Volume 13, Issue 3

 

ارسال های اخیر

  • Human Activity Recognition Based on Multi-Sensors in a Smart Home Using Deep Learning 

    Aqel, Musbah؛ Sokiyna, Munsif (Iranian Society of Cryptology, 2021-11-01)
    Tracking or taking care of elderly people when they live alone is much challenging area. Because most of the aged people suffering from some health issues like Alzheimer, diabetes, and hypertension, so in case happening ...

  • Open Web Application Security Project Components with Known Vulnerabilities: A Comprehensive Study 

    S. Albulayhi, Mohammed؛ M. Ibrahim, Dina (Iranian Society of Cryptology, 2021-11-01)
    The Open Web Application Security Project (OWASP) is a nonprofit organization battling for the improvements of software protection and enhancing the security of web applications. Moreover, its goal is to make application ...

  • Forensic-Enabled Security as a Service (FESaaS) - A Readiness Framework for Cloud Forensics 

    Alawad, Wedad؛ Balobaid, Awatef (Iranian Society of Cryptology, 2021-11-01)
    Digital forensics is a process of uncovering and exploring evidence from digital content. A growth in digital data in recent years has made it challenging for forensic investigators to uncover useful information. Moreover, ...

  • Data Enhancement for Date Fruit Classification Using DCGAN 

    Alajlan, Norah؛ Alyahya, Meshael؛ Alghasham, Noorah؛ M. Ibrahim, Dina (Iranian Society of Cryptology, 2021-11-01)
    Date fruits are considered essential food and the most important agricultural crop in Saudi Arabia. Where Saudi Arabia produces many of the types of dates per year. Collecting large data for date fruits is a difficult task ...

  • Secure Coding Guidelines — Python 

    A. Hammoudeh, Mohammad Ali؛ Ibrahim, Renad؛ Alshraryan, Lama؛ Alnomise, Manar؛ Alhumidan, Ragad (Iranian Society of Cryptology, 2021-11-01)
    Recently, the interest in cybercrime and cybersecurity has increased dramatically both in terms of critical security issues and national economic information infrastructure and sensitive dealing policies, such as protection ...

  • Cross Site Scripting Attack Review 

    Alotaibi, Afnan؛ Alghufaili, Lujain؛ M.Ibrahim, Dina (Iranian Society of Cryptology, 2021-11-01)
    At the present period of time, web applications are growing constantly in the whole society with the development of communication technology. Since the utilization of WWW (World Wide Web) expanded and increased since it ...

  • Broken Authentication and Session Management Vulnerabilities 

    Aljoaey, Hanan؛ Almutawa, Khawla؛ Alabdali, Ruyuf؛ M.Ibrahim, Dina (Iranian Society of Cryptology, 2021-11-01)
    Web application protection is today's most important battleground between victim, intruder, and web service resource. User authentication tends to be critical when a legitimate user of the web application abruptly ends ...

  • A Review Study on SQL Injection Attacks, Prevention, and Detection 

    Alsalamah, Mona؛ Alwabli, Huda؛ Alqwifli, Hutaf؛ M. Ibrahim, Dina (Iranian Society of Cryptology, 2021-11-01)
    The functionality of web-based system can be affected by many threats. In fact, web-based systems provide several services built on databases. This makes them prone to Structured Query Language (SQL) injection attacks. For ...