| International Journal of Network Security | ||
| 1. | Impact of IPSec Protocol on the Performance of Network Real-Time Applications: A Review
|
|
| Abdullah Abdulrahman Al-khatib and Rosilah Hassan, Vol. 20, No. 5, 2018, pp. 811-819 Article Full Text PDF |
||
| 2. | Improving Network Intrusion Detection Using Geometric Mean LDA
|
|
| Elkhadir Zyad, Chougdali Khalid and Benattou Mohammed, Vol. 20, No. 5, 2018, pp. 820-826 Article Full Text PDF |
||
| 3. | Scalable Approach Towards Discovery of Unknown Vulnerabilities
|
|
| Umesh Kumar Singh, Chanchala Joshi, Vol. 20, No. 5, 2018, pp. 827-835 Article Full Text PDF |
||
| 4. | Detection and Analysis Cerber Ransomware Based on Network Forensics Behavior
|
|
| Ade Kurniawan and Imam Riadi, Vol. 20, No. 5, 2018, pp. 836-843 Article Full Text PDF |
||
| 5. | A Reversible Watermarking Algorithm in the Lossless Mode of HEVC
|
|
| KwangHyok Jo, Weimin Lei, Zhaozheng Li, and Xiaoshi Song, Vol. 20, No. 5, 2018, pp. 844-852 Article Full Text PDF |
||
| 6. | Feature Extraction Optimization for Network Intrusion Detection in Control System Networks
|
|
| Travis Atkison, Stanislav Ponomarev, Randy Smith, and Bernard Chen, Vol. 20, No. 5, 2018, pp. 853-861 Article Full Text PDF |
||
| 7. | A Secure Routing Protocol Based on Reputation Mechanism
|
|
| Yanhui Lv, Kexin Liu, Deyu Zhang, and Zhuo Miao, Vol. 20, No. 5, 2018, pp. 862-871 Article Full Text PDF |
||
| 8. | An Efficient and Secure Cipher-Text Retrieval Scheme Based on Mixed Homomorphic Encryption and Multi-Attribute Sorting Method
|
|
| Lin Teng, Hang Li, Jie Liu, and Shoulin Yin, Vol. 20, No. 5, 2018, pp. 872-878 Article Full Text PDF |
||
| 9. | A New Scheme for Source-location Privacy in Wireless Sensor Networks
|
|
| Shaoquan Jiang, Min Li, and Zailiang Tang, Vol. 20, No. 5, 2018, pp. 879-889 Article Full Text PDF |
||
| 10. | Application of FSM Machine and S-Box in KASUMI Block Cipher to Improve Its Resistance Against Attack
|
|
| Raja Muthalagu and Subeen Jain, Vol. 20, No. 5, 2018, pp. 890-897 Article Full Text PDF |
||
| 11. | An Efficient Approach to Resolve Covert Channels
|
|
| Muawia A. Elsadig and Yahia A. Fadlalla, Vol. 20, No. 5, 2018, pp. 898-906 Article Full Text PDF |
||
| 12. | A Secure and Efficient Ciphertext Encryption Scheme Based on Attribute and Support Strategy Dynamic Update Via Hybrid Encryption
|
|
| Yanhua Wang, Yaqiu Liu and Kun Wang, Vol. 20, No. 5, 2018, pp. 907-913 Article Full Text PDF |
||
| 13. | A Grudger Based AIS Approach to Coerce Selfish Node Cooperation in MANET
|
|
| Lincy Elizebeth Jim and Mark A. Gregory, Vol. 20, No. 5, 2018, pp. 914-922 Article Full Text PDF |
||
| 14. | Efficient Implementation of Password-based Authenticated Key Exchange from RLWE and Post-Quantum TLS
|
|
| Xinwei Gao, Jintai Ding, Lin Li, Saraswathy RV, and Jiqiang Liu, Vol. 20, No. 5, 2018, pp. 923-930 Article Full Text PDF |
||
| 15. | A Fast Scalar Multiplication Algorithm Based on Alternate-Zeckendorf Representation
|
|
| Shuang-Gen Liu and Xue-Jing Sun, Vol. 20, No. 5, 2018, pp. 931-937 Article Full Text PDF |
||
| 16. | A Wireless Key Generation Algorithm for RFID System Based on Bit Operation
|
|
| Rui Xie, Jie Ling, Dao-Wei Liu, Vol. 20, No. 5, 2018, pp. 938-950 Article Full Text PDF |
||
| 17. | Perseverance of Uncertainty in Cloud Storage Services through Reputation Based Trust
|
|
| Vegi Srinivas, Vatsavayi Valli Kumari, KVSVN Raju, Vol. 20, No. 5, 2018, pp. 951-959 Article Full Text PDF |
||
| 18. | An Efficient Compromised Nodes Detection System in Wireless Sensor Networks
|
|
| Xiaolong Xu, Zhonghe Gao, Lijuan Han, Vol. 20, No. 5, 2018, pp. 960-970 Article Full Text PDF |
||
| 19. | Optimal Control Analysis of Computer Virus Transmission
|
|
| Okosun Kazeem, Ogunlade Samson, Bonyah Ebenezer, Vol. 20, No. 5, 2018, pp. 971-982 Article Full Text PDF |
||
| 20. | A Detection and Defense Technology for Information-stealing and Deceitful Trojan Viruses Based on Behavioral Features
|
|
| Li Lin, Vol. 20, No. 5, 2018, pp. 983-987 Article Full Text PDF |
||
| 21. | Exploring a Novel Cryptographic Solution for Securing Small Satellite Communications
|
|
| Samuel Jackson, Jeremy Straub, and Scott Kerlin, Vol. 20, No. 5, 2018, pp. 988-997 Article Full Text PDF |
||
| 22. | A Survey of E-book Digital Right Management
|
|
| Cheng-Yi Tsai, Cheng-Ying Yang, Iuon-Chang Lin, and Min-Shiang Hwang, Vol. 20, No. 5, 2018, pp. 998-1004 Article Full Text PDF |
||
| 23. | Subject index to volume 20 (2018)
|
|
| Article Full Text PDF | ||
| 24. | Author index to volume 20 (2018)
|
|
| Article Full Text PDF | ||
| 25. | Reviewer index to volume 20 (2018)
|
|
| Article Full Text PDF | ||
| 26. | All Papers to volume 20 (2018)
|
|
| Article Full Text PDF | ||