| 93 | -- | 94 | Mohammad Reza Aref. Editorial |
| 95 | -- | 111 | Seyed Alireza Hasheminasab, Behrouz Tork Ladani, Tansu Alpcan. Interdependent Security Game Design over Constrained Linear Influence Networks |
| 113 | -- | 128 | Majid Bayat, Zahra Zare Jousheghani, Ashok Kumar Das, Pitam Singh, Saru Kumari, Mohammad Reza Aref. A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications |
| 129 | -- | 143 | S. Ehsan Hosiny Nezhad, Masoumeh Safkhani, Nasour Bagheri. Relaxed Differential Fault Analysis of SHA-3 |
| 145 | -- | 158 | Siavash Ahmadi, Mohammad Reza Aref. New Fixed Point Attacks on GOST2 Block Cipher |
| 159 | -- | 171 | Elham Serkani, Hossein Gharaee Garakani, Naser MohammadZadeh. Anomaly Detection Using SVM as Classifier and Decision Tree for Optimizing Feature Vectors |
| 173 | -- | 183 | Mohammadreza Mohammadrezaei, Mohammad Ebrahim Shiri, Amir Masoud Rahmani. Detection of Fake Accounts in Social Networks Based on One Class Classification |
| 185 | -- | 190 | . Persian Abstract |