International Journal of Network Security | ||
1. | Impact of IPSec Protocol on the Performance of Network Real-Time Applications: A Review
|
|
Abdullah Abdulrahman Al-khatib and Rosilah Hassan, Vol. 20, No. 5, 2018, pp. 811-819 Article Full Text PDF |
||
2. | Improving Network Intrusion Detection Using Geometric Mean LDA
|
|
Elkhadir Zyad, Chougdali Khalid and Benattou Mohammed, Vol. 20, No. 5, 2018, pp. 820-826 Article Full Text PDF |
||
3. | Scalable Approach Towards Discovery of Unknown Vulnerabilities
|
|
Umesh Kumar Singh, Chanchala Joshi, Vol. 20, No. 5, 2018, pp. 827-835 Article Full Text PDF |
||
4. | Detection and Analysis Cerber Ransomware Based on Network Forensics Behavior
|
|
Ade Kurniawan and Imam Riadi, Vol. 20, No. 5, 2018, pp. 836-843 Article Full Text PDF |
||
5. | A Reversible Watermarking Algorithm in the Lossless Mode of HEVC
|
|
KwangHyok Jo, Weimin Lei, Zhaozheng Li, and Xiaoshi Song, Vol. 20, No. 5, 2018, pp. 844-852 Article Full Text PDF |
||
6. | Feature Extraction Optimization for Network Intrusion Detection in Control System Networks
|
|
Travis Atkison, Stanislav Ponomarev, Randy Smith, and Bernard Chen, Vol. 20, No. 5, 2018, pp. 853-861 Article Full Text PDF |
||
7. | A Secure Routing Protocol Based on Reputation Mechanism
|
|
Yanhui Lv, Kexin Liu, Deyu Zhang, and Zhuo Miao, Vol. 20, No. 5, 2018, pp. 862-871 Article Full Text PDF |
||
8. | An Efficient and Secure Cipher-Text Retrieval Scheme Based on Mixed Homomorphic Encryption and Multi-Attribute Sorting Method
|
|
Lin Teng, Hang Li, Jie Liu, and Shoulin Yin, Vol. 20, No. 5, 2018, pp. 872-878 Article Full Text PDF |
||
9. | A New Scheme for Source-location Privacy in Wireless Sensor Networks
|
|
Shaoquan Jiang, Min Li, and Zailiang Tang, Vol. 20, No. 5, 2018, pp. 879-889 Article Full Text PDF |
||
10. | Application of FSM Machine and S-Box in KASUMI Block Cipher to Improve Its Resistance Against Attack
|
|
Raja Muthalagu and Subeen Jain, Vol. 20, No. 5, 2018, pp. 890-897 Article Full Text PDF |
||
11. | An Efficient Approach to Resolve Covert Channels
|
|
Muawia A. Elsadig and Yahia A. Fadlalla, Vol. 20, No. 5, 2018, pp. 898-906 Article Full Text PDF |
||
12. | A Secure and Efficient Ciphertext Encryption Scheme Based on Attribute and Support Strategy Dynamic Update Via Hybrid Encryption
|
|
Yanhua Wang, Yaqiu Liu and Kun Wang, Vol. 20, No. 5, 2018, pp. 907-913 Article Full Text PDF |
||
13. | A Grudger Based AIS Approach to Coerce Selfish Node Cooperation in MANET
|
|
Lincy Elizebeth Jim and Mark A. Gregory, Vol. 20, No. 5, 2018, pp. 914-922 Article Full Text PDF |
||
14. | Efficient Implementation of Password-based Authenticated Key Exchange from RLWE and Post-Quantum TLS
|
|
Xinwei Gao, Jintai Ding, Lin Li, Saraswathy RV, and Jiqiang Liu, Vol. 20, No. 5, 2018, pp. 923-930 Article Full Text PDF |
||
15. | A Fast Scalar Multiplication Algorithm Based on Alternate-Zeckendorf Representation
|
|
Shuang-Gen Liu and Xue-Jing Sun, Vol. 20, No. 5, 2018, pp. 931-937 Article Full Text PDF |
||
16. | A Wireless Key Generation Algorithm for RFID System Based on Bit Operation
|
|
Rui Xie, Jie Ling, Dao-Wei Liu, Vol. 20, No. 5, 2018, pp. 938-950 Article Full Text PDF |
||
17. | Perseverance of Uncertainty in Cloud Storage Services through Reputation Based Trust
|
|
Vegi Srinivas, Vatsavayi Valli Kumari, KVSVN Raju, Vol. 20, No. 5, 2018, pp. 951-959 Article Full Text PDF |
||
18. | An Efficient Compromised Nodes Detection System in Wireless Sensor Networks
|
|
Xiaolong Xu, Zhonghe Gao, Lijuan Han, Vol. 20, No. 5, 2018, pp. 960-970 Article Full Text PDF |
||
19. | Optimal Control Analysis of Computer Virus Transmission
|
|
Okosun Kazeem, Ogunlade Samson, Bonyah Ebenezer, Vol. 20, No. 5, 2018, pp. 971-982 Article Full Text PDF |
||
20. | A Detection and Defense Technology for Information-stealing and Deceitful Trojan Viruses Based on Behavioral Features
|
|
Li Lin, Vol. 20, No. 5, 2018, pp. 983-987 Article Full Text PDF |
||
21. | Exploring a Novel Cryptographic Solution for Securing Small Satellite Communications
|
|
Samuel Jackson, Jeremy Straub, and Scott Kerlin, Vol. 20, No. 5, 2018, pp. 988-997 Article Full Text PDF |
||
22. | A Survey of E-book Digital Right Management
|
|
Cheng-Yi Tsai, Cheng-Ying Yang, Iuon-Chang Lin, and Min-Shiang Hwang, Vol. 20, No. 5, 2018, pp. 998-1004 Article Full Text PDF |
||
23. | Subject index to volume 20 (2018)
|
|
Article Full Text PDF | ||
24. | Author index to volume 20 (2018)
|
|
Article Full Text PDF | ||
25. | Reviewer index to volume 20 (2018)
|
|
Article Full Text PDF | ||
26. | All Papers to volume 20 (2018)
|
|
Article Full Text PDF | ||