Quick Search:

Volume: 22, No: 2 (March 1, 2020)

International Journal of Network Security

1. FI-SIFT Algorithm for Exposing Image Copy-Move Forgery with Reflection Attacks
You-Jian Yu, Guang-Fu Wang, and Jie Zhao, Vol. 22, No. 2, 2020, pp. 183-190
Article Full Text PDF

2. A Coefficient of Variation Method to Measure the Extents of Decentralization for Bitcoin and Ethereum Networks
Keke Wu, Bo Peng, Hua Xie, and Shaobin Zhan, Vol. 22, No. 2, 2020, pp. 191-200
Article Full Text PDF

3. Security Access Solution of Cloud Services for Trusted Mobile Terminals Based on TrustZone
Hui Xia and Weiji Yang, Vol. 22, No. 2, 2020, pp. 201-211
Article Full Text PDF

4. Security Analyses of a Data Collaboration Scheme with Hierarchical Attribute-based Encryption in Cloud Computing
Wei-Liang Tai, Ya-Fen Chang, and Wen-Hsin Huang, Vol. 22, No. 2, 2020, pp. 212-217
Article Full Text PDF

5. An Intrusion Detection Model for Wireless Sensor Network Based on Information Gain Ratio and Bagging Algorithm
Rui-Hong Dong, Hou-Hua Yan, and Qiu-Yu Zhang, Vol. 22, No. 2, 2020, pp. 218-230
Article Full Text PDF

6. Intrusion Detection Method Based on Support Vector Machine and Information Gain for Mobile Cloud Computing
Emmanuel Mugabo and Qiu-Yu Zhang, Vol. 22, No. 2, 2020, pp. 231-241
Article Full Text PDF

7. A Network Flow Correlation Method Based on Chaos Theory and Principal Component Analysis
Yang Chen and Yonghong Chen, Vol. 22, No. 2, 2020, pp. 242-249
Article Full Text PDF

8. A Secure Authenticated Key Agreement Protocol for Application at Digital Certificat
Javad Saadatmandan and Amirhossein Rahimi, Vol. 22, No. 2, 2020, pp. 250-256
Article Full Text PDF

9. Identity Based Key-Insulated Encryption with Outsourced Equality Test
Seth Alornyo, Yanan Zhao, Guobin Zhu, and Hu Xiong, Vol. 22, No. 2, 2020, pp. 257-264
Article Full Text PDF

10. Using Parametric t-Distributed Stochastic Neighbor Embedding Combined with Hierarchical Neural Network for Network Intrusion Detection
Huijun Yao, Chaopeng Li, and Peng Sun, Vol. 22, No. 2, 2020, pp. 265-274
Article Full Text PDF

11. A Method of Constructing Arc Edge Anonymous Area Based on LBS Privacy Protection in the Internet of Vehicles
Peng-Shou Xie, Xue-Ming Han, Tao Feng, Yan Yan, and Guo-Qiang Ma, Vol. 22, No. 2, 2020, pp. 275-282
Article Full Text PDF

12. Chaotic NHCP: Building an Efficient Secure Framework for Cloud Computing Environment Based on Chaos Theory
Diaa Salama Abdul Minaam, Mostafa Abdullah Ibrahim, and Elsayed Badr, Vol. 22, No. 2, 2020, pp. 283-295
Article Full Text PDF

13. Low-Computation-Cost Data Hiding Scheme Based on Turtle Shell
Yu Chen, Jiang-Yi Lin, Chin-Chen Chang, and Yu-Chen Hu, Vol. 22, No. 2, 2020, pp. 296-305
Article Full Text PDF

14. A PSO-based Wavelet-core ELM for Abnormal Flow Detection
Yueyang Su, Jing Wan, and Junkai Yi, Vol. 22, No. 2, 2020, pp. 306-313
Article Full Text PDF

15. Medical Image Encryption Based on Stream Cipher Algorithm and Krill Group
Chu Zhao, Shoulin Yin, Hang Li, and Yang Sun, Vol. 22, No. 2, 2020, pp. 314-320
Article Full Text PDF

16. LinkedIn Social Media Forensics on Windows 10
Ming-Sang Chang and Chih-Ping Yen, Vol. 22, No. 2, 2020, pp. 321-330
Article Full Text PDF

17. Run-based Modular Reduction Method
Zhengjun Cao, Zhen Chen, Ruizhong Wei, and Lihua Liu, Vol. 22, No. 2, 2020, pp. 331-336
Article Full Text PDF

18. Anomaly Detection for Network Flow Using Immune Network and Density Peak
Yuanquan Shi and Hong Shen, Vol. 22, No. 2, 2020, pp. 337-346
Article Full Text PDF

19. Adaptive Access Control Model of Vehicular Network Big Data Based on XACML and Security Risk
Peng-Shou Xie, Hong-Jin Fan, Tao Feng, Yan Yan, Guo-qiang Ma, and Xue-Ming Han, Vol. 22, No. 2, 2020, pp. 347-357
Article Full Text PDF

20. An Enhanced Secure Smart Card-based Password Authentication Scheme
Hsieh-Tsen Pan, Hung-Wei Yang, and Min-Shiang Hwang, Vol. 22, No. 2, 2020, pp. 358-363
Article Full Text PDF