A
-
Abbaszadeh Amirdehi, Hassan
Evaluating the Effect of Groundwater Level on Projectile Penetration Depth in Sandy and Clayey Soils [Volume 8, Issue 4, 2017, Pages 373-386]
-
Abedi, Elham
Reliability Analysis of Structures under Blast Loading [Volume 8, Issue 1, 2017, Pages 19-31]
-
Akbari, Ahmad
Engineered Feature Set to Detect Flooding Attacks in SIP Based VoIP [Volume 8, Issue 1, 2017, Pages 61-69]
-
Asgharian, Hassan
Engineered Feature Set to Detect Flooding Attacks in SIP Based VoIP [Volume 8, Issue 1, 2017, Pages 61-69]
B
-
Behzad Fallahpour, Mojtaba
Extraction of Point Target Model of Distributed Targets Using SAR Images [Volume 8, Issue 3, 2017, Pages 265-274]
D
-
Dehghani, Hamid
Extraction of Point Target Model of Distributed Targets Using SAR Images [Volume 8, Issue 3, 2017, Pages 265-274]
-
Dehghani Ashkozari, Ghassem
Investigating the Behavior of RC Underground Structures Employing Ultra-high Strength Concrete under the Effects of Surface Blasts [Volume 8, Issue 2, 2017, Pages 123-132]
E
-
Esfahani, Reza
Security Level Determination of Cover Image in Steganography Based on the Fuzzy Logic [Volume 8, Issue 3, 2017, Pages 213-221]
G
-
Gholizad, Amin
Reliability Analysis of Structures under Blast Loading [Volume 8, Issue 1, 2017, Pages 19-31]
H
-
Hadianfard, Mohammad Ali
Evaluation of Explosion Safe Distance of Steel Column Via Structural Reliability Analysis [Volume 8, Issue 4, 2017, Pages 349-359]
-
Hajiakbari, Masoud
Underfrequency Load Shedding Based on Wide Area Monitoring System [Volume 8, Issue 3, 2017, Pages 243-250]
J
-
Jabbar Rashidi, Ali
Extraction of Point Target Model of Distributed Targets Using SAR Images [Volume 8, Issue 3, 2017, Pages 265-274]
-
Jamali, Shahram
Defense against Black Hole Attacks on AODV Routing Protocol Using Fuzzy Logic [Volume 8, Issue 4, 2017, Pages 285-300]
-
Javidan, Reza
Real-Time Intrusion Detection System Using a Combination of Discretization and Feature Selection [Volume 8, Issue 3, 2017, Pages 251-263]
K
-
Karbasian, Mahdi
Evolutionary Stable Strategies to Defend of Sensitive Systems with False Attacks and Reliability Approach [Volume 8, Issue 4, 2017, Pages 339-348]
-
Khanzade, M. H.
Underfrequency Load Shedding Based on Wide Area Monitoring System [Volume 8, Issue 3, 2017, Pages 243-250]
-
Khanzade, Mohammad Hosein
Energy Supply of Sensitive Areas as an Inverter-Based Microgrid During Stiff Power System Black Out [Volume 8, Issue 2, 2017, Pages 85-95]
M
-
Malekpour, Sina
Evaluation of Explosion Safe Distance of Steel Column Via Structural Reliability Analysis [Volume 8, Issue 4, 2017, Pages 349-359]
-
Mardani Shahrbabak, Mohammad
Size Reduction and Characteristics Improvement of Espar Antenna Using Metal Disc with Monopoles [Volume 8, Issue 1, 2017, Pages 1-7]
-
Massah, Saeed Reza
Investigating the Behavior of RC Underground Structures Employing Ultra-high Strength Concrete under the Effects of Surface Blasts [Volume 8, Issue 2, 2017, Pages 123-132]
-
Mirghadri, Abdolrasoul
Extending the Switching Mechanism for 256 bit Block Ciphers Designing [Volume 8, Issue 3, 2017, Pages 181-189]
-
Mirmohseni namin, Sonia
Defense against Black Hole Attacks on AODV Routing Protocol Using Fuzzy Logic [Volume 8, Issue 4, 2017, Pages 285-300]
-
Mirzeinaly Yazdi, Hossein
Evaluating the Effect of Groundwater Level on Projectile Penetration Depth in Sandy and Clayey Soils [Volume 8, Issue 4, 2017, Pages 373-386]
-
Moghaddam, M.A.
Simulation and Comparison of Amplified Spontaneous Emission Spectrum in Various Ytterbium Doped Double-Clad Fibers [Volume 8, Issue 4, 2017, Pages 329-337]
-
Mohammadi, Ali
Investigating the Behavior of RC Underground Structures Employing Ultra-high Strength Concrete under the Effects of Surface Blasts [Volume 8, Issue 2, 2017, Pages 123-132]
N
-
Nabati Rad, Mohammadreza
Energy Supply of Sensitive Areas as an Inverter-Based Microgrid During Stiff Power System Black Out [Volume 8, Issue 2, 2017, Pages 85-95]
-
Najafi, Mehdi
A New Light Weight Intrusion Detection Algorithm for Computer Networks [Volume 8, Issue 3, 2017, Pages 191-200]
-
Norozi, Zynolabedin
Security Level Determination of Cover Image in Steganography Based on the Fuzzy Logic [Volume 8, Issue 3, 2017, Pages 213-221]
P
-
Parsaei, Mohammad Reza
Real-Time Intrusion Detection System Using a Combination of Discretization and Feature Selection [Volume 8, Issue 3, 2017, Pages 251-263]
-
Peyman, Safa
Analysis of Underground Tunnels in Explosion Loading Based on Peak Particle Velocity [Volume 8, Issue 1, 2017, Pages 45-50]
-
Pourtaheri, Zeinab Khatoun
Design of Heuristic Ensemble Classifiers with High Reliability [Volume 8, Issue 4, 2017, Pages 301-311]
R
-
Raahemi, Bijan
Engineered Feature Set to Detect Flooding Attacks in SIP Based VoIP [Volume 8, Issue 1, 2017, Pages 61-69]
-
Rafeh, Reza
A New Light Weight Intrusion Detection Algorithm for Computer Networks [Volume 8, Issue 3, 2017, Pages 191-200]
-
Rahimdel Meybodi, Mahdi
Evolutionary Stable Strategies to Defend of Sensitive Systems with False Attacks and Reliability Approach [Volume 8, Issue 4, 2017, Pages 339-348]
-
Razavi, Seyed Mohammad
Design of Heuristic Ensemble Classifiers with High Reliability [Volume 8, Issue 4, 2017, Pages 301-311]
S
-
Salehzadeh, Hossein
Investigating the Behavior of RC Underground Structures Employing Ultra-high Strength Concrete under the Effects of Surface Blasts [Volume 8, Issue 2, 2017, Pages 123-132]
-
Seyed Hashemi, Seyed Naser
Defense against Black Hole Attacks on AODV Routing Protocol Using Fuzzy Logic [Volume 8, Issue 4, 2017, Pages 285-300]
-
Sheikhi, Abbas
Extraction of Point Target Model of Distributed Targets Using SAR Images [Volume 8, Issue 3, 2017, Pages 265-274]
T
-
Taheri, Rahim
Real-Time Intrusion Detection System Using a Combination of Discretization and Feature Selection [Volume 8, Issue 3, 2017, Pages 251-263]
Z
-
Zahiri, Seyed Hamid
Design of Heuristic Ensemble Classifiers with High Reliability [Volume 8, Issue 4, 2017, Pages 301-311]
Your query does not match with any item