default search action
ISC International Journal of Information Security, Volume 13
Volume 13, Number 1, January 2021
- K. Nalini Sujantha Bel, I. Shatheesh Sam:
OT-Feature Extraction on Scrambled Images with Instantaneous Clustering for CBIR Scheme in Cloud Computing. 1-17 - Vahid Meraji, Hadi Soleimany:
Evict+Time Attack on Intel CPUs without Explicit Knowledge of Address Offsets. 19-27 - Nastaran Shekofte, Siavash Bayat Sarmadi, Hatameh Mosanaei-Boorani:
A Trusted Design Platform for Trojan Detection in FPGA Bitstreams Using Partial Reconfiguration. 29-45 - Mansoureh Labbafniya, Shahram Etemadi Borujeni, Roghayeh Saeidi:
Hardware Trojan Prevention and Detection by Filling Unused Space Using Shift registers, Gate-chain and Extra Routing. 47-57 - Salome James, Thumbur Gowri, Punugu Vasudeva Reddy:
An Efficient Pairing-Free Identity Based Proxy Blind Signature Scheme with Message Recovery. 59-72 - Vahid Chegeni, Hamid Haj Seyyed Javadi, Mohammad Reza Moazami Goudarzi, Afshin Rezakhani:
Providing a Hybrid Cryptography Algorithm for Lightweight Authentication Protocol in RFID with Urban Traffic Usage Case. 73-85
Volume 13, Number 2, July 2021
- Aniseh Najafi, Majid Bayat, Hamid Haj Seyyed Javadi:
Privacy Preserving Attribute-Based Encryption with Conjunctive Keyword Search for E-health Records in Cloud. 87-100 - Mina Erfan, Saeed Jalili:
File Fragment Type Classification by Bag-Of-Visual-Words. 101-116 - Mohammad Ali Hadavi, Arash Bagherdaei, Simin Ghasemi:
IDOT: Black-Box Detection of Access Control Violations in Web Applications. 117-129 - Hayyan Hasan, Behrouz Tork Ladani, Bahman Zamani:
Curious-Monkey: Evolved Monkey for Triggering Malicious Payloads in Android Malware. 131-143 - Sorour Sheidani, Ziba Eslami:
Blind Multipurpose Image Watermarking with Perfect Security. 145-156 - Mansoureh Labafniya, Shahram Etemadi Borujeni:
An Obfuscation Method Based on CFGLUTs for Security of FPGAs. 157-162 - Milad Salimian, Ali Jahanian:
Intensive Analysis of Physical Parameters of Power Sensors for Remote Side-Channel Attacks. 163-176 - Gholam Reza Moghissi, Ali Payandeh:
Better Sampling Method of Enumeration Solution for BKZ-Simulation. 177-208
Volume 13, Number 3, November 2021
- Mona Alsalamah, Huda Alwabli, Hutaf Alqwifli, Dina M. Ibrahim:
A Review Study on SQL Injection Attacks, Prevention, and Detection. 1-10 - Hanan Aljoaey, Khawla Almutawa, Ruyuf Alabdali, Dina M. Ibrahim:
Broken Authentication and Session Management Vulnerabilities. 11-19 - Afnan Alotaibi, Lujain Alghufaili, Dina M. Ibrahim:
Cross Site Scripting Attack Review. 21-30 - Mohammad Ali A. Hammoudeh, Renad Ibrahim, Lama Alshraryan, Manar Alnomise, Ragad Alhumidan:
Secure Coding Guidelines - Python. 31-38 - Norah Alajlan, Meshael Alyahya, Noorah Alghasham, Dina M. Ibrahim:
Data Enhancement for Date Fruit Classification Using DCGAN. 39-48 - Wedad Alawad, Awatef Salem Balobaid:
Forensic-Enabled Security as a Service (FESaaS) - A Readiness Framework for Cloud Forensics. 49-57 - Mohammed S. Albulayhi, Dina M. Ibrahim:
Open Web Application Security Project Components with Known Vulnerabilities: A Comprehensive Study. 59-67 - Musbah Joma Aqel, Munsif Yousef Sokiyna:
Human Activity Recognition Based on Multi-Sensors in a Smart Home Using Deep Learning. 69-78
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.