Statistics

Number of Journals34
Number of Issues1,306
Number of Articles9,427
Article View9,189,002
PDF Download5,621,607

1.

Covert communication in the presence of untrusted relay

Pages 1-14
MohammadReza Yari; Moslem Forouzesh; Paeize Azmi

2.

Smart Home Intrusion Detection Model based on Principal Component Analysis and Random Forest Classification

Pages 15-25
Aliakbar Tajari Siahmarzkooh

3.

Proposing framework for comparative evaluation of information security risk assessment methods (Case of study: Iranian Research Institute for Information Science and Technology (IranDoc))

Pages 27-39
Hamid Reza Khedmatgozar; Hamid Hassani

4.

Improving the Geo-LU routing algorithm by considering the lifetime of links in selecting the next hop toward the destination in VANETs

Pages 41-52
Robabeh Ghafouri Vayghan; Mohammad Hossein Lotfi nekoo

5.

Sink mobility management in mobile sensor networks for cluster-heads load balancing

Pages 53-66
Omid Abedi; fatemeh Moradi; Mahdieh Ghazvini

6.

Image encryption using face biometric and metaheuristic algorithm over blockchain system

Pages 67-83
MOHAMMAD Ganjalikhan Hakemi; MOHAMMADJAVAD Rostami

7.

DAS system performance improvement algorithm based on quantum technology

Pages 85-97
Ali soleimani; Ali naseri

8.

Introducing a decoy-state version of the high-dimensional polarization-phase (PoP) quantum key distribution protocol and explaining its implementation

Pages 99-107
Ali Mehri Toonabi; Mahdi Davoudi

9.

Enhancing secret sharing security: A cheating detection approach based on inverse polynomial coefficients

Pages 109-114
Ali Havasi; Massoud Hadian Dehkordi

10.

Localization of ground emitters using LEO satellites in LER scenario based on combined TDOA-FDOA method

Pages 115-123
Bahman Bonyadi; Hamid Arezumand; Hamidreza Khodadai