Volume 16 (2024)
Volume 15 (2023)
Volume 14 (2022)
Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
Evaluation of a Wireless ZigBee with PID Controller for Networked Control System Using True Time Toolbox

Osama Ali Awad; Mais Monqith

Volume 12, Issue 3 , November 2020, , Pages 13-17

https://doi.org/10.22042/isecure.2021.271058.614

Abstract
  Wireless Networked Control System (WNCS) consists of a control system and communication network system. The insertion of the communication network in control systems has enormous advantages but on the other hand, it brings several issues like network induced delays or packet dropouts that bring negative ...  Read More

An Overview of Security Attacks in 5G Enabled Technologies: Applications and Use Case Scenarios

Shadab Kalhoro; Farhan Bashir Shaikh; Anam Kalhoro; Junaid Ur Rehman Abbasi; Ramesh Kumar Ayyasamy

Volume 16, Issue 1 , January 2024, , Pages 17-35

https://doi.org/10.22042/isecure.2023.354872.829

Abstract
  With the advancement of ICTs, the fifth generation has developed into an emergent communication platform that supports high speed, low latency, and excellent connectivity to numerous devices with modern radio technology, service-oriented design, and cloud infrastructure. The recent developments in the ...  Read More

A Hybrid Encryption Algorithm for Mitigating the Effects of Attacks in Ad Hoc Networks

Abdllkader Esaid; Mary Agoyi; Muhannad Tahboush

Volume 12, Issue 3 , November 2020, , Pages 19-27

https://doi.org/10.22042/isecure.2021.271065.619

Abstract
  Ad hoc network is infrastructure-less support, so network nodes are vulnerable to many attacks. Security attacks in Ad-Hoc networks are increasing significantly with time. They communicated and exchanged data should be also secured and kept confidential. Therefore, hybrid cryptography is proposed to ...  Read More

Quantum Multiple Access Wiretap Channel: On the One-Shot Achievable Secrecy Rate Regions

Hadi Aghaee; Bahareh Akhbari

Volume 15, Issue 3 , October 2023, , Pages 19-34

https://doi.org/10.22042/isecure.2023.180848

Abstract
  In this paper, we want to investigate classical-quantum multiple access wiretap channels (CQ-MA-WTC) under one-shot setting. In this regard, we analyze the CQ-MA-WTC using a simultaneous position-based decoder for reliable decoding and using a newly introduced technique to decode securely. Also, for ...  Read More

Cross Site Scripting Attack Review

Afnan Alotaibi; Lujain Alghufaili; Dina M.Ibrahim

Volume 13, Issue 3 , November 2021, , Pages 21-30

https://doi.org/10.22042/isecure.2022.0.0.0

Abstract
  At the present period of time, web applications are growing constantly in the whole society with the development of communication technology. Since the utilization of WWW (World Wide Web) expanded and increased since it provides many services, such as sharing data, stay connected and other services. ...  Read More

Practical Differential Fault Analysis on CRAFT, a Lightweight Block Cipher

Hamed Ramzanipour; Navid Vafaei; Nasour Bagheri

Volume 14, Issue 3 , October 2022, , Pages 21-31

https://doi.org/10.22042/isecure.2022.14.3.3

Abstract
  Differential fault analysis, a kind of active non-invasive attack, is an effective way of analyzing cryptographic primitives that have lately earned more attention. In this study, we apply this attack on CRAFT, a recently proposed lightweight tweakable block cipher, supported by simulation and experimental ...  Read More

CEMD: A Cluster-based Ensemble Motif Discovery Tool

Sumayia Al-Anazi; Isra Al-Turaiki; Najwa Altwaijry

Volume 12, Issue 3 , November 2020, , Pages 29-36

https://doi.org/10.22042/isecure.2021.271073.623

Abstract
  Motif discovery is a challenging problem in bioinformatics. It is an essential step towards understanding gene regulation. Although numerous algorithms and tools have been proposed in the literature, the accuracy of motif finding is still low. In this paper, we tackle the motif discovery problem using ...  Read More

Secure Coding Guidelines — Python

Mohammad Ali A. Hammoudeh; Renad Ibrahim; Lama Alshraryan; Manar Alnomise; Ragad Alhumidan

Volume 13, Issue 3 , November 2021, , Pages 31-38

https://doi.org/10.22042/isecure.2021.13.3.0

Abstract
  Recently, the interest in cybercrime and cybersecurity has increased dramatically both in terms of critical security issues and national economic information infrastructure and sensitive dealing policies, such as protection and data privacy. Moreover, the growing threat of cybersecurity has prompted ...  Read More

