Sign in
ISC Int. J. Inf. Secur.
2009
2014
2019
2024
2009
2024
Keyphrases
Publications
volume 16, number 1, 2024
Meharaj Begum A
,
Michael Arock
Modified Parse-Tree Based Pattern Extraction Approach for Detecting SQLIA Using Neural Network Model.
ISC Int. J. Inf. Secur.
16 (1) (2024)
Shadab Kalhoro
,
Farhan Bashir Shaikh
,
Anam Kalhoro
,
Junaid Ur Rehman Abbasi
,
Ramesh Kumar Ayyasamy
An Overview of Security Attacks in 5G Enabled Technologies: Applications and Use Case Scenarios.
ISC Int. J. Inf. Secur.
16 (1) (2024)
Morteza Amirmohseni
,
Sadegh Dorri Nogoorani
Safety Guards for Ethereum Smart Contracts.
ISC Int. J. Inf. Secur.
16 (1) (2024)
Kangkan Talukdar
,
Debojit Boro
Slowloris Attack Detection Using Adaptive Timeout-Based Approach.
ISC Int. J. Inf. Secur.
16 (1) (2024)
Mehmet Ali Yalçinkaya
,
Ecir Ugur Küçüksille
Artificial Intelligence and Dynamic Analysis-Based Web Application Vulnerability Scanner.
ISC Int. J. Inf. Secur.
16 (1) (2024)
Mostafa Chegenizadeh
,
Mohammad Ali
,
Javad Mohajeri
,
Mohammad Reza Aref
HUAP: Practical Attribute-Based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices.
ISC Int. J. Inf. Secur.
16 (1) (2024)
volume 15, number 1, 2023
Sina Abdollahi
,
Javad Mohajeri
,
Mahmoud Salmasizadeh
Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT.
ISC Int. J. Inf. Secur.
15 (1) (2023)
Bahram Rashidi
Lightweight Cryptographic S-Boxes Based on Efficient Hardware Structures for Block Ciphers.
ISC Int. J. Inf. Secur.
15 (1) (2023)
Ali Khosravi
,
Taraneh Eghlidos
Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon's Algorithm.
ISC Int. J. Inf. Secur.
15 (1) (2023)
Mohammad Ebrahim Ebrahimi Kiasari
,
Nasrollah Pakniat
,
Abdolrasoul Mirghadri
,
Mojtaba Nazari
A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem.
ISC Int. J. Inf. Secur.
15 (1) (2023)
Hayyan Hasan
,
Hasan Deeb
,
Behrouz Tork Ladani
A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware.
ISC Int. J. Inf. Secur.
15 (1) (2023)
Mahdi Sajadieh
,
Arash Mirzaei
4n × 4n Diffusion Layers Based on Multiple 4 × 4 MDS Matrices.
ISC Int. J. Inf. Secur.
15 (1) (2023)
Omid Torki
,
Maede Ashouri-Talouki
,
Mojtaba Mahdavi
Hierarchical Deterministic Wallets for Secure Steganography in Blockchain.
ISC Int. J. Inf. Secur.
15 (1) (2023)
Suryateja S. Pericherla
Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art.
ISC Int. J. Inf. Secur.
15 (1) (2023)
volume 15, number 2, 2023
Faeze Rasouli
,
Mohammad Taheri
,
Reza Rohani Sarvestani
A Fragile Watermarking by Hamming Code on Distributed Pixels with Perfect Recovery for Small Tampers.
ISC Int. J. Inf. Secur.
15 (2) (2023)
Maryam Azadmanesh
,
Behrouz Shahgholi Ghahfarokhi
,
Maede Ashouri-Talouki
An Auto-Encoder based Membership Inference Attack against Generative Adversarial Network.
ISC Int. J. Inf. Secur.
15 (2) (2023)
Mansoureh Labbafniya
,
Hamed Yusefi
,
Akram Khalesi
Reverse Engineering of Authentication Protocol in DesFire.
ISC Int. J. Inf. Secur.
