Journal: ISeCure

Volume 12, Issue 3

1 -- 5Hachem H. Alaoui, El-Kaber Hachem, Cherif Ziti, Mohammed Karim. The Use of Local Sensitive Hashing for E-learner Face Identification
7 -- 12Aymen M. Al-Kadhimi, Salim A. Mohammed Ali, Sami Hasan. Suspended Stripline Low-pass Filter Design for Wide Stopband Attenuation Applications
13 -- 17Osama Ali Awad, Mais Monqith. Evaluation of a Wireless ZigBee with PID Controller for Networked Control System Using True Time Toolbox
19 -- 27Abdllkader Esaid, Mary Agoyi, Muhannad Tahboush. A Hybrid Encryption Algorithm for Mitigating the Effects of Attacks in Ad Hoc Networks
29 -- 36Sumayia Al-Anazi, Isra Al-Turaiki, Najwa Altwaijry. CEMD: A Cluster-based Ensemble Motif Discovery Tool
37 -- 44Isra Al-Turaiki, Najwa Altwaijry, Abeer Agil, Haya Aljodhi, Sara Alharbi, Lina Alqassem. Anomaly-Based Network Intrusion Detection Using Bidirectional Long Short Term Memory and Convolutional Neural Network
45 -- 53Saja Ahmed Albliwi, Hanan Abdullah Alkharmani. The Impact of Mobile Payment Quality on User?s Continuance Intention Toward Mobile Payment in Saudi Arabia
55 -- 58Marcelo S. Alencar, Karcius D. R. Assis. A New Derivation of the Leftover Hash Lemma
59 -- 72Bodor Moheel Almotairy, Manal Abdullah, Rabeeh Abbasi. Identifying Entrepreneurial Influencers on Twitter
73 -- 79Shereen S. Jumaa. Fuzzy Histogram Equalization and Computer Vision Automated Identification of Microcalcifications in Breast Cancer
81 -- 85Talib M. J. Al Taleb, Sami Hasan, Yaqoob Yousif Mahdi. Indexed View Technique to Speed-up Data Warehouse Query Processing
87 -- 93Mustapha Bassiri, Abderrazak Mazouak, Imad Lamniai, Malika Tridane, Said Belaaouad, Said Belaaouad. The Establishment of a Distance Training Device within the Regional Center of the Taza Education and Training: Administrative Cycle Case
95 -- 99Najah K. Almazmomi. Knowledge Discovery in Cloud-Computing Environment and the Challenges
101 -- 109Wafa Abdulaziz Alkenazan, Ashraf A. Taha, Mohammed J. F. Alenazi, Wadood Abdul. Modeling a Cloud-Based Smart Parking WLAN Networks Using IEEE802.11AC Technology
111 -- 115Ghada Al-Hudhud, Abeer Al-Humamidi. A Multilingual Infobot in Airports
117 -- 127Abeer S. Al-Humaimeedy, Abeer Salman Al-Hammad, Ghada Al-Hudhud. Reverse Image-Based Search Engine for IP Trademarks

Volume 12, Issue 2

67 -- 80Mohsen Jahanbani, Nasour Bagheri, Zynolabedin Norouzi. CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking
81 -- 89Milad Seddigh, Hadi Soleimany. Enhanced Flush+Reload Attack on AES
91 -- 99Ali Zaghian, Bagher Bagherpour. A Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions
101 -- 111Mohammad Mahdi Modiri, Javad Mohajeri, Mahmoud Salmasizadeh. GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
113 -- 128Mahsa Nooribakhsh, Mahdi MollaMotalebi. F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management
129 -- 140Maryam Zarezadeh, Maede Ashouri-Talouki, Mohammad Siavashi. Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems

Volume 12, Issue 1

1 -- 12Zahra Eskandari, Abbas Ghaemi Bafghi. Extension of Cube Attack with Probabilistic Equations and its Application on Cryptanalysis of KATAN Cipher
13 -- 23Majid M. Niknam, Sadegh Sadeghi, Mohammad Reza Aref, Nasour Bagheri. Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants
24 -- 44Vajiheh Sabeti, Minoo Shoaei. New High Secure Network Steganography Method Based on Packet Length
35 -- 43Reza Mortazavi. Improved Univariate Microaggregation for Integer Values
44 -- 54Shahriar Mohammadi, Amin Namadchian. Anomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism
55 -- 66Bashir Naderi, Hossein Kheiri, Vajiheh Vafaei. Modified Sliding-Mode Control Method for Synchronization a Class of Chaotic Fractional-Order Systems with Application in Encryption