Journal: ISeCure

Volume 16, Issue 2

115 -- 136Fatemeh Pirmoradian, Mohammad Dakhilalian, Masoumeh Safkhani. ECKCI: An ECC-Based Authenticated Key Agreement Scheme Resistant to Key Compromise Impersonation Attack for TMIS
137 -- 147Mohammad Ali Jamshidi, Mohammad Mahdi Mojahedian, Mohammad Reza Aref. Customizable Utility-Privacy Trade-Off: A Flexible Autoencoder-Based Obfuscator
149 -- 163Maryam Rajabzadeh Asaar, Mustafa Isam Ahmed Al-Baghdadi. Security Enhancement of an Authentication Scheme Based on DAC and Intel SGX in WSNs
165 -- 190Kostyantyn Anatolievich Malyshenko, Majid Mohammad Shafiee, Vadim Anatolievich Malyshenko. Identification of Fake News Using Emotional Profiling as an Approach to Text Analysis
191 -- 203Mehmet Emin Gönen, Muhammed Said Gündogan, Kamil Otal. Boomerang Attacks on Reduced-Round Midori64
205 -- 220Nilakshi Gogoi, Dhruba K. Bhattacharyya, Debojit Boro. Shrew DDoS Attack Detection Based on Statistical Analysis

Volume 16, Issue 1

1 -- 16Meharaj Begum A, Michael Arock. Modified Parse-Tree Based Pattern Extraction Approach for Detecting SQLIA Using Neural Network Model
17 -- 35Shadab Kalhoro, Farhan Bashir Shaikh, Anam Kalhoro, Junaid Ur Rehman Abbasi, Ramesh Kumar Ayyasamy. An Overview of Security Attacks in 5G Enabled Technologies: Applications and Use Case Scenarios
37 -- 53Morteza Amirmohseni, Sadegh Dorri Nogoorani. Safety Guards for Ethereum Smart Contracts
55 -- 77Mehmet Ali Yalçinkaya, Ecir Ugur Küçüksille. Artificial Intelligence and Dynamic Analysis-Based Web Application Vulnerability Scanner
79 -- 92Kangkan Talukdar, Debojit Boro. Slowloris Attack Detection Using Adaptive Timeout-Based Approach
93 -- 114Mostafa Chegenizadeh, Mohammad Ali 0003, Javad Mohajeri, Mohammad Reza Aref. HUAP: Practical Attribute-Based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices