Volume 16 (2024)
Volume 15 (2023)
Volume 14 (2022)
Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
Proposed ST-Slotted-CS-ALOHA Protocol for Time Saving and Collision Avoidance

Ehab Khatter; Dina Ibrahim

Volume 11, Issue 3 , August 2019, , Pages 67-72

https://doi.org/10.22042/isecure.2019.11.0.9

Abstract
  Time Saving and energy consumption has become a vital issue that attracts the attention of researchers in Underwater Wireless Sensor Networks (UWSNs) fields. According to that, there is a strong need to improve MAC protocols performance in UWSNs, particularly enhancing the effectiveness ...  Read More

Cognitive Strategic Model applied to a Port System

Felisa Córdova; Claudia Durán; Fredi Palominos

Volume 11, Issue 3 , August 2019, , Pages 73-78

https://doi.org/10.22042/isecure.2019.11.0.10

Abstract
  Port organizations have focused their efforts on physical or tangible assets, generating profitability and value. However, it is recognized that the greatest sustainable competitive advantage is the creation of knowledge using the intangible assets of the organization. The Balanced ScoreCard, ...  Read More

Enhancing Learning from Imbalanced Classes via Data Preprocessing: A Data-Driven Application in Metabolomics Data Mining

Ahmed BaniMustafa

Volume 11, Issue 3 , August 2019, , Pages 79-89

https://doi.org/10.22042/isecure.2019.11.0.11

Abstract
  This paper presents a data mining application in metabolomics. It aims at building an enhanced machine learning classifier that can be used for diagnosing cachexia syndrome and identifying its involved biomarkers. To achieve this goal, a data-driven analysis is carried out using a public ...  Read More

Hand Gestures Classification with Multi-Core DTW

Ayman Atia; Nada Shorim

Volume 11, Issue 3 , August 2019, , Pages 91-96

https://doi.org/10.22042/isecure.2019.11.0.12

Abstract
  Classifications of several gesture types are very helpful in several applications. This paper tries to address fast classifications of hand gestures using DTW over multi-core simple processors. We presented a methodology to distribute templates over multi-cores and then allow parallel ...  Read More

Aspect Oriented UML to ECORE Model Transformation

Muhammad Ali Memon; Zaira Hassan; Kamran Dahri; Asadullah Shaikh; Muhammad Ali Nizamani

Volume 11, Issue 3 , August 2019, , Pages 97-103

https://doi.org/10.22042/isecure.2019.11.0.13

Abstract
  With the emerging concept of model transformation, information can be extracted from one or more source models to produce the target models. The conversion of these models can be done automatically with specific transformation languages. This conversion requires mapping between both models ...  Read More

Access and Mobility Policy Control at the Network Edge

Evelina Pencheva; Ivaylo Atanasov; Ivaylo Asenov

Volume 11, Issue 3 , August 2019, , Pages 105-111

https://doi.org/10.22042/isecure.2019.11.0.14

Abstract
  The fifth generation (5G) system architecture is defined as service-based and the core network functions are described as sets of services accessible through application programming interfaces (API). One of the components of 5G is Multi-access Edge Computing (MEC) which provides the open ...  Read More

Evaluating Multipath TCP Resilience against Link Failures

Mohammed J.F. Alenazi

Volume 11, Issue 3 , August 2019, , Pages 113-122

https://doi.org/10.22042/isecure.2019.11.0.15

Abstract
  Standard TCP is the de facto reliable transfer protocol for the Internet. It is designed to establish a reliable connection using only a single network interface. However, standard TCP with single interfacing performs poorly due to intermittent node connectivity. This requires the re-establishment of ...  Read More

A Fair Power Allocation for Non-Orthogonal Multiple Access in the Power Domain

Joel E. Cordeiro Junior; Marcelo S. Alencar; José V. dos Santos Filho; Karcius D. R. Assis

Volume 11, Issue 3 , August 2019, , Pages 123-130

https://doi.org/10.22042/isecure.2019.11.0.16

Abstract
  This paper presents an investigation on the performance of the Non-Orthogonal Multiple Access (NOMA) in the power domain scheme. A Power Allocation (PA) method is proposed from NOMA throughput expression analysis. This method aims to provide fair opportunities for users to improve their ...  Read More

Critical Success Factors for Data Virtualization: A Literature Review

Matthias Gottlieb; Marwin Shraideh; Isabel Fuhrmann; Markus Böhm; Helmut Krcmar

Volume 11, Issue 3 , August 2019, , Pages 131-137

https://doi.org/10.22042/isecure.2019.11.0.17

Abstract
  Data Virtualization (DV) has become an important method to store and handle data cost-efficiently. However, it is unclear what kind of data and when data should be virtualized or not. We applied a design science approach in the first stage to get a state of the art of DV regarding data ...  Read More

