List Of Volumes: 11 Volume(s) Year 2020 Year 2019 Year 2018 Year 2017 Volume 8, Number 3 Volume 8, Number 2 Volume 7, Number 4 Volume 8, Number 1 Year 2016 Year 2015 Year 2014 Year 2013 Year 2012 Year 2011 Year 2010
List Of Journal Paper(s): QUARTERLY (JOURNAL OF ADVANCED DEFENCE SCIENCE AND TECHNOLOGY) JOURNAL OF PASSIVE DEFENCE SCIENCE AND TECHNOLOGY:FALL 2017, Volume 8, Number 3 10 Paper(s) 1 : EXTENDING THE SWITCHING MECHANISM FOR 256 BIT BLOCK CIPHERS DESIGNING Author(s): MIRGHADRI A.*,YOSEFIPOUR M.,KHADEM B. Page(s): From 181 To 189 Keyword(s): DIFFUSION LAYERS, LINEAR CRYPTANALYSIS, DIFFERENTIAL CRYPTANALYSIS, IMPOSSIBLE DIFFERENTIAL CRYPTANALYSIS, SWITCHING MECHANISM Reference(s): (0) Citation(s): (0) 2 : A NEW LIGHT WEIGHT INTRUSION DETECTION ALGORITHM FOR COMPUTER NETWORKS Author(s): NAJAFI M.,RAFEH R.* Page(s): From 191 To 200 Keyword(s): FEATURE SELECTION, ANOMALY DETECTION, GENETIC ALGORITHM, INTRUSION DETECTION SYSTEM Reference(s): (0) Citation(s): (0) 3 : EVALUATION OF NONLINEAR RESPONSE OF REINFORCED CONCRETE FRAMES DESIGNED ACCORDING TO EARTHQUAKE CODES AND SUBJECTED TO BLAST LOADING Author(s): LEZGI M.,IZADIFARD R.A.*,LASHGARI M.R. Page(s): From 201 To 212 Keyword(s): SPECIAL MOMENT FRAME, LOW, MID AND HIGH-RISE STRUCTURES, BLAST LOADING, NONLINEAR DYNAMIC ANALYSIS Reference(s): (0) Citation(s): (0) 4 : SECURITY LEVEL DETERMINATION OF COVER IMAGE IN STEGANOGRAPHY BASED ON THE FUZZY LOGIC Author(s): ESFAHANI R.*,NOROZI Z. Page(s): From 213 To 221 Keyword(s): CO-OCCURRENCE MATRIX, FUZZY LOGIC, HARRIS THRESHOLD, IMAGE SECURITY LEVEL, COVER OF STEGANOGRAPHY Reference(s): (0) Citation(s): (0) 5 : NUMERICAL SIMULATION AND ANALYSIS OF CHEVRON TYPE HEAT EXCHANGERS FOR THERMAL CAMOUFLAGE OF BURIED STRUCTURES Author(s): RADMARD H.*,SHARIFI A.,SALARI M. Page(s): From 223 To 233 Keyword(s): THERMAL CAMOUFLAGE, BURIED SAFE STRUCTURES, CHEVRON TYPE HEAT EXCHANGER Reference(s): (0) Citation(s): (0) 6 : PRESENTING A NEW PHOTOGRAPHIC CAPTCHA USING MORPHOLOGY Author(s): SABETEGHLIDI A.,LATIF A.*,ESMAEILIZAINI A. Page(s): From 235 To 241 Keyword(s): SECURITY, MALICIOUS PROGRAMS, IMAGE RECOGNITION, CAPTCHA, MORPHOLOGY Reference(s): (0) Citation(s): (0) 7 : UNDERFREQUENCY LOAD SHEDDING BASED ON WIDE AREA MONITORING SYSTEM Author(s): HAJIAKBARI M.*,KHANZADEH M.H. Page(s): From 243 To 250 Keyword(s): UNDERFREQUENCY LOAD SHEDDING, FREQUENCY STABILITY, WIDE AREA MONITORING SYSTEM Reference(s): (0) Citation(s): (0) 8 : REAL-TIME INTRUSION DETECTION SYSTEM USING A COMBINATION OF DISCRETIZATION AND FEATURE SELECTION Author(s): TAHERI R.,PARSAEI M.R.*,JAVIDAN R. Page(s): From 251 To 263 Keyword(s): REAL-TIME INTRUSION DETECTION, DISCRETIZATION, FEATURE SELECTION, DECISION TREE, DATA MINING, SVM Reference(s): (0) Citation(s): (0) 9 : EXTRACTION OF POINT TARGET MODEL OF DISTRIBUTED TARGETS USING SAR IMAGES Author(s): FALLAHPOUR M.B.,DEHGHANI H.,RASHIDI A.J.*,SHEIKHI A. Page(s): From 265 To 274 Keyword(s): SAR, POINT TARGET MODEL, DISTRIBUTED TARGET, SCATTERING FIELD, PASSIVE DEFENCE Reference(s): (0) Citation(s): (0) 10 : RDA ALGORITHM IN SAR WITH OFDM WAVEFORM Author(s): ZEIGHAMI M.*,BASTANI M.H.,BEHNIA F. Page(s): From 275 To 284 Keyword(s): SAR, OFDM, RDA ALGORITHM Reference(s): (0) Citation(s): (0)