Search dblp for Publications

export results for "stream:streams/journals/isecure:"

 download as .bib file

@article{DBLP:journals/isecure/BelS21,
  author    = {K. Nalini Sujantha Bel and
               I. Shatheesh Sam},
  title     = {OT-Feature Extraction on Scrambled Images with Instantaneous Clustering
               for {CBIR} Scheme in Cloud Computing},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {13},
  number    = {1},
  pages     = {1--17},
  year      = {2021},
  url       = {https://doi.org/10.22042/isecure.2020.209056.497},
  doi       = {10.22042/isecure.2020.209056.497},
  timestamp = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/BelS21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/ChegeniJGR21,
  author    = {Vahid Chegeni and
               Hamid Haj Seyyed Javadi and
               Mohammad Reza Moazami Goudarzi and
               Afshin Rezakhani},
  title     = {Providing a Hybrid Cryptography Algorithm for Lightweight Authentication
               Protocol in {RFID} with Urban Traffic Usage Case},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {13},
  number    = {1},
  pages     = {73--85},
  year      = {2021},
  url       = {https://doi.org/10.22042/isecure.2020.226400.535},
  doi       = {10.22042/isecure.2020.226400.535},
  timestamp = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/ChegeniJGR21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/JamesGR21,
  author    = {Salome James and
               Thumbur Gowri and
               Punugu Vasudeva Reddy},
  title     = {An Efficient Pairing-Free Identity Based Proxy Blind Signature Scheme
               with Message Recovery},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {13},
  number    = {1},
  pages     = {59--72},
  year      = {2021},
  url       = {https://doi.org/10.22042/isecure.2020.208473.495},
  doi       = {10.22042/isecure.2020.208473.495},
  timestamp = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/JamesGR21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/LabbafniyaBS21,
  author    = {Mansoureh Labbafniya and
               Shahram Etemadi Borujeni and
               Roghayeh Saeidi},
  title     = {Hardware Trojan Prevention and Detection by Filling Unused Space Using
               Shift registers, Gate-chain and Extra Routing},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {13},
  number    = {1},
  pages     = {47--57},
  year      = {2021},
  url       = {https://doi.org/10.22042/isecure.2020.215265.510},
  doi       = {10.22042/isecure.2020.215265.510},
  timestamp = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/LabbafniyaBS21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/MerajiS21,
  author    = {Vahid Meraji and
               Hadi Soleimany},
  title     = {Evict+Time Attack on Intel CPUs without Explicit Knowledge of Address
               Offsets},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {13},
  number    = {1},
  pages     = {19--27},
  year      = {2021},
  url       = {https://doi.org/10.22042/isecure.2020.209945.500},
  doi       = {10.22042/isecure.2020.209945.500},
  timestamp = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/MerajiS21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/ShekofteSM21,
  author    = {Nastaran Shekofte and
               Siavash Bayat Sarmadi and
               Hatameh Mosanaei{-}Boorani},
  title     = {A Trusted Design Platform for Trojan Detection in {FPGA} Bitstreams
               Using Partial Reconfiguration},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {13},
  number    = {1},
  pages     = {29--45},
  year      = {2021},
  url       = {https://doi.org/10.22042/isecure.2020.196541.477},
  doi       = {10.22042/isecure.2020.196541.477},
  timestamp = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/ShekofteSM21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Al-AnaziAA20,
  author    = {Sumayia Al{-}Anazi and
               Isra Al{-}Turaiki and
               Najwa Altwaijry},
  title     = {{CEMD:} {A} Cluster-based Ensemble Motif Discovery Tool},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {12},
  number    = {3},
  pages     = {29--36},
  year      = {2020},
  url       = {https://doi.org/10.22042/isecure.2021.271073.623},
  doi       = {10.22042/isecure.2021.271073.623},
  timestamp = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/Al-AnaziAA20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Al-HudhudA20,
  author    = {Ghada Al{-}Hudhud and
               Abeer Al{-}Humamidi},
  title     = {A Multilingual Infobot in Airports},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {12},
  number    = {3},
  pages     = {111--115},
  year      = {2020},
  url       = {https://doi.org/10.22042/isecure.2021.274961.643},
  doi       = {10.22042/isecure.2021.274961.643},
  timestamp = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/Al-HudhudA20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Al-HumaimeedyAA20,
  author    = {Abeer S. Al{-}Humaimeedy and
               Abeer Salman Al{-}Hammad and
               Ghada Al{-}Hudhud},
  title     = {Reverse Image-Based Search Engine for {IP} Trademarks},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {12},
  number    = {3},
  pages     = {117--127},
  year      = {2020},
  url       = {https://doi.org/10.22042/isecure.2021.277174.651},
  doi       = {10.22042/isecure.2021.277174.651},
  timestamp = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/Al-HumaimeedyAA20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Al-KadhimiAH20,
  author    = {Aymen M. Al{-}Kadhimi and
               Salim A. Mohammed Ali and
               Sami Hasan},
  title     = {Suspended Stripline Low-pass Filter Design for Wide Stopband Attenuation
               Applications},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {12},
  number    = {3},
  pages     = {7--12},
  year      = {2020},
  url       = {https://doi.org/10.22042/isecure.2021.271055.613},
  doi       = {10.22042/isecure.2021.271055.613},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/Al-KadhimiAH20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Al-TuraikiAAAAA20,
  author    = {Isra Al{-}Turaiki and
               Najwa Altwaijry and
               Abeer Agil and
               Haya Aljodhi and
               Sara Alharbi and
               Lina Alqassem},
  title     = {Anomaly-Based Network Intrusion Detection Using Bidirectional Long
               Short Term Memory and Convolutional Neural Network},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {12},
  number    = {3},
  pages     = {37--44},
  year      = {2020},
  url       = {https://doi.org/10.22042/isecure.2021.271076.624},
  doi       = {10.22042/isecure.2021.271076.624},
  timestamp = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/Al-TuraikiAAAAA20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/AlaouiHZK20,
  author    = {Hachem H. Alaoui and
               El{-}Kaber Hachem and
               Cherif Ziti and
               Mohammed Karim},
  title     = {The Use of Local Sensitive Hashing for E-learner Face Identification},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {12},
  number    = {3},
  pages     = {1--5},
  year      = {2020},
  url       = {https://doi.org/10.22042/isecure.2021.271051.612},
  doi       = {10.22042/isecure.2021.271051.612},
  timestamp = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/AlaouiHZK20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/AlbliwiA20,
  author    = {Saja Ahmed Albliwi and
               Hanan Abdullah Alkharmani},
  title     = {The Impact of Mobile Payment Quality on User?s Continuance Intention
               Toward Mobile Payment in Saudi Arabia},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {12},
  number    = {3},
  pages     = {45--53},
  year      = {2020},
  url       = {https://doi.org/10.22042/isecure.2021.271079.625},
  doi       = {10.22042/isecure.2021.271079.625},
  timestamp = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/AlbliwiA20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/AlencarA20,
  author    = {Marcelo S. Alencar and
               Karcius D. R. Assis},
  title     = {A New Derivation of the Leftover Hash Lemma},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {12},
  number    = {3},
  pages     = {55--58},
  year      = {2020},
  url       = {https://doi.org/10.22042/isecure.2021.271070.622},
  doi       = {10.22042/isecure.2021.271070.622},
  timestamp = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/AlencarA20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/AlkenazanTAA20,
  author    = {Wafa Abdulaziz Alkenazan and
               Ashraf A. Taha and
               Mohammed J. F. Alenazi and
               Wadood Abdul},
  title     = {Modeling a Cloud-Based Smart Parking {WLAN} Networks Using {IEEE802.11AC}
               Technology},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {12},
  number    = {3},
  pages     = {101--109},
  year      = {2020},
  url       = {https://doi.org/10.22042/isecure.2021.274868.642},
  doi       = {10.22042/isecure.2021.274868.642},
  timestamp = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/AlkenazanTAA20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Almazmomi20,
  author    = {Najah K. Almazmomi},
  title     = {Knowledge Discovery in Cloud-Computing Environment and the Challenges},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {12},
  number    = {3},
  pages     = {95--99},
  year      = {2020},
  url       = {https://doi.org/10.22042/isecure.2021.273750.640},
  doi       = {10.22042/isecure.2021.273750.640},
  timestamp = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/Almazmomi20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/AlmotairyAA20,
  author    = {Bodor Moheel Almotairy and
               Manal Abdullah and
               Rabeeh Abbasi},
  title     = {Identifying Entrepreneurial Influencers on Twitter},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {12},
  number    = {3},
  pages     = {59--72},
  year      = {2020},
  url       = {https://doi.org/10.22042/isecure.2021.271108.629},
  doi       = {10.22042/isecure.2021.271108.629},
  timestamp = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/AlmotairyAA20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/AwadM20,
  author    = {Osama Ali Awad and
               Mais Monqith},
  title     = {Evaluation of a Wireless ZigBee with {PID} Controller for Networked
               Control System Using True Time Toolbox},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {12},
  number    = {3},
  pages     = {13--17},
  year      = {2020},
  url       = {https://doi.org/10.22042/isecure.2021.271058.614},
  doi       = {10.22042/isecure.2021.271058.614},
  timestamp = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/AwadM20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/BassiriMLTBB20,
  author    = {Mustapha Bassiri and
               Abderrazak Mazouak and
               Imad Lamniai and
               Malika Tridane and
               Said Belaaouad},
  title     = {The Establishment of a Distance Training Device within the Regional
               Center of the Taza Education and Training: Administrative Cycle Case},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {12},
  number    = {3},
  pages     = {87--93},
  year      = {2020},
  url       = {https://doi.org/10.22042/isecure.2021.271064.618},
  doi       = {10.22042/isecure.2021.271064.618},
  timestamp = {Thu, 15 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/BassiriMLTBB20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/EsaidAT20,
  author    = {Abdllkader Esaid and
               Mary Agoyi and
               Muhannad Tahboush},
  title     = {A Hybrid Encryption Algorithm for Mitigating the Effects of Attacks
               in Ad Hoc Networks},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {12},
  number    = {3},
  pages     = {19--27},
  year      = {2020},
  url       = {https://doi.org/10.22042/isecure.2021.271065.619},
  doi       = {10.22042/isecure.2021.271065.619},
  timestamp = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/EsaidAT20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/EskandariB20,
  author    = {Zahra Eskandari and
               Abbas Ghaemi Bafghi},
  title     = {Extension of Cube Attack with Probabilistic Equations and its Application
               on Cryptanalysis of {KATAN} Cipher},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {12},
  number    = {1},
  pages     = {1--12},
  year      = {2020},
  url       = {https://doi.org/10.22042/isecure.2020.199304.481},
  doi       = {10.22042/isecure.2020.199304.481},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/EskandariB20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/JahanbaniBN20,
  author    = {Mohsen Jahanbani and
               Nasour Bagheri and
               Zynolabedin Norouzi},
  title     = {{CPA} on {COLM} Authenticated Cipher and the Protection Using Domain-Oriented
               Masking},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {12},
  number    = {2},
  pages     = {67--80},
  year      = {2020},
  url       = {https://doi.org/10.22042/isecure.2020.191916.471},
  doi       = {10.22042/isecure.2020.191916.471},
  timestamp = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/JahanbaniBN20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Jumaa20,
  author    = {Shereen S. Jumaa},
  title     = {Fuzzy Histogram Equalization and Computer Vision Automated Identification
               of Microcalcifications in Breast Cancer},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {12},
  number    = {3},
  pages     = {73--79},
  year      = {2020},
  url       = {https://doi.org/10.22042/isecure.2021.271062.616},
  doi       = {10.22042/isecure.2021.271062.616},
  timestamp = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/Jumaa20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/ModiriMS20,
  author    = {Mohammad Mahdi Modiri and
               Javad Mohajeri and
               Mahmoud Salmasizadeh},
