Quick Search:

Volume: 24, No: 1 (January 1, 2022)

International Journal of Network Security

1. Information Entropy Models and Privacy Metrics Methods for Privacy Protection
Hui Xia and Weiji Yang, Vol. 24, No. 1, 2022, pp. 1-10
Article Full Text PDF

2. A ZigBee Software Defined Network Security
Alireza Ebrahimi Basabi, Jingsha He, Seyed Mahmood Hashemi, Xinggang Xuan, Muhammad Salman Pathan, and Zulfiqar Ali Zardari, Vol. 24, No. 1, 2022, pp. 11-19
Article Full Text PDF

3. Detect Cross-Site Scripting Attacks Using Average Word Embedding and Support Vector Machine
Fawaz Mahiuob Mohammed Mokbal, Dan Wang, and Xiaoxi Wang, Vol. 24, No. 1, 2022, pp. 20-28
Article Full Text PDF

4. Research on Network Security Intrusion Detection with an Extreme Learning Machine Algorithm
Ying Xue, Vol. 24, No. 1, 2022, pp. 29-35
Article Full Text PDF

5. Research on Monitoring Technology of Industrial Cannabis Based on Blockchain and SM Series Cryptographic Algorithm
Zijian Ma, Zhiqiang Wang, Hang Wu, Xingyu Guo, and Xizhen Wang, Vol. 24, No. 1, 2022, pp. 36-48
Article Full Text PDF

6. Security Situation Prediction Method for Industrial Control Network Based on Adaptive Grey Verhulst Model and GRU Network
Rui-Hong Dong, Chuang Shu, Qiu-Yu Zhang, and Ya-Yu Mo, Vol. 24, No. 1, 2022, pp. 49-61
Article Full Text PDF

7. A New Upper Bound and Optimal Constructions of Equi-Difference Conflict-Avoiding Codes on Constant Weight
Chun-E Zhao and Yuhua Sun, Vol. 24, No. 1, 2022, pp. 62-67
Article Full Text PDF

8. Research on Secure Storage of Network Data Based on Cloud Computing Technology
Jinfeng Zhu, Vol. 24, No. 1, 2022, pp. 68-74
Article Full Text PDF

9. Frequent Itemset Mining Algorithm Based on Differential Privacy in Vertical Structure
Shigong Long, Hongqin Lu, Tingting Chen, Nannan Zhou, and Hai Liu, Vol. 24, No. 1, 2022, pp. 75-82
Article Full Text PDF

10. Research on Blackmail Virus Defense Based on Multi-Defender Hybrid Strategy
Guoqing Sun, Jiulun Fan, and Hao Wu, Vol. 24, No. 1, 2022, pp. 83-91
Article Full Text PDF

11. Publicly Verifiable Outsourcing Computation for Inner Product Evaluation under Multiple Keys with Improved Security and Efficiency
Zhiqiang Du, Dong Zheng, and Qinglan Zhao, Vol. 24, No. 1, 2022, pp. 92-103
Article Full Text PDF

12. A Pseudorandom Bit Generator Based on Gaussian Function
Qi Wu, Vol. 24, No. 1, 2022, pp. 104-108
Article Full Text PDF

13. Secure and Accountable Data Access Control Against Malicious Behavior in Smart Grids
Leyou Zhang, Chao Song, and Yi Mu, Vol. 24, No. 1, 2022, pp. 109-122
Article Full Text PDF

14. Some Properties and Privacy Measurement of 0/1-Encoding
Ya-Ting Duan, Yan-Ping Li, Lai-Feng Lu, and Kai Zhang, Vol. 24, No. 1, 2022, pp. 123-129
Article Full Text PDF

15. A Novel Smart Lock Protocol Based on Group Signature
Yonglei Liu, Kun Hao, Jie Zhao, Li Wang, and Weilong Zhang, Vol. 24, No. 1, 2022, pp. 130-139
Article Full Text PDF

16. Video Steganography for Image and Text using Deep Genetic Algorithm and LSB
Nouran Mohamed Selim, Shawkat Kamal Guirguis, and Yasser Fouad Hassan, Vol. 24, No. 1, 2022, pp. 140-146
Article Full Text PDF

17. A Framework for Detecting Compatibility-Issues-Proneness Apps Based on Multimodal Analysis in Android Platform
Chen Xu, Caimei Wang, Yan Xiong, Wenchao Huang, Zhaoyi Meng, and Fuyou Miao, Vol. 24, No. 1, 2022, pp. 147-155
Article Full Text PDF

18. Network Security Risk Assessment Based on Enterprise Environment Characteristics
Yunxue Yang, Zhenqi Yang, Qin Yang, Guohua Ji, and Shengjun Xue, Vol. 24, No. 1, 2022, pp. 156-165
Article Full Text PDF

19. A CKKS-based Privacy Preserving Extreme Learning Machine
Kunhong Li and Ruwei Huang, Vol. 24, No. 1, 2022, pp. 166-175
Article Full Text PDF

20. The System Adoption Evaluation of RFID Safety Management System on Campus
Yu-Ying Hsieh, Liang-Hsu Chang, Anthony Y. H. Liao, Cheng-Ying Yang, and Min-Shiang Hwang, Vol. 24, No. 1, 2022, pp. 176-180
Article Full Text PDF