Current Issue Issue 2 , 2 Vol 22 Summer 2024 Submit Your Paper Published Issues Vol. 22 ✓ Issue 2 , 1 - Summer 2024 ✓ Issue 2 , 2 - Summer 2024 ✓ Issue 1 , 1 - Spring 2024 ✓ Issue 1 , 2 - Spring 2024 Vol. 21 ✓ Issue 4 , 1 - Winter 2023 ✓ Issue 4 , 2 - Winter 2023 ✓ Issue 3 , 1 - Autumn 2023 ✓ Issue 3 , 2 - Autumn 2024 ✓ Issue 2 , 1 - Summer 2023 ✓ Issue 2 , 2 - Summer 2023 ✓ Issue 1 , 1 - Spring 2023 ✓ Issue 1 , 2 - Spring 2023 Vol. 20 ✓ Issue 4 , 1 - Winter 2022 ✓ Issue 4 , 2 - Winter 2023 ✓ Issue 3 , 1 - Autumn 2022 ✓ Issue 3 , 2 - Autumn 2022 ✓ Issue 2 , 1 - Summer 2022 ✓ Issue 2 , 2 - Summer 2022 ✓ Issue 1 , 1 - Spring 2022 ✓ Issue 1 , 2 - Spring 2022 Vol. 19 ✓ Issue 4 , 1 - Winter 2021 ✓ Issue 4 , 2 - Winter 2022 ✓ Issue 3 , 1 - Autumn 2021 ✓ Issue 3 , 2 - Autumn 2022 ✓ Issue 2 , 1 - Summer 2021 ✓ Issue 2 , 2 - Summer 2021 ✓ Issue 1 , 1 - Spring 2021 ✓ Issue 1 , 2 - Spring 2021 Vol. 16 ✓ Issue 4 , 1 - Winter 2019 ✓ Issue 4 , 2 - Winter 2019 ✓ Issue 3 , 2 - Autumn 2021 ✓ Issue 3 , 1 - Autumn 2018 ✓ Issue 2 , 1 - Summer 2021 ✓ Issue 2 , 2 - Summer 2021 ✓ Issue 1 , 2 - Spring 2021 ✓ Issue 1 , 1 - Spring 2018 Vol. 18 ✓ Issue 4 , 1 - Winter 2021 ✓ Issue 4 , 2 - Winter 2021 ✓ Issue 3 , 1 - Autumn 2020 ✓ Issue 3 , 2 - Autumn 2020 ✓ Issue 2 , 1 - Summer 2020 ✓ Issue 2 , 2 - Summer 2020 ✓ Issue 1 , 1 - Spring 2020 ✓ Issue 1 , 2 - Spring 2020 Vol. 17 ✓ Issue 4 , 1 - Winter 2020 ✓ Issue 4 , 2 - Winter 2020 ✓ Issue 3 , 1 - Autumn 2019 ✓ Issue 3 , 2 - Autumn 2019 ✓ Issue 2 , 1 - Summer 2019 ✓ Issue 2 , 2 - Summer 2019 ✓ Issue 1 , 1 - Spring 2019 ✓ Issue 1 , 2 - Spring 2019 Vol. 15 ✓ Issue 4 , 1 - Winter 2018 ✓ Issue 4 , 2 - Winter 2018 ✓ Issue 3 , 1 - Autumn 2017 ✓ Issue 3 , 2 - Autumn 2017 ✓ Issue 2 , 1 - Summer 2017 ✓ Issue 2 , 2 - Summer 2017 ✓ Issue 1 , 1 - Spring 2017 ✓ Issue 1 , 2 - Spring 2017 Vol. 14 ✓ Issue 4 , 1 - Winter 2017 ✓ Issue 4 , 2 - Winter 2017 ✓ Issue 3 , 1 - Autumn 2016 ✓ Issue 3 , 2 - Autumn 2016 ✓ Issue 2 , 2 - Summer 2016 ✓ Issue 2 , 2 - Summer 2016 ✓ Issue 1 , 1 - Spring 2016 ✓ Issue 1 , 2 - Spring 2016 Vol. 13 ✓ Issue 4 - Winter 2016 ✓ Issue 3 - Autumn 2015 ✓ Issue 2 - Summer 2015 ✓ Issue 1 - Spring 2015 Vol. 12 ✓ Issue 4 - Winter 2015 ✓ Issue 3 - Autumn 2014 ✓ Issue 2 - Summer 2014 ✓ Issue 1 - Spring 2014 Vol. 11 ✓ Issue 4 - Winter 2014 ✓ Issue 3 - Autumn 2013 ✓ Issue 2 - Summer 2013 ✓ Issue 1 - Spring 2013 Vol. 10 ✓ Issue 4 - Winter 2013 ✓ Issue 3 - Autumn 2012 ✓ Issue 2 - Summer 2012 ✓ Issue 1 - Spring 2012 Vol. 9 ✓ Issue 4 - Winter 2011 ✓ Issue 3 - Autumn 2011 ✓ Issue 2 - Summer 2011 ✓ Issue 1 - Spring 2011 Vol. 8 ✓ Issue 4 - Winter 2010 ✓ Issue 3 - Autumn 2010 ✓ Issue 2 - Summer 2010 ✓ Issue 1 - Spring 2010 Vol. 7 ✓ Issue 4 - Winter 2009 ✓ Issue 3 - Autumn 2009 ✓ Issue 2 - Summer 2009 ✓ Issue 1 - Spring 2009 Vol. 6 ✓ Issue 4 - Winter 2008 ✓ Issue 3 - Autumn 2008 ✓ Issue 2 - Summer 2008 ✓ Issue 1 - Spring 2008 Vol. 5 ✓ Issue 4 - Winter 2007 ✓ Issue 3 - Autumn 2007 ✓ Issue 2 - Summer 2007 ✓ Issue 1 - Spring 2007 Vol. 4 ✓ Issue 2 - Autumn - Winter 2006 ✓ Issue 1 - Spring - Summer 2006 Vol. 3 ✓ Issue 2 - Autumn - Winter 2005 ✓ Issue 1 - Spring - Summer 2005 Vol. 2 ✓ Issue 2 - Autumn - Winter 2004 ✓ Issue 1 - Spring - Summer 2004 Vol. 1 ✓ Issue 2 - Autumn - Winter 2003 ✓ Issue 1 - Spring - Summer 2003 Menu Contact Journal Browse • Current Issue • By Issue • Author Index • By Subject • By Author
