Journal: ISeCure

Volume 4, Issue 2

95 -- 96Rasool Jalili. Editorial
97 -- 106Farshid Farhat, Abolfazl Diyanat, Shahrokh Ghaemmaghami, Mohammad Reza Aref. Eigenvalues-based LSB steganalysis
107 -- 114Vahid Amin Ghafari, Ali Vardasbi, Javad Mohajeri. Cryptanalysis of GSM encryption algorithm A5/1
115 -- 124Motahareh Taheri, Saeed Mozaffari. Improving security of double random phase encoding with chaos theory using fractal images
125 -- 136Zeinab Zali, Massoud Reza Hashemi, Hossein Saidi 0001. Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach
137 -- 150Enos K. Mabuto, Hein S. Venter. Analyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications
151 -- 165Hassan Shakeri, Abbas Ghaemi Bafghi. A confidence-aware interval-based trust model

Volume 4, Issue 1

1 -- 2Rasool Jalili. Editorial
3 -- 14Reza Hooshmand, Taraneh Eghlidos, Mohammad Reza Aref. Improving the Rao-Nam secret key cryptosystem using regular EDF-QC-LDPC codes
15 -- 24Ali Vardasbi, Mahmoud Salmasizadeh, Javad Mohajeri. On the multi _ chi-square tests and their data complexity
25 -- 39Fatemeh Barani, Mahdi Abadi. BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms
41 -- 50Hammad Afzali, Hamed Nemati, Reza Azmi. Private Key based query on encrypted data
51 -- 62Moosa Yahyazadeh, Mahdi Abadi. BotOnus: an online unsupervised method for Botnet detection
63 -- 76Maryam Mehrnejad, Abbas Ghaemi Bafghi, Ahad Harati, Ehsan Toreini. SEIMCHA: a new semantic image CAPTCHA using geometric transformations
77 -- 86Somayyeh Mohammadi, Ahmad Hakimi. A chaos-based video watermarking algorithm