Volume 9 Number 3 September 2018

    
Fully Homomorphic Encryption based on Euler’s Theorem

Sarah Shihab Hamad, Ali Makki Sagheer

https://doi.org/10.6025/jisr/2018/9/3/83-95

Abstract Cloud computing enables sharing of resources and services. In the cloud computing the client (user) puts his data in the cloud, and any computations on his stored data will be implemented in the cloud. To produce the effective services, some of the cloud service providers share the information with third parties. The third party can reach to the client private... Read More


Malware Detection using Sub-Signatures and Machine Learning Technique

Ban Khammas

https://doi.org/10.6025/jisr/2018/9/2/96-106

Abstract Malware is a major computer security concern as many computing systems are connected to the Internet. The number of malware has increased over the years and new malware has emerged, where new variants are capable of evading conventional system detection through obfuscations. One of the promising methods used to detect malware is machine learning (ML) techniques. This work presents a static malware detection... Read More


An Approach to Discover the Sinkhole and Selective Forwarding Attack in IoT

Atena Shiranzaei, Rafiqul Zaman Khan

https://doi.org/10.6025/jisr/2018/9/3/107-118

Abstract Internet of things (IoT) is considered as a new technology to connect the resource-constrained things to the unreliable and untrusted world of the Internet through IPv6 and 6LowPAN network. The things are exposed wireless attacks from inside or outside the network. To prevent against these attacks, the existence of Intrusion Detection Systems (IDS) are necessary. In this paper, we design, implement, and evaluate... Read More