  title     = {{GSLHA:} Group-based Secure Lightweight Handover Authentication Protocol
               for {M2M} Communication},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {12},
  number    = {2},
  pages     = {101--111},
  year      = {2020},
  url       = {https://doi.org/10.22042/isecure.2020.213482.507},
  doi       = {10.22042/isecure.2020.213482.507},
  timestamp = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/ModiriMS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/MohammadiN20,
  author    = {Shahriar Mohammadi and
               Amin Namadchian},
  title     = {Anomaly-based Web Attack Detection: The Application of Deep Neural
               Network Seq2Seq With Attention Mechanism},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {12},
  number    = {1},
  pages     = {44--54},
  year      = {2020},
  url       = {https://doi.org/10.22042/isecure.2020.199009.479},
  doi       = {10.22042/isecure.2020.199009.479},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/MohammadiN20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Mortazavi20,
  author    = {Reza Mortazavi},
  title     = {Improved Univariate Microaggregation for Integer Values},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {12},
  number    = {1},
  pages     = {35--43},
  year      = {2020},
  url       = {https://doi.org/10.22042/isecure.2019.185397.465},
  doi       = {10.22042/isecure.2019.185397.465},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/Mortazavi20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/NaderiKV20,
  author    = {Bashir Naderi and
               Hossein Kheiri and
               Vajiheh Vafaei},
  title     = {Modified Sliding-Mode Control Method for Synchronization a Class of
               Chaotic Fractional-Order Systems with Application in Encryption},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {12},
  number    = {1},
  pages     = {55--66},
  year      = {2020},
  url       = {https://doi.org/10.22042/isecure.2019.156417.439},
  doi       = {10.22042/isecure.2019.156417.439},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/NaderiKV20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/NiknamSAB20,
  author    = {Majid M. Niknam and
               Sadegh Sadeghi and
               Mohammad Reza Aref and
               Nasour Bagheri},
  title     = {Investigation of Some Attacks on {GAGE} (v1), InGAGE (v1), (v1.03),
               and CiliPadi (v1) Variants},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {12},
  number    = {1},
  pages     = {13--23},
  year      = {2020},
  url       = {https://doi.org/10.22042/isecure.2020.199099.480},
  doi       = {10.22042/isecure.2020.199099.480},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/isecure/NiknamSAB20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/NooribakhshM20,
  author    = {Mahsa Nooribakhsh and
               Mahdi MollaMotalebi},
  title     = {{F-STONE:} {A} Fast Real-Time {DDOS} Attack Detection Method Using
               an Improved Historical Memory Management},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {12},
  number    = {2},
  pages     = {113--128},
  year      = {2020},
  url       = {https://doi.org/10.22042/isecure.2020.167450.453},
  doi       = {10.22042/isecure.2020.167450.453},
  timestamp = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/NooribakhshM20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/SabetiS20,
  author    = {Vajiheh Sabeti and
               Minoo Shoaei},
  title     = {New High Secure Network Steganography Method Based on Packet Length},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {12},
  number    = {1},
  pages     = {24--44},
  year      = {2020},
  url       = {https://doi.org/10.22042/isecure.2020.194573.475},
  doi       = {10.22042/isecure.2020.194573.475},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/SabetiS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/SeddighS20,
  author    = {Milad Seddigh and
               Hadi Soleimany},
  title     = {Enhanced Flush+Reload Attack on {AES}},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {12},
  number    = {2},
  pages     = {81--89},
  year      = {2020},
  url       = {https://doi.org/10.22042/isecure.2020.219248.519},
  doi       = {10.22042/isecure.2020.219248.519},
  timestamp = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/SeddighS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/TalebHM20,
  author    = {Talib M. J. Al Taleb and
               Sami Hasan and
               Yaqoob Yousif Mahdi},
  title     = {Indexed View Technique to Speed-up Data Warehouse Query Processing},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {12},
  number    = {3},
  pages     = {81--85},
  year      = {2020},
  url       = {https://doi.org/10.22042/isecure.2021.271059.615},
  doi       = {10.22042/isecure.2021.271059.615},
  timestamp = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/TalebHM20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/ZaghianB20,
  author    = {Ali Zaghian and
               Bagher Bagherpour},
  title     = {A Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous
               Linear Recursions},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {12},
  number    = {2},
  pages     = {91--99},
  year      = {2020},
  url       = {https://doi.org/10.22042/isecure.2020.212763.505},
  doi       = {10.22042/isecure.2020.212763.505},
  timestamp = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/ZaghianB20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/ZarezadehAS20,
  author    = {Maryam Zarezadeh and
               Maede Ashouri{-}Talouki and
               Mohammad Siavashi},
  title     = {Attribute-based Access Control for Cloud-based Electronic Health Record
               {(EHR)} Systems},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {12},
  number    = {2},
  pages     = {129--140},
  year      = {2020},
  url       = {https://doi.org/10.22042/isecure.2020.174338.458},
  doi       = {10.22042/isecure.2020.174338.458},
  timestamp = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/ZarezadehAS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/AbdulsattarA19,
  author    = {Oula L. Abdulsattar and
               Emad H. Al{-}Hemiary},
  title     = {Virtualized Network Management Laboratory for Educational Purposes},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {11},
  number    = {3},
  pages     = {181--186},
  year      = {2019},
  url       = {https://doi.org/10.22042/isecure.2019.11.3.24},
  doi       = {10.22042/isecure.2019.11.3.24},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/AbdulsattarA19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/AhmadiA19,
  author    = {Siavash Ahmadi and
               Mohammad Reza Aref},
  title     = {New Fixed Point Attacks on {GOST2} Block Cipher},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {11},
  number    = {2},
  pages     = {145--158},
  year      = {2019},
  url       = {https://doi.org/10.22042/isecure.2019.140663.424},
  doi       = {10.22042/isecure.2019.140663.424},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/AhmadiA19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/AhmadiAMA19,
  author    = {Siavash Ahmadi and
               Zahra Ahmadian and
               Javad Mohajeri and
               Mohammad Reza Aref},
  title     = {Biclique Cryptanalysis of Block Ciphers LBlock and {TWINE-80} with
               Practical Data Complexity},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {11},
  number    = {1},
  pages     = {57--74},
  year      = {2019},
  url       = {https://doi.org/10.22042/isecure.2018.138036.420},
  doi       = {10.22042/isecure.2018.138036.420},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/AhmadiAMA19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/AhmedLXA19,
  author    = {Omed Hassan Ahmed and
               Joan Lu and
               Qiang Xu and
               Muzhir Shaban Al{-}Ani},
  title     = {Face Recognition Based Rank Reduction {SVD} Approach},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {11},
  number    = {3},
  pages     = {39--50},
  year      = {2019},
  url       = {https://doi.org/10.22042/isecure.2019.11.0.6},
  doi       = {10.22042/isecure.2019.11.0.6},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/AhmedLXA19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Al-JobouryA19,
  author    = {Istabraq M. Al{-}Joboury and
               Emad H. Al{-}Hemiary},
  title     = {IoT Protocols Based Fog/Cloud over High Traffic},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {11},
  number    = {3},
  pages     = {173--180},
  year      = {2019},
  url       = {https://doi.org/10.22042/isecure.2019.11.3.23},
  doi       = {10.22042/isecure.2019.11.3.23},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/Al-JobouryA19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Alahmari19,
  author    = {Saad Ali Alahmari},
  title     = {Using Machine Learning {ARIMA} to Predict the Price of Cryptocurrencies},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {11},
  number    = {3},
  pages     = {139--144},
  year      = {2019},
  url       = {https://doi.org/10.22042/isecure.2019.11.0.18},
  doi       = {10.22042/isecure.2019.11.0.18},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/Alahmari19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Alenazi19,
  author    = {Mohammed J. F. Alenazi},
  title     = {Evaluating Multipath {TCP} Resilience against Link Failures},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {11},
  number    = {3},
  pages     = {113--122},
  year      = {2019},
  url       = {https://doi.org/10.22042/isecure.2019.11.0.15},
  doi       = {10.22042/isecure.2019.11.0.15},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/Alenazi19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/AlyasASAFK19,
  author    = {Tahir Alyas and
               Gulzar Ahmad and
               Yousaf Saeed and
               Muhammad Asif and
               Umer Farooq and
               Asma Kanwal},
  title     = {Cloud and IoT based Smart Car Parking System by using Mamdani Fuzzy
               Inference System {(MFIS)}},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {11},
  number    = {3},
  pages     = {153--160},
  year      = {2019},
  url       = {https://doi.org/10.22042/isecure.2019.11.0.20},
  doi       = {10.22042/isecure.2019.11.0.20},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/AlyasASAFK19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Aref19,
  author    = {Mohammad Reza Aref},
  title     = {Editorial},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {11},
  number    = {1},
  pages     = {1--2},
  year      = {2019},
  url       = {https://doi.org/10.22042/isecure.2019.11.1.7},
  doi       = {10.22042/isecure.2019.11.1.7},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/Aref19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Aref19a,
  author    = {Mohammad Reza Aref},
  title     = {Editorial},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {11},
  number    = {2},
  pages     = {93--94},
  year      = {2019},
  url       = {https://doi.org/10.22042/isecure.2019.0.0.7},
  doi       = {10.22042/isecure.2019.0.0.7},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/Aref19a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Aref19b,
  author    = {Mohammad Reza Aref},
  title     = {Editorial},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {11},
  number    = {3},
  year      = {2019},
  url       = {https://doi.org/10.22042/isecure.2019.11.3.22},
  doi       = {10.22042/isecure.2019.11.3.22},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/Aref19b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/AtaniAK19,
  author    = {Reza Ebrahimi Atani and
               Shahabaddin Ebrahimi Atani and
               Amir Hassani Karbasi},
  title     = {A New Ring-Based {SPHF} and {PAKE} Protocol On Ideal Lattices},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {11},
  number    = {1},
  pages     = {75--86},
  year      = {2019},
  url       = {https://doi.org/10.22042/isecure.2018.109810.398},
  doi       = {10.22042/isecure.2018.109810.398},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/AtaniAK19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/AtiaS19,
  author    = {Ayman Atia and
               Nada Shorim},
  title     = {Hand Gestures Classification with Multi-Core {DTW}},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {11},
  number    = {3},
  pages     = {91--96},
  year      = {2019},
  url       = {https://doi.org/10.22042/isecure.2019.11.0.12},
  doi       = {10.22042/isecure.2019.11.0.12},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/AtiaS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/BaniMustafa19,
  author    = {Ahmed BaniMustafa},
  title     = {Enhancing Learning from Imbalanced Classes via Data Preprocessing:
               {A} Data-Driven Application in Metabolomics Data Mining},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {11},
  number    = {3},
  pages     = {79--89},
  year      = {2019},
  url       = {https://doi.org/10.22042/isecure.2019.11.0.11},
  doi       = {10.22042/isecure.2019.11.0.11},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/BaniMustafa19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/BayatJDSKA19,
  author    = {Majid Bayat and
               Zahra Zare Jousheghani and
               Ashok Kumar Das and
               Pitam Singh and
               Saru Kumari and
               Mohammad Reza Aref},
  title     = {A Lightweight Privacy-preserving Authenticated Key Exchange Scheme
               for Smart Grid Communications},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {11},
  number    = {2},
  pages     = {113--128},
  year      = {2019},
  url       = {https://doi.org/10.22042/isecure.2019.161366.445},
  doi       = {10.22042/isecure.2019.161366.445},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/BayatJDSKA19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/ChamaniDJP19,
  author    = {Javad Ghareh Chamani and
               Mohammad Sadeq Dousti and
