


default search action
ISC International Journal of Information Security, Volume 17
Volume 17, Number 1, January 2025
- Maryam Rajabzadeh Asaar, Mustafa Husam Shareef Alrzij:
An Authenticated Key Establishment Protocol with Perfect Forward Secrecy in Smart Grids. 1-12 - Sedigheh Khajouei-Nejad, Sam Jabbehdari, Hamid Haj Seyyed Javadi, Seyed Mohammad Hossein Moattar:
Enhancing Lattice-Based Attribute-Based Encryption with Robust Fine-Grained Access Policies. 13-23 - Motahareh Dehghan, Babak Sadeghiyan, Erfan Khosravian, Alireza Sedighi Moghadam, Farshid Nooshi:
ProAPT: Projection of APTs with Deep Reinforcement Learning. 25-41 - Ala Ekramifard, Haleh Amintoosi, Seyed Amin Hosseini Seno:
Detection of Membership Inference Attacks on GAN Models. 43-57 - Navid Shirmohammadi, Behrouz Tork Ladani:
CST-SDL: A Scenario Description Language for Collaborative Security Training in Cyber Ranges. 59-73 - Gholam Reza Moghissi, Ali Payandeh:
Design of an Accurate BKZ Simulation. 75-106
Volume 17, Number 2, July 2025
- Hossein Shadabfar, Motahareh Dehghan, Babak Sadeghian:
DSRL-APT-2023: A New Synthetic Dataset for Advanced Persistent Threats. 107-116 - Ebrahim Raeisian Dashtaki, Shahrokh Ghaemmaghami:
A New Bit-Wise Approach for Image-in-Audio Steganography Using Deep Learning. 117-124 - Masroor Hajari, Mahmoud Salmasizadeh, Javad Mohajeri, Siavash Ahmadi, Shahram Rasoolzadeh:
Impossible Differential Cryptanalysis of Reduced-Round mCrypton-64. 125-135 - Elahe Farshadfar, Amir Mahdi Sadeghzadeh Mesgar, Rasool Jalili:
Divergent Twins Fencing: Protecting Deep Neural Networks Against Query-based Black-box Adversarial Attacks. 137-150 - Farnoosh Hamednejad, Javad Mohajeri, Mohammad Reza Aref:
Attacking Two Pairing-Free Ciphertext-Policy Attribute-Based Encryption Schemes. 151-160 - Amirhossein Hadavi, Mohammad Mahdi Mojahedian, Mohammad Reza Aref:
Over-the-Air Federated Adaptive Data Analysis: Preserving Accuracy via Opportunistic Differential Privacy. 161-169 - Reihaneh Sotoudeh, Taraneh Eghlidos, Javad Mohajeri:
Security Weaknesses of Some Policy-Hiding Attribute-Based Encryption Schemes. 171-178 - Mehrad Jaberi, Hamid Mala, Seyede Marzieh Sadat Madani:
Cryptanalysis of Two Authenticated Key Agreement Protocols in Multi-Server Environments. 179-187 - Maryam Azadmanesh:
A Fine-Grained Hybrid Inversion-Based Membership Inference Attack Against GANs. 189-198 - Atiyeh Mirzaie, Siavash Ahmadi, Mohammad Reza Aref:
Division Property-Based Integral Attack on Reduced-Round SAND-128. 199-207 - Mojtaba Shirinjani, Mojtaba Amiri, Amirhosein Salehi, Pouria Arefi Jamal, Rasoul Khazaei Laki, Seyed Hatef Sadegh Esfahani, Siavash Ahmadi, Masoumeh Koochak Shooshtari, Mohammad Reza Aref:
Spotting and Mitigating DDoS Attacks Using Deep Learning for Online Traffic Analysis. 209-221 - Narges Mokhtari, Navid Vafaei, Sadegh Sadeghi, Nasour Bagheri:
Differential Fault Analysis of the BipBip Block Cipher. 223-232 - Amirhosein Salehi, Siavash Ahmadi, Mohammad Reza Aref:
A Lightweight Online Intrusion Detection and Localization Framework for Industrial Control Systems. 233-241 - Hossein Naderi Varandi, Raziye Salarifard:
A Lightweight General Modular Multiplier for Kyber PQC. 243-249 - Mohammad Amin Sarzaeem, Seyed Reza Hoseini Najarkolaei, Mohammad Reza Aref:
Shapley Value for Federated Learning: A Distributed and Fair Framework. 251-259 - Zahra Saeidi, Samaneh Mashhadi:
A New Scheme Based on (t,n)-Secret Image Sharing With Steganography Based on Joseph's Problem and HLR. 261-265

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.