Volume 15 (2023)
Volume 14 (2022)
Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)

 

Facts & Figures

Publication starting date

 2009

h-index

20

i10-index

39

Citations

1410

Issue per year

3

No. of volumes

16

No. of issues

 36

No. of articles

 278

PDF Download

 746,196

View Per Article

 3589.01

PDF Download Per Article

 2684.16

Acceptance Rate

14

Accept Date (Days)

240

Number of Indexing Databases

15

 

 

The ISC International Journal of Information Security (ISeCureis a peer reviewed scholarly publication by Iranian Society of Cryptology. ISeCure is published biannually in print and online with full texts of articles made available for free on the website of the journal under ISeCure open access policy. ISeCure is devoted to publishing theoretical scholarship on a variety of topics related to information security. The intended audience of the journal is any person with an interest in information security from an academic perspective such as engineers, mathematicians and computer scientists. A partial list of topics for review by the journal can be found in the Aims and Scope section. Manuscript types for submission are research papers, review papers, case reports, short communications and letters to the editor.  More information about the policies of the journal can be found on the About Journal and mostly in the Publication Ethics pages. To start a new submission, please first read the Guide for Authors page for detailed information about manuscript format, style and other requirements. Manuscript submission, refereeing and publishing are completely free of charge. New manuscripts should be submitted online by the corresponding author through the website after registration. Articles published in ISeCure Journal are indexed in the Emerging Sources Citation Index (ESCI) database of Web of Science/ISI and Scopus.

Web of Science Scopus CiteScore
SCImago Journal & Country Rank
 

Journal Impact Factor
(JCR)

2022

 

Journal Citation Indicator (JCI)

2022

2022          2023  
   Follow us:                         
0.7   0.13 0.3    0.6   

                   

Research Article
Modified Parse-Tree Based Pattern Extraction Approach for Detecting SQLIA Using Neural Network Model.

Meharaj Begum A; Michael Arock

Volume 16, Issue 1 , January 2024, Pages 1-16

https://doi.org/10.22042/isecure.2023.370697.886

Abstract
  Whatever malware protection is upcoming, still the data are prone to cyber-attacks. The most threatening Structured Query Language Injection Attack (SQLIA) happens at the database layer of web applications leading to unlimited and unauthorized access to confidential information through malicious code ...  Read More

Research Article
An Overview of Security Attacks in 5G Enabled Technologies: Applications and Use Case Scenarios

Shadab Kalhoro; Farhan Bashir Shaikh; Anam Kalhoro; Junaid Ur Rehman Abbasi; Ramesh Kumar Ayyasamy

Volume 16, Issue 1 , January 2024, Pages 17-35

https://doi.org/10.22042/isecure.2023.354872.829

Abstract
  With the advancement of ICTs, the fifth generation has developed into an emergent communication platform that supports high speed, low latency, and excellent connectivity to numerous devices with modern radio technology, service-oriented design, and cloud infrastructure. The recent developments in the ...  Read More

Research Article
Safety Guards for Ethereum Smart Contracts

Morteza Amirmohseni; Sadegh Dorri Nogoorani

Volume 16, Issue 1 , January 2024, Pages 37-53

https://doi.org/10.22042/isecure.2023.365808.846

Abstract
  Smart contracts are applications that are deployed on a blockchain and can be executed through transactions. The code and the state of the smart contracts are persisted on the ledger, and their execution is validated by all blockchain nodes. Smart contracts often hold and manage amounts of cryptocurrency. ...  Read More

Research Article
Artificial Intelligence and Dynamic Analysis-Based Web Application Vulnerability Scanner

Mehmet Ali Yalçınkaya; Ecir Uğur Küçüksille

Volume 16, Issue 1 , January 2024, Pages 55-77

https://doi.org/10.22042/isecure.2023.367746.847

Abstract
  The widespread use of web applications and running on sensitive data has made them one of the most significant targets of cyber attackers. One of the most crucial security measures that can be taken is the detection and closure of vulnerabilities on web applications before attackers. In this study, a ...  Read More

Research Article
Slowloris Attack Detection Using Adaptive Timeout-Based Approach

Kangkan Talukdar; Debojit Boro

Volume 16, Issue 1 , January 2024, Pages 79-92

https://doi.org/10.22042/isecure.2023.392462.938

Abstract
  Distributed Denial of Service (DDoS) attacks have become a critical threat to the Web with the increase in web-based transactions and application services offered by the Internet. With the vast resources and techniques easily available to the attackers countering them has become more challenging. They ...  Read More

Research Article
HUAP: Practical Attribute-Based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices

Mostafa Chegenizadeh; Mohammad Ali; Javad Mohajeri; Mohammad Reza Aref

Volume 16, Issue 1 , January 2024, Pages 93-114

https://doi.org/10.22042/isecure.2023.395028.954

Abstract
  Attribute-based encryption (ABE) is a promising cryptographic mechanism for providing confidentiality and fine-grained access control in the cloud-based area.However, due to high computational overhead, common ABE schemes are not suitable for resource-constrained devices.Additionally, access policies ...  Read More

Keywords Cloud