               Rasool Jalili and
               Dimitrios Papadopoulos},
  title     = {{SESOS:} {A} Verifiable Searchable Outsourcing Scheme for Ordered
               Structured Data in Cloud Computing},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {11},
  number    = {1},
  pages     = {15--34},
  year      = {2019},
  url       = {https://doi.org/10.22042/isecure.2019.148637.430},
  doi       = {10.22042/isecure.2019.148637.430},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/ChamaniDJP19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/CordovaDP19,
  author    = {Felisa M. C{\'{o}}rdova and
               Claudia A. Dur{\'{a}}n and
               Fredi Edgardo Palominos},
  title     = {Cognitive Strategic Model applied to a Port System},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {11},
  number    = {3},
  pages     = {73--78},
  year      = {2019},
  url       = {https://doi.org/10.22042/isecure.2019.11.0.10},
  doi       = {10.22042/isecure.2019.11.0.10},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/CordovaDP19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/FatimaKAWAA19,
  author    = {Areej Fatima and
               Muhammad Adnan Khan and
               Sagheer Abbas and
               Muhammad Waqas and
               Leena Anum and
               Muhammad Asif},
  title     = {Evaluation of Planet Factors of Smart City through Multi-layer Fuzzy
               Logic {(MFL)}},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {11},
  number    = {3},
  pages     = {51--58},
  year      = {2019},
  url       = {https://doi.org/10.22042/isecure.2019.11.0.7},
  doi       = {10.22042/isecure.2019.11.0.7},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/FatimaKAWAA19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Flifel19,
  author    = {Rawan Flifel},
  title     = {The Role of Packet Tracer in Learning Wireless Networks and Managing
               IoT Devices},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {11},
  number    = {3},
  pages     = {35--38},
  year      = {2019},
  url       = {https://doi.org/10.22042/isecure.2019.11.0.5},
  doi       = {10.22042/isecure.2019.11.0.5},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/Flifel19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/GhasemiHN19,
  author    = {Simin Ghasemi and
               Mohammad Ali Hadavi and
               Mina Niknafs},
  title     = {A Trust Based Probabilistic Method for Efficient Correctness Verification
               in Database Outsourcing},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {11},
  number    = {1},
  pages     = {3--14},
  year      = {2019},
  url       = {https://doi.org/10.22042/isecure.2018.141655.426},
  doi       = {10.22042/isecure.2018.141655.426},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/GhasemiHN19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/GottliebSFBK19,
  author    = {Matthias Gottlieb and
               Marwin Shraideh and
               Isabel Fuhrmann and
               Markus B{\"{o}}hm and
               Helmut Krcmar},
  title     = {Critical Success Factors for Data Virtualization: {A} Literature Review},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {11},
  number    = {3},
  pages     = {131--137},
  year      = {2019},
  url       = {https://doi.org/10.22042/isecure.2019.11.0.17},
  doi       = {10.22042/isecure.2019.11.0.17},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/GottliebSFBK19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/HasheminasabLA19,
  author    = {Seyed Alireza Hasheminasab and
               Behrouz Tork Ladani and
               Tansu Alpcan},
  title     = {Interdependent Security Game Design over Constrained Linear Influence
               Networks},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {11},
  number    = {2},
  pages     = {95--111},
  year      = {2019},
  url       = {https://doi.org/10.22042/isecure.2019.186923.467},
  doi       = {10.22042/isecure.2019.186923.467},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/HasheminasabLA19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/JedaibiK19,
  author    = {Wajdi Al Jedaibi and
               Sufian Khamis},
  title     = {Towards Measuring the Project Management Process During Large Scale
               Software System Implementation Phase},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {11},
  number    = {3},
  pages     = {161--172},
  year      = {2019},
  url       = {https://doi.org/10.22042/isecure.2019.11.0.21},
  doi       = {10.22042/isecure.2019.11.0.21},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/JedaibiK19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/JuniorAFA19,
  author    = {Joel E. Cordeiro Junior and
               Marcelo S. Alencar and
               Jos{\'{e}} Valentim Dos Santos Filho and
               Karcius D. R. Assis},
  title     = {A Fair Power Allocation for Non-Orthogonal Multiple Access in the
               Power Domain},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {11},
  number    = {3},
  pages     = {123--130},
  year      = {2019},
  url       = {https://doi.org/10.22042/isecure.2019.11.0.16},
  doi       = {10.22042/isecure.2019.11.0.16},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/JuniorAFA19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/KhatterI19,
  author    = {Ehab Khatter and
               Dina Ibrahim},
  title     = {Proposed ST-Slotted-CS-ALOHA Protocol for Time Saving and Collision
               Avoidance},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {11},
  number    = {3},
  pages     = {67--72},
  year      = {2019},
  url       = {https://doi.org/10.22042/isecure.2019.11.0.9},
  doi       = {10.22042/isecure.2019.11.0.9},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/isecure/KhatterI19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/LabbafniyaS19,
  author    = {Mansoureh Labbafniya and
               Roghayeh Saeidi},
  title     = {Secure {FPGA} Design by Filling Unused Spaces},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {11},
  number    = {1},
  pages     = {47--56},
  year      = {2019},
  url       = {https://doi.org/10.22042/isecure.2019.143657.427},
  doi       = {10.22042/isecure.2019.143657.427},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/LabbafniyaS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/LetychevskyiHYP19,
  author    = {Oleksandr A. Letychevskyi and
               Yaroslav Hryniuk and
               Viktor Yakovlev and
               Volodymyr Peschanenko and
               Viktor Radchenko},
  title     = {Algebraic Matching of Vulnerabilities in a Low-Level Code},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {11},
  number    = {3},
  pages     = {1--7},
  year      = {2019},
  url       = {https://doi.org/10.22042/isecure.2019.11.0.1},
  doi       = {10.22042/isecure.2019.11.0.1},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/LetychevskyiHYP19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/MemonHDSN19,
  author    = {Muhammad Ali Memon and
               Zaira Hassan and
               Kamran Dahri and
               Asadullah Shaikh and
               Muhammad Ali Nizamani},
  title     = {Aspect Oriented {UML} to {ECORE} Model Transformation},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {11},
  number    = {3},
  pages     = {97--103},
  year      = {2019},
  url       = {https://doi.org/10.22042/isecure.2019.11.0.13},
  doi       = {10.22042/isecure.2019.11.0.13},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/MemonHDSN19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/MohammadrezaeiS19,
  author    = {Mohammadreza Mohammadrezaei and
               Mohammad Ebrahim Shiri and
               Amir Masoud Rahmani},
  title     = {Detection of Fake Accounts in Social Networks Based on One Class Classification},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {11},
  number    = {2},
  pages     = {173--183},
  year      = {2019},
  url       = {https://doi.org/10.22042/isecure.2019.165312.450},
  doi       = {10.22042/isecure.2019.165312.450},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/MohammadrezaeiS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/NezhadSB19,
  author    = {S. Ehsan Hosiny Nezhad and
               Masoumeh Safkhani and
               Nasour Bagheri},
  title     = {Relaxed Differential Fault Analysis of {SHA-3}},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {11},
  number    = {2},
  pages     = {129--143},
  year      = {2019},
  url       = {https://doi.org/10.22042/isecure.2019.184302.464},
  doi       = {10.22042/isecure.2019.184302.464},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/NezhadSB19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/PenchevaAA19,
  author    = {Evelina Pencheva and
               Ivaylo Atanasov and
               Ivaylo Asenov},
  title     = {Access and Mobility Policy Control at the Network Edge},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {11},
  number    = {3},
  pages     = {105--111},
  year      = {2019},
  url       = {https://doi.org/10.22042/isecure.2019.11.0.14},
  doi       = {10.22042/isecure.2019.11.0.14},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/PenchevaAA19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/RishakaniSDAMB19,
  author    = {Akbar Mahmoodi Rishakani and
               Mohammad Reza Mirzaee Shamsabad and
               Seyed Mojtaba Dehnavi and
               Mohammad Amin Amiri and
               Hamidreza Maimani and
               Nasour Bagheri},
  title     = {Lightweight 4x4 {MDS} Matrices for Hardware-Oriented Cryptographic
               Primitives},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {11},
  number    = {1},
  pages     = {35--46},
  year      = {2019},
  url       = {https://doi.org/10.22042/isecure.2018.138301.421},
  doi       = {10.22042/isecure.2018.138301.421},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/RishakaniSDAMB19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/SaadiYT19,
  author    = {Hadjer Saadi and
               Mustapha C. E. Yagoub and
               Rachida Touhami},
  title     = {Role and Application of {RFID} Technology in Internet of Things: Communication,
               Authentication, Risk, and Security Concerns},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {11},
  number    = {3},
  pages     = {9--17},
  year      = {2019},
  url       = {https://doi.org/10.22042/isecure.2019.11.0.2},
  doi       = {10.22042/isecure.2019.11.0.2},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/SaadiYT19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/SaeedYFAKAA19,
  author    = {Anwar Saeed and
               Muhammad Yousif and
               Areej Fatima and
               Sagheer Abbas and
               Muhammad Adnan Khan and
               Leena Anum and
               Ali Akram},
  title     = {An Optimal Utilization of Cloud Resources using Adaptive Back Propagation
               Neural Network and Multi-Level Priority Queue Scheduling},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {11},
  number    = {3},
  pages     = {145--151},
  year      = {2019},
  url       = {https://doi.org/10.22042/isecure.2019.11.0.19},
  doi       = {10.22042/isecure.2019.11.0.19},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/SaeedYFAKAA19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/SerkaniGM19,
  author    = {Elham Serkani and
               Hossein Gharaee Garakani and
               Naser Mohammadzadeh},
  title     = {Anomaly Detection Using {SVM} as Classifier and Decision Tree for
               Optimizing Feature Vectors},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {11},
  number    = {2},
  pages     = {159--171},
  year      = {2019},
  url       = {https://doi.org/10.22042/isecure.2019.164980.448},
  doi       = {10.22042/isecure.2019.164980.448},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/SerkaniGM19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/ShaabanSME19,
  author    = {Dalia A. Shaaban and
               Mohamed H. Saad and
               Ahmed H. Madian and
               Hesham N. Elmahdy},
  title     = {Medical Image Compression Based on Region of Interest},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {11},
  number    = {3},
  pages     = {29--34},
  year      = {2019},
  url       = {https://doi.org/10.22042/isecure.2019.11.0.4},
  doi       = {10.22042/isecure.2019.11.0.4},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/ShaabanSME19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/SoranT19,
  author    = {Ibrahim Soran and
               Qing Tan},
  title     = {A Sudy on Information Privacy Issue on Social Networks},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {11},
  number    = {3},
  pages     = {19--27},
  year      = {2019},
  url       = {https://doi.org/10.22042/isecure.2019.11.0.3},
  doi       = {10.22042/isecure.2019.11.0.3},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/SoranT19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/X19,
  title     = {Persian Abstract},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {11},
  number    = {1},
  pages     = {87--92},
  year      = {2019},
  url       = {https://doi.org/10.22042/isecure.2019.11.1.8},
  doi       = {10.22042/isecure.2019.11.1.8},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/X19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/X19a,
  title     = {Persian Abstract},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {11},
  number    = {2},
  pages     = {185--190},
  year      = {2019},
  url       = {https://doi.org/10.22042/isecure.2019.0.0.8},
  doi       = {10.22042/isecure.2019.0.0.8},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/X19a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/ZendaouiH19,
  author    = {Fairouz Zendaoui and
               Walid{-}Khaled Hidouci},
  title     = {Considering Uncertainty in Modeling Historical Knowledge},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {11},
  number    = {3},
  pages     = {59--65},
  year      = {2019},
