Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
1. A novel local search method for microaggregation

R. Mortazavi; S. Jalili

Volume 7, Issue 1 , Winter and Spring 2015, , Pages 15-26

http://dx.doi.org/10.22042/isecure.2015.7.1.3

Abstract
  In this paper, we propose an effective microaggregation algorithm to produce a more useful protected data for publishing. Microaggregation is mapped to a clustering problem with known minimum and maximum group size constraints. In this scheme, the goal is to cluster n records into groups of at least ...  Read More

2. A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs

M. Abadi; S. Jalili

Volume 2, Issue 1 , Winter and Spring 2010, , Pages 13-32

http://dx.doi.org/10.22042/isecure.2015.2.1.3

Abstract
  To prevent an exploit, the security analyst must implement a suitable countermeasure. In this paper, we consider cost-sensitive attack graphs (CAGs) for network vulnerability analysis. In these attack graphs, a weight is assigned to each countermeasure to represent the cost of its implementation. There ...  Read More