Current Issue Issue 1 , 2 Vol 24 Spring 2026 Submit Your Paper List of Reviewers Published Issues Vol. 24 ✓ Issue 1 , 2 - Spring 2026 Vol. 23 ✓ Issue 4 , 2 - Winter 2026 ✓ Issue 3 , 2 - Autumn 2025 ✓ Issue 3 , 1 - Autumn - Winter 2026 ✓ Issue 2 , 2 - Summer 2025 ✓ Issue 2 , 1 - Summer 2025 ✓ Issue 1 , 2 - Spring 2025 ✓ Issue 1 , 1 - Spring 2025 Vol. 22 ✓ Issue 4 , 1 - Winter 2025 ✓ Issue 4 , 2 - Winter 2025 ✓ Issue 3 , 2 - Autumn 2024 ✓ Issue 3 , 1 - Autumn 2024 ✓ Issue 2 , 1 - Summer 2024 ✓ Issue 2 , 2 - Summer 2024 ✓ Issue 1 , 1 - Spring 2024 ✓ Issue 1 , 2 - Spring 2024 Vol. 21 ✓ Issue 4 , 1 - Winter 2023 ✓ Issue 4 , 2 - Winter 2023 ✓ Issue 3 , 1 - Autumn 2023 ✓ Issue 3 , 2 - Autumn 2024 ✓ Issue 2 , 1 - Summer 2023 ✓ Issue 2 , 2 - Summer 2023 ✓ Issue 1 , 1 - Spring 2023 ✓ Issue 1 , 2 - Spring 2023 Vol. 20 ✓ Issue 4 , 1 - Winter 2022 ✓ Issue 4 , 2 - Winter 2023 ✓ Issue 3 , 1 - Autumn 2022 ✓ Issue 3 , 2 - Autumn 2022 ✓ Issue 2 , 1 - Summer 2022 ✓ Issue 2 , 2 - Summer 2022 ✓ Issue 1 , 1 - Spring 2022 ✓ Issue 1 , 2 - Spring 2022 Vol. 19 ✓ Issue 4 , 1 - Winter 2021 ✓ Issue 4 , 2 - Winter 2022 ✓ Issue 3 , 1 - Autumn 2021 ✓ Issue 3 , 2 - Autumn 2022 ✓ Issue 2 , 1 - Summer 2021 ✓ Issue 2 , 2 - Summer 2021 ✓ Issue 1 , 1 - Spring 2021 ✓ Issue 1 , 2 - Spring 2021 Vol. 16 ✓ Issue 4 , 1 - Winter 2019 ✓ Issue 4 , 2 - Winter 2019 ✓ Issue 3 , 2 - Autumn 2021 ✓ Issue 3 , 1 - Autumn 2018 ✓ Issue 2 , 1 - Summer 2021 ✓ Issue 2 , 2 - Summer 2021 ✓ Issue 1 , 2 - Spring 2021 ✓ Issue 1 , 1 - Spring 2018 Vol. 18 ✓ Issue 4 , 1 - Winter 2021 ✓ Issue 4 , 2 - Winter 2021 ✓ Issue 3 , 1 - Autumn 2020 ✓ Issue 3 , 2 - Autumn 2020 ✓ Issue 2 , 1 - Summer 2020 ✓ Issue 2 , 2 - Summer 2020 ✓ Issue 1 , 1 - Spring 2020 ✓ Issue 1 , 2 - Spring 2020 Vol. 17 ✓ Issue 4 , 1 - Winter 2020 ✓ Issue 4 , 2 - Winter 2020 ✓ Issue 3 , 1 - Autumn 2019 ✓ Issue 3 , 2 - Autumn 2019 ✓ Issue 2 , 1 - Summer 2019 ✓ Issue 2 , 2 - Summer 2019 ✓ Issue 1 , 1 - Spring 2019 ✓ Issue 1 , 2 - Spring 2019 Vol. 15 ✓ Issue 4 , 1 - Winter 2018 ✓ Issue 4 , 2 - Winter 2018 ✓ Issue 3 , 1 - Autumn 2017 ✓ Issue 3 , 2 - Autumn 2017 ✓ Issue 2 , 1 - Summer 2017 ✓ Issue 2 , 2 - Summer 2017 ✓ Issue 1 , 1 - Spring 2017 ✓ Issue 1 , 2 - Spring 2017 Vol. 14 ✓ Issue 4 , 1 - Winter 2017 ✓ Issue 4 , 2 - Winter 2017 ✓ Issue 3 , 1 - Autumn 2016 ✓ Issue 3 , 2 - Autumn 2016 ✓ Issue 2 , 2 - Summer 2016 ✓ Issue 2 , 2 - Summer 2016 ✓ Issue 1 , 1 - Spring 2016 ✓ Issue 1 , 2 - Spring 2016 Vol. 13 ✓ Issue 4 - Winter 2016 ✓ Issue 3 - Autumn 2015 ✓ Issue 2 - Summer 2015 ✓ Issue 1 - Spring 2015 Vol. 12 ✓ Issue 4 - Winter 2015 ✓ Issue 3 - Autumn 2014 ✓ Issue 2 - Summer 2014 ✓ Issue 1 - Spring 2014 Vol. 11 ✓ Issue 4 - Winter 2014 ✓ Issue 3 - Autumn 2013 ✓ Issue 2 - Summer 2013 ✓ Issue 1 - Spring 2013 Vol. 10 ✓ Issue 4 - Winter 2013 ✓ Issue 3 - Autumn 2012 ✓ Issue 2 - Summer 2012 ✓ Issue 1 - Spring 2012 Vol. 9 ✓ Issue 4 - Winter 2011 ✓ Issue 3 - Autumn 2011 ✓ Issue 2 - Summer 2011 ✓ Issue 1 - Spring 2011 Vol. 8 ✓ Issue 4 - Winter 2010 ✓ Issue 3 - Autumn 2010 ✓ Issue 2 - Summer 2010 ✓ Issue 1 - Spring 2010 Vol. 7 ✓ Issue 4 - Winter 2009 ✓ Issue 3 - Autumn 2009 ✓ Issue 2 - Summer 2009 ✓ Issue 1 - Spring 2009 Vol. 6 ✓ Issue 4 - Winter 2008 ✓ Issue 3 - Autumn 2008 ✓ Issue 2 - Summer 2008 ✓ Issue 1 - Spring 2008 Vol. 5 ✓ Issue 4 - Winter 2007 ✓ Issue 3 - Autumn 2007 ✓ Issue 2 - Summer 2007 ✓ Issue 1 - Spring 2007 Vol. 4 ✓ Issue 2 - Autumn - Winter 2006 ✓ Issue 1 - Spring - Summer 2006 Vol. 3 ✓ Issue 2 - Autumn - Winter 2005 ✓ Issue 1 - Spring - Summer 2005 Vol. 2 ✓ Issue 2 - Autumn - Winter 2004 ✓ Issue 1 - Spring - Summer 2004 Vol. 1 ✓ Issue 2 - Autumn - Winter 2003 ✓ Issue 1 - Spring - Summer 2003 Menu Contact Journal Browse • Current Issue • By Issue • Author Index • By Subject • By Author
