Volume 16 (2024)
Volume 15 (2023)
Volume 14 (2022)
Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
Towards Event Aggregation for Reducing the Volume of Logged Events During IKC Stages of APT Attacks

Ali Ahmadian Ramaki; Abbas Ghaemi-Bafghi; Abbas Rasoolzadegan

Volume 15, Issue 2 , July 2023, , Pages 178-215


  Nowadays, targeted attacks like Advanced Persistent Threats (APTs) has become one of the major concern of many enterprise networks. As a common approach to counter these attacks, security staff deploy a variety of heterogeneous security and non-security sensors at different lines of defense (Network, ...  Read More

Extension of Cube Attack with Probabilistic Equations and its Application on Cryptanalysis of KATAN Cipher

Zahra Eskandari; Abbas Ghaemi Bafghi

Volume 12, Issue 1 , January 2020, , Pages 1-12


  Cube Attack is a successful case of Algebraic Attack. Cube Attack consists of two phases, linear equation extraction and solving the extracted equation system. Due to the high complexity of equation extraction phase in finding linear equations, we can extract nonlinear ones that could be approximated ...  Read More

A confidence-aware interval-based trust model

H. Shakeri; A. Ghaemi Bafghi

Volume 4, Issue 2 , July 2012, , Pages 151-165


  It is a common and useful task in a web of trust to evaluate the trust value between two nodes using intermediate nodes. This technique is widely used when the source node has no experience of direct interaction with the target node, or the direct trust is not reliable enough by itself. If trust is used ...  Read More