  url       = {https://doi.org/10.22042/isecure.2019.11.0.8},
  doi       = {10.22042/isecure.2019.11.0.8},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/ZendaouiH19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Aref18,
  author    = {Mohammad Reza Aref},
  title     = {Editorial},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {10},
  number    = {1},
  pages     = {1--2},
  year      = {2018},
  url       = {https://doi.org/10.22042/isecure.2018.10.1.1},
  doi       = {10.22042/isecure.2018.10.1.1},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/Aref18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Aref18a,
  author    = {Mohammad Reza Aref},
  title     = {Editorial},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {10},
  number    = {2},
  pages     = {77--78},
  year      = {2018},
  url       = {https://doi.org/10.22042/isecure.2018.10.2.1},
  doi       = {10.22042/isecure.2018.10.2.1},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/Aref18a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/AtaniAK18,
  author    = {Reza Ebrahimi Atani and
               Shahabaddin Ebrahimi Atani and
               Amir Hassani Karbasi},
  title     = {{NETRU:} {A} Non-commutative and Secure Variant of {CTRU} Cryptosystem},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {10},
  number    = {1},
  pages     = {45--53},
  year      = {2018},
  url       = {https://doi.org/10.22042/isecure.2018.0.0.2},
  doi       = {10.22042/isecure.2018.0.0.2},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/AtaniAK18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/BehniafarNS18,
  author    = {Morteza Behniafar and
               Alireza Nowroozi and
               Hamid Reza Shahriari},
  title     = {A Survey of Anomaly Detection Approaches in Internet of Things},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {10},
  number    = {2},
  pages     = {79--92},
  year      = {2018},
  url       = {https://doi.org/10.22042/isecure.2018.116976.408},
  doi       = {10.22042/isecure.2018.116976.408},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/BehniafarNS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/FanianMH18,
  author    = {Ali Fanian and
               Ehsan Mahdavi and
               Homa Hassannejad},
  title     = {Classification of encrypted traffic for applications based on statistical
               features},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {10},
  number    = {1},
  pages     = {29--43},
  year      = {2018},
  url       = {https://doi.org/10.22042/isecure.2018.95316.390},
  doi       = {10.22042/isecure.2018.95316.390},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/FanianMH18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/KhoshhalpourS18,
  author    = {Ehsan Khoshhalpour and
               Hamid Reza Shahriari},
  title     = {BotRevealer: Behavioral Detection of Botnets based on Botnet Life-cycle},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {10},
  number    = {1},
  pages     = {55--61},
  year      = {2018},
  url       = {https://doi.org/10.22042/isecure.2017.81520.374},
  doi       = {10.22042/isecure.2017.81520.374},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/KhoshhalpourS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/MoazamiMS18,
  author    = {Farokhlagha Moazami and
               Alireza Mehrdad and
               Hadi Soleimany},
  title     = {Impossible Differential Cryptanalysis on Deoxys-BC-256},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {10},
  number    = {2},
  pages     = {93--105},
  year      = {2018},
  url       = {https://doi.org/10.22042/isecure.2018.114245.405},
  doi       = {10.22042/isecure.2018.114245.405},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/isecure/MoazamiMS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Mohseni-EjiyehA18,
  author    = {Atefeh Mohseni{-}Ejiyeh and
               Maede Ashouri{-}Talouki and
               Mojtaba Mahdavi},
  title     = {An Incentive-Aware Lightweight Secure Data Sharing Scheme for {D2D}
               Communication in 5G Cellular Networks},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {10},
  number    = {1},
  pages     = {15--27},
  year      = {2018},
  url       = {https://doi.org/10.22042/isecure.2018.111195.401},
  doi       = {10.22042/isecure.2018.111195.401},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/Mohseni-EjiyehA18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/OliaeeDAMA18,
  author    = {Mehdi Mahdavi Oliaee and
               Mahshid Delavar and
               Mohammad Hassan Ameri and
               Javad Mohajeri and
               Mohammad Reza Aref},
  title     = {On the Security of {O-PSI:} {A} Delegated Private Set Intersection
               on Outsourced Datasets (Extended Version)},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {10},
  number    = {2},
  pages     = {117--127},
  year      = {2018},
  url       = {https://doi.org/10.22042/isecure.2018.120860.410},
  doi       = {10.22042/isecure.2018.120860.410},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/OliaeeDAMA18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/PatilP18,
  author    = {Dharmaraj R. Patil and
               Jayantrao Bhaurao Patil},
  title     = {Feature-based Malicious {URL} and Attack Type Detection Using Multi-class
               Classification},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {10},
  number    = {2},
  pages     = {141--162},
  year      = {2018},
  url       = {https://doi.org/10.22042/isecure.2018.0.0.1},
  doi       = {10.22042/isecure.2018.0.0.1},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/PatilP18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Ramezanian18,
  author    = {Rahim Ramezanian},
  title     = {Distributed Contingency Logic and Security},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {10},
  number    = {2},
  pages     = {107--115},
  year      = {2018},
  url       = {https://doi.org/10.22042/isecure.2018.114354.406},
  doi       = {10.22042/isecure.2018.114354.406},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/Ramezanian18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/RamezanianP18,
  author    = {Rasoul Ramezanian and
               Mohsen Pourpouneh},
  title     = {A Decentralized Online Sortition Protocol},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {10},
  number    = {1},
  pages     = {63--69},
  year      = {2018},
  url       = {https://doi.org/10.22042/isecure.2018.113240.403},
  doi       = {10.22042/isecure.2018.113240.403},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/RamezanianP18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/ShahmirzdiASMA18,
  author    = {Aein Rezaei Shahmirzadi and
               Seyyed Arash Azimi and
               Mahmoud Salmasizadeh and
               Javad Mohajeri and
               Mohammad Reza Aref},
  title     = {Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block
               Cipher (Extended Version)},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {10},
  number    = {1},
  pages     = {3--13},
  year      = {2018},
  url       = {https://doi.org/10.22042/isecure.2018.110672.399},
  doi       = {10.22042/isecure.2018.110672.399},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/ShahmirzdiASMA18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/SoltaniBJ18,
  author    = {Naeimeh Soltani and
               Ramin Bohlooli and
               Rasool Jalili},
  title     = {Enforcing {RBAC} Policies over Data Stored on Untrusted Server (Extended
               Version)},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {10},
  number    = {2},
  pages     = {129--139},
  year      = {2018},
  url       = {https://doi.org/10.22042/isecure.2018.126294.414},
  doi       = {10.22042/isecure.2018.126294.414},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/SoltaniBJ18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/X18,
  title     = {Persian Abstract},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {10},
  number    = {2},
  pages     = {163--168},
  year      = {2018},
  url       = {https://doi.org/10.22042/isecure.2018.10.2.8},
  doi       = {10.22042/isecure.2018.10.2.8},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/X18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/AerabiKFPA17,
  author    = {Ehsan Aerabi and
               Mahdi Kaykha and
               Mahdi Fazeli and
               Ahmad Patooghy and
               Ahmad Akbari},
  title     = {Side channel parameter characteristics of code injection attacks},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {9},
  number    = {1},
  pages     = {17--26},
  year      = {2017},
  url       = {https://doi.org/10.22042/isecure.2017.0.0.5},
  doi       = {10.22042/isecure.2017.0.0.5},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/AerabiKFPA17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/AhadipourK17,
  author    = {Alireza Ahadipour and
               Alireza Keshavarz{-}Haddad},
  title     = {{LPKP:} location-based probabilistic key pre-distribution scheme for
               large-scale wireless sensor networks using graph coloring},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {9},
  number    = {1},
  pages     = {27--39},
  year      = {2017},
  url       = {https://doi.org/10.22042/isecure.2017.0.0.1},
  doi       = {10.22042/isecure.2017.0.0.1},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/AhadipourK17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Aref17,
  author    = {Mohammad Reza Aref},
  title     = {Editorial},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {9},
  number    = {1},
  pages     = {1--2},
  year      = {2017},
  url       = {https://doi.org/10.22042/isecure.2017.9.1.6},
  doi       = {10.22042/isecure.2017.9.1.6},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/Aref17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Aref17a,
  author    = {Mohammad Reza Aref},
  title     = {Editorial},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {9},
  number    = {2},
  pages     = {99--100},
  year      = {2017},
  url       = {https://doi.org/10.22042/isecure.2017.9.2.1},
  doi       = {10.22042/isecure.2017.9.2.1},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/Aref17a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/GhasemzadehKM17,
  author    = {Hamzeh Ghasemzadeh and
               Mehdi Tajik Khass and
               Hamed Mehrara},
  title     = {Cipher text only attack on speech time scrambling systems using correction
               of audio spectrogram},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {9},
  number    = {2},
  pages     = {131--145},
  year      = {2017},
  url       = {http://www.isecure-journal.com/article\_48950.html},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/GhasemzadehKM17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/ImaniM17,
  author    = {Maryam Imani and
               Gholam Ali Montazer},
  title     = {Phishing website detection using weighted feature line embedding},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {9},
  number    = {2},
  pages     = {147--159},
  year      = {2017},
  url       = {https://doi.org/10.22042/isecure.2017.83439.377},
  doi       = {10.22042/isecure.2017.83439.377},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/ImaniM17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/KhazaeiM17,
  author    = {Shahram Khazaei and
               Farokhlagha Moazami},
  title     = {On the computational complexity of finding a minimal basis for the
               guess and determine attack},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {9},
  number    = {2},
  pages     = {101--110},
  year      = {2017},
  url       = {https://doi.org/10.22042/isecure.2017.79681.373},
  doi       = {10.22042/isecure.2017.79681.373},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/KhazaeiM17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/MafakheriEP17,
  author    = {Behnam Mafakheri and
               Taraneh Eghlidos and
               Hossein Pilaram},
  title     = {An efficient secure channel coding scheme based on polar codes},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {9},
  number    = {2},
  pages     = {111--118},
  year      = {2017},
  url       = {https://doi.org/10.22042/isecure.2017.84609.380},
  doi       = {10.22042/isecure.2017.84609.380},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/MafakheriEP17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/MortazaviSD17,
  author    = {Amir S. Mortazavi and
               Mahmoud Salmasizadeh and
               Amir Daneshgar},
  title     = {A new security proof for {FMNV} continuous non-malleable encoding
               scheme},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {9},
  number    = {1},
  pages     = {41--51},
  year      = {2017},
  url       = {https://doi.org/10.22042/isecure.2017.74050.371},
  doi       = {10.22042/isecure.2017.74050.371},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/MortazaviSD17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/NezhadJTS17,
  author    = {Javad Hajian Nezhad and
               Majid Vafaei Jahan and
               Mohammad{-}H. Tayarani{-}N. and
               Zohre Sadrnezhad},
  title     = {Analyzing new features of infected web content in detection of malicious
               web pages},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {9},
  number    = {2},
  pages     = {161--181},
  year      = {2017},
  url       = {https://doi.org/10.22042/isecure.2017.9.2.2},
  doi       = {10.22042/isecure.2017.9.2.2},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/NezhadJTS17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/PourS17,
  author    = {Morteza Safaei Pour and
               Mahmoud Salmasizadeh},
  title     = {A new {CPA} resistant software implementation for symmetric ciphers
               with smoothed power consumption: {SIMON} case study},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {9},
  number    = {2},
  pages     = {119--130},
  year      = {2017},
