Volume 16 (2024)
Volume 15 (2023)
Volume 14 (2022)
Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
Research Article
Eigenvalues-based LSB steganalysis

F. Farhat; A. Diyanat; Sh. Ghaemmaghami; M. R. Aref

Volume 4, Issue 2 , July 2012, Pages 97-106

https://doi.org/10.22042/isecure.2013.4.2.1

Abstract
  So far, various components of image characteristics have been used for steganalysis, including the histogram characteristic function, adjacent colors distribution, and sample pair analysis. However, some certain steganography methods have been proposed that can thwart some analysis approaches through ...  Read More

Research Article
Cryptanalysis of GSM encryption algorithm A5/1

V. Amin Ghafari; A. Vardasbi; J. Mohajeri

Volume 4, Issue 2 , July 2012, Pages 107-114

https://doi.org/10.22042/isecure.2013.4.2.2

Abstract
  The A5/1 algorithm is one of the most famous stream cipher algorithms used for over-the-air communication privacy in GSM. The purpose of this paper is to analyze several weaknesses of A5/1, including an improvement to an attack and investigation of the A5/1 state transition. Biham and Dunkelman proposed ...  Read More

Research Article
Improving security of double random phase encoding with chaos theory using fractal images

M. Taheri; S. Mozaffari

Volume 4, Issue 2 , July 2012, Pages 115-124

https://doi.org/10.22042/isecure.2013.4.2.3

Abstract
  This study presents a new method based on the combination of cryptography and information hiding methods. Firstly, the image is encoded by the Double Random Phase Encoding (DRPE) technique. The real and imaginary parts of the encoded image are subsequently embedded into an enlarged normalized host image. ...  Read More

Research Article
Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach

Z. Zali; M. R. Hashemi; H. Saidi

Volume 4, Issue 2 , July 2012, Pages 125-136

https://doi.org/10.22042/isecure.2013.4.2.4

Abstract
  Alert correlation systems attempt to discover the relations among alerts produced by one or more intrusion detection systems to determine the attack scenarios and their main motivations. In this paper a new IDS alert correlation method is proposed that can be used to detect attack scenarios in real-time. ...  Read More

Research Article
Analyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications

E. K. Mabuto; H. S. Venter

Volume 4, Issue 2 , July 2012, Pages 137-150

https://doi.org/10.22042/isecure.2013.4.2.5

Abstract
  The products of graphic design applications leave behind traces of digital information which can be used during a digital forensic investigation in cases where counterfeit documents have been created. This paper analyzes the digital forensics involved in the creation of counterfeit documents. This is ...  Read More

Research Article
A confidence-aware interval-based trust model

H. Shakeri; A. Ghaemi Bafghi

Volume 4, Issue 2 , July 2012, Pages 151-165

https://doi.org/10.22042/isecure.2013.4.2.6

Abstract
  It is a common and useful task in a web of trust to evaluate the trust value between two nodes using intermediate nodes. This technique is widely used when the source node has no experience of direct interaction with the target node, or the direct trust is not reliable enough by itself. If trust is used ...  Read More