


default search action
ISC International Journal of Information Security, Volume 12
Volume 12, Number 1, January 2020
- Zahra Eskandari, Abbas Ghaemi Bafghi:

Extension of Cube Attack with Probabilistic Equations and its Application on Cryptanalysis of KATAN Cipher. 1-12 - Majid M. Niknam, Sadegh Sadeghi

, Mohammad Reza Aref, Nasour Bagheri:
Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants. 13-23 - Vajiheh Sabeti

, Minoo Shoaei:
New High Secure Network Steganography Method Based on Packet Length. 24-44 - Reza Mortazavi:

Improved Univariate Microaggregation for Integer Values. 35-43 - Shahriar Mohammadi, Amin Namadchian:

Anomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism. 44-54 - Bashir Naderi

, Hossein Kheiri, Vajiheh Vafaei:
Modified Sliding-Mode Control Method for Synchronization a Class of Chaotic Fractional-Order Systems with Application in Encryption. 55-66
Volume 12, Number 2, July 2020
- Mohsen Jahanbani, Nasour Bagheri, Zynolabedin Norouzi:

CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking. 67-80 - Milad Seddigh, Hadi Soleimany:

Enhanced Flush+Reload Attack on AES. 81-89 - Ali Zaghian, Bagher Bagherpour:

A Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions. 91-99 - Mohammad Mahdi Modiri, Javad Mohajeri, Mahmoud Salmasizadeh:

GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication. 101-111 - Mahsa Nooribakhsh, Mahdi MollaMotalebi:

F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management. 113-128 - Maryam Zarezadeh, Maede Ashouri-Talouki, Mohammad Siavashi:

Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems. 129-140
Volume 12, Number 3, November 2020
- Hachem H. Alaoui, El-Kaber Hachem, Cherif Ziti, Mohammed Karim:

The Use of Local Sensitive Hashing for E-learner Face Identification. 1-5 - Aymen M. Al-Kadhimi

, Salim A. Mohammed Ali
, Sami Hasan:
Suspended Stripline Low-pass Filter Design for Wide Stopband Attenuation Applications. 7-12 - Osama Ali Awad, Mais Monqith:

Evaluation of a Wireless ZigBee with PID Controller for Networked Control System Using True Time Toolbox. 13-17 - Abdllkader Esaid, Mary Agoyi, Muhannad Tahboush

:
A Hybrid Encryption Algorithm for Mitigating the Effects of Attacks in Ad Hoc Networks. 19-27 - Sumayia Al-Anazi, Isra Al-Turaiki, Najwa Altwaijry:

CEMD: A Cluster-based Ensemble Motif Discovery Tool. 29-36 - Isra Al-Turaiki, Najwa Altwaijry, Abeer Agil, Haya Aljodhi, Sara Alharbi, Lina Alqassem:

Anomaly-Based Network Intrusion Detection Using Bidirectional Long Short Term Memory and Convolutional Neural Network. 37-44 - Saja Ahmed Albliwi, Hanan Abdullah Alkharmani:

The Impact of Mobile Payment Quality on User?s Continuance Intention Toward Mobile Payment in Saudi Arabia. 45-53 - Marcelo S. Alencar, Karcius D. R. Assis:

A New Derivation of the Leftover Hash Lemma. 55-58 - Bodor Moheel Almotairy, Manal Abdullah, Rabeeh Abbasi:

Identifying Entrepreneurial Influencers on Twitter. 59-72 - Shereen S. Jumaa:

Fuzzy Histogram Equalization and Computer Vision Automated Identification of Microcalcifications in Breast Cancer. 73-79 - Talib M. J. Al Taleb, Sami Hasan, Yaqoob Yousif Mahdi:

Indexed View Technique to Speed-up Data Warehouse Query Processing. 81-85 - Mustapha Bassiri

, Abderrazak Mazouak, Imad Lamniai, Malika Tridane, Said Belaaouad:
The Establishment of a Distance Training Device within the Regional Center of the Taza Education and Training: Administrative Cycle Case. 87-93 - Najah K. Almazmomi:

Knowledge Discovery in Cloud-Computing Environment and the Challenges. 95-99 - Wafa Abdulaziz Alkenazan, Ashraf A. Taha, Mohammed J. F. Alenazi, Wadood Abdul:

Modeling a Cloud-Based Smart Parking WLAN Networks Using IEEE802.11AC Technology. 101-109 - Ghada Al-Hudhud

, Abeer Al-Humamidi:
A Multilingual Infobot in Airports. 111-115 - Abeer S. Al-Humaimeedy, Abeer Salman Al-Hammad, Ghada Al-Hudhud

:
Reverse Image-Based Search Engine for IP Trademarks. 117-127

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