Using Machine Learning ARIMA to Predict the Price of Cryptocurrencies

Saad Ali Alahmari

Volume 11, Issue 3 , August 2019, , Pages 139-144

https://doi.org/10.22042/isecure.2019.11.0.18

Abstract
  The increasing volatility in pricing and growing potential for profit in digital currency have made predicting the price of cryptocurrency a very attractive research topic. Several studies have already been conducted using various machine-learning models to predict crypto currency prices. ...  Read More

An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling

Anwar Saeed; Muhammad Yousif; Areej Fatima; Sagheer Abbas; Muhammad Adnan Khan; Leena Anum; Ali Akram

Volume 11, Issue 3 , August 2019, , Pages 145-151

https://doi.org/10.22042/isecure.2019.11.0.19

Abstract
  With the innovation of cloud computing industry lots of services were provided based on different deployment criteria. Nowadays everyone tries to remain connected and demand maximum utilization of resources with minimum timeand effort. Thus, making it an important challenge in cloud computing ...  Read More

Cloud and IoT based Smart Car Parking System by using Mamdani Fuzzy Inference System (MFIS)

Tahir Alyas; Gulzar Ahmad; Yousaf Saeed; Muhammad Asif; Umer Farooq; Asma Kanwal

Volume 11, Issue 3 , August 2019, , Pages 153-160

https://doi.org/10.22042/isecure.2019.11.0.20

Abstract
  Internet of Things (IoT) and cloud computing technologies have connected the infrastructure of the city to make the context-aware and more intelligent city for utility its major resources. These technologies have much potential to solve thechallenges of urban areas around the globe to facilitate ...  Read More

Towards Measuring the Project Management Process During Large Scale Software System Implementation Phase

Wajdi Aljedaibi; Sufian Khamis

Volume 11, Issue 3 , August 2019, , Pages 161-172

https://doi.org/10.22042/isecure.2019.11.0.21

Abstract
  Project management is an important factor to accomplish the decision to implement large-scale software systems (LSS) in a successful manner. The effective project management comes into play to plan, coordinate and control such a complex project. Project management factor has been argued ...  Read More

IoT Protocols Based Fog/Cloud over High Traffic

Istabraq M. Al-Joboury; Emad H. Al-Hemiary

Volume 11, Issue 3 , August 2019, , Pages 173-180

https://doi.org/10.22042/isecure.2019.11.3.23

Abstract
  The Internet of Things (IoT) becomes the future of a global data field in which the embedded devices communicate with each other, exchange data and making decisions through the Internet. IoT could improve the quality of life in smart cities, but a massive amount of data from different smart devices could ...  Read More

Virtualized Network Management Laboratory for Educational Purposes

Oula L. Abdulsattar; Emad H. Al-Hemiary

Volume 11, Issue 3 , August 2019, , Pages 181-186

https://doi.org/10.22042/isecure.2019.11.3.24

Abstract
  In this paper, we implement a Virtualized Network Management Laboratory named (VNML) linked to college campus network for educational purposes. This laboratory is created using Virtualbox virtualizer and GNS3 on Linux UBUNTU single HP DL380 G7 server platform. A total of 35 virtual devices (Routers, ...  Read More

A Comparison Study between Intelligent Decision Support Systems and Decision Support Systems

Mosleh Zeebaree; Musbah Aqel

Volume 11, Issue 3 , August 2019, , Pages 187-194

https://doi.org/10.22042/isecure.2019.11.3.25

Abstract
  This paper is one that explored intelligent decision support systems and Decision support systems. Due to the inception and development of systems and technological advances such as data warehouse, enterprise resource planning, advance plan system & also top trends like Internet of things, big data, ...  Read More

The Use of Local Sensitive Hashing for E-learner Face Identification

Hachem H. Alaoui; Elkaber Hachem; Cherif Ziti; Mohammed Karim

Volume 12, Issue 3 , November 2020, , Pages 1-5

https://doi.org/10.22042/isecure.2021.271051.612

Abstract
  Because face can reveal so much hidden information, we need to interpret these data and benefit from them. Hence, our paper shows a new and productive facial image representation based on local sensitive hashing (LSH). This strategy makes it conceivable to recognize the students who pursue their preparation ...  Read More

