Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
1. A Hybrid Encryption Algorithm for Mitigating the Effects of Attacks in Ad Hoc Networks

Abdllkader Esaid; Mary Agoyi; Muhannad Tahboush

Articles in Press, Accepted Manuscript, Available Online from 30 November 2020

http://dx.doi.org/10.22042/isecure.2021.271065.619

Abstract
  Ad hoc network is infrastructure-less support, so network nodes are vulnerable to many attacks. Security attacks in Ad-Hoc networks are increasing significantly with time. They communicated and exchanged data should be also secured and kept confidential. Therefore, hybrid cryptography is proposed to ...  Read More

2. Anomaly Detection Using SVM as Classifier and Decision Tree for Optimizing Feature Vectors

Elham Serkani; Hossein Gharaee Garakani; Naser Mohammadzadeh

Volume 11, Issue 2 , Summer and Autumn 2019, , Pages 159-171

http://dx.doi.org/10.22042/isecure.2019.164980.448

Abstract
  Abstract- With the advancement and development of computer network technologies, the way for intruders has become smoother; therefore, to detect threats and attacks, the importance of intrusion detection systems (IDS) as one of the key elements of security is increasing. One of the challenges of intrusion ...  Read More

3. A Survey of Anomaly Detection Approaches in Internet of Things

M. Behniafar; A.R. Nowroozi; H.R. Shahriari

Volume 10, Issue 2 , Summer and Autumn 2018, , Pages 79-92

http://dx.doi.org/10.22042/isecure.2018.116976.408

Abstract
  Internet of Things is an ever-growing network of heterogeneous and constraint nodes which are connected to each other and the Internet. Security plays an important role in such networks. Experience has proved that encryption and authentication are not enough for the security of networks and an Intrusion ...  Read More

4. A hybrid approach for database intrusion detection at transaction and inter-transaction levels

M. Doroudian; H. R. Shahriari

Volume 6, Issue 2 , Summer and Autumn 2014, , Pages 155-167

http://dx.doi.org/10.22042/isecure.2015.6.2.5

Abstract
  Nowadays, information plays an important role in organizations. Sensitive information is often stored in databases. Traditional mechanisms such as encryption, access control, and authentication cannot provide a high level of confidence. Therefore, the existence of Intrusion Detection Systems in databases ...  Read More

5. BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms

F. Barani; M. Abadi

Volume 4, Issue 1 , Winter and Spring 2012, , Pages 25-39

http://dx.doi.org/10.22042/isecure.2015.4.1.4

Abstract
  Mobile ad hoc networks (MANETs) are multi-hop wireless networks of mobile nodes constructed dynamically without the use of any fixed network infrastructure. Due to inherent characteristics of these networks, malicious nodes can easily disrupt the routing process. A traditional approach to detect such ...  Read More

6. Alert correlation and prediction using data mining and HMM

H. Farhadi; M. AmirHaeri; M. Khansari

Volume 3, Issue 2 , Summer and Autumn 2011, , Pages 77-101

http://dx.doi.org/10.22042/isecure.2015.3.2.3

Abstract
  Intrusion Detection Systems (IDSs) are security tools widely used in computer networks. While they seem to be promising technologies, they pose some serious drawbacks: When utilized in large and high traffic networks, IDSs generate high volumes of low-level alerts which are hardly manageable. Accordingly, ...  Read More

7. Moving dispersion method for statistical anomaly detection in intrusion detection systems

J. Dj. Golic'

Volume 1, Issue 2 , Summer and Autumn 2009, , Pages 71-90

http://dx.doi.org/10.22042/isecure.2015.1.2.2

Abstract
  A unified method for statistical anomaly detection in intrusion detection systems is theoretically introduced. It is based on estimating a dispersion measure of numerical or symbolic data on successive moving windows in time and finding the times when a relative change of the dispersion measure is significant. ...  Read More