Volume 14 (2022)
Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)

Research Article
1. Ransomware Detection Based on PE Header Using Convolutional Neural Networks

Farnoush Manavi; Ali Hamzeh

Articles in Press, Accepted Manuscript, Available Online from 28 August 2021

http://dx.doi.org/10.22042/isecure.2021.262846.595

Abstract
  With the spread of information technology in human life, data protection is a critical task. On the other hand, malicious programs are developed, which can manipulate sensitive and critical data and restrict access to this data. Ransomware is an example of such a malicious program that encrypts data, ...  Read More

Research Article
2. A Graph-based Online Feature Selection to Improve Detection of New Attacks

Hajar Dastanpour; Ali Fanian

Articles in Press, Accepted Manuscript, Available Online from 08 January 2022

http://dx.doi.org/10.22042/isecure.2022.262485.590

Abstract
  Today, intrusion detection systems are used in the networks as one of the essential methods to detect new attacks. Usually, these systems deal with a broad set of data and many features. Therefore, selecting proper features and benefitting from previously learned knowledge is suitable for efficiently ...  Read More

Research Article
3. Revisiting the Security and Efficiency of SP2DAS, 3PDA, and EPPA Smart Grid Security Protocols

Hamid Amiryousefi; Zahra Ahmadian

Articles in Press, Accepted Manuscript, Available Online from 08 January 2022

http://dx.doi.org/10.22042/isecure.2022.275064.645

Abstract
  This paper analyses the security and efficiency of some notable privacy preserving data aggregation schemes, SP2DAS, 3PDA, and EPPA. For SP2DAS and 3PDA schemes, We show that despite the designers’ claims, there are efficient forgery attacks on the signature scheme used. We present aselective forgery ...  Read More

Research Article
4. Perfect Recovery of Small Tampers Using a Novel Fragile Watermarking Technique Based on Distributed Hamming Code

Faeze Rasouli; Mohammad Taheri

Articles in Press, Accepted Manuscript, Available Online from 22 January 2022

http://dx.doi.org/10.22042/isecure.2022.284952.670

Abstract
  Fragile watermarking is a technique of authenticating the originality of the media (e.g., image). Although the watermark is destroyed with any small modification (tamper), it may be used to recover the original image. There is no method yet, based on our knowledge, to guarantee the perfect recovery of ...  Read More