default search action
ISC International Journal of Information Security, Volume 12
Volume 12, Number 1, January 2020
- Zahra Eskandari, Abbas Ghaemi Bafghi:
Extension of Cube Attack with Probabilistic Equations and its Application on Cryptanalysis of KATAN Cipher. 1-12 - Majid M. Niknam, Sadegh Sadeghi, Mohammad Reza Aref, Nasour Bagheri:
Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants. 13-23 - Vajiheh Sabeti, Minoo Shoaei:
New High Secure Network Steganography Method Based on Packet Length. 24-44 - Reza Mortazavi:
Improved Univariate Microaggregation for Integer Values. 35-43 - Shahriar Mohammadi, Amin Namadchian:
Anomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism. 44-54 - Bashir Naderi, Hossein Kheiri, Vajiheh Vafaei:
Modified Sliding-Mode Control Method for Synchronization a Class of Chaotic Fractional-Order Systems with Application in Encryption. 55-66
Volume 12, Number 2, July 2020
- Mohsen Jahanbani, Nasour Bagheri, Zynolabedin Norouzi:
CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking. 67-80 - Milad Seddigh, Hadi Soleimany:
Enhanced Flush+Reload Attack on AES. 81-89 - Ali Zaghian, Bagher Bagherpour:
A Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions. 91-99 - Mohammad Mahdi Modiri, Javad Mohajeri, Mahmoud Salmasizadeh:
GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication. 101-111 - Mahsa Nooribakhsh, Mahdi MollaMotalebi:
F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management. 113-128 - Maryam Zarezadeh, Maede Ashouri-Talouki, Mohammad Siavashi:
Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems. 129-140
Volume 12, Number 3, November 2020
- Hachem H. Alaoui, El-Kaber Hachem, Cherif Ziti, Mohammed Karim:
The Use of Local Sensitive Hashing for E-learner Face Identification. 1-5 - Aymen M. Al-Kadhimi, Salim A. Mohammed Ali, Sami Hasan:
Suspended Stripline Low-pass Filter Design for Wide Stopband Attenuation Applications. 7-12 - Osama Ali Awad, Mais Monqith:
Evaluation of a Wireless ZigBee with PID Controller for Networked Control System Using True Time Toolbox. 13-17 - Abdllkader Esaid, Mary Agoyi, Muhannad Tahboush:
A Hybrid Encryption Algorithm for Mitigating the Effects of Attacks in Ad Hoc Networks. 19-27 - Sumayia Al-Anazi, Isra Al-Turaiki, Najwa Altwaijry:
CEMD: A Cluster-based Ensemble Motif Discovery Tool. 29-36 - Isra Al-Turaiki, Najwa Altwaijry, Abeer Agil, Haya Aljodhi, Sara Alharbi, Lina Alqassem:
Anomaly-Based Network Intrusion Detection Using Bidirectional Long Short Term Memory and Convolutional Neural Network. 37-44 - Saja Ahmed Albliwi, Hanan Abdullah Alkharmani:
The Impact of Mobile Payment Quality on User?s Continuance Intention Toward Mobile Payment in Saudi Arabia. 45-53 - Marcelo S. Alencar, Karcius D. R. Assis:
A New Derivation of the Leftover Hash Lemma. 55-58 - Bodor Moheel Almotairy, Manal Abdullah, Rabeeh Abbasi:
Identifying Entrepreneurial Influencers on Twitter. 59-72 - Shereen S. Jumaa:
Fuzzy Histogram Equalization and Computer Vision Automated Identification of Microcalcifications in Breast Cancer. 73-79 - Talib M. J. Al Taleb, Sami Hasan, Yaqoob Yousif Mahdi:
Indexed View Technique to Speed-up Data Warehouse Query Processing. 81-85 - Mustapha Bassiri, Abderrazak Mazouak, Imad Lamniai, Malika Tridane, Said Belaaouad:
The Establishment of a Distance Training Device within the Regional Center of the Taza Education and Training: Administrative Cycle Case. 87-93 - Najah K. Almazmomi:
Knowledge Discovery in Cloud-Computing Environment and the Challenges. 95-99 - Wafa Abdulaziz Alkenazan, Ashraf A. Taha, Mohammed J. F. Alenazi, Wadood Abdul:
Modeling a Cloud-Based Smart Parking WLAN Networks Using IEEE802.11AC Technology. 101-109 - Ghada Al-Hudhud, Abeer Al-Humamidi:
A Multilingual Infobot in Airports. 111-115 - Abeer S. Al-Humaimeedy, Abeer Salman Al-Hammad, Ghada Al-Hudhud:
Reverse Image-Based Search Engine for IP Trademarks. 117-127
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.