Statistics

Number of Journals34
Number of Issues1,306
Number of Articles9,427
Article View9,189,270
PDF Download5,621,868

1.

Radar data processing using a combination of principal component analysis methods and self-organizing and digitized neural networks of the learning vector

Pages 1-7
S. Talati; M. R. Hasani Ahangar

2.

Providing a behavioral malware detection system based on the function of hardware counters using a neural network optimized with a dragonfly algorithm

Pages 9-16
M. Karami; M. Mosleh

3.

A Mutual Authentication Protocol for IoT Users in Cloud Environment

Pages 17-28
A. Shahidinejad

4.

A New Mechanism for Enhancing the Security of Military Internet of Things by Using Quantum and Classic Cryptography

Pages 29-49
S. N. Doustimotlagh

5.

Inverse Synthetic Aperture Radar (ISAR) Imaging of Targets with Non-Uniform Motion and Constant Acceleration based on Compressed Sensing

Pages 51-62
R. Entezari; A. J. Rashidi

6.

Classification of High Dimensional Imbalanced Dataset via Game Theory-based Generative Adversarial Networks

Pages 63-74
Sh. Mirabedini; M. R. Kangavari; J. Mohammad Zadeh

7.

PIVATool- a fast and precise tool for analysis and detection of PendingIntent vulnerabilities

Pages 75-83
A. Sarvazimi; M. Sakhaei-nia

8.

Design a Blockchain based Electronic Payment with Users’ Anonymity

Pages 85-100
Z. Hatefi; M. Bayat; N. Hamian

9.

Automatic XSS Exploit Generation Using Grammatical Evolution

Pages 101-119
A. Moghaddasi; M. Bagheri

10.

SCEIRS information dissemination model based on rumor spreading in complex networks

Pages 121-134
S. Hosseini; A. Zandvakili

11.

Improving the Security in Cellular Communications Networks with adding Artificial Noise by method Non-Orthogonal Resource Allocation Techniques

Pages 135-142
M. A. Kamari; H. R. Khodadadi

12.

Improving INS/GPS Integration with Artificial Intelligence during GPS Outage

Pages 143-157
A. Ebrahimi; M. Sadeghi; M. Nezhadshahbodaghi; M. R. Mosavi; E. S. Abdolkarimi

13.

Security-aware Task Scheduling Algorithm based on Multi Adaptive Learning and PSO Technique

Pages 159-178
N. Mansouri; B. Mohammad Hasani Zade; R. Ghafari

14.

Concurrent Detection of Compact Anomalous Subgraphs in Large Social Networks

Pages 179-194
M. Shah Hosseini; A. Mahabadi

15.

A Heuristic Data Diffusion and Gathering Scheme Using Virtual Line for Wireless Sensor Networks with Mobile Sink

Pages 195-207
A. Nadinejad; M. Alaei