International Journal of Network Security | ||
1. | FI-SIFT Algorithm for Exposing Image Copy-Move Forgery with Reflection Attacks
|
|
You-Jian Yu, Guang-Fu Wang, and Jie Zhao, Vol. 22, No. 2, 2020, pp. 183-190 Article Full Text PDF |
||
2. | A Coefficient of Variation Method to Measure the Extents of Decentralization for Bitcoin and Ethereum Networks
|
|
Keke Wu, Bo Peng, Hua Xie, and Shaobin Zhan, Vol. 22, No. 2, 2020, pp. 191-200 Article Full Text PDF |
||
3. | Security Access Solution of Cloud Services for Trusted Mobile Terminals Based on TrustZone
|
|
Hui Xia and Weiji Yang, Vol. 22, No. 2, 2020, pp. 201-211 Article Full Text PDF |
||
4. | Security Analyses of a Data Collaboration Scheme with Hierarchical Attribute-based Encryption in Cloud Computing
|
|
Wei-Liang Tai, Ya-Fen Chang, and Wen-Hsin Huang, Vol. 22, No. 2, 2020, pp. 212-217 Article Full Text PDF |
||
5. | An Intrusion Detection Model for Wireless Sensor Network Based on Information Gain Ratio and Bagging Algorithm
|
|
Rui-Hong Dong, Hou-Hua Yan, and Qiu-Yu Zhang, Vol. 22, No. 2, 2020, pp. 218-230 Article Full Text PDF |
||
6. | Intrusion Detection Method Based on Support Vector Machine and Information Gain for Mobile Cloud Computing
|
|
Emmanuel Mugabo and Qiu-Yu Zhang, Vol. 22, No. 2, 2020, pp. 231-241 Article Full Text PDF |
||
7. | A Network Flow Correlation Method Based on Chaos Theory and Principal Component Analysis
|
|
Yang Chen and Yonghong Chen, Vol. 22, No. 2, 2020, pp. 242-249 Article Full Text PDF |
||
8. | A Secure Authenticated Key Agreement Protocol for Application at Digital Certificat
|
|
Javad Saadatmandan and Amirhossein Rahimi, Vol. 22, No. 2, 2020, pp. 250-256 Article Full Text PDF |
||
9. | Identity Based Key-Insulated Encryption with Outsourced Equality Test
|
|
Seth Alornyo, Yanan Zhao, Guobin Zhu, and Hu Xiong, Vol. 22, No. 2, 2020, pp. 257-264 Article Full Text PDF |
||
10. | Using Parametric t-Distributed Stochastic Neighbor Embedding Combined with Hierarchical Neural Network for Network Intrusion Detection
|
|
Huijun Yao, Chaopeng Li, and Peng Sun, Vol. 22, No. 2, 2020, pp. 265-274 Article Full Text PDF |
||
11. | A Method of Constructing Arc Edge Anonymous Area Based on LBS Privacy Protection in the Internet of Vehicles
|
|
Peng-Shou Xie, Xue-Ming Han, Tao Feng, Yan Yan, and Guo-Qiang Ma, Vol. 22, No. 2, 2020, pp. 275-282 Article Full Text PDF |
||
12. | Chaotic NHCP: Building an Efficient Secure Framework for Cloud Computing Environment Based on Chaos Theory
|
|
Diaa Salama Abdul Minaam, Mostafa Abdullah Ibrahim, and Elsayed Badr, Vol. 22, No. 2, 2020, pp. 283-295 Article Full Text PDF |
||
13. | Low-Computation-Cost Data Hiding Scheme Based on Turtle Shell
|
|
Yu Chen, Jiang-Yi Lin, Chin-Chen Chang, and Yu-Chen Hu, Vol. 22, No. 2, 2020, pp. 296-305 Article Full Text PDF |
||
14. | A PSO-based Wavelet-core ELM for Abnormal Flow Detection
|
|
Yueyang Su, Jing Wan, and Junkai Yi, Vol. 22, No. 2, 2020, pp. 306-313 Article Full Text PDF |
||
15. | Medical Image Encryption Based on Stream Cipher Algorithm and Krill Group
|
|
Chu Zhao, Shoulin Yin, Hang Li, and Yang Sun, Vol. 22, No. 2, 2020, pp. 314-320 Article Full Text PDF |
||
16. | LinkedIn Social Media Forensics on Windows 10
|
|
Ming-Sang Chang and Chih-Ping Yen, Vol. 22, No. 2, 2020, pp. 321-330 Article Full Text PDF |
||
17. | Run-based Modular Reduction Method
|
|
Zhengjun Cao, Zhen Chen, Ruizhong Wei, and Lihua Liu, Vol. 22, No. 2, 2020, pp. 331-336 Article Full Text PDF |
||
18. | Anomaly Detection for Network Flow Using Immune Network and Density Peak
|
|
Yuanquan Shi and Hong Shen, Vol. 22, No. 2, 2020, pp. 337-346 Article Full Text PDF |
||
19. | Adaptive Access Control Model of Vehicular Network Big Data Based on XACML and Security Risk
|
|
Peng-Shou Xie, Hong-Jin Fan, Tao Feng, Yan Yan, Guo-qiang Ma, and Xue-Ming Han, Vol. 22, No. 2, 2020, pp. 347-357 Article Full Text PDF |
||
20. | An Enhanced Secure Smart Card-based Password Authentication Scheme
|
|
Hsieh-Tsen Pan, Hung-Wei Yang, and Min-Shiang Hwang, Vol. 22, No. 2, 2020, pp. 358-363 Article Full Text PDF |
||