Volume 16 (2024)
Volume 15 (2023)
Volume 14 (2022)
Volume 13 (2021)
Volume 12 (2020)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
Research Article
Interdependent Security Game Design over Constrained Linear Influence Networks

Seyed Alireza Hasheminasab; Behrouz Tork Ladani; Tansu Alpcan

Volume 11, Issue 2 , July 2019, Pages 95-111

https://doi.org/10.22042/isecure.2019.186923.467

Abstract
  In today's highly interconnected networks, security of the entities are often interdependent. This means security decisions of the agents are not only influenced by their own costs and constraints, but also are affected by their neighbors’ decisions. Game theory provides a rich set of tools to ...  Read More

Research Article
A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications

Majid Bayat; Zahra Zare Jousheghani; Ashok Kumar Das; Pitam Singh; Saru Kumari; Mohammad Reza Aref

Volume 11, Issue 2 , July 2019, Pages 113-128

https://doi.org/10.22042/isecure.2019.161366.445

Abstract
  Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important ...  Read More

Research Article
Relaxed Differential Fault Analysis of SHA-3

S.Ehsan Hosiny Nezhad; Masoumeh Safkhani; Nasour Bagheri

Volume 11, Issue 2 , July 2019, Pages 129-143

https://doi.org/10.22042/isecure.2019.184302.464

Abstract
  In this paper, we propose a new method of differential fault analysis of SHA-3 which is based on the differential relations of the algorithm. Employing those differential relations in the fault analysis of SHA-3 gives new features to the proposed attacks, e.g., the high probability of fault detection ...  Read More

Research Article
New Fixed Point Attacks on GOST2 Block Cipher

Siavash Ahmadi; Mohammad Reza Aref

Volume 11, Issue 2 , July 2019, Pages 145-158

https://doi.org/10.22042/isecure.2019.140663.424

Abstract
  GOST block cipher designed in the 1970s and published in 1989 as the Soviet and Russian standard GOST 28147-89. In order to enhance the security of GOST block cipher after proposing various attacks on it, designers published a modified version of GOST, namely GOST2, in 2015 which has a new key schedule ...  Read More

Research Article
Anomaly Detection Using SVM as Classifier and Decision Tree for Optimizing Feature Vectors

Elham Serkani; Hossein Gharaee Garakani; Naser Mohammadzadeh

Volume 11, Issue 2 , July 2019, Pages 159-171

https://doi.org/10.22042/isecure.2019.164980.448

Abstract
  Abstract- With the advancement and development of computer network technologies, the way for intruders has become smoother; therefore, to detect threats and attacks, the importance of intrusion detection systems (IDS) as one of the key elements of security is increasing. One of the challenges of intrusion ...  Read More

Research Article
Detection of Fake Accounts in Social Networks Based on One Class Classification

Mohammad Reza Mohammadrezaei; Mohammad Ebrahim Shiri; Amir Masoud Rahmani

Volume 11, Issue 2 , July 2019, Pages 173-183

https://doi.org/10.22042/isecure.2019.165312.450

Abstract
  Detection of fake accounts on social networks is a challenging process. The previous methods in identification of fake accounts have not considered the strength of the users’ communications, hence reducing their efficiency. In this work, we are going to present a detection method based on the users’ ...  Read More