15 (2) (2023)
Farhad Taheri Ardakani
,
Siavash Bayat Sarmadi
MISC: Multi-Input Secure Two-Party Computation.
ISC Int. J. Inf. Secur.
15 (2) (2023)
Maryam Rezaei Kashi
,
Mojtaba Bahramian
Oblivious Transfer Using Generalized Jacobian of Elliptic Curves.
ISC Int. J. Inf. Secur.
15 (2) (2023)
Hamid Mala
,
Mohammad Reza Saeidi
Secure Outsourcing of Two Standard Identity-Based Cryptosystems.
ISC Int. J. Inf. Secur.
15 (2) (2023)
Ali Ahmadian Ramaki
,
Abbas Ghaemi Bafghi
,
Abbas Rasoolzadegan
Towards Event Aggregation for Reducing the Volume of Logged Events During IKC Stages of APT Attacks.
ISC Int. J. Inf. Secur.
15 (2) (2023)
Habib Allah Yajam
,
Mohammad Ali Akhaee
Analysis of IOTA Tangle Stability in High Transaction Rates.
ISC Int. J. Inf. Secur.
15 (2) (2023)
volume 15, number 3, 2023
Danial Shiraly
,
Nasrollah Pakniat
,
Ziba Eslami
Designated-Server Hierarchical Searchable Encryption in Identity-Based Setting.
ISC Int. J. Inf. Secur.
15 (3) (2023)
Parichehr Dadkhah
,
Mohammad Dakhilalian
,
Parvin Rastegari
Security Analysis and Improvement of an Access Control Scheme for Wireless Body Area Networks.
ISC Int. J. Inf. Secur.
15 (3) (2023)
Hadi Aghaee
,
Bahareh Akhbari
Quantum Multiple Access Wiretap Channel: On the One-Shot Achievable Secrecy Rate Regions.
ISC Int. J. Inf. Secur.
15 (3) (2023)
Amirhosein Salehi
,
Siavash Ahmadi
,
Mohammad Reza Aref
A Semi-Supervised IDS for Cyber-Physical Systems Using a Deep Learning Approach.
ISC Int. J. Inf. Secur.
15 (3) (2023)
volume 14, number 1, 2022
Mohammad Erfan Mazaheri
,
Siavash Bayat Sarmadi
,
Farhad Taheri Ardakani
A Study of Timing Side-Channel Attacks and Countermeasures on JavaScript and WebAssembly.
ISC Int. J. Inf. Secur.
14 (1) (2022)
Hossein Oraei
,
Massoud Hadian Dehkordi
A New Variant of the Winternitz One Time Signature Based on Graded Encoding Schemes.
ISC Int. J. Inf. Secur.
14 (1) (2022)
volume 14, number 2, 2022
Parvin Rastegari
Attacks to Some Recently Proposed CL-SC Schemes and Presenting a Secure Scheme with KSSTIS.
ISC Int. J. Inf. Secur.
14 (2) (2022)
Faeze Rasouli
,
Mohammad Taheri
Perfect Recovery of Small Tampers Using a Novel Fragile Watermarking Technique Based on Distributed Hamming Code.
ISC Int. J. Inf. Secur.
14 (2) (2022)
Zeinab Salami
,
Mahmoud Ahmadian-Attari
,
Mohammad Reza Aref
,
Hoda Jannati
Location Privacy Preservation for Secondary Users in a Database-Driven Cognitive Radio Network.
ISC Int. J. Inf. Secur.
14 (2) (2022)
Farnoush Manavi
,
Ali Hamzeh
Ransomware Detection Based on PE Header Using Convolutional Neural Networks.
ISC Int. J. Inf. Secur.
14 (2) (2022)
Vajiheh Sabeti
,
Mahsa Amerehei
Secure and Imperceptible Image Steganography in Discrete Wavelet Transform Using the XOR Logical Function and Genetic Algorithm.
ISC Int. J. Inf. Secur.
