Journal: ISeCure

Volume 10, Issue 2

77 -- 78Mohammad Reza Aref. Editorial
79 -- 92Morteza Behniafar, Alireza Nowroozi, Hamid Reza Shahriari. A Survey of Anomaly Detection Approaches in Internet of Things
93 -- 105Farokhlagha Moazami, Alireza Mehrdad, Hadi Soleimany. Impossible Differential Cryptanalysis on Deoxys-BC-256
107 -- 115Rahim Ramezanian. Distributed Contingency Logic and Security
117 -- 127Mehdi Mahdavi Oliaee, Mahshid Delavar, Mohammad Hassan Ameri, Javad Mohajeri, Mohammad Reza Aref. On the Security of O-PSI: A Delegated Private Set Intersection on Outsourced Datasets (Extended Version)
129 -- 139Naeimeh Soltani, Ramin Bohlooli, Rasool Jalili. Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)
141 -- 162Dharmaraj R. Patil, Jayantrao Bhaurao Patil. Feature-based Malicious URL and Attack Type Detection Using Multi-class Classification
163 -- 168. Persian Abstract

Volume 10, Issue 1

1 -- 2Mohammad Reza Aref. Editorial
3 -- 13Aein Rezaei Shahmirzdi, Seyyed Arash Azimi, Mahmoud Salmasizadeh, Javad Mohajeri, Mohammad Reza Aref. Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version)
15 -- 27Atefeh Mohseni-Ejiyeh, Maede Ashouri-Talouki, Mojtaba Mahdavi. An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks
29 -- 43Ali Fanian, Ehsan Mahdavi, Homa Hassannejad. Classification of encrypted traffic for applications based on statistical features
45 -- 53Reza Ebrahimi Atani, Shahabaddin Ebrahimi Atani, Amir Hassani Karbasi. NETRU: A Non-commutative and Secure Variant of CTRU Cryptosystem
55 -- 61Ehsan Khoshhalpour, Hamid Reza Shahriari. BotRevealer: Behavioral Detection of Botnets based on Botnet Life-cycle
63 -- 69Rasoul Ramezanian, Mohsen Pourpouneh. A Decentralized Online Sortition Protocol