Journal: ISeCure

Volume 11, Issue 3

0 -- 0Mohammad Reza Aref. Editorial
1 -- 7Oleksandr A. Letychevskyi, Yaroslav Hryniuk, Viktor Yakovlev, Volodymyr Peschanenko, Viktor Radchenko. Algebraic Matching of Vulnerabilities in a Low-Level Code
9 -- 17Hadjer Saadi, Mustapha C. E. Yagoub, Rachida Touhami. Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns
19 -- 27Ibrahim Soran, Qing Tan. A Sudy on Information Privacy Issue on Social Networks
29 -- 34Dalia A. Shaaban, Mohamed H. Saad, Ahmed H. Madian, Hesham N. Elmahdy. Medical Image Compression Based on Region of Interest
35 -- 38Rawan Flifel. The Role of Packet Tracer in Learning Wireless Networks and Managing IoT Devices
39 -- 50Omed Hassan Ahmed, Joan Lu, Qiang Xu 0002, Muzhir Shaban Al-Ani. Face Recognition Based Rank Reduction SVD Approach
51 -- 58Areej Fatima, Muhammad Adnan Khan, Sagheer Abbas, Muhammad Waqas, Leena Anum, Muhammad Asif. Evaluation of Planet Factors of Smart City through Multi-layer Fuzzy Logic (MFL)
59 -- 65Fairouz Zendaoui, Walid-Khaled Hidouci. Considering Uncertainty in Modeling Historical Knowledge
67 -- 72Ehab Khatter, Dina Ibrahim. Proposed ST-Slotted-CS-ALOHA Protocol for Time Saving and Collision Avoidance
73 -- 78Felisa M. Córdova, Claudia A. Durán, Fredi Palominos. Cognitive Strategic Model applied to a Port System
79 -- 89Ahmed BaniMustafa. Enhancing Learning from Imbalanced Classes via Data Preprocessing: A Data-Driven Application in Metabolomics Data Mining
91 -- 96Ayman Atia, Nada Shorim. Hand Gestures Classification with Multi-Core DTW
97 -- 103Muhammad Ali Memon, Zaira Hassan, Kamran Dahri, Asadullah Shaikh, Muhammad Ali Nizamani. Aspect Oriented UML to ECORE Model Transformation
105 -- 111Evelina Pencheva, Ivaylo Atanasov, Ivaylo Asenov. Access and Mobility Policy Control at the Network Edge
113 -- 122Mohammed J. F. Alenazi. Evaluating Multipath TCP Resilience against Link Failures
123 -- 130Joel E. Cordeiro Junior, Marcelo S. Alencar, José Valentim Dos Santos Filho, Karcius D. R. Assis. A Fair Power Allocation for Non-Orthogonal Multiple Access in the Power Domain
131 -- 137Matthias Gottlieb, Marwin Shraideh, Isabel Fuhrmann, Markus Böhm 0001, Helmut Krcmar. Critical Success Factors for Data Virtualization: A Literature Review
139 -- 144Saad Ali Alahmari. Using Machine Learning ARIMA to Predict the Price of Cryptocurrencies
145 -- 151Anwar Saeed, Muhammad Yousif, Areej Fatima, Sagheer Abbas, Muhammad Adnan Khan, Leena Anum, Ali Akram. An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling
153 -- 160Tahir Alyas, Gulzar Ahmad, Yousaf Saeed, Muhammad Asif, Umer Farooq, Asma Kanwal. Cloud and IoT based Smart Car Parking System by using Mamdani Fuzzy Inference System (MFIS)
161 -- 172Wajdi Al Jedaibi, Sufian Khamis. Towards Measuring the Project Management Process During Large Scale Software System Implementation Phase
173 -- 180Istabraq M. Al-Joboury, Emad H. Al-Hemiary. IoT Protocols Based Fog/Cloud over High Traffic
181 -- 186Oula L. Abdulsattar, Emad H. Al-Hemiary. Virtualized Network Management Laboratory for Educational Purposes

Volume 11, Issue 2

93 -- 94Mohammad Reza Aref. Editorial
95 -- 111Seyed Alireza Hasheminasab, Behrouz Tork Ladani, Tansu Alpcan. Interdependent Security Game Design over Constrained Linear Influence Networks
113 -- 128Majid Bayat, Zahra Zare Jousheghani, Ashok Kumar Das, Pitam Singh, Saru Kumari, Mohammad Reza Aref. A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications
129 -- 143S. Ehsan Hosiny Nezhad, Masoumeh Safkhani, Nasour Bagheri. Relaxed Differential Fault Analysis of SHA-3
145 -- 158Siavash Ahmadi, Mohammad Reza Aref. New Fixed Point Attacks on GOST2 Block Cipher
159 -- 171Elham Serkani, Hossein Gharaee Garakani, Naser MohammadZadeh. Anomaly Detection Using SVM as Classifier and Decision Tree for Optimizing Feature Vectors
173 -- 183Mohammadreza Mohammadrezaei, Mohammad Ebrahim Shiri, Amir Masoud Rahmani. Detection of Fake Accounts in Social Networks Based on One Class Classification
185 -- 190. Persian Abstract

Volume 11, Issue 1

1 -- 2Mohammad Reza Aref. Editorial
3 -- 14Simin Ghasemi, Mohammad Ali Hadavi, Mina Niknafs. A Trust Based Probabilistic Method for Efficient Correctness Verification in Database Outsourcing
15 -- 34Javad Ghareh Chamani, Mohammad Sadeq Dousti, Rasool Jalili, Dimitrios Papadopoulos. SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing
35 -- 46Akbar Mahmoodi Rishakani, Mohammad Reza Mirzaee Shamsabad, Seyed Mojtaba Dehnavi, Mohammad Amin Amiri, Hamidreza Maimani, Nasour Bagheri. Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives
47 -- 56Mansoureh Labbafniya, Roghayeh Saeidi. Secure FPGA Design by Filling Unused Spaces
57 -- 74Siavash Ahmadi, Zahra Ahmadian, Javad Mohajeri, Mohammad Reza Aref. Biclique Cryptanalysis of Block Ciphers LBlock and TWINE-80 with Practical Data Complexity
75 -- 86Reza Ebrahimi Atani, Shahabaddin Ebrahimi Atani, Amir Hassani Karbasi. A New Ring-Based SPHF and PAKE Protocol On Ideal Lattices
87 -- 92. Persian Abstract