14 (2) (2022)
Hamid Amiryousefi
,
Zahra Ahmadian
Revisiting the Security and Efficiency of SP2DAS, 3PDA, and EPPA Smart Grid Security Protocols.
ISC Int. J. Inf. Secur.
14 (2) (2022)
Hajar Dastanpour
,
Ali Fanian
A Graph-based Online Feature Selection to Improve Detection of New Attacks.
ISC Int. J. Inf. Secur.
14 (2) (2022)
Mojtaba Hemmati
,
Mohammad Ali Hadavi
Bypassing Web Application Firewalls Using Deep Reinforcement Learning.
ISC Int. J. Inf. Secur.
14 (2) (2022)
volume 14, number 3, 2022
Fatemeh Deldar
,
Mahdi Abadi
,
Mohammad Ebrahimifard
Android Malware Detection Using One-Class Graph Neural Networks.
ISC Int. J. Inf. Secur.
14 (3) (2022)
Afshin Karampour
,
Maede Ashouri-Talouki
,
Behrouz Tork Ladani
Light-Weight Privacy-Preserving Data Aggregation Protocols in Smart Grid Metering Networks.
ISC Int. J. Inf. Secur.
14 (3) (2022)
Muhamadali Hajisoltani
,
Raziyeh Salarifard
,
Hadi Soleimany
Secure and Low-Area Implementation of the AES Using FPGA.
ISC Int. J. Inf. Secur.
14 (3) (2022)
Seyed Salar Ghazi
,
Haleh Amintoosi
,
Sahar Pilevar Moakhar
On the Suitability of Improved TrustChain for Smartphones.
ISC Int. J. Inf. Secur.
14 (3) (2022)
Hadi Aghaee
,
Bahareh Akhbari
One-Shot Achievable Secrecy Rate Regions for Quantum Interference Wiretap Channel.
ISC Int. J. Inf. Secur.
14 (3) (2022)
Amirhosein Sayyadabdi
,
Behrouz Tork Ladani
,
Bahman Zamani
Towards a Formal Approach for Detection of Vulnerabilities in the Android Permissions System.
ISC Int. J. Inf. Secur.
14 (3) (2022)
Amir Ashtari
,
Ahmad Shabani
,
Bijan Alizadeh
Mutual Lightweight PUF-Based Authentication Scheme Using Random Key Management Mechanism for Resource-Constrained IoT Devices.
ISC Int. J. Inf. Secur.
14 (3) (2022)
Navid Vafaei
,
Maryam Porkar
,
Hamed Ramzanipour
,
Nasour Bagheri
Practical Differential Fault Analysis on SKINNY.
ISC Int. J. Inf. Secur.
14 (3) (2022)
Sepehr Damavandi
,
Sadegh Dorri Nogoorani
An Electronic Voting Scheme Based on Blockchain Technology and Zero-Knowledge Proofs.
ISC Int. J. Inf. Secur.
14 (3) (2022)
Maryam Saeedi Sadr
,
Mohammad Ali Hadavi
SecureKV: Secure Searchable Outsourcing of Key-Value Databases to the Public Cloud.
ISC Int. J. Inf. Secur.
14 (3) (2022)
Mohammad Ali
Attribute-Based Remote Data Auditing and User Authentication for Cloud Storage Systems.
ISC Int. J. Inf. Secur.
14 (3) (2022)
Sajjad Palanki
,
Alireza Shafieinejad
Attribute-Based Encryption with Efficient Attribute Revocation, Decryption Outsourcing, and Multi-Keyword Searching in Cloud Storage.
ISC Int. J. Inf. Secur.
14 (3) (2022)
Somayeh Mozafari
,
Amir Jalaly Bidgoly
Lightweight Identification of Android Malware with Knowledge Distillation and Deep Learning Approach.
ISC Int. J. Inf. Secur.
14 (3) (2022)
Hamed Ramzanipour
,
Navid Vafaei
,
Nasour Bagheri
Practical Differential Fault Analysis on CRAFT, a Lightweight Block Cipher.
ISC Int. J. Inf. Secur.
14 (3) (2022)