  url       = {https://doi.org/10.22042/isecure.2017.82990.376},
  doi       = {10.22042/isecure.2017.82990.376},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/PourS17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/RastegariB17,
  author    = {Parvin Rastegari and
               Mehdi Berenjkoub},
  title     = {An efficient certificateless signcryption scheme in the standard model},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {9},
  number    = {1},
  pages     = {3--16},
  year      = {2017},
  url       = {https://doi.org/10.22042/isecure.2017.70117.368},
  doi       = {10.22042/isecure.2017.70117.368},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/RastegariB17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/SadeghiAS17,
  author    = {AliAkbar Sadeghi and
               Farzane Aminmansour and
               Hamid Reza Shahriari},
  title     = {Dwarf Frankenstein is still in your memory: tiny code reuse attacks},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {9},
  number    = {1},
  pages     = {53--72},
  year      = {2017},
  url       = {https://doi.org/10.22042/isecure.2017.0.0.4},
  doi       = {10.22042/isecure.2017.0.0.4},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/SadeghiAS17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/SafarzadehTZL17,
  author    = {Marzieh Safarzadeh and
               Mahboubeh Taghizadeh and
               Bahman Zamani and
               Behrouz Tork Ladani},
  title     = {An automatic test case generator for evaluating implementation of
               access control policies},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {9},
  number    = {1},
  pages     = {73--91},
  year      = {2017},
  url       = {https://doi.org/10.22042/isecure.2017.0.0.3},
  doi       = {10.22042/isecure.2017.0.0.3},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/SafarzadehTZL17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/X17,
  title     = {Persian Abstract},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {9},
  number    = {2},
  pages     = {183--189},
  year      = {2017},
  url       = {https://doi.org/10.22042/isecure.2017.9.2.8},
  doi       = {10.22042/isecure.2017.9.2.8},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/X17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/AminmansourS16,
  author    = {Farzane Aminmansour and
               Hamid Reza Shahriari},
  title     = {Aggrandizing the beast's limbs: patulous code reuse attack on {ARM}
               architecture},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {8},
  number    = {1},
  pages     = {39--52},
  year      = {2016},
  url       = {https://doi.org/10.22042/isecure.2016.8.1.6},
  doi       = {10.22042/isecure.2016.8.1.6},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/AminmansourS16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Aref16,
  author    = {Mohammad Reza Aref},
  title     = {Editorial},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {8},
  number    = {1},
  pages     = {1--2},
  year      = {2016},
  url       = {https://doi.org/10.22042/isecure.2015.8.1.7},
  doi       = {10.22042/isecure.2015.8.1.7},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/Aref16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Aref16a,
  author    = {Mohammad Reza Aref},
  title     = {Editorial},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {8},
  number    = {2},
  pages     = {91--92},
  year      = {2016},
  url       = {https://doi.org/10.22042/isecure.2016.8.2.7},
  doi       = {10.22042/isecure.2016.8.2.7},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/Aref16a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/GhaemMaghamiHM16,
  author    = {Seyed Salman Sajjadi GhaemMaghami and
               Afrooz Haghbin and
               Mahtab Mirmohseni},
  title     = {Traceability improvements of a new {RFID} protocol based on {EPC}
               {C1} {G2}},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {8},
  number    = {2},
  pages     = {105--114},
  year      = {2016},
  url       = {https://doi.org/10.22042/isecure.2016.8.2.2},
  doi       = {10.22042/isecure.2016.8.2.2},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/GhaemMaghamiHM16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/KamareiPF16,
  author    = {Meisam Kamarei and
               Ahmad Patooghy and
               Mahdi Fazeli},
  title     = {Unauthenticated event detection in wireless sensor networks using
               sensors co-coverage},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {8},
  number    = {1},
  pages     = {61--71},
  year      = {2016},
  url       = {https://doi.org/10.22042/isecure.2016.8.1.4},
  doi       = {10.22042/isecure.2016.8.1.4},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/KamareiPF16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/KhalesiBM16,
  author    = {Akram Khalesi and
               Hossein Bahramgiri and
               Davod Mansuri},
  title     = {A new method for accelerating impossible differential cryptanalysis
               and its application on LBlock},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {8},
  number    = {1},
  pages     = {73--84},
  year      = {2016},
  url       = {https://doi.org/10.22042/isecure.2016.8.1.5},
  doi       = {10.22042/isecure.2016.8.1.5},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/KhalesiBM16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/KhorasganiAPEA16,
  author    = {Hamidreza Amini Khorasgani and
               Saba Asaad and
               Hossein Pilaram and
               Taraneh Eghlidos and
               Mohammad Reza Aref},
  title     = {On the design and security of a lattice-based threshold secret sharing
               scheme},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {8},
  number    = {1},
  pages     = {25--38},
  year      = {2016},
  url       = {https://doi.org/10.22042/isecure.2016.8.1.2},
  doi       = {10.22042/isecure.2016.8.1.2},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/KhorasganiAPEA16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/PourpounehR16,
  author    = {Mohsen Pourpouneh and
               Rasoul Ramezanian},
  title     = {A short introduction to two approaches in formal verification of security
               protocols: model checking and theorem proving},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {8},
  number    = {1},
  pages     = {3--24},
  year      = {2016},
  url       = {https://doi.org/10.22042/isecure.2016.8.1.1},
  doi       = {10.22042/isecure.2016.8.1.1},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/PourpounehR16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/RezapourAA16,
  author    = {Taha Yasin Rezapour and
               Reza Ebrahimi Atani and
               Meer Soheil Abolghasemi},
  title     = {A novel key management scheme for heterogeneous sensor networks based
               on the position of nodes},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {8},
  number    = {2},
  pages     = {115--130},
  year      = {2016},
  url       = {https://doi.org/10.22042/isecure.2016.8.2.3},
  doi       = {10.22042/isecure.2016.8.2.3},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/RezapourAA16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/SafkhaniB16,
  author    = {Masoumeh Safkhani and
               Nasour Bagheri},
  title     = {A note on the security of two improved {RFID} protocols},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {8},
  number    = {2},
  pages     = {155--160},
  year      = {2016},
  url       = {https://doi.org/10.22042/isecure.2016.8.2.6},
  doi       = {10.22042/isecure.2016.8.2.6},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/SafkhaniB16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/SedaghatbafA16,
  author    = {Ali Sedaghatbaf and
               Mohammad Abdollahi Azgomi},
  title     = {Quantitative evaluation of software security: an approach based on
               UML/SecAM and evidence theory},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {8},
  number    = {2},
  pages     = {141--153},
  year      = {2016},
  url       = {https://doi.org/10.22042/isecure.2016.8.2.5},
  doi       = {10.22042/isecure.2016.8.2.5},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/SedaghatbafA16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Zamanzadeh016,
  author    = {Sharareh Zamanzadeh and
               Ali Jahanian},
  title     = {Self authentication path insertion in FPGA-based design flow for tamper-resistant
               purpose},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {8},
  number    = {1},
  pages     = {53--60},
  year      = {2016},
  url       = {https://doi.org/10.22042/isecure.2016.8.1.3},
  doi       = {10.22042/isecure.2016.8.1.3},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/Zamanzadeh016.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Zamanzadeh016a,
  author    = {Sharareh Zamanzadeh and
               Ali Jahanian},
  title     = {{ASIC} design protection against reverse engineering during the fabrication
               process using automatic netlist obfuscation design flow},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {8},
  number    = {2},
  pages     = {93--104},
  year      = {2016},
  url       = {https://doi.org/10.22042/isecure.2016.8.2.1},
  doi       = {10.22042/isecure.2016.8.2.1},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/Zamanzadeh016a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/ZarmehiA16,
  author    = {Nematollah Zarmehi and
               Mohammad Reza Aref},
  title     = {Optimum decoder for multiplicative spread spectrum image watermarking
               with Laplacian modeling},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {8},
  number    = {2},
  pages     = {131--139},
  year      = {2016},
  url       = {https://doi.org/10.22042/isecure.2016.8.2.4},
  doi       = {10.22042/isecure.2016.8.2.4},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/ZarmehiA16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/AlizadehABS15,
  author    = {Javad Alizadeh and
               Mohammad Reza Aref and
               Nasour Bagheri and
               Hassan Sadeghi},
  title     = {Cryptanalysis of some first round {CAESAR} candidates},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {7},
  number    = {2},
  pages     = {127--134},
  year      = {2015},
  url       = {https://doi.org/10.22042/isecure.2016.7.2.5},
  doi       = {10.22042/isecure.2016.7.2.5},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/AlizadehABS15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/AminiA15,
  author    = {Morteza Amini and
               Majid Arasteh},
  title     = {A combination of semantic and attribute-based access control model
               for virtual organizations},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {7},
  number    = {1},
  pages     = {27--45},
  year      = {2015},
  url       = {https://doi.org/10.22042/isecure.2015.7.1.4},
  doi       = {10.22042/isecure.2015.7.1.4},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/AminiA15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/AtaniAK15,
  author    = {Reza Ebrahimi Atani and
               Shahabaddin Ebrahimi Atani and
               Amir Hassani Karbasi},
  title     = {{EEH:} AGGH-like public key cryptosystem over the eisenstein integers
               using polynomial representations},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {7},
  number    = {2},
  pages     = {115--126},
  year      = {2015},
  url       = {https://doi.org/10.22042/isecure.2016.7.2.4},
  doi       = {10.22042/isecure.2016.7.2.4},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/AtaniAK15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/BagheryAAA15,
  author    = {Karim Baghery and
               Behzad Abdolmaleki and
               Bahareh Akhbari and
               Mohammad Reza Aref},
  title     = {Enhancing privacy of recent authentication schemes for low-cost {RFID}
               systems},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {7},
  number    = {2},
  pages     = {135--149},
  year      = {2015},
  url       = {https://doi.org/10.22042/isecure.2016.7.2.6},
  doi       = {10.22042/isecure.2016.7.2.6},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/isecure/BagheryAAA15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/FalavarjaniLG15,
  author    = {Safieh Ghasemi Falavarjani and
               Behrouz Tork Ladani and
               Simin Ghasemi},
  title     = {{GGRA:} a grouped gossip-based reputation aggregation algorithm},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {7},
  number    = {1},
  pages     = {59--74},
  year      = {2015},
  url       = {https://doi.org/10.22042/isecure.2015.7.1.6},
  doi       = {10.22042/isecure.2015.7.1.6},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/FalavarjaniLG15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/GanjaviAS15,
  author    = {Ramin Ganjavi and
               Maryam Rajabzadeh Asaar and
               Mahmoud Salmasizadeh},
  title     = {A traceable optimistic fair exchange protocol in the standard model},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {7},
  number    = {1},
  pages     = {3--14},
  year      = {2015},
  url       = {https://doi.org/10.22042/isecure.2015.7.1.2},
  doi       = {10.22042/isecure.2015.7.1.2},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/GanjaviAS15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Jalili15,
  author    = {Rasool Jalili},
  title     = {Editorial},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {7},
  number    = {1},
  pages     = {1--2},
  year      = {2015},
  url       = {https://doi.org/10.22042/isecure.2015.7.1.1},
  doi       = {10.22042/isecure.2015.7.1.1},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/Jalili15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Jalili15a,
  author    = {Rasool Jalili},
  title     = {Editorial},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {7},
  number    = {2},
  pages     = {89--90},
  year      = {2015},
