Volume 16 (2024)
Volume 15 (2023)
Volume 14 (2022)
Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
Android Malware Detection Using One-Class Graph Neural Networks

Fatemeh Deldar; Mahdi Abadi; Mohammad Ebrahimifard

Volume 14, Issue 3 , October 2022, , Pages 51-60

https://doi.org/10.22042/isecure.2022.14.3.6

Abstract
  With the widespread use of Android smartphones, the Android platform has become an attractive target for cybersecurity attackers and malware authors. Meanwhile, the growing emergence of zero-day malware has long been a major concern for cybersecurity researchers. This is because malware that has not ...  Read More

BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms

F. Barani; M. Abadi

Volume 4, Issue 1 , January 2012, , Pages 25-39

https://doi.org/10.22042/isecure.2015.4.1.4

Abstract
  Mobile ad hoc networks (MANETs) are multi-hop wireless networks of mobile nodes constructed dynamically without the use of any fixed network infrastructure. Due to inherent characteristics of these networks, malicious nodes can easily disrupt the routing process. A traditional approach to detect such ...  Read More

BotOnus: an online unsupervised method for Botnet detection

M. Yahyazadeh; M. Abadi

Volume 4, Issue 1 , January 2012, , Pages 51-62

https://doi.org/10.22042/isecure.2015.4.1.6

Abstract
  Botnets are recognized as one of the most dangerous threats to the Internet infrastructure. They are used for malicious activities such as launching distributed denial of service attacks, sending spam, and leaking personal information. Existing botnet detection methods produce a number of good ideas, ...  Read More

A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs

M. Abadi; S. Jalili

Volume 2, Issue 1 , January 2010, , Pages 13-32

https://doi.org/10.22042/isecure.2015.2.1.3

Abstract
  To prevent an exploit, the security analyst must implement a suitable countermeasure. In this paper, we consider cost-sensitive attack graphs (CAGs) for network vulnerability analysis. In these attack graphs, a weight is assigned to each countermeasure to represent the cost of its implementation. There ...  Read More