- 2024
- Meharaj Begum A, Michael Arock:
Modified Parse-Tree Based Pattern Extraction Approach for Detecting SQLIA Using Neural Network Model. ISC Int. J. Inf. Secur. 16(1): 1-16 (2024) - Morteza Amirmohseni, Sadegh Dorri Nogoorani:
Safety Guards for Ethereum Smart Contracts. ISC Int. J. Inf. Secur. 16(1): 37-53 (2024) - Maryam Rajabzadeh Asaar, Mustafa Isam Ahmed Al-Baghdadi:
Security Enhancement of an Authentication Scheme Based on DAC and Intel SGX in WSNs. ISC Int. J. Inf. Secur. 16(2): 149-163 (2024) - Mostafa Chegenizadeh, Mohammad Ali, Javad Mohajeri, Mohammad Reza Aref:
HUAP: Practical Attribute-Based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices. ISC Int. J. Inf. Secur. 16(1): 93-114 (2024) - Nilakshi Gogoi, Dhruba K. Bhattacharyya, Debojit Boro:
Shrew DDoS Attack Detection Based on Statistical Analysis. ISC Int. J. Inf. Secur. 16(2): 205-220 (2024) - Mehmet Emin Gönen, Muhammed Said Gündogan, Kamil Otal:
Boomerang Attacks on Reduced-Round Midori64. ISC Int. J. Inf. Secur. 16(2): 191-203 (2024) - Mohammad Ali Jamshidi, Mohammad Mahdi Mojahedian, Mohammad Reza Aref:
Customizable Utility-Privacy Trade-Off: A Flexible Autoencoder-Based Obfuscator. ISC Int. J. Inf. Secur. 16(2): 137-147 (2024) - Shadab Kalhoro, Farhan Bashir Shaikh, Anam Kalhoro, Junaid Ur Rehman Abbasi, Ramesh Kumar Ayyasamy:
An Overview of Security Attacks in 5G Enabled Technologies: Applications and Use Case Scenarios. ISC Int. J. Inf. Secur. 16(1): 17-35 (2024) - Kostyantyn Anatolievich Malyshenko, Majid Mohammad Shafiee, Vadim Anatolievich Malyshenko:
Identification of Fake News Using Emotional Profiling as an Approach to Text Analysis. ISC Int. J. Inf. Secur. 16(2): 165-190 (2024) - Fatemeh Pirmoradian, Mohammad Dakhilalian, Masoumeh Safkhani:
ECKCI: An ECC-Based Authenticated Key Agreement Scheme Resistant to Key Compromise Impersonation Attack for TMIS. ISC Int. J. Inf. Secur. 16(2): 115-136 (2024) - Kangkan Talukdar, Debojit Boro:
Slowloris Attack Detection Using Adaptive Timeout-Based Approach. ISC Int. J. Inf. Secur. 16(1): 79-92 (2024) - Mehmet Ali Yalçinkaya, Ecir Ugur Küçüksille:
Artificial Intelligence and Dynamic Analysis-Based Web Application Vulnerability Scanner. ISC Int. J. Inf. Secur. 16(1): 55-77 (2024) - 2023
- Sina Abdollahi, Javad Mohajeri, Mahmoud Salmasizadeh:
Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT. ISC Int. J. Inf. Secur. 15(1): 97-110 (2023) - Hadi Aghaee, Bahareh Akhbari:
Quantum Multiple Access Wiretap Channel: On the One-Shot Achievable Secrecy Rate Regions. ISC Int. J. Inf. Secur. 15(3) (2023) - Farhad Taheri Ardakani, Siavash Bayat Sarmadi:
MISC: Multi-Input Secure Two-Party Computation. ISC Int. J. Inf. Secur. 15(2) (2023) - Maryam Azadmanesh, Behrouz Shahgholi Ghahfarokhi, Maede Ashouri-Talouki:
An Auto-Encoder based Membership Inference Attack against Generative Adversarial Network. ISC Int. J. Inf. Secur. 15(2) (2023) - Parichehr Dadkhah, Mohammad Dakhilalian, Parvin Rastegari:
Security Analysis and Improvement of an Access Control Scheme for Wireless Body Area Networks. ISC Int. J. Inf. Secur. 15(3) (2023) - Hayyan Hasan, Hasan Deeb, Behrouz Tork Ladani:
A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware. ISC Int. J. Inf. Secur. 15(1): 59-71 (2023) - Maryam Rezaei Kashi, Mojtaba Bahramian:
Oblivious Transfer Using Generalized Jacobian of Elliptic Curves. ISC Int. J. Inf. Secur. 15(2) (2023) - Ali Khosravi, Taraneh Eghlidos:
Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon's Algorithm. ISC Int. J. Inf. Secur. 15(1): 83-95 (2023) - Mohammad Ebrahim Ebrahimi Kiasari, Nasrollah Pakniat, Abdolrasoul Mirghadri, Mojtaba Nazari:
A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem. ISC Int. J. Inf. Secur. 15(1): 125-135 (2023) - Mansoureh Labbafniya, Hamed Yusefi, Akram Khalesi:
Reverse Engineering of Authentication Protocol in DesFire. ISC Int. J. Inf. Secur. 15(2) (2023) - Hamid Mala, Mohammad Reza Saeidi:
Secure Outsourcing of Two Standard Identity-Based Cryptosystems. ISC Int. J. Inf. Secur. 15(2) (2023) - Suryateja S. Pericherla:
Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art. ISC Int. J. Inf. Secur. 15(1): 1-58 (2023) - Ali Ahmadian Ramaki, Abbas Ghaemi Bafghi, Abbas Rasoolzadegan:
Towards Event Aggregation for Reducing the Volume of Logged Events During IKC Stages of APT Attacks. ISC Int. J. Inf. Secur. 15(2) (2023) - Bahram Rashidi:
Lightweight Cryptographic S-Boxes Based on Efficient Hardware Structures for Block Ciphers. ISC Int. J. Inf. Secur. 15(1): 137-151 (2023) - Faeze Rasouli, Mohammad Taheri, Reza Rohani Sarvestani:
A Fragile Watermarking by Hamming Code on Distributed Pixels with Perfect Recovery for Small Tampers. ISC Int. J. Inf. Secur. 15(2) (2023) - Mahdi Sajadieh, Arash Mirzaei:
4n × 4n Diffusion Layers Based on Multiple 4 × 4 MDS Matrices. ISC Int. J. Inf. Secur. 15(1): 111-124 (2023) - Amirhosein Salehi, Siavash Ahmadi, Mohammad Reza Aref:
A Semi-Supervised IDS for Cyber-Physical Systems Using a Deep Learning Approach. ISC Int. J. Inf. Secur. 15(3) (2023) - Danial Shiraly, Nasrollah Pakniat, Ziba Eslami:
Designated-Server Hierarchical Searchable Encryption in Identity-Based Setting. ISC Int. J. Inf. Secur. 15(3): 1-16 (2023)