Volume 16 (2024)
Volume 15 (2023)
Volume 14 (2022)
Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)

 

Facts & Figures

Publication starting date

 2009

h-index

20

i10-index

44

Citations

1573

Issue per year

3

No. of volumes

17

No. of issues

 38

No. of articles

 290

PDF Download

 786,270

View Per Article

 3562.32

PDF Download Per Article

 2711.28

Acceptance Rate

14

Accept Date (Days)

240

Number of Indexing Databases

15

 

 

 

                 

The ISC International Journal of Information Security (ISeCureis a peer reviewed scholarly publication by Iranian Society of Cryptology. ISeCure is published biannually in print and online with full texts of articles made available for free on the website of the journal under ISeCure open access policy. ISeCure is devoted to publishing theoretical scholarship on a variety of topics related to information security. The intended audience of the journal is any person with an interest in information security from an academic perspective such as engineers, mathematicians and computer scientists. A partial list of topics for review by the journal can be found in the Aims and Scope section. Manuscript types for submission are research papers, review papers, case reports, short communications and letters to the editor.  More information about the policies of the journal can be found on the About Journal and mostly in the Publication Ethics pages. To start a new submission, please first read the Guide for Authors page for detailed information about manuscript format, style and other requirements. Manuscript submission, refereeing and publishing are completely free of charge. New manuscripts should be submitted online by the corresponding author through the website after registration. Articles published in ISeCure Journal are indexed in the Emerging Sources Citation Index (ESCI) database of Web of Science/ISI and Scopus.

 

                 

Journal Impact Factor

(Web of Science)

0.8 (2023)

Submission to first decision (average)

8 days

CiteScore

(Scopus)

0.9 (2024)

Acceptance Rate

14%

Research Article
An Authenticated Key Establishment Protocol with Perfect Forward Secrecy in Smart Grids

Maryam Rajabzadeh Asaar; Mustafa Husam Shareef Alrzij

Abstract
  In smart grids, messages exchanged between service providers and smart meters should be authenticated and confidential to prevent threats due to their insecurity. Hence, it is imperative to design a secure authentication and key exchange scheme to create a session key for secure and authenticated transmission ...  Read More

Research Article
Enhancing Lattice-Based Attribute-Based Encryption with Robust Fine-Grained Access Policies

Sedigheh Khajouei-Nejad; Sam Jabbehdari; Hamid Haj Seyyed Javadi; Seyed Mohammad Hossein Moattar

Abstract
  Protecting sensitive data is crucial in various fields, including Information Technologies, Network Security, and healthcare records. Implementing precise access policies for encrypted data is vital in large networks. Attribute-Based Encryption (ABE) emerges as a solution to this challenge, enabling ...  Read More

Research Article
ProAPT: Projection of APTs with Deep Reinforcement Learning

Motahareh Dehghan; Babak Sadeghiyan; Erfan Khosravian; Alireza Sedighi Moghadam; Farshid Nooshi

Abstract
  The highest level in Endsley's situation awareness model is called projection when the status of elements in the environment is shortly predicted. In cybersecurity situation awareness, the projection for an Advanced Persistent Threat (APT) requires to predict the next step of the APT.The threats are ...  Read More

Research Article
Detection of Membership Inference Attacks on GAN models

Ala Ekramifard; Haleh Amintoosi; Seyed Amin Hosseini Seno

Abstract
  In the realm of machine learning, Generative Adversarial Networks (GANs) have revolutionized the generation of synthetic data, closely mirroring the distribution of real datasets. This paper delves into the privacy concerns associated with GANs, particularly focusing on Membership Inference Attacks (MIAs), ...  Read More

Research Article
CST-SDL: A Scenario Description Language for Collaborative Security Training in Cyber Ranges

Navid Shirmohammadi; Behrouz Tork Ladani

Abstract
  As cyber threats grow increasingly sophisticated, the importance of security training as an effective means of prevention will become even more critical. Cyber Range (CR) is a platform for creating cyber training programs using virtualization and simulation technologies to create a realistic training ...  Read More

Research Article
Design of an Accurate BKZ Simulation

Gholam Reza Moghissi; Ali Payandeh

Abstract
  The main role of BKZ simulations focuses on showing the behavior of BKZ algorithm for high block sizes, therefore current lattice security analysis (e.g., bit-security estimations and selection of efficient/secure parameter set for current LWE/NTRU-based schemes) needs to these simulations. This paper ...  Read More

Keywords Cloud

  翻译: