Volume 15 (2023)
Volume 14 (2022)
Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)


Facts & Figures

Publication starting date








Issue per year


No. of volumes


No. of issues


No. of articles


PDF Download


View Per Article


PDF Download Per Article


Acceptance Rate


Accept Date (Days)


Number of Indexing Databases




The ISC International Journal of Information Security (ISeCureis a peer reviewed scholarly publication by Iranian Society of Cryptology. ISeCure is published biannually in print and online with full texts of articles made available for free on the website of the journal under ISeCure open access policy. ISeCure is devoted to publishing theoretical scholarship on a variety of topics related to information security. The intended audience of the journal is any person with an interest in information security from an academic perspective such as engineers, mathematicians and computer scientists. A partial list of topics for review by the journal can be found in the Aims and Scope section. Manuscript types for submission are research papers, review papers, case reports, short communications and letters to the editor.  More information about the policies of the journal can be found on the About Journal and mostly in the Publication Ethics pages. To start a new submission, please first read the Guide for Authors page for detailed information about manuscript format, style and other requirements. Manuscript submission, refereeing and publishing are completely free of charge. New manuscripts should be submitted online by the corresponding author through the website after registration. Articles published in ISeCure Journal are indexed in the Emerging Sources Citation Index (ESCI) database of Web of Science/ISI and Scopus.

Web of Science Scopus CiteScore
SCImago Journal & Country Rank

Journal Impact Factor



Journal Citation Indicator (JCI)


2022          2023  
   Follow us:                         
0.7   0.13 0.3    0.6   


Research Article
Modified Parse-Tree Based Pattern Extraction Approach for Detecting SQLIA Using Neural Network Model.

Meharaj Begum A; Michael Arock

Volume 16, Issue 1 , January 2024, Pages 1-16


  Whatever malware protection is upcoming, still the data are prone to cyber-attacks. The most threatening Structured Query Language Injection Attack (SQLIA) happens at the database layer of web applications leading to unlimited and unauthorized access to confidential information through malicious code ...  Read More

Research Article
An Overview of Security Attacks in 5G Enabled Technologies: Applications and Use Case Scenarios

Shadab Kalhoro; Farhan Bashir Shaikh; Anam Kalhoro; Junaid Ur Rehman Abbasi; Ramesh Kumar Ayyasamy

Volume 16, Issue 1 , January 2024, Pages 17-35


  With the advancement of ICTs, the fifth generation has developed into an emergent communication platform that supports high speed, low latency, and excellent connectivity to numerous devices with modern radio technology, service-oriented design, and cloud infrastructure. The recent developments in the ...  Read More

Research Article
Safety Guards for Ethereum Smart Contracts

Morteza Amirmohseni; Sadegh Dorri Nogoorani

Volume 16, Issue 1 , January 2024, Pages 37-53


  Smart contracts are applications that are deployed on a blockchain and can be executed through transactions. The code and the state of the smart contracts are persisted on the ledger, and their execution is validated by all blockchain nodes. Smart contracts often hold and manage amounts of cryptocurrency. ...  Read More

Research Article
Artificial Intelligence and Dynamic Analysis-Based Web Application Vulnerability Scanner

Mehmet Ali Yalçınkaya; Ecir Uğur Küçüksille

Volume 16, Issue 1 , January 2024, Pages 55-77


  The widespread use of web applications and running on sensitive data has made them one of the most significant targets of cyber attackers. One of the most crucial security measures that can be taken is the detection and closure of vulnerabilities on web applications before attackers. In this study, a ...  Read More

Research Article
Slowloris Attack Detection Using Adaptive Timeout-Based Approach

Kangkan Talukdar; Debojit Boro

Volume 16, Issue 1 , January 2024, Pages 79-92


  Distributed Denial of Service (DDoS) attacks have become a critical threat to the Web with the increase in web-based transactions and application services offered by the Internet. With the vast resources and techniques easily available to the attackers countering them has become more challenging. They ...  Read More

Research Article
HUAP: Practical Attribute-Based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices

Mostafa Chegenizadeh; Mohammad Ali; Javad Mohajeri; Mohammad Reza Aref

Volume 16, Issue 1 , January 2024, Pages 93-114


  Attribute-based encryption (ABE) is a promising cryptographic mechanism for providing confidentiality and fine-grained access control in the cloud-based area.However, due to high computational overhead, common ABE schemes are not suitable for resource-constrained devices.Additionally, access policies ...  Read More

Research Article
ECKCI: An ECC-Based Authenticated Key Agreement Scheme Resistant to Key Compromise Impersonation Attack for TMIS

Fatemeh Pirmoradian; Mohammad Dakhilalian; Masoumeh Safkhani

Articles in Press, Accepted Manuscript, Available Online from 22 April 2024


  Internet of things (IoT) is an innovation in the world of technology. Continuous technological advancements based on the IoT cloud and booming wireless technology have revolutionized the living of human and remote health monitoring of patients is no exclusion. The Telecare Medicine Information Systems ...  Read More

Research Article
Security Enhancement of an Authentication Scheme Based on DAC and Intel SGX in WSNs

Maryam Rajabzadeh Asaar; Mustafa Isam Ahmed Al-Baghdadi

Articles in Press, Accepted Manuscript, Available Online from 30 April 2024


  Designing authentication techniques suitable for wireless sensor networks (WSNs) with their dedicated consideration is critical due to the nature of public channel. In 2022, Liu et al. presented an authentication protocol which employs dynamic authentication credentials (DACs) and Intel software guard ...  Read More

Research Article
Boomerang Attacks on Reduced-Round Midori64

Mehmet Emin Gönen; Muhammed Said Gündoğan; Kamil Otal

Articles in Press, Accepted Manuscript, Available Online from 12 May 2024


  Midori64 is a lightweight SPN block cipher introduced by Banik et al. at ASIACRYPT 2015 which operates on 64-bit states through 16 rounds using a 128-bit key. In the last decade, Midori64 has been exposed to several attacks intensely. In this paper, we provide the first boomerang attack on Midori64 in ...  Read More

Research Article
Customizable Utility-Privacy Trade-Off: A Flexible Autoencoder-Based Obfuscator

Mohammad Ali Jamshidi; Mohammad Mahdi Mojahedian; Mohammad Reza Aref

Articles in Press, Accepted Manuscript, Available Online from 12 May 2024


  To enhance the accuracy of learning models‎, ‎it becomes imperative to train them on more extensive datasets‎. ‎Unfortunately‎, ‎access to such data is often restricted because data providers are hesitant to share their data due to privacy concerns‎. ‎Hence‎, ‎it ...  Read More

Keywords Cloud