Journal: ISeCure

Volume 17, Issue 2

107 -- 116Hossein Shadabfar, Motahareh Dehghan, Babak Sadeghian. DSRL-APT-2023: A New Synthetic Dataset for Advanced Persistent Threats
117 -- 124Ebrahim Raeisian Dashtaki, Shahrokh Ghaemmaghami. A New Bit-Wise Approach for Image-in-Audio Steganography Using Deep Learning
125 -- 135Masroor Hajari, Mahmoud Salmasizadeh, Javad Mohajeri, Siavash Ahmadi, Shahram Rasoolzadeh. Impossible Differential Cryptanalysis of Reduced-Round mCrypton-64
137 -- 150Elahe Farshadfar, Amir Mahdi Sadeghzadeh Mesgar, Rasool Jalili. Divergent Twins Fencing: Protecting Deep Neural Networks Against Query-based Black-box Adversarial Attacks
151 -- 160Farnoosh Hamednejad, Javad Mohajeri, Mohammad Reza Aref. Attacking Two Pairing-Free Ciphertext-Policy Attribute-Based Encryption Schemes
161 -- 169Amirhossein Hadavi, Mohammad Mahdi Mojahedian, Mohammad Reza Aref. Over-the-Air Federated Adaptive Data Analysis: Preserving Accuracy via Opportunistic Differential Privacy
171 -- 178Reihaneh Sotoudeh, Taraneh Eghlidos, Javad Mohajeri. Security Weaknesses of Some Policy-Hiding Attribute-Based Encryption Schemes
179 -- 187Mehrad Jaberi, Hamid Mala, Seyede Marzieh Sadat Madani. Cryptanalysis of Two Authenticated Key Agreement Protocols in Multi-Server Environments
189 -- 198Maryam Azadmanesh. A Fine-Grained Hybrid Inversion-Based Membership Inference Attack Against GANs
199 -- 207Atiyeh Mirzaie, Siavash Ahmadi, Mohammad Reza Aref. Division Property-Based Integral Attack on Reduced-Round SAND-128
209 -- 221Mojtaba Shirinjani, Mojtaba Amiri, Amirhosein Salehi, Pouria Arefi Jamal, Rasoul Khazaei Laki, Seyed Hatef Sadegh Esfahani, Siavash Ahmadi, Masoumeh Koochak Shooshtari, Mohammad Reza Aref. Spotting and Mitigating DDoS Attacks Using Deep Learning for Online Traffic Analysis
223 -- 232Narges Mokhtari, Navid Vafaei, Sadegh Sadeghi, Nasour Bagheri. Differential Fault Analysis of the BipBip Block Cipher
233 -- 241Amirhosein Salehi, Siavash Ahmadi, Mohammad Reza Aref. A Lightweight Online Intrusion Detection and Localization Framework for Industrial Control Systems
243 -- 249Hossein Naderi Varandi, Raziye Salarifard. A Lightweight General Modular Multiplier for Kyber PQC
251 -- 259Mohammad Amin Sarzaeem, Seyed Reza Hoseini Najarkolaei, Mohammad Reza Aref. Shapley Value for Federated Learning: A Distributed and Fair Framework
261 -- 265Zahra Saeidi, Samaneh Mashhadi. A New Scheme Based on (t,n)-Secret Image Sharing With Steganography Based on Joseph's Problem and HLR

Volume 17, Issue 1

1 -- 12Maryam Rajabzadeh Asaar, Mustafa Husam Shareef Alrzij. An Authenticated Key Establishment Protocol with Perfect Forward Secrecy in Smart Grids
13 -- 23Sedigheh Khajouei Nejad, Sam Jabbehdari, Hamid Haj Seyyed Javadi, Seyed Mohammad Hossein Moattar. Enhancing Lattice-Based Attribute-Based Encryption with Robust Fine-Grained Access Policies
25 -- 41Motahareh Dehghan, Babak Sadeghiyan, Erfan Khosravian, Alireza Sedighi Moghadam, Farshid Nooshi. ProAPT: Projection of APTs with Deep Reinforcement Learning
43 -- 57Ala Ekramifard, Haleh Amintoosi, Seyed-Amin Hosseini-Seno. Detection of Membership Inference Attacks on GAN Models
59 -- 73Navid Shirmohammadi, Behrouz Tork Ladani. CST-SDL: A Scenario Description Language for Collaborative Security Training in Cyber Ranges
75 -- 106Gholam Reza Moghissi, Ali Payandeh. Design of an Accurate BKZ Simulation