Login / Signup
ISC Int. J. Inf. Secur.
2009
2013
2019
2024
2009
2024
Keyphrases
Publications
volume 16, number 1, 2024
Meharaj Begum A
,
Michael Arock
Modified Parse-Tree Based Pattern Extraction Approach for Detecting SQLIA Using Neural Network Model.
ISC Int. J. Inf. Secur.
16 (1) (2024)
Morteza Amirmohseni
,
Sadegh Dorri Nogoorani
Safety Guards for Ethereum Smart Contracts.
ISC Int. J. Inf. Secur.
16 (1) (2024)
Mostafa Chegenizadeh
,
Mohammad Ali
,
Javad Mohajeri
,
Mohammad Reza Aref
HUAP: Practical Attribute-Based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices.
ISC Int. J. Inf. Secur.
16 (1) (2024)
Shadab Kalhoro
,
Farhan Bashir Shaikh
,
Anam Kalhoro
,
Junaid Ur Rehman Abbasi
,
Ramesh Kumar Ayyasamy
An Overview of Security Attacks in 5G Enabled Technologies: Applications and Use Case Scenarios.
ISC Int. J. Inf. Secur.
16 (1) (2024)
Kangkan Talukdar
,
Debojit Boro
Slowloris Attack Detection Using Adaptive Timeout-Based Approach.
ISC Int. J. Inf. Secur.
16 (1) (2024)
Mehmet Ali Yalçinkaya
,
Ecir Ugur Küçüksille
Artificial Intelligence and Dynamic Analysis-Based Web Application Vulnerability Scanner.
ISC Int. J. Inf. Secur.
16 (1) (2024)
volume 16, number 2, 2024
Kostyantyn Anatolievich Malyshenko
,
Majid Mohammad Shafiee
,
Vadim Anatolievich Malyshenko
Identification of Fake News Using Emotional Profiling as an Approach to Text Analysis.
ISC Int. J. Inf. Secur.
16 (2) (2024)
Nilakshi Gogoi
,
Dhruba K. Bhattacharyya
,
Debojit Boro
Shrew DDoS Attack Detection Based on Statistical Analysis.
ISC Int. J. Inf. Secur.
16 (2) (2024)
Fatemeh Pirmoradian
,
Mohammad Dakhilalian
,
Masoumeh Safkhani
ECKCI: An ECC-Based Authenticated Key Agreement Scheme Resistant to Key Compromise Impersonation Attack for TMIS.
ISC Int. J. Inf. Secur.
16 (2) (2024)
Maryam Rajabzadeh Asaar
,
Mustafa Isam Ahmed Al-Baghdadi
Security Enhancement of an Authentication Scheme Based on DAC and Intel SGX in WSNs.
ISC Int. J. Inf. Secur.
16 (2) (2024)
Mohammad Ali Jamshidi
,
Mohammad Mahdi Mojahedian
,
Mohammad Reza Aref
Customizable Utility-Privacy Trade-Off: A Flexible Autoencoder-Based Obfuscator.
ISC Int. J. Inf. Secur.
16 (2) (2024)
Mehmet Emin Gönen
,
Muhammed Said Gündogan
,
Kamil Otal
Boomerang Attacks on Reduced-Round Midori64.
ISC Int. J. Inf. Secur.
16 (2) (2024)
volume 15, number 1, 2023
Bahram Rashidi
Lightweight Cryptographic S-Boxes Based on Efficient Hardware Structures for Block Ciphers.
ISC Int. J. Inf. Secur.
15 (1) (2023)
Ali Khosravi
,
Taraneh Eghlidos
Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon's Algorithm.
ISC Int. J. Inf. Secur.
15 (1) (2023)
Mohammad Ebrahim Ebrahimi Kiasari
,
Nasrollah Pakniat
,
Abdolrasoul Mirghadri
,
Mojtaba Nazari
A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem.
ISC Int. J. Inf. Secur.
15 (1) (2023)
Sina Abdollahi
,
Javad Mohajeri
,
Mahmoud Salmasizadeh
Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT.
ISC Int. J. Inf. Secur.
