Statistics

Number of Journals34
Number of Issues1,306
Number of Articles9,427
Article View9,188,328
PDF Download5,620,752

1.

Providing an Ontology-Based Method for Exploring the Association Rules in Multi-Agent Distributed Environments

Pages 1-17
H. Saberi; M. R. Kangaavari; M. R. Hasani Ahangar

2.

A New Method for Blind Recognition of the Initial State of Synchronous Scramblers When Located after the Channel Encoder

Pages 19-27
S. Ghazi maghrebi; H. Alemi

3.

Trajectory Database Release with Differential Privacy Guarantee

Pages 29-42
F. Deldar; M. Abadi

4.

Distributed Denial of Service Attacks Detection in Software Defined Networks

Pages 43-59
A. Banitalebi dehkordi; M. R. Soltanaghaie; F. Zamani Boroujeni

5.

Detecting of Botnets’ Malicious Domains with Deep Autoencoder Neural Network

Pages 61-74
M. Asadi; S. Parsa; V. Vosoughi

6.

Speech Steganalysis of Least Significant Bits Based on the Percentage of Equal Adjacent Samples

Pages 75-90
S. Yazdanpanah; M. Kheyrandish; M. Mosleh

7.

Improvement of Rotational Cryptanalysis of Shabal and Cubehash Hash Functions

Pages 91-100
J. Alizadeh; M. Aboei Mehrizi

8.

Transparent and Robust Audio Watermarking Using Synergy LU Decomposition and the Fibonacci Sequence in GBT-DCT-DWT Transforms

Pages 101-113
M. Mosleh; S. Setayeshi; B. Barekatain; M. Mosleh

9.

Anomaly Detection in Dynamic Social Networks Based on Behavioral Measurements

Pages 115-123
S. Ghaderi Piraghum; M. Sakhaei-nia; M. Mansoorizadeh

10.

Generalized Version of the BB84 QKD Protocol with n Polarization Bases and Unequal Probabilities

Pages 125-136
A. Aghanis; N. Doustimotlagh

11.

Kavosh: Offering an Analysis Method and the Impact of Normal Network Traffic on Selection and Extraction Based on the Minkowski Distance

Pages 137-147
M. J. Faghihniya; R. Jalaei; H. Shojaee yas

12.

A Techno-Economic Model of Sustainable Communication Infrastructure in the Smart City; using WDM-PON FTTx

Pages 149-156
M. R. Asgarirad; M. Nejati Jahromi

13.

A Security Model Based Approach for Dynamic Risk Assessment of Multi-Step Attacks in Computer Networks

Pages 157-173
M. Keramati

14.

Presentation and Performance Evaluation of an Efficient Algorithm for a Distributed Controller in SDN

Pages 175-183
A. Naseri; M. R. Mehrpoya; S. M. Banihashemi