List of Articles security Open Access Article Abstract Page Full-Text 1 - Nastaliq CAPTCHA M. H. Shirali-Shahreza Mohammad Shirali-Shahreza 20.1001.1.16823745.1386.5.10.7.4 Open Access Article Abstract Page Full-Text 2 - Risk-based Static and Dynamics Security Assessment and Its Enhancement with Particle Swarm Optimization Generation Realloca M. Saeedi H. Seifi 20.1001.1.16823745.1391.10.1.3.7 Open Access Article Abstract Page Full-Text 3 - The Effects of SIP Register Flood Attack and Detection by Using Kullback–Leibler Distance S. R. Chogan M. Fathy M. Ramezani 20.1001.1.16823745.1393.12.2.5.5 Open Access Article Abstract Page Full-Text 4 - Throughput Optimization in a Broadcast Network Using Adaptive Modulation, Coding and Transmit Power Provisioning Security Constraint M. Taki 20.1001.1.16823745.1393.12.2.7.7 Open Access Article Abstract Page Full-Text 5 - Economic Load Dispatch in Power Plants, Taking into Account Environmental Pollutants and System Security Indices Using Multi-Objective Harmony Search Algorithm H. Sharifi محمود اوکاتی صادق 20.1001.1.16823745.1398.17.1.4.7 Open Access Article Abstract Page Full-Text 6 - An On-Chip Detection Mechanism to Detect Scan-Based Attack in Crypto-Chips F. Jamali Zavareh H. Beitollahi 20.1001.1.16823745.1398.17.1.15.8 Open Access Article Abstract Page Full-Text 7 - Energy Efficiency in Secrecy Multi-Antenna Two-Way Relay Networks F. B. soroush akhlaghi 20.1001.1.16823745.1400.19.1.7.4 Open Access Article Abstract Page Full-Text 8 - A Patient Identification and Authentication Protocol to Increase Security Afsaneh Sharafi Sepideh Adabi Ali Movaghar Salah Al-Majed 20.1001.1.16823745.1401.20.1.7.1 Open Access Article Abstract Page Full-Text 9 - Maintaining Confidentiality and Integrity of Data and Preventing Unauthorized Access to DICOM Medical Images Mohammad Soltani Hassan Shakeri Mahboobeh Houshmand 20.1001.1.16823745.1402.21.1.11.2 Open Access Article Abstract Page Full-Text 10 - SQ-PUF: A Resistant PUF-Based Authentication Protocol against Machine-Learning Attack Abolfazl Sajadi Bijan Alizadeh Open Access Article Abstract Page Full-Text 11 - A New Parallel Method to Verify the Packets Forwarding in SDN Networks Rozbeh Beglari Hakem Beitollahi Open Access Article Abstract Page Full-Text 12 - Machine Learning-Based Security Resource Allocation for Defending against Attacks in the Internet of Things Nasim Navaei Vesal Hakami Open Access Article Abstract Page Full-Text 13 - Designing a Secure Consensus Algorithm for Use in Blockchain Hosein Badri Masumeh Safkhani Open Access Article Abstract Page Full-Text 14 - A Novel Approach based on Chaotic Mapping for Implementing Security Phases on Cloud Computing Azita Rezaei Ali Broumandnia Seyed Javad Mirabedini Open Access Article Abstract Page Full-Text 15 - Optimal Power Allocation for Maximizing Secrecy Rate in Physical Layer Security Using Frequency Diverse Array Directional Modulation and Artificial Noise Mahdi Tayyeb Massoud Hossein Khaleghi