Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
126. The Role of Packet Tracer in Learning Wireless Networks and Managing IoT Devices

Rawan Flifel

Volume 11, Issue 3 , Summer and Autumn 2019, , Pages 35-38


  Wireless networks, Internet of Things (IoT), Internet of Everything (IoE), and smart homes have become extremely important terms in our present-day life. Most of the buildings, companies, institutions, and even homes depend onthese technologies for interaction, communication, automation, and ...  Read More

127. BotOnus: an online unsupervised method for Botnet detection

M. Yahyazadeh; M. Abadi

Volume 4, Issue 1 , Winter and Spring 2012, , Pages 51-62


  Botnets are recognized as one of the most dangerous threats to the Internet infrastructure. They are used for malicious activities such as launching distributed denial of service attacks, sending spam, and leaking personal information. Existing botnet detection methods produce a number of good ideas, ...  Read More

128. Dwarf Frankenstein is still in your memory: tiny code reuse attacks

A.A Sadeghi; F. Aminmansour; H.R. Shahriari

Volume 9, Issue 1 , Winter and Spring 2017, , Pages 53-72


  Code reuse attacks such as return oriented programming and jump oriented programming are the most popular exploitation methods among attackers. A large number of practical and non-practical defenses are proposed that differ in their overhead, the source code requirement, detection rate and implementation ...  Read More

129. Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions

R. Ramezanian

Volume 1, Issue 1 , Winter and Spring 2009, , Pages 55-67


  Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role ...  Read More

130. BotRevealer: Behavioral Detection of Botnets based on Botnet Life-cycle

E. Khoshhalpour; H. R. Shahriari

Volume 10, Issue 1 , Winter and Spring 2018, , Pages 55-61


  Nowadays, botnets are considered as essential tools for planning serious cyber attacks. Botnets are used to perform various malicious activities such as DDoS attacks and sending spam emails. Different approaches are presented to detect botnets; however most of them may be ineffective when ...  Read More

131. Modified Sliding-Mode Control Method for Synchronization a Class of Chaotic Fractional-Order Systems with Application in Encryption

Bashir Naderi; Hossein Kheiri; Vajiheh Vafaei

Volume 12, Issue 1 , Winter and Spring 2020, , Pages 55-66


  In this study, we propose a secure communication scheme based on the synchronization of two identical fractional-order chaotic systems. The fractional-order derivative is in Caputo sense, and for synchronization, we use a robust sliding-mode control scheme. The designed sliding surface is taken simply ...  Read More

132. Biclique Cryptanalysis of Block Ciphers LBlock and TWINE-80 with Practical Data Complexity

Siavash Ahmadi; Zahra Ahmadian; Javad Mohajeri; Mohammad Reza Aref

Volume 11, Issue 1 , Winter and Spring 2019, , Pages 57-74


  In the biclique attack, a shorter biclique usually results in less data complexity, but at the expense of more computational complexity. The early abort technique can be used in partial matching part of the biclique attack in order to slightly reduce the computations. In this paper, we make use of this ...  Read More

133. GGRA: a grouped gossip-based reputation aggregation algorithm

S. Ghasemi Falavarjani; Behrouz Tork Ladani; S. Ghasemi

Volume 7, Issue 1 , Winter and Spring 2015, , Pages 59-74


  An important issue in P2P networks is the existence of malicious nodes that decreases the performance of such networks. Reputation system in which nodes are ranked based on their behavior, is one of the proposed solutions to detect and isolate malicious (low ranked) nodes. Gossip Trust is an interesting ...  Read More

134. Unauthenticated event detection in wireless sensor networks using sensors co-coverage

M. Kamarei; A. Patooghy; M. Fazeli

Volume 8, Issue 1 , Winter and Spring 2016, , Pages 61-71


  Wireless Sensor Networks (WSNs) offer inherent packet redundancy since each point within the network area is covered by more than one sensor node. This phenomenon, which is known as sensors co-coverage, is used in this paper to detect unauthenticated events. Unauthenticated event broadcasting in a WSN ...  Read More

135. Improving Tor security against timing and traffic analysis attacks with fair randomization

A. Tavakoly; R. Ebrahimi Atani

Volume 6, Issue 1 , Winter and Spring 2014, , Pages 67-76


  The Tor network is probably one of the most popular online anonymity systems in the world. It has been built based on the volunteer relays from all around the world. It has a strong scientific basis which is structured very well to work in low latency mode that makes it suitable for tasks such as web ...  Read More

136. Robust multiplicative video watermarking using statistical modeling

A. Diyanat; M. A. Akhaee; Sh. Ghaemmaghami

Volume 5, Issue 1 , Winter and Spring 2013, , Pages 83-95


  The present paper is intended to present a robust multiplicative video watermarking scheme. In this regard, the video signal is segmented into 3-D blocks like cubes, and then, the 3-D wavelet transform is applied to each block. The low frequency components of the wavelet coefficients are then used for ...  Read More

137. Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems

Maryam Zarezadeh; Maede Ashouri-Talouki; Mohammad Siavashi

Volume 12, Issue 2 , Summer and Autumn 2020, , Pages 117-128


  Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha ...  Read More

138. Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)