On the Suitability of Improved TrustChain for Smartphones

Seyed Salar Ghazi; Haleh Amintoosi; Sahar Pilevar Moakhar

Volume 14, Issue 3 , October 2022, , Pages 33-42

https://doi.org/10.22042/isecure.2022.14.3.4

Abstract
  In recent years, blockchain technology has been used in many fields, including IoT and Smartphones. Since most of these devices are battery constrained and have low processing capabilities, conventional blockchains are not suitable for these types of systems. In this field, critical challenges that need ...  Read More

Security Analysis and Improvement of an Access Control Scheme for Wireless Body Area Networks

Parichehr Dadkhah; Mohammad Dakhilalian; Parvin Rastegari

Volume 15, Issue 3 , October 2023, , Pages 35-42

https://doi.org/10.22042/isecure.2023.180857

Abstract
  Wireless Body Area Networks (WBANs) have attracted a lot of attention in recent researches as they play a vital role in diagnosing, controlling and treating diseases. These networks can improve the quality of medical services by following the health status of people and providing online medical advice ...  Read More

Anomaly-Based Network Intrusion Detection Using Bidirectional Long Short Term Memory and Convolutional Neural Network

Isra Al-Turaiki; Najwa Altwaijry; Abeer Agil; Haya Aljodhi; sara Alharbi; Lina Alqassem

Volume 12, Issue 3 , November 2020, , Pages 37-44

https://doi.org/10.22042/isecure.2021.271076.624

Abstract
  With present-day technological advancements, the number of devices connected to the Internet has increased dramatically. Cybersecurity attacks are increasingly becoming a threat to individuals and organizations. Contemporary security frameworks incorporate Network Intrusion Detection Systems (NIDS). ...  Read More

Safety Guards for Ethereum Smart Contracts

Morteza Amirmohseni; Sadegh Dorri Nogoorani

Volume 16, Issue 1 , January 2024, , Pages 37-53

https://doi.org/10.22042/isecure.2023.365808.846

Abstract
  Smart contracts are applications that are deployed on a blockchain and can be executed through transactions. The code and the state of the smart contracts are persisted on the ledger, and their execution is validated by all blockchain nodes. Smart contracts often hold and manage amounts of cryptocurrency. ...  Read More

Data Enhancement for Date Fruit Classification Using DCGAN

Norah Alajlan; Meshael Alyahya; Noorah Alghasham; Dina M. Ibrahim

Volume 13, Issue 3 , November 2021, , Pages 39-48

https://doi.org/10.22042/isecure.2021.13.3.0

Abstract
  Date fruits are considered essential food and the most important agricultural crop in Saudi Arabia. Where Saudi Arabia produces many of the types of dates per year. Collecting large data for date fruits is a difficult task and consumedtime, besides some of the date types are seasonal. Wherein convolutional ...  Read More

Attribute-Based Remote Data Auditing and User Authentication for Cloud Storage Systems

Mohammad Ali

Volume 14, Issue 3 , October 2022, , Pages 43-49

https://doi.org/10.22042/isecure.2022.0.0.0

Abstract
  Remote data auditing (RDA) protocols enable a cloud server to persuade an auditor that it is storing a data file honestly. Unlike digital signature(DS) schemes, in RDA protocols, the auditor can carry out the auditing procedure without having the entire data file. Therefore, RDA protocols seem to be ...  Read More

A Semi-Supervised IDS for Cyber-Physical Systems Using a Deep Learning Approach

Amirhosein Salehi; Siavash Ahmadi; Mohammad Reza Aref

Volume 15, Issue 3 , October 2023, , Pages 43-50

https://doi.org/10.22042/isecure.2023.181544

Abstract
  Industrial control systems are widely used in industrial sectors and critical infrastructures to monitor and control industrial processes. Recently, the security of industrial control systems has attracted a lot of attention, because these systems are now increasingly interacting with the Internet. Classic ...  Read More

The Impact of Mobile Payment Quality on User’s Continuance Intention Toward Mobile Payment in Saudi Arabia

Saja Ahmed Albliwi; Hanan Abdullah Alkharmani

Volume 12, Issue 3 , November 2020, , Pages 45-53

https://doi.org/10.22042/isecure.2021.271079.625

Abstract
  With the revolution in mobile technologies and the growing number of mobile internet users, Mobile Payment was born as a convenient channel of communication between customers and firms or organizations. Nowadays, Mobile Payments are on the way to disrupting the traditional Payment methods and contributing ...  Read More

Forensic-Enabled Security as a Service (FESaaS) - A Readiness Framework for Cloud Forensics