A Review Study on SQL Injection Attacks, Prevention, and Detection

Mona Alsalamah; Huda Alwabli; Hutaf Alqwifli; Dina M. Ibrahim

Volume 13, Issue 3 , November 2021, , Pages 1-10

https://doi.org/10.22042/isecure.2021.0.0.0

Abstract
  The functionality of web-based system can be affected by many threats. In fact, web-based systems provide several services built on databases. This makes them prone to Structured Query Language (SQL) injection attacks. For that reason, many research efforts have been made to deal with such attack. The ...  Read More

Mutual Lightweight PUF-Based Authentication Scheme Using Random Key Management Mechanism for Resource-Constrained IoT Devices

Amir Ashtari; Ahmad Shabani; Bijan Alizadeh

Volume 14, Issue 3 , October 2022, , Pages 1-8

https://doi.org/10.22042/isecure.2022.14.3.1

Abstract
  This paper presents a novel RF-PUF-based authentication scheme, called RKM-PUF which takes advantage of a dynamic random key generation that depends upon both communication parties in the network to detect intrusion attacks. Unlike the existing authentication schemes, our proposed approach takes the ...  Read More

Modified Parse-Tree Based Pattern Extraction Approach for Detecting SQLIA Using Neural Network Model.

Meharaj Begum A; Michael Arock

Volume 16, Issue 1 , January 2024, , Pages 1-16

https://doi.org/10.22042/isecure.2023.370697.886

Abstract
  Whatever malware protection is upcoming, still the data are prone to cyber-attacks. The most threatening Structured Query Language Injection Attack (SQLIA) happens at the database layer of web applications leading to unlimited and unauthorized access to confidential information through malicious code ...  Read More

Designated-Server Hierarchical Searchable Encryption in Identity-Based Setting

Danial Shiraly; Nasrollah Pakniat; Ziba Eslami

Volume 15, Issue 3 , October 2023, , Pages 1-17

https://doi.org/10.22042/isecure.2023.416676.1014

Abstract
  Public key encryption with keyword search (PEKS) is a cryptographic primitive designed for performing secure search operations over encrypted data stored on untrusted cloud servers. However, in some applications of cloud computing, there is a hierarchical access-privilege setup among users so that upper-level ...  Read More

ECKCI: An ECC-Based Authenticated Key Agreement Scheme Resistant to Key Compromise Impersonation Attack for TMIS

Fatemeh Pirmoradian; Mohammad Dakhilalian; Masoumeh Safkhani

Articles in Press, Accepted Manuscript, Available Online from 22 April 2024

https://doi.org/10.22042/isecure.2024.408640.989

Abstract
  Internet of things (IoT) is an innovation in the world of technology. Continuous technological advancements based on the IoT cloud and booming wireless technology have revolutionized the living of human and remote health monitoring of patients is no exclusion. The Telecare Medicine Information Systems ...  Read More

Suspended Stripline Low-pass Filter Design for Wide Stopband Attenuation Applications

Aymen M. Al-Kadhimi; Salim A. Mohammed Ali; Sami Hasan

Volume 12, Issue 3 , November 2020, , Pages 7-12

https://doi.org/10.22042/isecure.2021.271055.613

Abstract
  This paper involves the design of asymmetrical generalized Chebyshev low-pass filter realized with a suspended substrate stripline. The study presents the synthesis and design of an asymmetrical prototype with a degree of 11, the cut-off frequency of 2.5 GHz, better than 26 dB as passband return loss ...  Read More

Practical Differential Fault Analysis on SKINNY

Navid Vafaei; Maryam Porkar; Hamed Ramzanipour; Nasour Bagheri

Volume 14, Issue 3 , October 2022, , Pages 9-19

https://doi.org/10.22042/isecure.2022.14.3.2

Abstract
  SKINNY is a lightweight tweakable block cipher that for the first time introduced in CRYPTO 2016. SKINNY is considered in two block sizes: 64 bits and 128 bits, as well as three TWEAK versions. In the beginning, this paper reflects our findings that improve the effectiveness of DFA analysis on SKINNY, ...  Read More

Broken Authentication and Session Management Vulnerabilities

Hanan Aljoaey; Khawla Almutawa; Ruyuf Alabdali; Dina M.Ibrahim

Volume 13, Issue 3 , November 2021, , Pages 11-19

https://doi.org/10.22042/isecure.2021.0.0.0

Abstract
  Web application protection is today’s most important battleground between victim, intruder, and web service resource. User authentication tends to be critical when a legitimate user of the web application abruptly ends contact while the session is still active, and an unauthorized user chooses ...  Read More