


default search action
ISC International Journal of Information Security, Volume 17
Volume 17, Number 1, January 2025
- Maryam Rajabzadeh Asaar, Mustafa Husam Shareef Alrzij:

An Authenticated Key Establishment Protocol with Perfect Forward Secrecy in Smart Grids. 1-12 - Sedigheh Khajouei-Nejad, Sam Jabbehdari, Hamid Haj Seyyed Javadi, Seyed Mohammad Hossein Moattar:

Enhancing Lattice-Based Attribute-Based Encryption with Robust Fine-Grained Access Policies. 13-23 - Motahareh Dehghan, Babak Sadeghiyan, Erfan Khosravian, Alireza Sedighi Moghadam

, Farshid Nooshi:
ProAPT: Projection of APTs with Deep Reinforcement Learning. 25-41 - Ala Ekramifard, Haleh Amintoosi, Seyed Amin Hosseini Seno:

Detection of Membership Inference Attacks on GAN Models. 43-57 - Navid Shirmohammadi, Behrouz Tork Ladani:

CST-SDL: A Scenario Description Language for Collaborative Security Training in Cyber Ranges. 59-73 - Gholam Reza Moghissi, Ali Payandeh:

Design of an Accurate BKZ Simulation. 75-106
Volume 17, Number 2, July 2025
- Hossein Shadabfar, Motahareh Dehghan, Babak Sadeghian:

DSRL-APT-2023: A New Synthetic Dataset for Advanced Persistent Threats. 107-116 - Ebrahim Raeisian Dashtaki, Shahrokh Ghaemmaghami:

A New Bit-Wise Approach for Image-in-Audio Steganography Using Deep Learning. 117-124 - Masroor Hajari, Mahmoud Salmasizadeh, Javad Mohajeri, Siavash Ahmadi, Shahram Rasoolzadeh:

Impossible Differential Cryptanalysis of Reduced-Round mCrypton-64. 125-135 - Elahe Farshadfar, Amir Mahdi Sadeghzadeh Mesgar, Rasool Jalili:

Divergent Twins Fencing: Protecting Deep Neural Networks Against Query-based Black-box Adversarial Attacks. 137-150 - Farnoosh Hamednejad, Javad Mohajeri, Mohammad Reza Aref:

Attacking Two Pairing-Free Ciphertext-Policy Attribute-Based Encryption Schemes. 151-160 - Amirhossein Hadavi, Mohammad Mahdi Mojahedian, Mohammad Reza Aref:

Over-the-Air Federated Adaptive Data Analysis: Preserving Accuracy via Opportunistic Differential Privacy. 161-169 - Reihaneh Sotoudeh, Taraneh Eghlidos, Javad Mohajeri:

Security Weaknesses of Some Policy-Hiding Attribute-Based Encryption Schemes. 171-178 - Mehrad Jaberi

, Hamid Mala, Seyede Marzieh Sadat Madani:
Cryptanalysis of Two Authenticated Key Agreement Protocols in Multi-Server Environments. 179-187 - Maryam Azadmanesh:

A Fine-Grained Hybrid Inversion-Based Membership Inference Attack Against GANs. 189-198 - Atiyeh Mirzaie, Siavash Ahmadi, Mohammad Reza Aref:

Division Property-Based Integral Attack on Reduced-Round SAND-128. 199-207 - Mojtaba Shirinjani, Mojtaba Amiri, Amirhosein Salehi, Pouria Arefi Jamal, Rasoul Khazaei Laki, Seyed Hatef Sadegh Esfahani, Siavash Ahmadi, Masoumeh Koochak Shooshtari, Mohammad Reza Aref:

Spotting and Mitigating DDoS Attacks Using Deep Learning for Online Traffic Analysis. 209-221 - Narges Mokhtari, Navid Vafaei, Sadegh Sadeghi, Nasour Bagheri:

Differential Fault Analysis of the BipBip Block Cipher. 223-232 - Amirhosein Salehi, Siavash Ahmadi, Mohammad Reza Aref:

A Lightweight Online Intrusion Detection and Localization Framework for Industrial Control Systems. 233-241 - Hossein Naderi Varandi, Raziye Salarifard:

A Lightweight General Modular Multiplier for Kyber PQC. 243-249 - Mohammad Amin Sarzaeem, Seyed Reza Hoseini Najarkolaei, Mohammad Reza Aref:

Shapley Value for Federated Learning: A Distributed and Fair Framework. 251-259 - Zahra Saeidi, Samaneh Mashhadi:

A New Scheme Based on (t,n)-Secret Image Sharing With Steganography Based on Joseph's Problem and HLR. 261-265

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














