


default search action
ISC International Journal of Information Security, Volume 13
Volume 13, Number 1, January 2021
- K. Nalini Sujantha Bel, I. Shatheesh Sam:

OT-Feature Extraction on Scrambled Images with Instantaneous Clustering for CBIR Scheme in Cloud Computing. 1-17 - Vahid Meraji, Hadi Soleimany:

Evict+Time Attack on Intel CPUs without Explicit Knowledge of Address Offsets. 19-27 - Nastaran Shekofte, Siavash Bayat Sarmadi, Hatameh Mosanaei-Boorani:

A Trusted Design Platform for Trojan Detection in FPGA Bitstreams Using Partial Reconfiguration. 29-45 - Mansoureh Labbafniya, Shahram Etemadi Borujeni, Roghayeh Saeidi

:
Hardware Trojan Prevention and Detection by Filling Unused Space Using Shift registers, Gate-chain and Extra Routing. 47-57 - Salome James, Thumbur Gowri, Punugu Vasudeva Reddy:

An Efficient Pairing-Free Identity Based Proxy Blind Signature Scheme with Message Recovery. 59-72 - Vahid Chegeni

, Hamid Haj Seyyed Javadi, Mohammad Reza Moazami Goudarzi, Afshin Rezakhani:
Providing a Hybrid Cryptography Algorithm for Lightweight Authentication Protocol in RFID with Urban Traffic Usage Case. 73-85
Volume 13, Number 2, July 2021
- Aniseh Najafi, Majid Bayat

, Hamid Haj Seyyed Javadi
:
Privacy Preserving Attribute-Based Encryption with Conjunctive Keyword Search for E-health Records in Cloud. 87-100 - Mina Erfan, Saeed Jalili:

File Fragment Type Classification by Bag-Of-Visual-Words. 101-116 - Mohammad Ali Hadavi, Arash Bagherdaei, Simin Ghasemi

:
IDOT: Black-Box Detection of Access Control Violations in Web Applications. 117-129 - Hayyan Hasan

, Behrouz Tork Ladani, Bahman Zamani:
Curious-Monkey: Evolved Monkey for Triggering Malicious Payloads in Android Malware. 131-143 - Sorour Sheidani, Ziba Eslami:

Blind Multipurpose Image Watermarking with Perfect Security. 145-156 - Mansoureh Labafniya, Shahram Etemadi Borujeni:

An Obfuscation Method Based on CFGLUTs for Security of FPGAs. 157-162 - Milad Salimian, Ali Jahanian:

Intensive Analysis of Physical Parameters of Power Sensors for Remote Side-Channel Attacks. 163-176 - Gholam Reza Moghissi, Ali Payandeh:

Better Sampling Method of Enumeration Solution for BKZ-Simulation. 177-208
Volume 13, Number 3, November 2021
- Mona Alsalamah, Huda Alwabli, Hutaf Alqwifli, Dina M. Ibrahim:

A Review Study on SQL Injection Attacks, Prevention, and Detection. 1-10 - Hanan Aljoaey, Khawla Almutawa, Ruyuf Alabdali, Dina M. Ibrahim:

Broken Authentication and Session Management Vulnerabilities. 11-19 - Afnan Alotaibi, Lujain Alghufaili, Dina M. Ibrahim:

Cross Site Scripting Attack Review. 21-30 - Mohammad Ali A. Hammoudeh, Renad Ibrahim, Lama Alshraryan, Manar Alnomise, Ragad Alhumidan:

Secure Coding Guidelines - Python. 31-38 - Norah Alajlan, Meshael Alyahya, Noorah Alghasham, Dina M. Ibrahim:

Data Enhancement for Date Fruit Classification Using DCGAN. 39-48 - Wedad Alawad, Awatef Salem Balobaid

:
Forensic-Enabled Security as a Service (FESaaS) - A Readiness Framework for Cloud Forensics. 49-57 - Mohammed S. Albulayhi, Dina M. Ibrahim:

Open Web Application Security Project Components with Known Vulnerabilities: A Comprehensive Study. 59-67 - Musbah Joma Aqel, Munsif Yousef Sokiyna:

Human Activity Recognition Based on Multi-Sensors in a Smart Home Using Deep Learning. 69-78

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














