Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)

 

Facts & Figures

Publication starting date

 2009

h-index

17

i10-index

33

Citations

977

Issue per year

3

No. of volumes

14

No. of issues

 30

No. of articles

 219

PDF Download

 696,541

View Per Article

 4232.69

PDF Download Per Article

 3180.55

Acceptance Rate

17

Accept Date (Days)

226

Number of Indexing Databases

15

 

 

The ISC International Journal of Information Security (ISeCureis a peer reviewed scholarly publication by Iranian Society of Cryptology. ISeCure is published biannually in print and online with full texts of articles made available for free on the website of the journal under ISeCure open access policy. ISeCure is devoted to publishing theoretical scholarship on a variety of topics related to information security. The intended audience of the journal is any person with an interest in information security from an academic perspective such as engineers, mathematicians and computer scientists. A partial list of topics for review by the journal can be found in the Aims and Scope section. Manuscript types for submission are research papers, review papers, case reports, short communications and letters to the editor.  More information about the policies of the journal can be found on the About Journal and mostly in the Publication Ethics pages. To start a new submission, please first read the Guide for Authors page for detailed information about manuscript format, style and other requirements. Manuscript submission, refereeing and publishing are completely free of charge. New manuscripts should be submitted online by the corresponding author through the website after registration. Articles published in ISeCure Journal are indexed in the Emerging Sources Citation Index (ESCI) database of Web of Science/ISI and Scopus.

Follow us:

 

 

 

Research Article
1. A Graph-based Online Feature Selection to Improve Detection of New Attacks

Hajar Dastanpour; Ali Fanian

Volume 14, Issue 2 , July 2022, Pages 115-130

http://dx.doi.org/10.22042/isecure.2022.14.2.1

Abstract
  Today, intrusion detection systems are used in the networks as one of the essential methods to detect new attacks. Usually, these systems deal with a broad set of data and many features. Therefore, selecting proper features and benefitting from previously learned knowledge is suitable for efficiently ...  Read More

Research Article
2. Bypassing Web Application Firewalls Using Deep Reinforcement Learning

Mojtaba Hemmati; Mohammad Ali Hadavi

Volume 14, Issue 2 , July 2022, Pages 131-145

http://dx.doi.org/10.22042/isecure.2022.323140.744

Abstract
  Web application firewalls (WAFs) are used for protecting web applications from attacks such as SQL injection, cross-site request forgery, and cross-site scripting. As a result of the growing complexity of web attacks, WAFs need to be tested and updated on a regular basis. There are various tools and ...  Read More

Research Article
3. Perfect Recovery of Small Tampers Using a Novel Fragile Watermarking Technique Based on Distributed Hamming Code

Faeze Rasouli; Mohammad Taheri

Volume 14, Issue 2 , July 2022, Pages 147-156

http://dx.doi.org/10.22042/isecure.2022.284952.670

Abstract
  Fragile watermarking is a technique of authenticating the originality of the media (e.g., image). Although the watermark is destroyed with any small modification (tamper), it may be used to recover the original image. There is no method yet, based on our knowledge, to guarantee the perfect recovery of ...  Read More

Research Article
4. Revisiting the Security and Efficiency of SP2DAS, 3PDA, and EPPA Smart Grid Security Protocols

Hamid Amiryousefi; Zahra Ahmadian

Volume 14, Issue 2 , July 2022, Pages 157-165

http://dx.doi.org/10.22042/isecure.2022.275064.645

Abstract
  This paper analyses the security and efficiency of some notable privacy preserving data aggregation schemes, SP2DAS, 3PDA, and EPPA. For SP2DAS and 3PDA schemes, We show that despite the designers’ claims, there are efficient forgery attacks on the signature scheme used. We present aselective forgery ...  Read More

Research Article
5. Secure and Imperceptible Image Steganography in Discrete Wavelet Transform Using the XOR Logical Function and Genetic Algorithm

Vajiheh Sabeti; Mahsa Amerehei

Volume 14, Issue 2 , July 2022, Pages 167-179

http://dx.doi.org/10.22042/isecure.2022.274305.641

Abstract
  A steganography system must embed the message in an unseen and unrecognizable manner in the cover signal. Embedding information in transform coefficients, especially Discrete Wavelet Transform (DWT), is one of the most successful approaches in this field. The proposed method in this paper has two main ...  Read More

Research Article
6. Ransomware Detection Based on PE Header Using Convolutional Neural Networks

Farnoush Manavi; Ali Hamzeh

Volume 14, Issue 2 , July 2022, Pages 181-192

http://dx.doi.org/10.22042/isecure.2021.262846.595

Abstract
  With the spread of information technology in human life, data protection is a critical task. On the other hand, malicious programs are developed, which can manipulate sensitive and critical data and restrict access to this data. Ransomware is an example of such a malicious program that encrypts data, ...  Read More

Research Article
7. Attacks to Some Recently Proposed CL-SC Schemes and Presenting a Secure Scheme with KSSTIS

Parvin Rastegari

Volume 14, Issue 2 , July 2022, Pages 193-213

http://dx.doi.org/10.22042/isecure.2022.266258.602

Abstract
  The certificateless public key cryptography (CL-PKC) setting, makes it possible to overcome the problems of the conventional public key infrastructure and the ID-Based public key cryptography, concurrently. A certificateless signcryption (CL-SC) scheme is an important cryptographic primitive which provides ...  Read More

Research Article
8. Location Privacy Preservation for Secondary Users in a Database-Driven Cognitive Radio Network

Zeinab Salami; Mahmoud Ahmadian Attari; Mohammad Reza Aref; Hoda Jannati

Volume 14, Issue 2 , July 2022, Pages 215-227

http://dx.doi.org/10.22042/isecure.2022.243102.568

Abstract
  Since their introduction, cognitive radio networks, as a new solution to the problem of spectrum scarcity, have received great attention from the research society. An important field in database driven cognitive radio network studies is pivoted on their security issues. A critical issue in this context ...  Read More

Keywords Cloud