Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
1. The Use of Local Sensitive Hashing for E-learner Face Identification

Hachem H. Alaoui; Elkaber Hachem; Cherif Ziti; Mohammed Karim

Articles in Press, Accepted Manuscript, Available Online from 30 November 2020

http://dx.doi.org/10.22042/isecure.2021.271051.612

Abstract
  Because face can reveal so much hidden information, we need to interpret these data and benefit from them. Hence, our paper shows a new and productive facial image representation based on local sensitive hashing (LSH). This strategy makes it conceivable to recognize the students who pursue their preparation ...  Read More

2. Suspended Stripline Low-pass Filter Design for Wide Stopband Attenuation Applications

Aymen M. Al-Kadhimi; Salim A. Mohammed Ali; Sami Hasan

Articles in Press, Accepted Manuscript, Available Online from 30 August 2020

http://dx.doi.org/10.22042/isecure.2021.271055.613

Abstract
  This paper involves the design of asymmetrical generalized Chebyshev low-pass filter realized with a suspended substrate stripline. The study presents the synthesis and design of an asymmetrical prototype with a degree of 11, the cut-off frequency of 2.5 GHz, better than 26 dB as passband return loss ...  Read More

3. CEMD: A Cluster-based Ensemble Motif Discovery Tool

Sumayia Al-Anazi; Isra Al-Turaiki; Najwa Altwaijry

Articles in Press, Accepted Manuscript, Available Online from 30 November 2020

http://dx.doi.org/10.22042/isecure.2021.271073.623

Abstract
  Motif discovery is a challenging problem in bioinformatics. It is an essential step towards understanding gene regulation. Although numerous algorithms and tools have been proposed in the literature, the accuracy of motif finding is still low. In this paper, we tackle the motif discovery problem using ...  Read More

4. Anomaly-Based Network Intrusion Detection Using Bidirectional Long Short Term Memory and Convolutional Neural Network

Isra Al-Turaiki; Najwa Altwaijry; Abeer Agil; Haya Aljodhi; sara Alharbi; Lina Alqassem

Articles in Press, Accepted Manuscript, Available Online from 30 August 2020

http://dx.doi.org/10.22042/isecure.2021.271076.624

Abstract
  With present-day technological advancements, the number of devices connected to the Internet has increased dramatically. Cybersecurity attacks are increasingly becoming a threat to individuals and organizations. Contemporary security frameworks incorporate Network Intrusion Detection Systems (NIDS). ...  Read More

5. The Impact of Mobile Payment Quality on User’s Continuance Intention Toward Mobile Payment in Saudi Arabia

Saja Ahmed Albliwi; Hanan Abdullah Alkharmani

Articles in Press, Accepted Manuscript, Available Online from 30 November 2020

http://dx.doi.org/10.22042/isecure.2021.271079.625

Abstract
  With the revolution in mobile technologies and the growing number of mobile internet users, Mobile Payment was born as a convenient channel of communication between customers and firms or organizations. Nowadays, Mobile Payments are on the way to disrupting the traditional Payment methods and contributing ...  Read More

6. The Establishment of a Distance Training Device within the Regional Center of the Taza Education and Training: Administrative Cycle Case

Mustapha Bassiri; Abderrazak Mazouak; Imad Lamniai; Malika Tridane; Said Belaaouad; Said Belaaouad

Articles in Press, Accepted Manuscript, Available Online from 14 November 2020

http://dx.doi.org/10.22042/isecure.2021.271064.618

Abstract
  The application of New Information and Communication Technologies (NICT) in the field of training led to the creation of this new reality called distance learning. Described as the marriage of multimedia (sound, image, text) and the Internet (online distribution, interactivity) DT has no doubt allowed ...  Read More