15 (1) (2023)
Hayyan Hasan
,
Hasan Deeb
,
Behrouz Tork Ladani
A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware.
ISC Int. J. Inf. Secur.
15 (1) (2023)
Mahdi Sajadieh
,
Arash Mirzaei
4n × 4n Diffusion Layers Based on Multiple 4 × 4 MDS Matrices.
ISC Int. J. Inf. Secur.
15 (1) (2023)
Omid Torki
,
Maede Ashouri-Talouki
,
Mojtaba Mahdavi
Hierarchical Deterministic Wallets for Secure Steganography in Blockchain.
ISC Int. J. Inf. Secur.
15 (1) (2023)
Suryateja S. Pericherla
Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art.
ISC Int. J. Inf. Secur.
15 (1) (2023)
volume 15, number 2, 2023
Habib Allah Yajam
,
Mohammad Ali Akhaee
Analysis of IOTA Tangle Stability in High Transaction Rates.
ISC Int. J. Inf. Secur.
15 (2) (2023)
Mansoureh Labbafniya
,
Hamed Yusefi
,
Akram Khalesi
Reverse Engineering of Authentication Protocol in DesFire.
ISC Int. J. Inf. Secur.
15 (2) (2023)
Hamid Mala
,
Mohammad Reza Saeidi
Secure Outsourcing of Two Standard Identity-Based Cryptosystems.
ISC Int. J. Inf. Secur.
15 (2) (2023)
Farhad Taheri Ardakani
,
Siavash Bayat Sarmadi
MISC: Multi-Input Secure Two-Party Computation.
ISC Int. J. Inf. Secur.
15 (2) (2023)
Maryam Rezaei Kashi
,
Mojtaba Bahramian
Oblivious Transfer Using Generalized Jacobian of Elliptic Curves.
ISC Int. J. Inf. Secur.
15 (2) (2023)
Maryam Azadmanesh
,
Behrouz Shahgholi Ghahfarokhi
,
Maede Ashouri-Talouki
An Auto-Encoder based Membership Inference Attack against Generative Adversarial Network.
ISC Int. J. Inf. Secur.
15 (2) (2023)
Ali Ahmadian Ramaki
,
Abbas Ghaemi Bafghi
,
Abbas Rasoolzadegan
Towards Event Aggregation for Reducing the Volume of Logged Events During IKC Stages of APT Attacks.
ISC Int. J. Inf. Secur.
15 (2) (2023)
Faeze Rasouli
,
Mohammad Taheri
,
Reza Rohani Sarvestani
A Fragile Watermarking by Hamming Code on Distributed Pixels with Perfect Recovery for Small Tampers.
ISC Int. J. Inf. Secur.
15 (2) (2023)
volume 15, number 3, 2023
Hadi Aghaee
,
Bahareh Akhbari
Quantum Multiple Access Wiretap Channel: On the One-Shot Achievable Secrecy Rate Regions.
ISC Int. J. Inf. Secur.
15 (3) (2023)
Danial Shiraly
,
Nasrollah Pakniat
,
Ziba Eslami
Designated-Server Hierarchical Searchable Encryption in Identity-Based Setting.
ISC Int. J. Inf. Secur.
15 (3) (2023)
Amirhosein Salehi
,
Siavash Ahmadi
,
Mohammad Reza Aref
A Semi-Supervised IDS for Cyber-Physical Systems Using a Deep Learning Approach.
ISC Int. J. Inf. Secur.
15 (3) (2023)
Parichehr Dadkhah
,
Mohammad Dakhilalian
,
Parvin Rastegari
Security Analysis and Improvement of an Access Control Scheme for Wireless Body Area Networks.
ISC Int. J. Inf. Secur.
15 (3) (2023)
volume 14, number 2, 2022
Parvin Rastegari
Attacks to Some Recently Proposed CL-SC Schemes and Presenting a Secure Scheme with KSSTIS.
ISC Int. J. Inf. Secur.
14 (2) (2022)
Faeze Rasouli
,
Mohammad Taheri
Perfect Recovery of Small Tampers Using a Novel Fragile Watermarking Technique Based on Distributed Hamming Code.
