Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
1. BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms

F. Barani; M. Abadi

Volume 4, Issue 1 , Winter and Spring 2012, , Pages 25-39

http://dx.doi.org/10.22042/isecure.2015.4.1.4

Abstract
  Mobile ad hoc networks (MANETs) are multi-hop wireless networks of mobile nodes constructed dynamically without the use of any fixed network infrastructure. Due to inherent characteristics of these networks, malicious nodes can easily disrupt the routing process. A traditional approach to detect such ...  Read More

2. BotOnus: an online unsupervised method for Botnet detection

M. Yahyazadeh; M. Abadi

Volume 4, Issue 1 , Winter and Spring 2012, , Pages 51-62

http://dx.doi.org/10.22042/isecure.2015.4.1.6

Abstract
  Botnets are recognized as one of the most dangerous threats to the Internet infrastructure. They are used for malicious activities such as launching distributed denial of service attacks, sending spam, and leaking personal information. Existing botnet detection methods produce a number of good ideas, ...  Read More

3. A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs

M. Abadi; S. Jalili

Volume 2, Issue 1 , Winter and Spring 2010, , Pages 13-32

http://dx.doi.org/10.22042/isecure.2015.2.1.3

Abstract
  To prevent an exploit, the security analyst must implement a suitable countermeasure. In this paper, we consider cost-sensitive attack graphs (CAGs) for network vulnerability analysis. In these attack graphs, a weight is assigned to each countermeasure to represent the cost of its implementation. There ...  Read More