Computer Networks and Distributed Systems
A Review of Fraud Detection Algorithms for Electronic Payment Card Transactions

Touraj BaniRostam; Hamid BaniRostam; Mir Mohsen Pedram; Amir Masoud Rahamni

Volume 7, Issue 3 , August 2021, , Pages 157-166

Abstract
  Abstract—Several studies have been presented to solve challenges of electronic card (e-card) fraud that the two main purposes of these studies are to identify types of e-card fraud and to investigate the methods used in bank fraud detection. To achieve this purpose, one of the most common methods ...  Read More

Computer Networks and Distributed Systems
A Review of Anonymity Algorithms in Big Data

Elham shamsinejad; Mir Mohsen Pedram; Amir Masoud Rahamni; Touraj BaniRostam

Volume 7, Issue 3 , August 2021, , Pages 187-196

Abstract
  By increasing access to high amounts of data through internet-based technologies such as social networks and mobile phones and electronic devices, many companies have considered the issues of accessing large, random and fast data along with maintaining data confidentiality. Therefore, confidentiality ...  Read More

Computer Networks and Distributed Systems
Improving the security of wireless sensor networks using Game Theory

Behzad Seif; mohammad goodarzi

Volume 7, Issue 2 , May 2021, , Pages 93-102

Abstract
  Today, the use of wireless sensor networks has become very popular in many applications. Due to the connection in wireless sensor networks, it is done wirelessly, so they are naturally insecure and prone to various types of attacks. In the past, various solutions were offered in this regard, each of ...  Read More

Computer Networks and Distributed Systems
Development of Blockchain Technology

behnam Kiani Kalejahi; Jala Guluzade; shabnam maharramli

Volume 6, Issue 4 , November 2020, , Pages 265-272

Abstract
  AbstractBlockchain technology is the first successful Bitcoin Network. It enables the ledger to become more decentralized and secure. Since it is not limited to bitcoin and controlled by third parties by government, corporations, or banks, the technology is capturing several industries, including cryptocurrency, ...  Read More

Computer Networks and Distributed Systems
Detecting Bot Networks Based On HTTP And TLS Traffic Analysis

Zahra Nafarieh

Volume 6, Issue 2 , May 2020, , Pages 61-70

Abstract
  Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer ...  Read More

Computer Networks and Distributed Systems
Detecting Active Bot Networks Based on DNS Traffic Analysis

Zahra Nafarieh; Ebrahim Mahdipur; Haj Hamid Haj Seyed Javadi

Volume 5, Issue 3 , August 2019, , Pages 129-142

Abstract
  Abstract—One of the serious threats to cyberspace is the Bot networks or Botnets. Bots are malicious software that acts as a network and allows hackers to remotely manage and control infected computer victims. Given the fact that DNS is one of the most common protocols in the network and is essential ...  Read More

Computer Networks and Distributed Systems
IMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks

Swathi B H; Megha V; Gururaj H L; Hamsaveni M; Janhavi V

Volume 4, Issue 2 , May 2018, , Pages 87-100

Abstract
  Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication ...  Read More

Computer Networks and Distributed Systems
The Idea Of Using The Steganography As Encryption Tool

Ali Shlig; Amer Saleem Elameer

Volume 4, Issue 1 , February 2018, , Pages 42-50

Abstract
  the increasing use of computers and the widespread use of networks, Social networking and use applications through the use of the Internet to make the spread images, which make it easy to be penetrated from the attacker and from everyone who try to change the information. So, the need arises to transmit ...  Read More

Computer Networks and Distributed Systems
HF-Blocker: Detection of Distributed Denial of Service Attacks Based On Botnets

Bita Amirshahi; Ali Ahangari

Volume 1, Issue 3 , August 2015, , Pages 39-45

Abstract
  Abstract—Today, botnets have become a serious threat to enterprise networks. By creation of network of bots, they launch several attacks, distributed denial of service attacks (DDoS) on networks is a sample of such attacks. Such attacks with the occupation of system resources, have proven to be ...  Read More