List of Articles security Open Access Article Abstract Page Full-Text 1 - Nastaliq CAPTCHA M. H. Shirali-Shahreza Mohammad Shirali-Shahreza 20.1001.1.16823745.1386.5.10.7.4 Open Access Article Abstract Page Full-Text 2 - Risk-based Static and Dynamics Security Assessment and Its Enhancement with Particle Swarm Optimization Generation Realloca M. Saeedi H. Seifi 20.1001.1.16823745.1391.10.1.3.7 Open Access Article Abstract Page Full-Text 3 - The Effects of SIP Register Flood Attack and Detection by Using Kullback–Leibler Distance S. R. Chogan M. Fathy M. Ramezani 20.1001.1.16823745.1393.12.2.5.5 Open Access Article Abstract Page Full-Text 4 - Throughput Optimization in a Broadcast Network Using Adaptive Modulation, Coding and Transmit Power Provisioning Security Constraint M. Taki 20.1001.1.16823745.1393.12.2.7.7 Open Access Article Abstract Page Full-Text 5 - Economic Load Dispatch in Power Plants, Taking into Account Environmental Pollutants and System Security Indices Using Multi-Objective Harmony Search Algorithm H. Sharifi محمود اوکاتی صادق 20.1001.1.16823745.1398.17.1.4.7 Open Access Article Abstract Page Full-Text 6 - An On-Chip Detection Mechanism to Detect Scan-Based Attack in Crypto-Chips F. Jamali Zavareh H. Beitollahi 20.1001.1.16823745.1398.17.1.15.8 Open Access Article Abstract Page Full-Text 7 - Energy Efficiency in Secrecy Multi-Antenna Two-Way Relay Networks F. B. soroush akhlaghi 20.1001.1.16823745.1400.19.1.7.4 Open Access Article Abstract Page Full-Text 8 - A Patient Identification and Authentication Protocol to Increase Security Afsaneh Sharafi Sepideh Adabi Ali Movaghar Salah Al-Majed 20.1001.1.16823745.1401.20.1.7.1 Open Access Article Abstract Page Full-Text 9 - Maintaining Confidentiality and Integrity of Data and Preventing Unauthorized Access to DICOM Medical Images Mohammad Soltani Hassan Shakeri Mahboobeh Houshmand 20.1001.1.16823745.1402.21.1.11.2 Open Access Article Abstract Page Full-Text 10 - SQ-PUF: A Resistant PUF-Based Authentication Protocol against Machine-Learning Attack Abolfazl Sajadi Bijan Alizadeh Open Access Article Abstract Page Full-Text 11 - A New Parallel Method to Verify the Packets Forwarding in SDN Networks Rozbeh Beglari Hakem Beitollahi Open Access Article Abstract Page Full-Text 12 - Machine Learning-Based Security Resource Allocation for Defending against Attacks in the Internet of Things Nasim Navaei Vesal Hakami Open Access Article Abstract Page Full-Text 13 - Designing a Secure Consensus Algorithm for Use in Blockchain Hosein Badri Masumeh Safkhani Open Access Article Abstract Page Full-Text 14 - A Novel Approach based on Chaotic Mapping for Implementing Security Phases on Cloud Computing Azita Rezaei Ali Broumandnia Seyed Javad Mirabedini Open Access Article Abstract Page Full-Text 15 - Optimal Power Allocation for Maximizing Secrecy Rate in Physical Layer Security Using Frequency Diverse Array Directional Modulation and Artificial Noise Mahdi Tayyeb Massoud Hossein Khaleghi Open Access Article Abstract Page Full-Text 16 - Lightweight Hybrid Framework for IoT Security Using Optimized Random Forest and Adaptive Feature Selection in Edge-Cloud Architecture Mohsen Ashrafi