Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
ORIGINAL RESEARCH PAPER
2. Eigenvalues-based LSB steganalysis

F. Farhat; A. Diyanat; Sh. Ghaemmaghami; M. R. Aref

Volume 4, Issue 2 , Summer and Autumn 2012, Pages 97-106

http://dx.doi.org/10.22042/isecure.2013.4.2.1

Abstract
  So far, various components of image characteristics have been used for steganalysis, including the histogram characteristic function, adjacent colors distribution, and sample pair analysis. However, some certain steganography methods have been proposed that can thwart some analysis approaches through ...  Read More

ORIGINAL RESEARCH PAPER
3. Cryptanalysis of GSM encryption algorithm A5/1

V. Amin Ghafari; A. Vardasbi; J. Mohajeri

Volume 4, Issue 2 , Summer and Autumn 2012, Pages 107-114

http://dx.doi.org/10.22042/isecure.2013.4.2.2

Abstract
  The A5/1 algorithm is one of the most famous stream cipher algorithms used for over-the-air communication privacy in GSM. The purpose of this paper is to analyze several weaknesses of A5/1, including an improvement to an attack and investigation of the A5/1 state transition. Biham and Dunkelman proposed ...  Read More

ORIGINAL RESEARCH PAPER
4. Improving security of double random phase encoding with chaos theory using fractal images

M. Taheri; S. Mozaffari

Volume 4, Issue 2 , Summer and Autumn 2012, Pages 115-124

http://dx.doi.org/10.22042/isecure.2013.4.2.3

Abstract
  This study presents a new method based on the combination of cryptography and information hiding methods. Firstly, the image is encoded by the Double Random Phase Encoding (DRPE) technique. The real and imaginary parts of the encoded image are subsequently embedded into an enlarged normalized host image. ...  Read More

ORIGINAL RESEARCH PAPER
5. Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach

Z. Zali; M. R. Hashemi; H. Saidi

Volume 4, Issue 2 , Summer and Autumn 2012, Pages 125-136

http://dx.doi.org/10.22042/isecure.2013.4.2.4

Abstract
  Alert correlation systems attempt to discover the relations among alerts produced by one or more intrusion detection systems to determine the attack scenarios and their main motivations. In this paper a new IDS alert correlation method is proposed that can be used to detect attack scenarios in real-time. ...  Read More

ORIGINAL RESEARCH PAPER
6. Analyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications

E. K. Mabuto; H. S. Venter

Volume 4, Issue 2 , Summer and Autumn 2012, Pages 137-150

http://dx.doi.org/10.22042/isecure.2013.4.2.5

Abstract
  The products of graphic design applications leave behind traces of digital information which can be used during a digital forensic investigation in cases where counterfeit documents have been created. This paper analyzes the digital forensics involved in the creation of counterfeit documents. This is ...  Read More

ORIGINAL RESEARCH PAPER
7. A confidence-aware interval-based trust model

H. Shakeri; A. Ghaemi Bafghi

Volume 4, Issue 2 , Summer and Autumn 2012, Pages 151-165

http://dx.doi.org/10.22042/isecure.2013.4.2.6

Abstract
  It is a common and useful task in a web of trust to evaluate the trust value between two nodes using intermediate nodes. This technique is widely used when the source node has no experience of direct interaction with the target node, or the direct trust is not reliable enough by itself. If trust is used ...  Read More