|
|
 |
Search published articles |
 |
|
Showing 8 results for Sadeghi
Dr. Hadi Soleimany, Mr. Mohammad Reaza Sadeghi, Volume 7, Issue 1 (9-2018)
Abstract
Block cipher attacks have found new aspects, due to the advancement of the technology and the development of the software and hardware tools. In many cases, the attackers try to use the weaknesses of the block ciphers implementation, instead of the theoretical cryptanalyses. Increasing the attacker’s accessibility to the details of the block ciphers implementation will increase the chance of success of his attacks. Hence, it is important to design secure block cipher schemes, those are unbreakable whether the attackers have access to the details of the implementation or not. In this paper, first we will introduce the different models of the block ciphers implementation, then we will explain the fundamental concepts of the white-box cryptography, and why it is useful. Later we will discuss several white-box schemes.
Fariba Sadeghi, Amir Jalaly Bidgoly, Volume 8, Issue 1 (9-2019)
Abstract
Rumors, are unverified and often erroneous news that are widely propagated at the community level, discrediting or falsely increasing the trust of nodes in a network to an entity or subject. With the rise social networks in recent years, despite their positive uses, propagating rumors have become easier and more common. Rumors are a class of security challenges on social media, since a malicious node can easily disparage or isolate its goals by spreading a rumor. Therefore, rumors detection is an important challenge in soft security mechanisms such as trust and reputation. Researchers have come up with different methods for modeling, detecting and preventing rumors. In this study, rumor detection methods in social networks will be reviewed. First, we will briefly review the features used in previous research, then we will examine the approaches used and introduce the most commonly used Dataset. Finally, the challenges that exist for the future research in exploring social media to identify and resolve rumors are presented.
Mrs Sofia Ahanj, Mrs Mahsa Rahmani, Mrs Zahra Sadeghigole, Mrs Veda Nobakht, Volume 9, Issue 2 (2-2021)
Abstract
Providing security in the vital infrastructures of the country, is one of the essential operations that must be taken in order to improve the security of the country. Resistant security strategies need to be regularly implemented as a dynamic process to improve security, and security evaluation is one of the most important steps in this process. Methodology in the field of evaluation in both technical and managerial dimensions is discussed in the laboratory.
There are various standards in the field of general ICT technical-security evaluation. The most important are ISO / IEC 15408, ISO / IEC 27001 and NIST SP 800-53. In the present paper, these standards are first examined. Then, the standards and reports in the industrial field have been reviewed and compared, and finally, based on the results and special considerations of information and communication technology equipment in the electricity industry, the appropriate methodology has been presented.
Sofia Ahanj , Mahsa Rahmani, Vida Nobakht, Zahra Sadeghigol, Volume 11, Issue 1 (9-2022)
Abstract
Providing security in the electricity industry, as one of the vital infrastructures of the country, is one of the essential operations that must be taken in order to improve the security of the country. Resistant security strategies need to be regularly implemented as a dynamic process to improve security, and security evaluation is one of the most important steps in this process. Methodology in the field of evaluation in both technical and managerial dimensions is discussed in the laboratory. There are various standards in the field of general ICT technical-security evaluation. The most important are ISO/IEC 15408, ISO/IEC 27001 and NIST SP 800-53. In the present paper, these standards are first examined. Then, the standards and reports in the industrial field have been reviewed and compared, and finally, based on the results and special considerations of information and communication technology equipment in the electricity industry, the appropriate methodology has been presented.
Ali Nazari, Babak Sadeghiyan, Volume 11, Issue 2 (3-2023)
Abstract
Under the coverage of legitimate commerce, criminals money-launder their illicit incomes through the payment gateways provided by Payment Service Providers (PSP). In order to do money-laundering forensics in transactions of PSP companies, a new method was proposed by Hojati et al which is done through detecting deviations from class behavior based on peer group analysis (PGA) method. Our experiments showed that using the proposed method for money laundering detection leads to a false positive rate of about 13%. In this paper, we improved the proposed method and reduced the false positive rate to less than 1%. To achieve this, we analyzed the amount of financial transactions of sellers along with the number of visitors to their websites in PGA. Based on the number of visitors, we estimated the volume of transactions for each seller. If the volume of sales was much higher than expected, we considered it abnormal. We achieved a higher detection accuracy by using a restricted Boltzmann machine to separate out-of-class transactions. We also reduced rate of false negative alarms by the help of CBR method. Our proposed system detects money laundering online using a four-week sliding window. The experimental results confirmed the detection accuracy of 99% for our proposed system.
Iman Mirzaali Mazandarani, Dr Nasour Bagheri, Dr Sadegh Sadeghi, Volume 12, Issue 1 (9-2023)
Abstract
With the increasing and widespread application of deep learning and neural networks across various scientific domains and the notable successes achieved, deep neural networks were employed for differential cryptanalysis in 2019. This marked the initiation of growing interest in this research domain. While most existing works primarily focus on enhancing and deploying neural distinguishers, limited studies have delved into the intrinsic principles and learned characteristics of these neural distinguishers. In this study, our focus will be on analyzing block ciphers such as Speck, Simon, and Simeck using deep learning. We will explore and compare the factors and components that contribute to better performance. Additionally, by detailing attacks and comparing results, we aim to address the question of whether neural networks and deep learning can effectively serve as tools for block cipher cryptanalysis or not.
Mrs. Narges Mokhtari, Mr. Amirhossein Safari, Dr Sadegh Sadeghi, Volume 12, Issue 1 (9-2023)
Abstract
Biometric systems are an important technique for user identification in today's world, which have been welcomed due to their non-invasive nature and high resistance to forgery and fraud. Physiological and behavioral biomarkers are two main types of biometric identifiers. Behavioral identifiers, such as voice recognition, are based on human or even animal actions. Physiological biometrics, such as fingerprints and facial recognition, which have been used in our daily lives in the past years, are based on the physical characteristics of the human body. One of the various biometrics that have been investigated in studies in this field is the heart signal, which has been well used in authentication and identification systems due to its simple acquisition process compared to biomarkers such as the brain signal. In addition, there are valid databases on heart signal data, which the researchers of this issue refer to evaluate their systems. In this study, the analysis, analysis, and comparison of different authentication methods using heart signal biometrics have been studied. Also, in the following, the advantages and disadvantages of deep learning methods and models proposed in this field have been examined. In the final part, firstly, the implementation of the method presented in Fuster and Lopez's research is discussed, and then, to evaluate, we present the tests designed using the network created in this study, and after that, concluding based on the results.
Mahnaz Noroozi, Atiye Sadeghi , Volume 13, Issue 2 (12-2024)
Abstract
|
|