| International Journal of Network Security | ||
| 1. | FI-SIFT Algorithm for Exposing Image Copy-Move Forgery with Reflection Attacks
|
|
| You-Jian Yu, Guang-Fu Wang, and Jie Zhao, Vol. 22, No. 2, 2020, pp. 183-190 Article Full Text PDF |
||
| 2. | A Coefficient of Variation Method to Measure the Extents of Decentralization for Bitcoin and Ethereum Networks
|
|
| Keke Wu, Bo Peng, Hua Xie, and Shaobin Zhan, Vol. 22, No. 2, 2020, pp. 191-200 Article Full Text PDF |
||
| 3. | Security Access Solution of Cloud Services for Trusted Mobile Terminals Based on TrustZone
|
|
| Hui Xia and Weiji Yang, Vol. 22, No. 2, 2020, pp. 201-211 Article Full Text PDF |
||
| 4. | Security Analyses of a Data Collaboration Scheme with Hierarchical Attribute-based Encryption in Cloud Computing
|
|
| Wei-Liang Tai, Ya-Fen Chang, and Wen-Hsin Huang, Vol. 22, No. 2, 2020, pp. 212-217 Article Full Text PDF |
||
| 5. | An Intrusion Detection Model for Wireless Sensor Network Based on Information Gain Ratio and Bagging Algorithm
|
|
| Rui-Hong Dong, Hou-Hua Yan, and Qiu-Yu Zhang, Vol. 22, No. 2, 2020, pp. 218-230 Article Full Text PDF |
||
| 6. | Intrusion Detection Method Based on Support Vector Machine and Information Gain for Mobile Cloud Computing
|
|
| Emmanuel Mugabo and Qiu-Yu Zhang, Vol. 22, No. 2, 2020, pp. 231-241 Article Full Text PDF |
||
| 7. | A Network Flow Correlation Method Based on Chaos Theory and Principal Component Analysis
|
|
| Yang Chen and Yonghong Chen, Vol. 22, No. 2, 2020, pp. 242-249 Article Full Text PDF |
||
| 8. | A Secure Authenticated Key Agreement Protocol for Application at Digital Certificat
|
|
| Javad Saadatmandan and Amirhossein Rahimi, Vol. 22, No. 2, 2020, pp. 250-256 Article Full Text PDF |
||
| 9. | Identity Based Key-Insulated Encryption with Outsourced Equality Test
|
|
| Seth Alornyo, Yanan Zhao, Guobin Zhu, and Hu Xiong, Vol. 22, No. 2, 2020, pp. 257-264 Article Full Text PDF |
||
| 10. | Using Parametric t-Distributed Stochastic Neighbor Embedding Combined with Hierarchical Neural Network for Network Intrusion Detection
|
|
| Huijun Yao, Chaopeng Li, and Peng Sun, Vol. 22, No. 2, 2020, pp. 265-274 Article Full Text PDF |
||
| 11. | A Method of Constructing Arc Edge Anonymous Area Based on LBS Privacy Protection in the Internet of Vehicles
|
|
| Peng-Shou Xie, Xue-Ming Han, Tao Feng, Yan Yan, and Guo-Qiang Ma, Vol. 22, No. 2, 2020, pp. 275-282 Article Full Text PDF |
||
| 12. | Chaotic NHCP: Building an Efficient Secure Framework for Cloud Computing Environment Based on Chaos Theory
|
|
| Diaa Salama Abdul Minaam, Mostafa Abdullah Ibrahim, and Elsayed Badr, Vol. 22, No. 2, 2020, pp. 283-295 Article Full Text PDF |
||
| 13. | Low-Computation-Cost Data Hiding Scheme Based on Turtle Shell
|
|
| Yu Chen, Jiang-Yi Lin, Chin-Chen Chang, and Yu-Chen Hu, Vol. 22, No. 2, 2020, pp. 296-305 Article Full Text PDF |
||
| 14. | A PSO-based Wavelet-core ELM for Abnormal Flow Detection
|
|
| Yueyang Su, Jing Wan, and Junkai Yi, Vol. 22, No. 2, 2020, pp. 306-313 Article Full Text PDF |
||
| 15. | Medical Image Encryption Based on Stream Cipher Algorithm and Krill Group
|
|
| Chu Zhao, Shoulin Yin, Hang Li, and Yang Sun, Vol. 22, No. 2, 2020, pp. 314-320 Article Full Text PDF |
||
| 16. | LinkedIn Social Media Forensics on Windows 10
|
|
| Ming-Sang Chang and Chih-Ping Yen, Vol. 22, No. 2, 2020, pp. 321-330 Article Full Text PDF |
||
| 17. | Run-based Modular Reduction Method
|
|
| Zhengjun Cao, Zhen Chen, Ruizhong Wei, and Lihua Liu, Vol. 22, No. 2, 2020, pp. 331-336 Article Full Text PDF |
||
| 18. | Anomaly Detection for Network Flow Using Immune Network and Density Peak
|
|
| Yuanquan Shi and Hong Shen, Vol. 22, No. 2, 2020, pp. 337-346 Article Full Text PDF |
||
| 19. | Adaptive Access Control Model of Vehicular Network Big Data Based on XACML and Security Risk
|
|
| Peng-Shou Xie, Hong-Jin Fan, Tao Feng, Yan Yan, Guo-qiang Ma, and Xue-Ming Han, Vol. 22, No. 2, 2020, pp. 347-357 Article Full Text PDF |
||
| 20. | An Enhanced Secure Smart Card-based Password Authentication Scheme
|
|
| Hsieh-Tsen Pan, Hung-Wei Yang, and Min-Shiang Hwang, Vol. 22, No. 2, 2020, pp. 358-363 Article Full Text PDF |
||