Journal of Computing and Security

ارسال های اخیر

  • A Surrogate Model-based Aquila Optimizer for Solving High-dimensional Computationally Expensive Problems 

    Rouhi, Alireza؛ Pira, Einollah (University of Isfahan & Iranian Society of Cryptology, 2024-01-01)
    This paper introduces a variant version of the AO for efficiently solving high-dimensional computationally expensive problems. Traditional optimization techniques struggle with problems characterized by expensive objective ...

  • A Multi-Dimensional Framework for Virtual Machine Consolidation 

    mosavi, Ali؛ Horri, abbas (University of Isfahan & Iranian Society of Cryptology, 2023-07-01)
    Cloud computing is a demand computing model that requires a large number of physical resources and provides services based on the request of each user. A large number of physical servers in data centers have high electrical ...

  • Software Architecture Tools- A Classification and Survey with Recommendation for an Organization 

    Rashidi, Hassan؛ Rashidi, Zahra؛ Rashidi, Zeynab (University of Isfahan & Iranian Society of Cryptology, 2023-07-01)
    With the rise of cloud infrastructures, micro-services, frameworks, and reference architectures for every conceivable domain and quality attribute, someone might think that architectural knowledge is hardly needed anymore. ...

  • Uplift Modeling Using Artificial Immune System 

    Zaamari, Masih؛ Bateni, Mehdi (University of Isfahan & Iranian Society of Cryptology, 2023-07-01)
    Uplift Modeling aims to detect subgroups in a population with a specific response or reaction to an action taken on the targeted group. In these models, the Treatment set contains objects that have been exposed to some ...

  • A Generalized Spread Spectrum-Based Audio Watermarking Method with Adaptive Synchronization 

    Abdolrazzagh-Nezhad, Majid؛ Kabirirad, Saeideh؛ Ghaderi, Mahnaz (University of Isfahan & Iranian Society of Cryptology, 2023-07-01)
    In this paper, a new audio watermarking scheme is proposed that addresses the synchronization problem using an adaptive filter. To spread the watermark energy across the spectrum of the host audio signal, the scheme uses ...

  • TFDF, not TF-IDF in Financial Analysis 

    Haseme, Maxam؛ rezaei, mehran؛ Kaedi, Marjan (University of Isfahan & Iranian Society of Cryptology, 2023-07-01)
    Textual analysis in the realm of business depends on text-processing techniques borrowed mainly from information retrieval. Yet, these text-processing techniques are not viable in text-based financial forecasting. In this ...

  • New Attribute Relation-Based Access Control System via Hybrid Logic 

    Nazerian, Fatemeh؛ Motameni, Homayun (University of Isfahan & Iranian Society of Cryptology, 2023-07-01)
    In recent years, Online Social Network (OSN) has been rapidly evolving and attracted many users. In OSN, users share sensitive information; therefore, effective access control models are needed to protect information from ...

  • Vol. 10, No. 1, 2023‎ 

    پدیدآور نامشخص (University of Isfahan & Iranian Society of Cryptology, 2023-01-01)

  • A New PageRank-Based Method for Influence Maximization in Signed Social Networks 

    Hosseini-Pozveh, Maryam؛ Lotfi Shahreza, Maryam (University of Isfahan & Iranian Society of Cryptology, 2023-01-01)
    Influence maximization is one of the most important topics in the social network analysis field. As all the social networks can be considered signed, explicitly or implicitly, assessing influence maximization in these ...

  • Distributed Rule Anomaly Detection in SDN-based IoT: Towards a Comprehensive Approach 

    Kiani, Rasool؛ Bohlooli, Ali (University of Isfahan & Iranian Society of Cryptology, 2023-01-01)
    The rapid increase in the number of equipment connected to different networks in the world has led to the development of diverse and new applications in the Internet of Things, which often use the current network infrastructure. ...

