Statistics

Number of Journals34
Number of Issues1,306
Number of Articles9,427
Article View9,188,663
PDF Download5,620,948

1.

Detecting Botnets with Timing-Based Covert Command and Control Channels

Pages 1-15
R. Jalaei; M. R. Hasani Ahangar

2.

Structure of code-based hypergraphs and their application in wireless sensor networks

Pages 17-26
M. Hamidi; A. Borumand Saied; A. Rezaei; S. A. Samareh Hashemi

3.

Identification of STBC-OFDM Signals by Second-Order Cyclostationarity Method

Pages 27-36
M. Saadatmand; M. Rezaei Khair Abadi

4.

Design and Production of Hardware Authentication Code Using Physically Unclonable Functions and a Random Number Generator on FPGA

Pages 37-50
M. Masoumi; A. Dehghan; E. Madadi

5.

Side Channel Analysis of International Data Encryption Algorithm (IDEA)

Pages 51-57
A. Mirghadri; H. Bagheri

6.

Designing Systolic Array for SL0 Algorithm Implementation

Pages 59-65
A. Naseri; R. Jozpiri

7.

Smart Detection of Covert Worms in Computer Networks

Pages 67-77
M. Zabihi; B. Minaei; M. Nasiri

8.

A New Method for Image Steganography Using Discrete Wavelet Transforms

Pages 79-89
A. J. Rashidi; S. Sobhani; M. Hoseini

9.

Modeling of cyber-attacks obfuscation based on the attack analogous to the technique of insertion attacks

Pages 91-103
K. Shoushian; A. J. Rashidi; M. Dehghani

10.

An Improved Method of Incident Detection due to Cyber Attacks

Pages 105-116
M. H. HassanNia; M. R. HasaniAhangar; A. Gafori

11.

Guidance and distributed control of the networked UAVs

Pages 117-129
j. khalil pour; M. Veysi; F. Rahimi

12.

Secure and confidential workflow scheduling in hybrid cloud using improved particle swarm optimization algorithm

Pages 131-145
M. Mehravaran; M. R. Pajoohan; F. Adibnia