N. Soltani; R. Bohlooli; R. Jalili

Volume 10, Issue 2 , Summer and Autumn 2018, , Pages 129-139


  One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings ...  Read More

139. Enhancing privacy of recent authentication schemes for low-cost RFID systems

K. Baghery; B. Abdolmaleki; B. Akhbari; M. R. Aref

Volume 7, Issue 2 , Summer and Autumn 2015, , Pages 135-149


  Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been ...  Read More

140. Analyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications

E. K. Mabuto; H. S. Venter

Volume 4, Issue 2 , Summer and Autumn 2012, , Pages 137-150


  The products of graphic design applications leave behind traces of digital information which can be used during a digital forensic investigation in cases where counterfeit documents have been created. This paper analyzes the digital forensics involved in the creation of counterfeit documents. This is ...  Read More

141. Quantitative evaluation of software security: an approach based on UML/SecAM and evidence theory

A. Sedaghatbaf; M. Abdollahi Azgomi

Volume 8, Issue 2 , Summer and Autumn 2016, , Pages 141-153


  Quantitative and model-based prediction of security in the architecture design stage facilitates early detection of design faults hence reducing modification costs in subsequent stages of software life cycle. However, an important question arises with respect to the accuracy of input parameters. In practice, ...  Read More

142. Phishing website detection using weighted feature line embedding

M. Imani; Gh. A. Montazer

Volume 9, Issue 2 , Summer and Autumn 2017, , Pages 147-159


  The aim of phishing is tracing the users' s private information without their permission by designing a new website which mimics the trusted website. The specialists of information technology do not agree on a unique definition for the discriminative features that characterizes the phishing websites. ...  Read More

143. Anomaly Detection Using SVM as Classifier and Decision Tree for Optimizing Feature Vectors

Elham Serkani; Hossein Gharaee Garakani; Naser Mohammadzadeh

Volume 11, Issue 2 , Summer and Autumn 2019, , Pages 159-171


  Abstract- With the advancement and development of computer network technologies, the way for intruders has become smoother; therefore, to detect threats and attacks, the importance of intrusion detection systems (IDS) as one of the key elements of security is increasing. One of the challenges of intrusion ...  Read More

144. An extended feature set for blind image steganalysis in contourlet domain

E. Shakeri; Sh. Ghaemmaghami

Volume 6, Issue 2 , Summer and Autumn 2014, , Pages 169-181


  The aim of image steganalysis is to detect the presence of hidden messages in stego images. We propose a blind image steganalysis method in Contourlet domain and then show that the embedding process changes statistics of Contourlet coefficients. The suspicious image is transformed into Contourlet space, ...  Read More

145. Convertible limited (multi-) verifier signature: new constructions and applications

S. Avizheh; M. Rajabzadeh Asaar; M. Salmasizadeh

Volume 5, Issue 2 , Summer and Autumn 2013, , Pages 189-208


  A convertible limited (multi-) verifier signature (CL(M)VS) provides controlled verifiability and preserves the privacy of the signer. Furthermore, limited verifier(s) can designate the signature to a third party or convert it into a publicly verifiable signature upon necessity. In this proposal, we ...  Read More

146. Face Recognition Based Rank Reduction SVD Approach

Omed Hassan Ahmed; Joan Lu; Qiang Xu; Muzhir Shaban Al-Ani

Volume 11, Issue 3 , Summer and Autumn 2019, , Pages 39-50


  Standard face recognition algorithms that use standard feature extraction techniques always suffer from image performance degradation. Recently, singular value decomposition and low-rank matrix are applied in many applications,including pattern recognition and feature extraction. The main objective ...  Read More

147. SEIMCHA: a new semantic image CAPTCHA using geometric transformations

M. Mehrnejad; A. Ghaemi Bafghi; A. Harati; E. Toreini

Volume 4, Issue 1 , Winter and Spring 2012, , Pages 63-76


  As protection of web applications are getting more and more important every day, CAPTCHAs are facing booming attention both by users and designers. Nowadays, it is well accepted that using visual concepts enhance security and usability of CAPTCHAs. There exist few major different ideas for designing ...  Read More

148. A Decentralized Online Sortition Protocol

R. Ramezanian; M. Pourpouneh

Volume 10, Issue 1 , Winter and Spring 2018, , Pages 63-69


  We propose a new online sortition protocol which is decentralized. We argue that our protocol has safety, fairness, randomness, non-reputation and openness properties. Sortition is a process that makes random decision and it is used in competitions and lotteries to determine who is the winner. In the ...  Read More

149. A new method for accelerating impossible differential cryptanalysis and its application on LBlock

A. Khalesi; H. Bahramgiri; D. Mansuri

Volume 8, Issue 1 , Winter and Spring 2016, , Pages 73-84


  Impossible differential cryptanalysis, the extension of differential cryptanalysis, is one of the most efficient attacks against block ciphers. This cryptanalysis method has been applied to most of the block ciphers and has shown significant results. Using structures, key schedule considerations, early ...  Read More

150. An automatic test case generator for evaluating implementation of access control policies

M. Safarzadeh; M. Taghizadeh; B. Zamani; B. Tork Ladani

Volume 9, Issue 1 , Winter and Spring 2017, , Pages 73-91


  One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such policies may lead to undesirable outcomes. For testing the implementation of access ...  Read More