Journal: ISeCure

Volume 11, Issue 2

93 -- 94Mohammad Reza Aref. Editorial
95 -- 111Seyed Alireza Hasheminasab, Behrouz Tork Ladani, Tansu Alpcan. Interdependent Security Game Design over Constrained Linear Influence Networks
113 -- 128Majid Bayat, Zahra Zare Jousheghani, Ashok Kumar Das, Pitam Singh, Saru Kumari, Mohammad Reza Aref. A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications
129 -- 143S. Ehsan Hosiny Nezhad, Masoumeh Safkhani, Nasour Bagheri. Relaxed Differential Fault Analysis of SHA-3
145 -- 158Siavash Ahmadi, Mohammad Reza Aref. New Fixed Point Attacks on GOST2 Block Cipher
159 -- 171Elham Serkani, Hossein Gharaee Garakani, Naser MohammadZadeh. Anomaly Detection Using SVM as Classifier and Decision Tree for Optimizing Feature Vectors
173 -- 183Mohammadreza Mohammadrezaei, Mohammad Ebrahim Shiri, Amir Masoud Rahmani. Detection of Fake Accounts in Social Networks Based on One Class Classification
185 -- 190. Persian Abstract