  url       = {https://doi.org/10.22042/isecure.2016.7.2.1},
  doi       = {10.22042/isecure.2016.7.2.1},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/Jalili15a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Mashhadi15,
  author    = {Samaneh Mashhadi},
  title     = {Computationally secure multiple secret sharing: models, schemes, and
               formal security analysis},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {7},
  number    = {2},
  pages     = {91--99},
  year      = {2015},
  url       = {https://doi.org/10.22042/isecure.2016.7.2.2},
  doi       = {10.22042/isecure.2016.7.2.2},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/Mashhadi15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/MortazaviJ15,
  author    = {Reza Mortazavi and
               Saeed Jalili},
  title     = {A novel local search method for microaggregation},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {7},
  number    = {1},
  pages     = {15--26},
  year      = {2015},
  url       = {https://doi.org/10.22042/isecure.2015.7.1.3},
  doi       = {10.22042/isecure.2015.7.1.3},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/MortazaviJ15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/NiknafsNJ15,
  author    = {Mina Niknafs and
               Sadegh Dorri Nogoorani and
               Rasool Jalili},
  title     = {A collusion mitigation scheme for reputation systems},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {7},
  number    = {2},
  pages     = {151--166},
  year      = {2015},
  url       = {https://doi.org/10.22042/isecure.2016.7.2.7},
  doi       = {10.22042/isecure.2016.7.2.7},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/isecure/NiknafsNJ15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/RashidiFS15,
  author    = {Bahram Rashidi and
               Reza Rezaeian Farashahi and
               Sayed Masoud Sayedi},
  title     = {Efficient implementation of low time complexity and pipelined bit-parallel
               polynomial basis multiplier over binary finite fields},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {7},
  number    = {2},
  pages     = {101--114},
  year      = {2015},
  url       = {https://doi.org/10.22042/isecure.2016.7.2.3},
  doi       = {10.22042/isecure.2016.7.2.3},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/RashidiFS15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/SadeghiKR15,
  author    = {Faramarz Sadeghi and
               Fatemeh Zarisfi Kermani and
               M. Kuchaki Rafsanjani},
  title     = {Optimizing image steganography by combining the {GA} and {ICA}},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {7},
  number    = {1},
  pages     = {47--58},
  year      = {2015},
  url       = {https://doi.org/10.22042/isecure.2015.7.1.5},
  doi       = {10.22042/isecure.2015.7.1.5},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/SadeghiKR15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Vosoughi015,
  author    = {Mehrshad Vosoughi and
               Ali Jahanian},
  title     = {Security-aware register placement to hinder malicious hardware updating
               and improve Trojan detectability},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {7},
  number    = {1},
  pages     = {75--81},
  year      = {2015},
  url       = {https://doi.org/10.22042/isecure.2015.7.1.7},
  doi       = {10.22042/isecure.2015.7.1.7},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/Vosoughi015.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/AlizadehAB14,
  author    = {Javad Alizadeh and
               Mohammad Reza Aref and
               Nasour Bagheri},
  title     = {Artemia: a family of provably secure authenticated encryption schemes},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {6},
  number    = {2},
  pages     = {125--139},
  year      = {2014},
  url       = {https://doi.org/10.22042/isecure.2015.6.2.3},
  doi       = {10.22042/isecure.2015.6.2.3},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/AlizadehAB14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/DamianiCG14,
  author    = {Ernesto Damiani and
               Stelvio Cimato and
               Gabriele Gianini},
  title     = {A risk model for cloud processes},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {6},
  number    = {2},
  pages     = {99--123},
  year      = {2014},
  url       = {https://doi.org/10.22042/isecure.2015.6.2.2},
  doi       = {10.22042/isecure.2015.6.2.2},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/DamianiCG14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/DoroudianS14,
  author    = {Mostafa Doroudian and
               Hamid Reza Shahriari},
  title     = {A hybrid approach for database intrusion detection at transaction
               and inter-transaction levels},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {6},
  number    = {2},
  pages     = {155--167},
  year      = {2014},
  url       = {https://doi.org/10.22042/isecure.2015.6.2.5},
  doi       = {10.22042/isecure.2015.6.2.5},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/DoroudianS14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/FanianAB14,
  author    = {Ali Fanian and
               Fariba Alamifar and
               Mehdi Berenjkoub},
  title     = {An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN
               networks},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {6},
  number    = {2},
  pages     = {141--153},
  year      = {2014},
  url       = {https://doi.org/10.22042/isecure.2015.6.2.4},
  doi       = {10.22042/isecure.2015.6.2.4},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/FanianAB14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/GhasemzadehPA14,
  author    = {Hamzeh Ghasemzadeh and
               Ali Payandeh and
               Mohammad Reza Aref},
  title     = {Toward an energy efficient PKC-based key management system for wireless
               sensor networks},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {6},
  number    = {1},
  pages     = {53--66},
  year      = {2014},
  url       = {https://doi.org/10.22042/isecure.2014.6.1.5},
  doi       = {10.22042/isecure.2014.6.1.5},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/GhasemzadehPA14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Jalili14,
  author    = {Rasool Jalili},
  title     = {Editorial},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {6},
  number    = {1},
  pages     = {1--2},
  year      = {2014},
  url       = {https://doi.org/10.22042/isecure.2014.6.1.1},
  doi       = {10.22042/isecure.2014.6.1.1},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/Jalili14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Jalili14a,
  author    = {Rasool Jalili},
  title     = {Editorial},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {6},
  number    = {2},
  pages     = {97--98},
  year      = {2014},
  url       = {https://doi.org/10.22042/isecure.2015.6.2.1},
  doi       = {10.22042/isecure.2015.6.2.1},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/Jalili14a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/RajiMJ14,
  author    = {Fatemeh Raji and
               Ali Miri and
               Mohammad Davarpanah Jazi},
  title     = {A centralized privacy-preserving framework for online social networks},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {6},
  number    = {1},
  pages     = {35--52},
  year      = {2014},
  url       = {https://doi.org/10.22042/isecure.2014.6.1.4},
  doi       = {10.22042/isecure.2014.6.1.4},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/RajiMJ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/RasoolzadehASA14,
  author    = {Shahram Rasoolzadeh and
               Zahra Ahmadian and
               Mahmoud Salmasizadeh and
               Mohammad Reza Aref},
  title     = {Total break of Zorro using linear and differential attacks},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {6},
  number    = {1},
  pages     = {23--34},
  year      = {2014},
  url       = {https://doi.org/10.22042/isecure.2014.6.1.3},
  doi       = {10.22042/isecure.2014.6.1.3},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/RasoolzadehASA14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/ShakeriG14,
  author    = {Ehsan Shakeri and
               Shahrokh Ghaemmaghami},
  title     = {An extended feature set for blind image steganalysis in contourlet
               domain},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {6},
  number    = {2},
  pages     = {169--181},
  year      = {2014},
  url       = {https://doi.org/10.22042/isecure.2014.6.2.6},
  doi       = {10.22042/isecure.2014.6.2.6},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/ShakeriG14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/ShamaeiM14,
  author    = {Shiva Shamaei and
               Ali Movaghar},
  title     = {A two-phase wormhole attack detection scheme in MANETs},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {6},
  number    = {2},
  pages     = {183--191},
  year      = {2014},
  url       = {https://doi.org/10.22042/isecure.2015.6.2.7},
  doi       = {10.22042/isecure.2015.6.2.7},
  timestamp = {Wed, 12 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/ShamaeiM14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/ShokrollahiSE14,
  author    = {Saeed Shokrollahi and
               Fereidoon Shams and
               Javad Esmaeili},
  title     = {Access control in ultra-large-scale systems using a data-centric middleware},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {6},
  number    = {1},
  pages     = {3--22},
  year      = {2014},
  url       = {https://doi.org/10.22042/isecure.2014.6.1.2},
  doi       = {10.22042/isecure.2014.6.1.2},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/ShokrollahiSE14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/TavakolyA14,
  author    = {Asghar Tavakoly and
               Reza Ebrahimi Atani},
  title     = {Improving Tor security against timing and traffic analysis attacks
               with fair randomization},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {6},
  number    = {1},
  pages     = {67--76},
  year      = {2014},
  url       = {https://doi.org/10.22042/isecure.2014.6.1.6},
  doi       = {10.22042/isecure.2014.6.1.6},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/TavakolyA14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/ZabihiJH14,
  author    = {Mahdieh Zabihi and
               Majid Vafaei Jahan and
               Javad Hamidzadeh},
  title     = {A density based clustering approach to distinguish between web robot
               and human requests to a web server},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {6},
  number    = {1},
  pages     = {77--89},
  year      = {2014},
  url       = {https://doi.org/10.22042/isecure.2014.6.1.7},
  doi       = {10.22042/isecure.2014.6.1.7},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/ZabihiJH14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/AkhaeeM13,
  author    = {Mohammad Ali Akhaee and
               Farokh Marvasti},
  title     = {A survey on digital data hiding schemes: principals, algorithms, and
               applications},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {5},
  number    = {1},
  pages     = {5--36},
  year      = {2013},
  url       = {https://doi.org/10.22042/isecure.2013.5.1.2},
  doi       = {10.22042/isecure.2013.5.1.2},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/AkhaeeM13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/AmoozgarR13,
  author    = {Masoud Amoozgar and
               Rasoul Ramezanian},
  title     = {A computational model and convergence theorem for rumor dissemination
               in social networks},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {5},
  number    = {2},
  pages     = {141--154},
  year      = {2013},
  url       = {https://doi.org/10.22042/isecure.2014.5.2.3},
  doi       = {10.22042/isecure.2014.5.2.3},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/AmoozgarR13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/AvizhehAS13,
  author    = {Sepideh Avizheh and
               Maryam Rajabzadeh Asaar and
               Mahmoud Salmasizadeh},
  title     = {Convertible limited (multi-) verifier signature: new constructions
               and applications},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {5},
  number    = {2},
  pages     = {189--208},
  year      = {2013},
  url       = {https://doi.org/10.22042/isecure.2014.5.2.6},
  doi       = {10.22042/isecure.2014.5.2.6},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/AvizhehAS13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/AzmiP13,
  author    = {Reza Azmi and
               Boshra Pishgoo},
  title     = {{STLR:} a novel danger theory based structural {TLR} algorithm},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {5},
  number    = {2},
  pages     = {209--225},
  year      = {2013},
  url       = {https://doi.org/10.22042/isecure.2014.5.2.7},
  doi       = {10.22042/isecure.2014.5.2.7},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/AzmiP13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/DiyanatAG13,
  author    = {Abolfazl Diyanat and
               Mohammad Ali Akhaee and
               Shahrokh Ghaemmaghami},
  title     = {Robust multiplicative video watermarking using statistical modeling},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {5},
  number    = {1},
  pages     = {83--95},
  year      = {2013},
  url       = {https://doi.org/10.22042/isecure.2013.5.1.6},
  doi       = {10.22042/isecure.2013.5.1.6},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/DiyanatAG13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/EzheiL13,
  author    = {Mansooreh Ezhei and
               Behrouz Tork Ladani},
  title     = {GTrust: a group based trust model},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {5},
  number    = {2},
  pages     = {155--170},
  year      = {2013},
  url       = {https://doi.org/10.22042/isecure.2014.5.2.4},
  doi       = {10.22042/isecure.2014.5.2.4},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/EzheiL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/FarashA13,
