detection in Wireless Sensor Networks [Volume 5, Number 1] |
 |
update
Lightweight and Secure Authentication Key Agreement Protocol for Smart Grid [Volume 11, Number 1] |