Quick Search:

Volume: 20, No: 5 (September 1, 2018)

International Journal of Network Security

1. Impact of IPSec Protocol on the Performance of Network Real-Time Applications: A Review
Abdullah Abdulrahman Al-khatib and Rosilah Hassan, Vol. 20, No. 5, 2018, pp. 811-819
Article Full Text PDF

2. Improving Network Intrusion Detection Using Geometric Mean LDA
Elkhadir Zyad, Chougdali Khalid and Benattou Mohammed, Vol. 20, No. 5, 2018, pp. 820-826
Article Full Text PDF

3. Scalable Approach Towards Discovery of Unknown Vulnerabilities
Umesh Kumar Singh, Chanchala Joshi, Vol. 20, No. 5, 2018, pp. 827-835
Article Full Text PDF

4. Detection and Analysis Cerber Ransomware Using Network Forensics Behavior Based
Ade Kurniawan and Imam Riadi, Vol. 20, No. 5, 2018, pp. 836-843
Article Full Text PDF

5. A Reversible Watermarking Algorithm in the Lossless Mode of HEVC
KwangHyok Jo, Weimin Lei, Zhaozheng Li, and Xiaoshi Song, Vol. 20, No. 5, 2018, pp. 844-852
Article Full Text PDF

6. Feature Extraction Optimization for Network Intrusion Detection in Control System Networks
Travis Atkison, Stanislav Ponomarev, Randy Smith, and Bernard Chen, Vol. 20, No. 5, 2018, pp. 853-861
Article Full Text PDF

7. A Secure Routing Protocol Based on Reputation Mechanism
Yanhui Lv, Kexin Liu, Deyu Zhang, and Zhuo Miao, Vol. 20, No. 5, 2018, pp. 862-871
Article Full Text PDF

8. An Efficient and Secure Cipher-Text Retrieval Scheme Based on Mixed Homomorphic Encryption and Multi-Attribute Sorting Method
Lin Teng, Hang Li, Jie Liu, and Shoulin Yin, Vol. 20, No. 5, 2018, pp. 872-878
Article Full Text PDF

9. A New Scheme for Source-location Privacy in Wireless Sensor Networks
Shaoquan Jiang, Min Li, and Zailiang Tang, Vol. 20, No. 5, 2018, pp. 879-889
Article Full Text PDF

10. Application of FSM Machine and S-Box in KASUMI Block Cipher to Improve Its Resistance Against Attack
Raja Muthalagu and Subeen Jain, Vol. 20, No. 5, 2018, pp. 890-897
Article Full Text PDF

11. An Efficient Approach to Resolve Covert Channels
Muawia A. Elsadig and Yahia A. Fadlalla, Vol. 20, No. 5, 2018, pp. 898-906
Article Full Text PDF

12. A Secure and Efficient Ciphertext Encryption Scheme Based on Attribute and Support Strategy Dynamic Update Via Hybrid Encryption
Yanhua Wang, Yaqiu Liu and Kun Wang, Vol. 20, No. 5, 2018, pp. 907-913
Article Full Text PDF

13. A Grudger Based AIS Approach to Coerce Selfish Node Cooperation in MANET
Lincy Elizebeth Jim and Mark A. Gregory, Vol. 20, No. 5, 2018, pp. 914-922
Article Full Text PDF

14. Efficient Implementation of Password-based Authenticated Key Exchange from RLWE and Post-Quantum TLS
Xinwei Gao, Jintai Ding, Lin Li, Saraswathy RV, and Jiqiang Liu, Vol. 20, No. 5, 2018, pp. 923-930
Article Full Text PDF

15. A Fast Scalar Multiplication Algorithm Based on Alternate-Zeckendorf Representation
Shuang-Gen Liu and Xue-Jing Sun, Vol. 20, No. 5, 2018, pp. 931-937
Article Full Text PDF

16. A Wireless Key Generation Algorithm for RFID System Based on Bit Operation
Rui Xie, Jie Ling, Dao-Wei Liu, Vol. 20, No. 5, 2018, pp. 938-950
Article Full Text PDF

17. Perseverance of Uncertainty in Cloud Storage Services through Reputation Based Trust
Vegi Srinivas, Vatsavayi Valli Kumari, KVSVN Raju, Vol. 20, No. 5, 2018, pp. 951-959
Article Full Text PDF

18. An Efficient Compromised Nodes Detection System in Wireless Sensor Networks
Xiaolong Xu, Zhonghe Gao, Lijuan Han, Vol. 20, No. 5, 2018, pp. 960-970
Article Full Text PDF

19. Optimal Control Analysis of Computer Virus Transmission
Okosun Kazeem, Ogunlade Samson, Bonyah Ebenezer, Vol. 20, No. 5, 2018, pp. 971-982
Article Full Text PDF

20. A Detection and Defense Technology for Information-stealing and Deceitful Trojan Viruses Based on Behavioral Features
Li Lin, Vol. 20, No. 5, 2018, pp. 983-987
Article Full Text PDF

21. Exploring a Novel Cryptographic Solution for Securing Small Satellite Communications
Samuel Jackson, Jeremy Straub, and Scott Kerlin, Vol. 20, No. 5, 2018, pp. 988-997
Article Full Text PDF

22. A Survey of E-book Digital Right Management
Cheng-Yi Tsai, Cheng-Ying Yang, Iuon-Chang Lin, and Min-Shiang Hwang, Vol. 20, No. 5, 2018, pp. 998-1004
Article Full Text PDF

23. Subject index to volume 20 (2018)
Article Full Text PDF

24. Author index to volume 20 (2018)
Article Full Text PDF

25. Reviewer index to volume 20 (2018)
Article Full Text PDF

26. All Papers to volume 20 (2018)
Article Full Text PDF