Journal: ISeCure

Volume 13, Issue 3

1 -- 10Mona Alsalamah, Huda Alwabli, Hutaf Alqwifli, Dina M. Ibrahim. A Review Study on SQL Injection Attacks, Prevention, and Detection
11 -- 19Hanan Aljoaey, Khawla Almutawa, Ruyuf Alabdali, Dina M. Ibrahim. Broken Authentication and Session Management Vulnerabilities
21 -- 30Afnan Alotaibi, Lujain Alghufaili, Dina M. Ibrahim. Cross Site Scripting Attack Review
31 -- 38Mohammad Ali A. Hammoudeh, Renad Ibrahim, Lama Alshraryan, Manar Alnomise, Ragad Alhumidan. Secure Coding Guidelines - Python
39 -- 48Norah Alajlan, Meshael Alyahya, Noorah Alghasham, Dina M. Ibrahim. Data Enhancement for Date Fruit Classification Using DCGAN
49 -- 57Wedad Alawad, Awatef Balobaid. Forensic-Enabled Security as a Service (FESaaS) - A Readiness Framework for Cloud Forensics
59 -- 67Mohammed S. Albulayhi, Dina M. Ibrahim. Open Web Application Security Project Components with Known Vulnerabilities: A Comprehensive Study
69 -- 78Musbah Joma Aqel, Munsif Yousef Sokiyna. Human Activity Recognition Based on Multi-Sensors in a Smart Home Using Deep Learning

Volume 13, Issue 2

87 -- 100Aniseh Najafi, Majid Bayat, Hamid Haj Seyyed Javadi. Privacy Preserving Attribute-Based Encryption with Conjunctive Keyword Search for E-health Records in Cloud
101 -- 116Mina Erfan, Saeed Jalili. File Fragment Type Classification by Bag-Of-Visual-Words
117 -- 129Mohammad Ali Hadavi, Arash Bagherdaei, Simin Ghasemi. IDOT: Black-Box Detection of Access Control Violations in Web Applications
131 -- 143Hayyan Hasan, Behrouz Tork Ladani, Bahman Zamani. Curious-Monkey: Evolved Monkey for Triggering Malicious Payloads in Android Malware
145 -- 156Sorour Sheidani, Ziba Eslami. Blind Multipurpose Image Watermarking with Perfect Security
157 -- 162Mansoureh Labafniya, Shahram Etemadi Borujeni. An Obfuscation Method Based on CFGLUTs for Security of FPGAs
163 -- 176Milad Salimian, Ali Jahanian 0001. Intensive Analysis of Physical Parameters of Power Sensors for Remote Side-Channel Attacks
177 -- 208Gholam Reza Moghissi, Ali Payandeh. Better Sampling Method of Enumeration Solution for BKZ-Simulation

Volume 13, Issue 1

1 -- 17K. Nalini Sujantha Bel, I. Shatheesh Sam. OT-Feature Extraction on Scrambled Images with Instantaneous Clustering for CBIR Scheme in Cloud Computing
19 -- 27Vahid Meraji, Hadi Soleimany. Evict+Time Attack on Intel CPUs without Explicit Knowledge of Address Offsets
29 -- 45Nastaran Shekofte, Siavash Bayat Sarmadi, Hatameh Mosanaei-Boorani. A Trusted Design Platform for Trojan Detection in FPGA Bitstreams Using Partial Reconfiguration
47 -- 57Mansoureh Labbafniya, Shahram Etemadi Borujeni, Roghayeh Saeidi. Hardware Trojan Prevention and Detection by Filling Unused Space Using Shift registers, Gate-chain and Extra Routing
59 -- 72Salome James, Thumbur Gowri, Punugu Vasudeva Reddy. An Efficient Pairing-Free Identity Based Proxy Blind Signature Scheme with Message Recovery
73 -- 85Vahid Chegeni, Hamid Haj Seyyed Javadi, Mohammad Reza Moazami Goudarzi, Afshin Rezakhani. Providing a Hybrid Cryptography Algorithm for Lightweight Authentication Protocol in RFID with Urban Traffic Usage Case