ISC Int. J. Inf. Secur.
14 (2) (2022)
Zeinab Salami
,
Mahmoud Ahmadian-Attari
,
Mohammad Reza Aref
,
Hoda Jannati
Location Privacy Preservation for Secondary Users in a Database-Driven Cognitive Radio Network.
ISC Int. J. Inf. Secur.
14 (2) (2022)
Farnoush Manavi
,
Ali Hamzeh
Ransomware Detection Based on PE Header Using Convolutional Neural Networks.
ISC Int. J. Inf. Secur.
14 (2) (2022)
volume 14, number 3, 2022
Fatemeh Deldar
,
Mahdi Abadi
,
Mohammad Ebrahimifard
Android Malware Detection Using One-Class Graph Neural Networks.
ISC Int. J. Inf. Secur.
14 (3) (2022)
Muhamadali Hajisoltani
,
Raziyeh Salarifard
,
Hadi Soleimany
Secure and Low-Area Implementation of the AES Using FPGA.
ISC Int. J. Inf. Secur.
14 (3) (2022)
Seyed Salar Ghazi
,
Haleh Amintoosi
,
Sahar Pilevar Moakhar
On the Suitability of Improved TrustChain for Smartphones.
ISC Int. J. Inf. Secur.
14 (3) (2022)
Mohammad Ali
Attribute-Based Remote Data Auditing and User Authentication for Cloud Storage Systems.
ISC Int. J. Inf. Secur.
14 (3) (2022)
Afshin Karampour
,
Maede Ashouri-Talouki
,
Behrouz Tork Ladani
Light-Weight Privacy-Preserving Data Aggregation Protocols in Smart Grid Metering Networks.
ISC Int. J. Inf. Secur.
14 (3) (2022)
Hadi Aghaee
,
Bahareh Akhbari
One-Shot Achievable Secrecy Rate Regions for Quantum Interference Wiretap Channel.
ISC Int. J. Inf. Secur.
14 (3) (2022)
Amirhosein Sayyadabdi
,
Behrouz Tork Ladani
,
Bahman Zamani
Towards a Formal Approach for Detection of Vulnerabilities in the Android Permissions System.
ISC Int. J. Inf. Secur.
14 (3) (2022)
Amir Ashtari
,
Ahmad Shabani
,
Bijan Alizadeh
Mutual Lightweight PUF-Based Authentication Scheme Using Random Key Management Mechanism for Resource-Constrained IoT Devices.
ISC Int. J. Inf. Secur.
14 (3) (2022)
Navid Vafaei
,
Maryam Porkar
,
Hamed Ramzanipour
,
Nasour Bagheri
Practical Differential Fault Analysis on SKINNY.
ISC Int. J. Inf. Secur.
14 (3) (2022)
Sepehr Damavandi
,
Sadegh Dorri Nogoorani
An Electronic Voting Scheme Based on Blockchain Technology and Zero-Knowledge Proofs.
ISC Int. J. Inf. Secur.
14 (3) (2022)
Maryam Saeedi Sadr
,
Mohammad Ali Hadavi
SecureKV: Secure Searchable Outsourcing of Key-Value Databases to the Public Cloud.
ISC Int. J. Inf. Secur.
14 (3) (2022)
Sajjad Palanki
,
Alireza Shafieinejad
Attribute-Based Encryption with Efficient Attribute Revocation, Decryption Outsourcing, and Multi-Keyword Searching in Cloud Storage.
ISC Int. J. Inf. Secur.
14 (3) (2022)
Somayeh Mozafari
,
Amir Jalaly Bidgoly
Lightweight Identification of Android Malware with Knowledge Distillation and Deep Learning Approach.
ISC Int. J. Inf. Secur.
14 (3) (2022)
Hamed Ramzanipour
,
Navid Vafaei
,
Nasour Bagheri
Practical Differential Fault Analysis on CRAFT, a Lightweight Block Cipher.
ISC Int. J. Inf. Secur.
14 (3) (2022)