  author    = {Mohammad Sabzinejad Farash and
               Mahmoud Ahmadian{-}Attari},
  title     = {Provably secure and efficient identity-based key agreement protocol
               for independent PKGs using {ECC}},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {5},
  number    = {1},
  pages     = {55--70},
  year      = {2013},
  url       = {https://doi.org/10.22042/isecure.2013.5.1.4},
  doi       = {10.22042/isecure.2013.5.1.4},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/FarashA13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/GhiasiSS13,
  author    = {Mahboobe Ghiasi and
               Ashkan Sami and
               Zahra Salehi},
  title     = {DyVSoR: dynamic malware detection based on extracting patterns from
               value sets of registers},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {5},
  number    = {1},
  pages     = {71--82},
  year      = {2013},
  url       = {https://doi.org/10.22042/isecure.2013.5.1.5},
  doi       = {10.22042/isecure.2013.5.1.5},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/GhiasiSS13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/HassaniE13,
  author    = {Elham Hassani and
               Mohammad Eshghi},
  title     = {Image encryption based on chaotic tent map in time and frequency domains},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {5},
  number    = {1},
  pages     = {97--110},
  year      = {2013},
  url       = {https://doi.org/10.22042/isecure.2013.5.1.7},
  doi       = {10.22042/isecure.2013.5.1.7},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/HassaniE13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Jalili13,
  author    = {Rasool Jalili},
  title     = {Editorial},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {5},
  number    = {1},
  pages     = {1--3},
  year      = {2013},
  url       = {https://doi.org/10.22042/isecure.2013.5.1.1},
  doi       = {10.22042/isecure.2013.5.1.1},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/Jalili13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Jalili13a,
  author    = {Rasool Jalili},
  title     = {Editorial},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {5},
  number    = {2},
  pages     = {117--118},
  year      = {2013},
  url       = {https://doi.org/10.22042/isecure.2014.5.2.1},
  doi       = {10.22042/isecure.2014.5.2.1},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/Jalili13a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/JavadiA13,
  author    = {Seyyed Ahmad Javadi and
               Morteza Amini},
  title     = {A semantic-aware role-based access control model for pervasive computing
               environments},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {5},
  number    = {2},
  pages     = {119--140},
  year      = {2013},
  url       = {https://doi.org/10.22042/isecure.2014.5.2.2},
  doi       = {10.22042/isecure.2014.5.2.2},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/JavadiA13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Mohammadhassanzadeh13,
  author    = {Hossein Mohammadhassanzadeh and
               Hamid Reza Shahriari},
  title     = {Prediction of user's trustworthiness in web-based social networks
               via text mining},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {5},
  number    = {2},
  pages     = {171--187},
  year      = {2013},
  url       = {https://doi.org/10.22042/isecure.2014.5.2.5},
  doi       = {10.22042/isecure.2014.5.2.5},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/Mohammadhassanzadeh13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/MohammadiB13,
  author    = {Mahdi Soodkhah Mohammadi and
               Abbas Ghaemi Bafghi},
  title     = {Design and formal verification of {DZMBE+}},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {5},
  number    = {1},
  pages     = {37--53},
  year      = {2013},
  url       = {https://doi.org/10.22042/isecure.2013.5.1.3},
  doi       = {10.22042/isecure.2013.5.1.3},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/MohammadiB13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/AfzaliNA12,
  author    = {Hammad Afzali and
               Hamed Nemati and
               Reza Azmi},
  title     = {Private Key based query on encrypted data},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {4},
  number    = {1},
  pages     = {41--50},
  year      = {2012},
  url       = {https://doi.org/10.22042/isecure.2015.4.1.5},
  doi       = {10.22042/isecure.2015.4.1.5},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/AfzaliNA12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/BaraniA12,
  author    = {Fatemeh Barani and
               Mahdi Abadi},
  title     = {BeeID: intrusion detection in AODV-based MANETs using artificial Bee
               colony and negative selection algorithms},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {4},
  number    = {1},
  pages     = {25--39},
  year      = {2012},
  url       = {https://doi.org/10.22042/isecure.2015.4.1.4},
  doi       = {10.22042/isecure.2015.4.1.4},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/BaraniA12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/FarhatDGA12,
  author    = {Farshid Farhat and
               Abolfazl Diyanat and
               Shahrokh Ghaemmaghami and
               Mohammad Reza Aref},
  title     = {Eigenvalues-based {LSB} steganalysis},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {4},
  number    = {2},
  pages     = {97--106},
  year      = {2012},
  url       = {https://doi.org/10.22042/isecure.2013.4.2.1},
  doi       = {10.22042/isecure.2013.4.2.1},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/FarhatDGA12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/GhafariVM12,
  author    = {Vahid Amin Ghafari and
               Ali Vardasbi and
               Javad Mohajeri},
  title     = {Cryptanalysis of {GSM} encryption algorithm {A5/1}},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {4},
  number    = {2},
  pages     = {107--114},
  year      = {2012},
  url       = {https://doi.org/10.22042/isecure.2013.4.2.2},
  doi       = {10.22042/isecure.2013.4.2.2},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/GhafariVM12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/HooshmandEA12,
  author    = {Reza Hooshmand and
               Taraneh Eghlidos and
               Mohammad Reza Aref},
  title     = {Improving the Rao-Nam secret key cryptosystem using regular {EDF-QC-LDPC}
               codes},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {4},
  number    = {1},
  pages     = {3--14},
  year      = {2012},
  url       = {https://doi.org/10.22042/isecure.2015.4.1.2},
  doi       = {10.22042/isecure.2015.4.1.2},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/HooshmandEA12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Jalili12,
  author    = {Rasool Jalili},
  title     = {Editorial},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {4},
  number    = {1},
  pages     = {1--2},
  year      = {2012},
  url       = {https://doi.org/10.22042/isecure.2015.4.1.1},
  doi       = {10.22042/isecure.2015.4.1.1},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/Jalili12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Jalili12a,
  author    = {Rasool Jalili},
  title     = {Editorial},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {4},
  number    = {2},
  pages     = {95--96},
  year      = {2012},
  url       = {https://doi.org/10.22042/isecure.2012.4.2.7},
  doi       = {10.22042/isecure.2012.4.2.7},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/Jalili12a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/MabutoV12,
  author    = {Enos K. Mabuto and
               Hein S. Venter},
  title     = {Analyzing registry, log files, and prefetch files in finding digital
               evidence in graphic design applications},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {4},
  number    = {2},
  pages     = {137--150},
  year      = {2012},
  url       = {https://doi.org/10.22042/isecure.2013.4.2.5},
  doi       = {10.22042/isecure.2013.4.2.5},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/MabutoV12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/MehrnejadBHT12,
  author    = {Maryam Mehrnejad and
               Abbas Ghaemi Bafghi and
               Ahad Harati and
               Ehsan Toreini},
  title     = {{SEIMCHA:} a new semantic image {CAPTCHA} using geometric transformations},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {4},
  number    = {1},
  pages     = {63--76},
  year      = {2012},
  url       = {https://doi.org/10.22042/isecure.2015.4.1.7},
  doi       = {10.22042/isecure.2015.4.1.7},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/MehrnejadBHT12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/MohammadiH12,
  author    = {Somayyeh Mohammadi and
               Ahmad Hakimi},
  title     = {A chaos-based video watermarking algorithm},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {4},
  number    = {1},
  pages     = {77--86},
  year      = {2012},
  url       = {https://doi.org/10.22042/isecure.2015.4.1.8},
  doi       = {10.22042/isecure.2015.4.1.8},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/MohammadiH12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/ShakeriB12,
  author    = {Hassan Shakeri and
               Abbas Ghaemi Bafghi},
  title     = {A confidence-aware interval-based trust model},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {4},
  number    = {2},
  pages     = {151--165},
  year      = {2012},
  url       = {https://doi.org/10.22042/isecure.2013.4.2.6},
  doi       = {10.22042/isecure.2013.4.2.6},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/ShakeriB12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/TaheriM12,
  author    = {Motahareh Taheri and
               Saeed Mozaffari},
  title     = {Improving security of double random phase encoding with chaos theory
               using fractal images},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {4},
  number    = {2},
  pages     = {115--124},
  year      = {2012},
  url       = {https://doi.org/10.22042/isecure.2013.4.2.3},
  doi       = {10.22042/isecure.2013.4.2.3},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/TaheriM12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/VardasbiSM12,
  author    = {Ali Vardasbi and
               Mahmoud Salmasizadeh and
               Javad Mohajeri},
  title     = {On the multi {\_} chi-square tests and their data complexity},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {4},
  number    = {1},
  pages     = {15--24},
  year      = {2012},
  url       = {https://doi.org/10.22042/isecure.2015.4.1.3},
  doi       = {10.22042/isecure.2015.4.1.3},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/VardasbiSM12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/YahyazadehA12,
  author    = {Moosa Yahyazadeh and
               Mahdi Abadi},
  title     = {BotOnus: an online unsupervised method for Botnet detection},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {4},
  number    = {1},
  pages     = {51--62},
  year      = {2012},
  url       = {https://doi.org/10.22042/isecure.2015.4.1.6},
  doi       = {10.22042/isecure.2015.4.1.6},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/YahyazadehA12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/ZaliH012,
  author    = {Zeinab Zali and
               Massoud Reza Hashemi and
               Hossein Saidi},
  title     = {Real-Time intrusion detection alert correlation and attack scenario
               extraction based on the prerequisite consequence approach},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {4},
  number    = {2},
  pages     = {125--136},
  year      = {2012},
  url       = {https://doi.org/10.22042/isecure.2013.4.2.4},
  doi       = {10.22042/isecure.2013.4.2.4},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/ZaliH012.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/AmiriDA11,
  author    = {Mehran Deljavan Amiri and
               Habibollah Danyali and
               Bahram Zahir Azami},
  title     = {Intelligent scalable image watermarking robust against progressive
               DWT-based compression using genetic algorithms},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {3},
  number    = {1},
  pages     = {51--66},
  year      = {2011},
  url       = {https://doi.org/10.22042/isecure.2015.3.1.5},
  doi       = {10.22042/isecure.2015.3.1.5},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/AmiriDA11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/BaseriMAPM11,
  author    = {Yaser Baseri and
               Amir S. Mortazavi and
               Maryam Rajabzadeh Asaar and
               Mohsen Pourpouneh and
               Javad Mohajeri},
  title     = {Double voter perceptible blind signature based electronic voting protocol},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {3},
  number    = {1},
  pages     = {43--50},
  year      = {2011},
  url       = {https://doi.org/10.22042/isecure.2015.3.1.4},
  doi       = {10.22042/isecure.2015.3.1.4},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/BaseriMAPM11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Bishop11,
  author    = {Matt Bishop},
  title     = {Computer security in the future},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {3},
  number    = {1},
  pages     = {3--27},
  year      = {2011},
  url       = {https://doi.org/10.22042/isecure.2015.3.1.2},
  doi       = {10.22042/isecure.2015.3.1.2},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/Bishop11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/DerakhshandehL11,
  author    = {Zahra Derakhshandeh and
               Behrouz Tork Ladani},
  title     = {A model for specification, composition and verification of access
               control policies and its application to web services},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {3},
  number    = {2},
  pages     = {103--120},
  year      = {2011},
  url       = {https://doi.org/10.22042/isecure.2015.3.2.4},
