| 115 | -- | 130 | Hajar Dastanpour, Ali Fanian. A Graph-based Online Feature Selection to Improve Detection of New Attacks |
| 131 | -- | 145 | Mojtaba Hemmati, Mohammad Ali Hadavi. Bypassing Web Application Firewalls Using Deep Reinforcement Learning |
| 147 | -- | 156 | Faeze Rasouli, Mohammad Taheri. Perfect Recovery of Small Tampers Using a Novel Fragile Watermarking Technique Based on Distributed Hamming Code |
| 157 | -- | 165 | Hamid Amiryousefi, Zahra Ahmadian. Revisiting the Security and Efficiency of SP2DAS, 3PDA, and EPPA Smart Grid Security Protocols |
| 167 | -- | 179 | Vajiheh Sabeti, Mahsa Amerehei. Secure and Imperceptible Image Steganography in Discrete Wavelet Transform Using the XOR Logical Function and Genetic Algorithm |
| 181 | -- | 192 | Farnoush Manavi, Ali Hamzeh. Ransomware Detection Based on PE Header Using Convolutional Neural Networks |
| 193 | -- | 213 | Parvin Rastegari. Attacks to Some Recently Proposed CL-SC Schemes and Presenting a Secure Scheme with KSSTIS |
| 215 | -- | 227 | Zeinab Salami, Mahmoud Ahmadian-Attari, Mohammad Reza Aref, Hoda Jannati. Location Privacy Preservation for Secondary Users in a Database-Driven Cognitive Radio Network |