Network Security
A Hybrid Three-layered Approach for Intrusion Detection using Machine Learning Methods

A. Beigi

Volume 13, Issue 2 , July 2025, , Pages 443-454

https://doi.org/10.22061/jecei.2025.11530.811

Abstract
  Background and Objectives: Intrusion Detection Systems (IDS) are crucial for safeguarding computer networks. However, they face challenges such as detecting subtle intrusions and novel attack patterns. While signature-based and anomaly-based IDS have been widely used, hybrid approaches offer a promising ...  Read More

Network Security
An Advanced Hybrid Honeypot for Providing Effective Resistance in Automatic Network Generation

M. Amiri; A. Barati

Volume 7, Issue 2 , July 2019, , Pages 133-144

https://doi.org/10.22061/jecei.2020.5621.241

Abstract
  Background and Objectives: Increasing usage of Internet and computer networks by individuals and organizations and also attackers’ usage of new methods and tools in an attempt to endanger network security, have led to the emergence of a wide range of threats to networks.Methods: A honeypot is one ...  Read More

Network Security
A New Framework for Secure Routing in VANET

S. Goli-Bidgoli; M. SofarAli

Volume 6, Issue 2 , July 2018, , Pages 119-128

https://doi.org/10.22061/jecei.2019.5125.193

Abstract
  Background and Objectives: Vehicular Ad-Hoc Networks can enhance road safety and enable drivers to avoid different threats. Safety applications, mobile commerce, and other information services are among different available services that are affected by dynamic topology, vehicle’s speed and node ...  Read More

IoT Security
RSPAE: RFID Search Protocol based on Authenticated Encryption

M. Eslamnezhad Namin; M. Hosseinzadeh; N. Bagheri; A. Khademzadeh

Volume 6, Issue 2 , July 2018, , Pages 185-198

https://doi.org/10.22061/jecei.2019.5186.199

Abstract
  Background and Objectives: Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. Methods: In this article, an RFID-based search ...  Read More