Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
REVIEW PAPER
2. Moving dispersion method for statistical anomaly detection in intrusion detection systems

J. Dj. Golic'

Volume 1, Issue 2 , Summer and Autumn 2009, Pages 71-90

http://dx.doi.org/10.22042/isecure.2015.1.2.2

Abstract
  A unified method for statistical anomaly detection in intrusion detection systems is theoretically introduced. It is based on estimating a dispersion measure of numerical or symbolic data on successive moving windows in time and finding the times when a relative change of the dispersion measure is significant. ...  Read More

ORIGINAL RESEARCH PAPER
3. Security testing of session initiation protocol implementations

I. G. Harris; T. Alrahem; A. Chen; N. DiGiuseppe; J. Gee; Sh. P. Hsiao; S. Mattox; T. Park; S. Selvaraj; A. Tam; M. Carlsson

Volume 1, Issue 2 , Summer and Autumn 2009, Pages 91-103

http://dx.doi.org/10.22042/isecure.2015.1.2.3

Abstract
  The mechanisms which enable the vast majority of computer attacks are based on design and programming errors in networked applications. The growing use of voice over IP (VOIP) phone technology makes these phone applications potential targets. We present a tool to perform security testing of VOIP applications ...  Read More

ORIGINAL RESEARCH PAPER
4. Image flip CAPTCHA

M. Tariq Banday; N. A. Shah

Volume 1, Issue 2 , Summer and Autumn 2009, Pages 105-123

http://dx.doi.org/10.22042/isecure.2015.1.2.4

Abstract
  The massive and automated access to Web resources through robots has made it essential for Web service providers to make some conclusion about whether the "user" is a human or a robot. A Human Interaction Proof (HIP) like Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) ...  Read More

ORIGINAL RESEARCH PAPER
5. An efficient blind signature scheme based on the elliptic curve discrete logarithm problem

M. Nikooghadam; A. Zakerolhosseini

Volume 1, Issue 2 , Summer and Autumn 2009, Pages 125-131

http://dx.doi.org/10.22042/isecure.2015.1.2.5

Abstract
  Elliptic Curve Cryptosystems (ECC) have recently received significant attention by researchers due to their high performance such as low computational cost and small key size. In this paper a novel untraceable blind signature scheme is presented. Since the security of proposed method is based on difficulty ...  Read More