  doi       = {10.22042/isecure.2015.3.2.4},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/DerakhshandehL11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/FarhadiAK11,
  author    = {Hamid Farhadi and
               Maryam AmirHaeri and
               Mohammad Khansari},
  title     = {Alert correlation and prediction using data mining and {HMM}},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {3},
  number    = {2},
  pages     = {77--101},
  year      = {2011},
  url       = {https://doi.org/10.22042/isecure.2015.3.2.3},
  doi       = {10.22042/isecure.2015.3.2.3},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/FarhadiAK11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Jalili11,
  author    = {Rasool Jalili},
  title     = {Editorial},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {3},
  number    = {1},
  pages     = {1--2},
  year      = {2011},
  url       = {https://doi.org/10.22042/isecure.2015.3.1.1},
  doi       = {10.22042/isecure.2015.3.1.1},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/Jalili11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Jalili11a,
  author    = {Rasool Jalili},
  title     = {Editorial},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {3},
  number    = {2},
  pages     = {67--68},
  year      = {2011},
  url       = {https://doi.org/10.22042/isecure.2015.3.2.1},
  doi       = {10.22042/isecure.2015.3.2.1},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/Jalili11a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/MalekianZM11,
  author    = {Ehsan Malekian and
               Ali Zakerolhosseini and
               Atefeh Mashatan},
  title     = {{QTRU:} quaternionic version of the {NTRU} public-key cryptosystems},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {3},
  number    = {1},
  pages     = {29--42},
  year      = {2011},
  url       = {https://doi.org/10.22042/isecure.2015.3.1.3},
  doi       = {10.22042/isecure.2015.3.1.3},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/MalekianZM11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Rogaway11,
  author    = {Phillip Rogaway},
  title     = {Constructing cryptographic definitions},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {3},
  number    = {2},
  pages     = {69--76},
  year      = {2011},
  url       = {https://doi.org/10.22042/isecure.2015.3.2.2},
  doi       = {10.22042/isecure.2015.3.2.2},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/Rogaway11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/SoltaniHJ11,
  author    = {Somayeh Soltani and
               Mohammad Ali Hadavi and
               Rasool Jalili},
  title     = {Separating indexes from data: a distributed scheme for secure database
               outsourcing},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {3},
  number    = {2},
  pages     = {121--133},
  year      = {2011},
  url       = {https://doi.org/10.22042/isecure.2015.3.2.5},
  doi       = {10.22042/isecure.2015.3.2.5},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/SoltaniHJ11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/AbadehH10,
  author    = {Mohammad Saniee Abadeh and
               Jafar Habibi},
  title     = {A hybridization of evolutionary fuzzy systems and ant Colony optimization
               for intrusion detection},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {2},
  number    = {1},
  pages     = {33--46},
  year      = {2010},
  url       = {https://doi.org/10.22042/isecure.2015.2.1.4},
  doi       = {10.22042/isecure.2015.2.1.4},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/AbadehH10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/AbadiJ10,
  author    = {Mahdi Abadi and
               Saeed Jalili},
  title     = {A particle swarm optimization algorithm for minimization analysis
               of cost-sensitive attack graphs},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {2},
  number    = {1},
  pages     = {13--32},
  year      = {2010},
  url       = {https://doi.org/10.22042/isecure.2015.2.1.3},
  doi       = {10.22042/isecure.2015.2.1.3},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/AbadiJ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/AbolghasemiAF10,
  author    = {Mojtaba Abolghasemi and
               Hassan Aghaeinia and
               Karim Faez},
  title     = {Detection of perturbed quantization {(PQ)} steganography based on
               empirical matrix},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {2},
  number    = {2},
  pages     = {119--128},
  year      = {2010},
  url       = {https://doi.org/10.22042/isecure.2015.2.2.5},
  doi       = {10.22042/isecure.2015.2.2.5},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/AbolghasemiAF10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/EmamiZ10,
  author    = {Sareh Sadat Emami and
               Saadan Zokaei},
  title     = {A context-sensitive dynamic role-based access control model for pervasive
               computing environments},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {2},
  number    = {1},
  pages     = {47--66},
  year      = {2010},
  url       = {https://doi.org/10.22042/isecure.2015.2.1.5},
  doi       = {10.22042/isecure.2015.2.1.5},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/EmamiZ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/FanianB0G10,
  author    = {Ali Fanian and
               Mehdi Berenjkoub and
               Hossein Saidi and
               T. Aaron Gulliver},
  title     = {An efficient symmetric polynomial-based key establishment protocol
               for wireless sensor networks},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {2},
  number    = {2},
  pages     = {89--105},
  year      = {2010},
  url       = {https://doi.org/10.22042/isecure.2015.2.2.3},
  doi       = {10.22042/isecure.2015.2.2.3},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/FanianB0G10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/GutubA10,
  author    = {Adnan Abdul{-}Aziz Gutub and
               Ahmed Al{-}Nazer},
  title     = {High capacity steganography tool for Arabic text using 'Kashida'},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {2},
  number    = {2},
  pages     = {107--118},
  year      = {2010},
  url       = {https://doi.org/10.22042/isecure.2015.2.2.4},
  doi       = {10.22042/isecure.2015.2.2.4},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/GutubA10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Jalili10,
  author    = {Rasool Jalili},
  title     = {Editorial},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {2},
  number    = {1},
  pages     = {1--2},
  year      = {2010},
  url       = {https://doi.org/10.22042/isecure.2015.2.1.1},
  doi       = {10.22042/isecure.2015.2.1.1},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/Jalili10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Jalili10a,
  author    = {Rasool Jalili},
  title     = {Editorial},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {2},
  number    = {2},
  pages     = {67--68},
  year      = {2010},
  url       = {https://doi.org/10.22042/isecure.2015.2.2.1},
  doi       = {10.22042/isecure.2015.2.2.1},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/Jalili10a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Rijmen10,
  author    = {Vincent Rijmen},
  title     = {Stream ciphers and the eSTREAM project},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {2},
  number    = {1},
  pages     = {3--11},
  year      = {2010},
  url       = {https://doi.org/10.22042/isecure.2015.2.1.2},
  doi       = {10.22042/isecure.2015.2.1.2},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/Rijmen10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/SalimRD10,
  author    = {Farzad Salim and
               Jason Reid and
               Ed Dawson},
  title     = {Authorization models for secure information sharing: a survey and
               research agenda},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {2},
  number    = {2},
  pages     = {69--87},
  year      = {2010},
  url       = {https://doi.org/10.22042/isecure.2015.2.2.2},
  doi       = {10.22042/isecure.2015.2.2.2},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/SalimRD10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/ArefJ09,
  author    = {Mohammad Reza Aref and
               Rasool Jalili},
  title     = {Editorial},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {1},
  number    = {1},
  pages     = {1--2},
  year      = {2009},
  url       = {https://doi.org/10.22042/isecure.2015.1.1.1},
  doi       = {10.22042/isecure.2015.1.1.1},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/ArefJ09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/BandayS09,
  author    = {M. Tariq Banday and
               Nisar A. Shah},
  title     = {Image flip {CAPTCHA}},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {1},
  number    = {2},
  pages     = {105--123},
  year      = {2009},
  url       = {https://doi.org/10.22042/isecure.2015.1.2.4},
  doi       = {10.22042/isecure.2015.1.2.4},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/BandayS09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/FanianBG09,
  author    = {Ali Fanian and
               Mehdi Berenjkoub and
               T. Aaron Gulliver},
  title     = {A TESLA-based mutual authentication protocol for {GSM} networks},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {1},
  number    = {1},
  pages     = {3--15},
  year      = {2009},
  url       = {https://doi.org/10.22042/isecure.2015.1.1.2},
  doi       = {10.22042/isecure.2015.1.1.2},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/FanianBG09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Golic09,
  author    = {Jovan Dj. Golic},
  title     = {Moving dispersion method for statistical anomaly detection in intrusion
               detection systems},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {1},
  number    = {2},
  pages     = {71--90},
  year      = {2009},
  url       = {https://doi.org/10.22042/isecure.2015.1.2.2},
  doi       = {10.22042/isecure.2015.1.2.2},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/Golic09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/HarrisACDGHMPST09,
  author    = {Ian G. Harris and
               Thoulfekar Alrahem and
               Alex Chen and
               Nicholas DiGiuseppe and
               Jefferey Gee and
               Shang{-}Pin Hsiao and
               Sean Mattox and
               Taejoon Park and
               Saravanan Selvaraj and
               Albert Tam and
               Marcel Carlsson},
  title     = {Security testing of session initiation protocol implementations},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {1},
  number    = {2},
  pages     = {91--103},
  year      = {2009},
  url       = {https://doi.org/10.22042/isecure.2015.1.2.3},
  doi       = {10.22042/isecure.2015.1.2.3},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/HarrisACDGHMPST09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/JafarianA09,
  author    = {Jafar Haadi Jafarian and
               Morteza Amini},
  title     = {{CAMAC:} a context-aware mandatory access control model},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {1},
  number    = {1},
  pages     = {35--54},
  year      = {2009},
  url       = {https://doi.org/10.22042/isecure.2015.1.1.5},
  doi       = {10.22042/isecure.2015.1.1.5},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/JafarianA09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Jalili09,
  author    = {Rasool Jalili},
  title     = {Editorial},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {1},
  number    = {2},
  pages     = {69--70},
  year      = {2009},
  url       = {https://doi.org/10.22042/isecure.2015.1.2.1},
  doi       = {10.22042/isecure.2015.1.2.1},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/Jalili09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/NikooghadamZ09,
  author    = {Morteza Nikooghadam and
               Ali Zakerolhosseini},
  title     = {An efficient blind signature scheme based on the elliptic curve discrete
               logarithm problem},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {1},
  number    = {2},
  pages     = {125--131},
  year      = {2009},
  url       = {https://doi.org/10.22042/isecure.2015.1.2.5},
  doi       = {10.22042/isecure.2015.1.2.5},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/NikooghadamZ09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/PoonM09,
  author    = {Hoi Ting Poon and
               Ali Miri},
  title     = {A collusion attack on the fuzzy vault scheme},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {1},
  number    = {1},
  pages     = {27--34},
  year      = {2009},
  url       = {https://doi.org/10.22042/isecure.2015.1.1.4},
  doi       = {10.22042/isecure.2015.1.1.4},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/PoonM09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Ramezanian09,
  author    = {Rasoul Ramezanian},
  title     = {Process algebraic modeling of authentication protocols for analysis
               of parallel multi-session executions},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {1},
  number    = {1},
  pages     = {55--67},
  year      = {2009},
  url       = {https://doi.org/10.22042/isecure.2015.1.1.6},
  doi       = {10.22042/isecure.2015.1.1.6},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/Ramezanian09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/SabetiSMS09,
  author    = {Vajiheh Sabeti and
               Shadrokh Samavi and
               Mojtaba Mahdavi and
               Shahram Shirani},
  title     = {Steganalysis of embedding in difference of image pixel pairs by neural
               network},
  journal   = {{ISC} Int. J. Inf. Secur.},
  volume    = {1},
  number    = {1},
  pages     = {17--26},
  year      = {2009},
  url       = {https://doi.org/10.22042/isecure.2015.1.1.3},
  doi       = {10.22042/isecure.2015.1.1.3},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/isecure/SabetiSMS09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics