Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
1. STLR: a novel danger theory based structural TLR algorithm

R. Azmi; B. Pishgoo

Volume 5, Issue 2 , Summer and Autumn 2013, , Pages 209-225

http://dx.doi.org/10.22042/isecure.2014.5.2.7

Abstract
  Artificial Immune Systems (AIS) have long been used in the field of computer security and especially in Intrusion Detection systems. Intrusion detection based on AISs falls into two main categories. The first generation of AIS is inspired from adaptive immune reactions but, the second one which is called ...  Read More

2. Private Key based query on encrypted data

H. Afzali; H. Nemati; R. Azmi

Volume 4, Issue 1 , Winter and Spring 2012, , Pages 41-50

http://dx.doi.org/10.22042/isecure.2015.4.1.5

Abstract
  Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data ...  Read More