Research Article
1. A Graph-based Online Feature Selection to Improve Detection of New Attacks

Hajar Dastanpour; Ali Fanian

Volume 14, Issue 2 , July 2022, Pages 115-130

http://dx.doi.org/10.22042/isecure.2022.14.2.1

Abstract
  Today, intrusion detection systems are used in the networks as one of the essential methods to detect new attacks. Usually, these systems deal with a broad set of data and many features. Therefore, selecting proper features and benefitting from previously learned knowledge is suitable for efficiently ...  Read More

Research Article
2. Bypassing Web Application Firewalls Using Deep Reinforcement Learning

Mojtaba Hemmati; Mohammad Ali Hadavi

Volume 14, Issue 2 , July 2022, Pages 131-145

http://dx.doi.org/10.22042/isecure.2022.323140.744

Abstract
  Web application firewalls (WAFs) are used for protecting web applications from attacks such as SQL injection, cross-site request forgery, and cross-site scripting. As a result of the growing complexity of web attacks, WAFs need to be tested and updated on a regular basis. There are various tools and ...  Read More

Research Article
3. Perfect Recovery of Small Tampers Using a Novel Fragile Watermarking Technique Based on Distributed Hamming Code

Faeze Rasouli; Mohammad Taheri

Volume 14, Issue 2 , July 2022, Pages 147-156

http://dx.doi.org/10.22042/isecure.2022.284952.670

Abstract
  Fragile watermarking is a technique of authenticating the originality of the media (e.g., image). Although the watermark is destroyed with any small modification (tamper), it may be used to recover the original image. There is no method yet, based on our knowledge, to guarantee the perfect recovery of ...  Read More

Research Article
4. Revisiting the Security and Efficiency of SP2DAS, 3PDA, and EPPA Smart Grid Security Protocols

Hamid Amiryousefi; Zahra Ahmadian

Volume 14, Issue 2 , July 2022, Pages 157-165

http://dx.doi.org/10.22042/isecure.2022.275064.645

Abstract
  This paper analyses the security and efficiency of some notable privacy preserving data aggregation schemes, SP2DAS, 3PDA, and EPPA. For SP2DAS and 3PDA schemes, We show that despite the designers’ claims, there are efficient forgery attacks on the signature scheme used. We present aselective forgery ...  Read More

Research Article
5. Secure and Imperceptible Image Steganography in Discrete Wavelet Transform Using the XOR Logical Function and Genetic Algorithm

Vajiheh Sabeti; Mahsa Amerehei

Volume 14, Issue 2 , July 2022, Pages 167-179

http://dx.doi.org/10.22042/isecure.2022.274305.641

Abstract
  A steganography system must embed the message in an unseen and unrecognizable manner in the cover signal. Embedding information in transform coefficients, especially Discrete Wavelet Transform (DWT), is one of the most successful approaches in this field. The proposed method in this paper has two main ...  Read More

Research Article
6. Ransomware Detection Based on PE Header Using Convolutional Neural Networks

Farnoush Manavi; Ali Hamzeh

Volume 14, Issue 2 , July 2022, Pages 181-192

http://dx.doi.org/10.22042/isecure.2021.262846.595

Abstract
  With the spread of information technology in human life, data protection is a critical task. On the other hand, malicious programs are developed, which can manipulate sensitive and critical data and restrict access to this data. Ransomware is an example of such a malicious program that encrypts data, ...  Read More

Research Article
7. Attacks to Some Recently Proposed CL-SC Schemes and Presenting a Secure Scheme with KSSTIS

Parvin Rastegari

Volume 14, Issue 2 , July 2022, Pages 193-213

http://dx.doi.org/10.22042/isecure.2022.266258.602

Abstract
  The certificateless public key cryptography (CL-PKC) setting, makes it possible to overcome the problems of the conventional public key infrastructure and the ID-Based public key cryptography, concurrently. A certificateless signcryption (CL-SC) scheme is an important cryptographic primitive which provides ...  Read More

Research Article
8. Location Privacy Preservation for Secondary Users in a Database-Driven Cognitive Radio Network

Zeinab Salami; Mahmoud Ahmadian Attari; Mohammad Reza Aref; Hoda Jannati

Volume 14, Issue 2 , July 2022, Pages 215-227

http://dx.doi.org/10.22042/isecure.2022.243102.568

Abstract
  Since their introduction, cognitive radio networks, as a new solution to the problem of spectrum scarcity, have received great attention from the research society. An important field in database driven cognitive radio network studies is pivoted on their security issues. A critical issue in this context ...  Read More