International Journal of Network Security | ||
1. | Information Entropy Models and Privacy Metrics Methods for Privacy Protection
|
|
Hui Xia and Weiji Yang, Vol. 24, No. 1, 2022, pp. 1-10 Article Full Text PDF |
||
2. | A ZigBee Software Defined Network Security
|
|
Alireza Ebrahimi Basabi, Jingsha He, Seyed Mahmood Hashemi, Xinggang Xuan, Muhammad Salman Pathan, and Zulfiqar Ali Zardari, Vol. 24, No. 1, 2022, pp. 11-19 Article Full Text PDF |
||
3. | Detect Cross-Site Scripting Attacks Using Average Word Embedding and Support Vector Machine
|
|
Fawaz Mahiuob Mohammed Mokbal, Dan Wang, and Xiaoxi Wang, Vol. 24, No. 1, 2022, pp. 20-28 Article Full Text PDF |
||
4. | Research on Network Security Intrusion Detection with an Extreme Learning Machine Algorithm
|
|
Ying Xue, Vol. 24, No. 1, 2022, pp. 29-35 Article Full Text PDF |
||
5. | Research on Monitoring Technology of Industrial Cannabis Based on Blockchain and SM Series Cryptographic Algorithm
|
|
Zijian Ma, Zhiqiang Wang, Hang Wu, Xingyu Guo, and Xizhen Wang, Vol. 24, No. 1, 2022, pp. 36-48 Article Full Text PDF |
||
6. | Security Situation Prediction Method for Industrial Control Network Based on Adaptive Grey Verhulst Model and GRU Network
|
|
Rui-Hong Dong, Chuang Shu, Qiu-Yu Zhang, and Ya-Yu Mo, Vol. 24, No. 1, 2022, pp. 49-61 Article Full Text PDF |
||
7. | A New Upper Bound and Optimal Constructions of Equi-Difference Conflict-Avoiding Codes on Constant Weight
|
|
Chun-E Zhao and Yuhua Sun, Vol. 24, No. 1, 2022, pp. 62-67 Article Full Text PDF |
||
8. | Research on Secure Storage of Network Data Based on Cloud Computing Technology
|
|
Jinfeng Zhu, Vol. 24, No. 1, 2022, pp. 68-74 Article Full Text PDF |
||
9. | Frequent Itemset Mining Algorithm Based on Differential Privacy in Vertical Structure
|
|
Shigong Long, Hongqin Lu, Tingting Chen, Nannan Zhou, and Hai Liu, Vol. 24, No. 1, 2022, pp. 75-82 Article Full Text PDF |
||
10. | Research on Blackmail Virus Defense Based on Multi-Defender Hybrid Strategy
|
|
Guoqing Sun, Jiulun Fan, and Hao Wu, Vol. 24, No. 1, 2022, pp. 83-91 Article Full Text PDF |
||
11. | Publicly Verifiable Outsourcing Computation for Inner Product Evaluation under Multiple Keys with Improved Security and Efficiency
|
|
Zhiqiang Du, Dong Zheng, and Qinglan Zhao, Vol. 24, No. 1, 2022, pp. 92-103 Article Full Text PDF |
||
12. | A Pseudorandom Bit Generator Based on Gaussian Function
|
|
Qi Wu, Vol. 24, No. 1, 2022, pp. 104-108 Article Full Text PDF |
||
13. | Secure and Accountable Data Access Control Against Malicious Behavior in Smart Grids
|
|
Leyou Zhang, Chao Song, and Yi Mu, Vol. 24, No. 1, 2022, pp. 109-122 Article Full Text PDF |
||
14. | Some Properties and Privacy Measurement of 0/1-Encoding
|
|
Ya-Ting Duan, Yan-Ping Li, Lai-Feng Lu, and Kai Zhang, Vol. 24, No. 1, 2022, pp. 123-129 Article Full Text PDF |
||
15. | A Novel Smart Lock Protocol Based on Group Signature
|
|
Yonglei Liu, Kun Hao, Jie Zhao, Li Wang, and Weilong Zhang, Vol. 24, No. 1, 2022, pp. 130-139 Article Full Text PDF |
||
16. | Video Steganography for Image and Text using Deep Genetic Algorithm and LSB
|
|
Nouran Mohamed Selim, Shawkat Kamal Guirguis, and Yasser Fouad Hassan, Vol. 24, No. 1, 2022, pp. 140-146 Article Full Text PDF |
||
17. | A Framework for Detecting Compatibility-Issues-Proneness Apps Based on Multimodal Analysis in Android Platform
|
|
Chen Xu, Caimei Wang, Yan Xiong, Wenchao Huang, Zhaoyi Meng, and Fuyou Miao, Vol. 24, No. 1, 2022, pp. 147-155 Article Full Text PDF |
||
18. | Network Security Risk Assessment Based on Enterprise Environment Characteristics
|
|
Yunxue Yang, Zhenqi Yang, Qin Yang, Guohua Ji, and Shengjun Xue, Vol. 24, No. 1, 2022, pp. 156-165 Article Full Text PDF |
||
19. | A CKKS-based Privacy Preserving Extreme Learning Machine
|
|
Kunhong Li and Ruwei Huang, Vol. 24, No. 1, 2022, pp. 166-175 Article Full Text PDF |
||
20. | The System Adoption Evaluation of RFID Safety Management System on Campus
|
|
Yu-Ying Hsieh, Liang-Hsu Chang, Anthony Y. H. Liao, Cheng-Ying Yang, and Min-Shiang Hwang, Vol. 24, No. 1, 2022, pp. 176-180 Article Full Text PDF |
||