Wedad Alawad; Awatef Balobaid

Volume 13, Issue 3 , November 2021, , Pages 49-57

https://doi.org/10.22042/isecure.2021.0.0.0

Abstract
  Digital forensics is a process of uncovering and exploring evidence from digital content. A growth in digital data in recent years has made it challenging for forensic investigators to uncover useful information. Moreover, the applied use of cloud computing has increased significantly in past few years ...  Read More

Android Malware Detection Using One-Class Graph Neural Networks

Fatemeh Deldar; Mahdi Abadi; Mohammad Ebrahimifard

Volume 14, Issue 3 , October 2022, , Pages 51-60

https://doi.org/10.22042/isecure.2022.14.3.6

Abstract
  With the widespread use of Android smartphones, the Android platform has become an attractive target for cybersecurity attackers and malware authors. Meanwhile, the growing emergence of zero-day malware has long been a major concern for cybersecurity researchers. This is because malware that has not ...  Read More

Using ChatGPT as a Static Application Security Testing Tool

Atieh Bakhshandeh; Abdalsamad Keramatfar; Amir Norouzi; Mohammad M. Chekidehkhoun

Volume 15, Issue 3 , October 2023, , Pages 51-58

https://doi.org/10.22042/isecure.2023.182082

Abstract
  In recent years, artificial intelligence has had a conspicuous growth in almost every aspect of life. One of the most applicable areas is security code review, in which a lot of AI-based tools and approaches have been proposed. Recently, ChatGPT has caught a huge amount of attention with its remarkable ...  Read More

A New Derivation of the Leftover Hash Lemma

Marcelo S. Alencar; Karcius D. R. Assis

Volume 12, Issue 3 , November 2020, , Pages 55-58

https://doi.org/10.22042/isecure.2021.271070.622

Abstract
  This paper reviews the characteristics of the main digest algorithms, and presents a new derivation of the leftover hash lemma, using the collision probability to derive an upper bound on the statistical distance between the key and seed joint probability, and the hash bit sequence distribution. The ...  Read More

Artificial Intelligence and Dynamic Analysis-Based Web Application Vulnerability Scanner

Mehmet Ali Yalçınkaya; Ecir Uğur Küçüksille

Volume 16, Issue 1 , January 2024, , Pages 55-77

https://doi.org/10.22042/isecure.2023.367746.847

Abstract
  The widespread use of web applications and running on sensitive data has made them one of the most significant targets of cyber attackers. One of the most crucial security measures that can be taken is the detection and closure of vulnerabilities on web applications before attackers. In this study, a ...  Read More

Identifying Entrepreneurial Influencers on Twitter

Bodor Almotairy; Manal Abdullah; Rabeeh Abbasi

Volume 12, Issue 3 , November 2020, , Pages 59-72

https://doi.org/10.22042/isecure.2021.271108.629

Abstract
  Entrepreneurship involves an immense network of activities, linked via collaborations and information propagation. Information dissemination is extremely important for entrepreneurs. Finding influential users with high levels of interaction and connectivity in social media and involving them in information ...  Read More

Open Web Application Security Project Components with Known Vulnerabilities: A Comprehensive Study

Mohammed S. Albulayhi; Dina M. Ibrahim

Volume 13, Issue 3 , November 2021, , Pages 59-67

https://doi.org/10.22042/isecure.2021.0.0.0

Abstract
  The Open Web Application Security Project (OWASP) is a nonprofit organization battling for the improvements of software protection and enhancing the security of web applications. Moreover, its goal is to make application security “accessible” so that individuals and organizations can make ...  Read More

An Efficient Scheme for Secure Medical Data Sharing in the Cloud

Iman Jafarian; Siavash Khorsandi

Volume 15, Issue 3 , October 2023, , Pages 59-66

https://doi.org/10.22042/isecure.2023.182206

Abstract
  The Internet of Things has significantly improved healthcare with its promise of transforming technological, social, and economic perspectives. Medical devices with wireless internet access enable remote monitoring of patients, and collectively, these increasingly smart and connected medical devices ...  Read More

Towards a Formal Approach for Detection of Vulnerabilities in the Android Permissions System

Amirhosein Sayyadabdi; Behrouz Tork Ladani; Bahman Zamani

Volume 14, Issue 3 , October 2022, , Pages 61-69

https://doi.org/10.22042/isecure.2022.14.3.7

Abstract
  Android is a widely used operating system that employs a permission-based access control model. The Android Permissions System (APS) is responsible for mediating application resource requests. APS is a critical component of the Android security mechanism; hence, a failure in the design of APS can potentially ...  Read More