| 1 | -- | 12 | Zahra Eskandari, Abbas Ghaemi Bafghi. Extension of Cube Attack with Probabilistic Equations and its Application on Cryptanalysis of KATAN Cipher |
| 13 | -- | 23 | Majid M. Niknam, Sadegh Sadeghi, Mohammad Reza Aref, Nasour Bagheri. Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants |
| 24 | -- | 44 | Vajiheh Sabeti, Minoo Shoaei. New High Secure Network Steganography Method Based on Packet Length |
| 35 | -- | 43 | Reza Mortazavi. Improved Univariate Microaggregation for Integer Values |
| 44 | -- | 54 | Shahriar Mohammadi, Amin Namadchian. Anomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism |
| 55 | -- | 66 | Bashir Naderi, Hossein Kheiri, Vajiheh Vafaei. Modified Sliding-Mode Control Method for Synchronization a Class of Chaotic Fractional-Order Systems with Application in Encryption |