  • Development of a CGAN-Based Method for Aspect Level Text Generation: Encouragement and Punishment Factors in the Aspect Knowledge 

    Shams, Mohammadreza؛ Lotfi Shahreza, Maryam؛ Soltani, Amir Masoud (University of Isfahan & Iranian Society of Cryptology, 2023-01-01)
    Text mining systems may benefit from the use of automated text generation, especially when dealing with limited datasets and linguistic resources. Most successful text generation approaches are generic rather than ...

  • Summarization Algorithm for Data Stream to Speed up Outlier Data Detection 

    Mollashahi, Hadid؛ Saadatfar, Hamid؛ Vahdatnejad, Hamed (University of Isfahan & Iranian Society of Cryptology, 2023-01-01)
    Outlier detection in data streams is an essential issue in data processing. Today, due to the massive growth of streaming data generated by the spread of the Internet of Things, outlier detection has become a significant ...

  • Gamifault: A Gamified Motivational Framework for Software Debugging Process 

    Mousavi Esfahani, Shahrzad Sadat؛ Vahidi-Asl, Mojtaba؛ Khalilian, Alireza؛ Alikhani, Parastoo؛ Abhari, Bardia (University of Isfahan & Iranian Society of Cryptology, 2023-01-01)
    The released software systems still involve some faults, for which debugging becomes necessary. On the one hand, manual software debugging remains an arduous, time-consuming, and expensive task. On the other hand, effective ...

  • RSAM: A Questionnaire for Ransomware Security Awareness Measurement 

    Noorbehbahani, Fakhroddin؛ Taghiyar, Anahita؛ Rezvani, Azadeh (University of Isfahan & Iranian Society of Cryptology, 2023-01-01)
    Today ransomware is a significant security threat to both organizations and humans in the e-commerce and digital era. Poor human security awareness is a critical vulnerability that increases the risk of ransomware attacks. ...

  • Design of Optimal Progressive BKZ with Increasing Success-Probabilities and Increasing Block-Sizes 

    Moghissi, Gholam Reza؛ Payandeh, Ali (University of Isfahan & Iranian Society of Cryptology, 2022-07-01)
    Former studies on progressive-BKZ almost focus on increasing block sizes. Our work in IJCNIS 9.9, 2018, introduces a new version of progressive-BKZ based on increasing success probabilities, while its results are not ...

  • Indoor Localization Performance Optimization Using Modified kd-Tree Algorithm 

    Ghaffarian, Hossein؛ Soleimani, Seyfollah؛ Zadsar, Seyedeh Habibe (University of Isfahan & Iranian Society of Cryptology, 2022-07-01)
    In this paper, we present a new method for improving the efficiency of indoor localization algorithms, in terms of running time and error rate, using the KD-tree data structure. One of the main challenges of indoor ...

  • Decentralized App Store and License Management Using Smart Contracts and Self-Sovereign Identities 

    Dorri Nogoorani, Sadegh (University of Isfahan & Iranian Society of Cryptology, 2022-07-01)
    Mobile applications are playing an important role in our digital lives. App stores can be considered key components in the ecosystem of mobile applications. They assist users to ensure the authenticity of applications and ...

  • New Influence-Aware Centrality Measures for Influence Maximization in Social Networks 

    Hosseini-Pozveh, Maryam (University of Isfahan & Iranian Society of Cryptology, 2022-07-01)
    Influence maximization in social networks is defined as determining a subset of seed nodes where triggering the influence diffusion through the social network leads to the maximum number of final influenced nodes. The ...

  • Using Data Mining to Investigate the Effect of Cognitive Style on Programming Habits 

    Karimi, Zahra؛ Noorani, S.Fatemeh (University of Isfahan & Iranian Society of Cryptology, 2022-07-01)
    Different programmers code in different ways. Knowing these habits and the human factors that affect them significantly impacts teaching and task assignments in programming. This article examines the effect of cognitive ...

  • Illegal Miner Detection based on Pattern Mining: A Practical Approach 

    Amiri, Maryam؛ Askari, Hesam (University of Isfahan & Iranian Society of Cryptology, 2022-07-01)
    Since the most critical constituent of the cost of cryptocurrency production is energy bills, the use of illegal electricity in cryptocurrency mining farms is very common. Illegal mining farms have popped up throughout ...

View more