Quick Search:

Paper Preview:

International Journal of Network Security

1. Impact of IPSec Protocol on the Performance of Network Real-Time Applications: A Review
Abdullah Abdulrahman Al-khatib and Rosilah Hassan
Article Full Text PDF

2. Improving Network Intrusion Detection Using Geometric Mean LDA
Elkhadir Zyad, Chougdali Khalid and Benattou Mohammed
Article Full Text PDF

3. Scalable Approach Towards Discovery of Unknown Vulnerabilities
Umesh Kumar Singh, Chanchala Joshi
Article Full Text PDF

4. Detection and Analysis Cerber Ransomware Using Network Forensics Behavior Based
Ade Kurniawan and Imam Riadi
Article Full Text PDF

5. A Reversible Watermarking Algorithm in the Lossless Mode of HEVC
KwangHyok Jo, Weimin Lei, Zhaozheng Li, and Xiaoshi Song
Article Full Text PDF

6. Feature Extraction Optimization for Network Intrusion Detection in Control System Networks
Travis Atkison, Stanislav Ponomarev, Randy Smith, and Bernard Chen
Article Full Text PDF

7. A Secure Routing Protocol Based on Reputation Mechanism
Yanhui Lv, Kexin Liu, Deyu Zhang, and Zhuo Miao
Article Full Text PDF

8. An Efficient and Secure Cipher-Text Retrieval Scheme Based on Mixed Homomorphic Encryption and Multi-Attribute Sorting Method
Lin Teng, Hang Li, Jie Liu, and Shoulin Yin
Article Full Text PDF

9. A New Scheme for Source-location Privacy in Wireless Sensor Networks
Shaoquan Jiang, Min Li, and Zailiang Tang
Article Full Text PDF

10. Application of FSM Machine and S-Box in KASUMI Block Cipher to Improve Its Resistance Against Attack
Raja Muthalagu and Subeen Jain
Article Full Text PDF

11. An Efficient Approach to Resolve Covert Channels
Muawia A. Elsadig and Yahia A. Fadlalla
Article Full Text PDF

12. A Secure and Efficient Ciphertext Encryption Scheme Based on Attribute and Support Strategy Dynamic Update Via Hybrid Encryption
Yanhua Wang, Yaqiu Liu and Kun Wang
Article Full Text PDF

13. A Grudger Based AIS Approach to Coerce Selfish Node Cooperation in MANET
Lincy Elizebeth Jim and Mark A. Gregory
Article Full Text PDF

14. Efficient Implementation of Password-based Authenticated Key Exchange from RLWE and Post-Quantum TLS
Xinwei Gao, Jintai Ding, Lin Li, Saraswathy RV, and Jiqiang Liu
Article Full Text PDF

15. A Fast Scalar Multiplication Algorithm Based on Alternate-Zeckendorf Representation
Shuang-Gen Liu and Xue-Jing Sun
Article Full Text PDF

16. A Wireless Key Generation Algorithm for RFID System Based on Bit Operation
Rui Xie, Jie Ling, Dao-Wei Liu
Article Full Text PDF

17. Perseverance of Uncertainty in Cloud Storage Services through Reputation Based Trust
Vegi Srinivas, Vatsavayi Valli Kumari, KVSVN Raju
Article Full Text PDF

18. An Efficient Compromised Nodes Detection System in Wireless Sensor Networks
Xiaolong Xu, Zhonghe Gao, Lijuan Han
Article Full Text PDF

19. Optimal Control Analysis of Computer Virus Transmission
Okosun Kazeem, Ogunlade Samson, Bonyah Ebenezer
Article Full Text PDF