Volume 16 (2024)
Volume 15 (2023)
Volume 14 (2022)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
Research Article
A Review Study on SQL Injection Attacks, Prevention, and Detection

Mona Alsalamah; Huda Alwabli; Hutaf Alqwifli; Dina M. Ibrahim

Volume 13, Issue 3 , November 2021, Pages 1-10

https://doi.org/10.22042/isecure.2021.0.0.0

Abstract
  The functionality of web-based system can be affected by many threats. In fact, web-based systems provide several services built on databases. This makes them prone to Structured Query Language (SQL) injection attacks. For that reason, many research efforts have been made to deal with such attack. The ...  Read More

Research Article
Broken Authentication and Session Management Vulnerabilities

Hanan Aljoaey; Khawla Almutawa; Ruyuf Alabdali; Dina M.Ibrahim

Volume 13, Issue 3 , November 2021, Pages 11-19

https://doi.org/10.22042/isecure.2021.0.0.0

Abstract
  Web application protection is today’s most important battleground between victim, intruder, and web service resource. User authentication tends to be critical when a legitimate user of the web application abruptly ends contact while the session is still active, and an unauthorized user chooses ...  Read More

Research Article
Cross Site Scripting Attack Review

Afnan Alotaibi; Lujain Alghufaili; Dina M.Ibrahim

Volume 13, Issue 3 , November 2021, Pages 21-30

https://doi.org/10.22042/isecure.2022.0.0.0

Abstract
  At the present period of time, web applications are growing constantly in the whole society with the development of communication technology. Since the utilization of WWW (World Wide Web) expanded and increased since it provides many services, such as sharing data, stay connected and other services. ...  Read More

Research Article
Secure Coding Guidelines — Python

Mohammad Ali A. Hammoudeh; Renad Ibrahim; Lama Alshraryan; Manar Alnomise; Ragad Alhumidan

Volume 13, Issue 3 , November 2021, Pages 31-38

https://doi.org/10.22042/isecure.2021.13.3.0

Abstract
  Recently, the interest in cybercrime and cybersecurity has increased dramatically both in terms of critical security issues and national economic information infrastructure and sensitive dealing policies, such as protection and data privacy. Moreover, the growing threat of cybersecurity has prompted ...  Read More

Research Article
Data Enhancement for Date Fruit Classification Using DCGAN

Norah Alajlan; Meshael Alyahya; Noorah Alghasham; Dina M. Ibrahim

Volume 13, Issue 3 , November 2021, Pages 39-48

https://doi.org/10.22042/isecure.2021.13.3.0

Abstract
  Date fruits are considered essential food and the most important agricultural crop in Saudi Arabia. Where Saudi Arabia produces many of the types of dates per year. Collecting large data for date fruits is a difficult task and consumedtime, besides some of the date types are seasonal. Wherein convolutional ...  Read More

Research Article
Forensic-Enabled Security as a Service (FESaaS) - A Readiness Framework for Cloud Forensics

Wedad Alawad; Awatef Balobaid

Volume 13, Issue 3 , November 2021, Pages 49-57

https://doi.org/10.22042/isecure.2021.0.0.0

Abstract
  Digital forensics is a process of uncovering and exploring evidence from digital content. A growth in digital data in recent years has made it challenging for forensic investigators to uncover useful information. Moreover, the applied use of cloud computing has increased significantly in past few years ...  Read More

Research Article
Open Web Application Security Project Components with Known Vulnerabilities: A Comprehensive Study

Mohammed S. Albulayhi; Dina M. Ibrahim

Volume 13, Issue 3 , November 2021, Pages 59-67

https://doi.org/10.22042/isecure.2021.0.0.0

Abstract
  The Open Web Application Security Project (OWASP) is a nonprofit organization battling for the improvements of software protection and enhancing the security of web applications. Moreover, its goal is to make application security “accessible” so that individuals and organizations can make ...  Read More

Research Article
Human Activity Recognition Based on Multi-Sensors in a Smart Home Using Deep Learning

Musbah Aqel; Munsif Sokiyna

Volume 13, Issue 3 , November 2021, Pages 69-78

https://doi.org/10.22042/isecure.2021.13.3.0

Abstract
  Tracking or taking care of elderly people when they live alone is much challenging area. Because most of the aged people suffering from some health issues like Alzheimer, diabetes, and hypertension, so in case happening any abnormal activity or any emergency situation since they live alone and there ...  Read More