Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 1 (2009)
REVIEW PAPER
2. Stream ciphers and the eSTREAM project

V. Rijmen

Volume 2, Issue 1 , Winter and Spring 2010, Pages 3-11

http://dx.doi.org/10.22042/isecure.2015.2.1.2

Abstract
  Stream ciphers are an important class of symmetric cryptographic algorithms. The eSTREAM project contributed significantly to the recent increase of activity in this field. In this paper, we present a survey of the eSTREAM project. We also review recent time/memory/data and time/memory/key trade-offs ...  Read More

ORIGINAL RESEARCH PAPER
3. A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs

M. Abadi; S. Jalili

Volume 2, Issue 1 , Winter and Spring 2010, Pages 13-32

http://dx.doi.org/10.22042/isecure.2015.2.1.3

Abstract
  To prevent an exploit, the security analyst must implement a suitable countermeasure. In this paper, we consider cost-sensitive attack graphs (CAGs) for network vulnerability analysis. In these attack graphs, a weight is assigned to each countermeasure to represent the cost of its implementation. There ...  Read More

ORIGINAL RESEARCH PAPER
4. A hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection

M. Saniee Abadeh; J. Habibi

Volume 2, Issue 1 , Winter and Spring 2010, Pages 33-46

http://dx.doi.org/10.22042/isecure.2015.2.1.4

Abstract
  A hybrid approach for intrusion detection in computer networks is presented in this paper. The proposed approach combines an evolutionary-based fuzzy system with an Ant Colony Optimization procedure to generate high-quality fuzzy-classification rules. We applied our hybrid learning approach to network ...  Read More

ORIGINAL RESEARCH PAPER
5. A context-sensitive dynamic role-based access control model for pervasive computing environments

S. Sadat Emami; S. Zokaei

Volume 2, Issue 1 , Winter and Spring 2010, Pages 47-66

http://dx.doi.org/10.22042/isecure.2015.2.1.5

Abstract
  Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar ...  Read More