Journal: ISeCure

Volume 14, Issue 2

115 -- 130Hajar Dastanpour, Ali Fanian. A Graph-based Online Feature Selection to Improve Detection of New Attacks
131 -- 145Mojtaba Hemmati, Mohammad Ali Hadavi. Bypassing Web Application Firewalls Using Deep Reinforcement Learning
147 -- 156Faeze Rasouli, Mohammad Taheri. Perfect Recovery of Small Tampers Using a Novel Fragile Watermarking Technique Based on Distributed Hamming Code
157 -- 165Hamid Amiryousefi, Zahra Ahmadian. Revisiting the Security and Efficiency of SP2DAS, 3PDA, and EPPA Smart Grid Security Protocols
167 -- 179Vajiheh Sabeti, Mahsa Amerehei. Secure and Imperceptible Image Steganography in Discrete Wavelet Transform Using the XOR Logical Function and Genetic Algorithm
181 -- 192Farnoush Manavi, Ali Hamzeh. Ransomware Detection Based on PE Header Using Convolutional Neural Networks
193 -- 213Parvin Rastegari. Attacks to Some Recently Proposed CL-SC Schemes and Presenting a Secure Scheme with KSSTIS
215 -- 227Zeinab Salami, Mahmoud Ahmadian-Attari, Mohammad Reza Aref, Hoda Jannati. Location Privacy Preservation for Secondary Users in a Database-Driven Cognitive Radio Network