| 77 | -- | 78 | Mohammad Reza Aref. Editorial |
| 79 | -- | 92 | Morteza Behniafar, Alireza Nowroozi, Hamid Reza Shahriari. A Survey of Anomaly Detection Approaches in Internet of Things |
| 93 | -- | 105 | Farokhlagha Moazami, Alireza Mehrdad, Hadi Soleimany. Impossible Differential Cryptanalysis on Deoxys-BC-256 |
| 107 | -- | 115 | Rahim Ramezanian. Distributed Contingency Logic and Security |
| 117 | -- | 127 | Mehdi Mahdavi Oliaee, Mahshid Delavar, Mohammad Hassan Ameri, Javad Mohajeri, Mohammad Reza Aref. On the Security of O-PSI: A Delegated Private Set Intersection on Outsourced Datasets (Extended Version) |
| 129 | -- | 139 | Naeimeh Soltani, Ramin Bohlooli, Rasool Jalili. Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version) |
| 141 | -- | 162 | Dharmaraj R. Patil, Jayantrao Bhaurao Patil. Feature-based Malicious URL and Attack Type Detection Using Multi-class Classification |
| 163 | -- | 168 | . Persian Abstract |