International Journal of Network Security | ||
1. | Attack Chains Construction Method Based on Vulnerabilities Combination
|
|
Jing Zhao, Hao Sun, and Yang Cheng, Vol. 24, No. 3, 2022, pp. 389-400 Article Full Text PDF |
||
2. | A Feature Selection Method of CERT for Abnormal Network Traffic Detection
|
|
Yongxin Feng, Wenxin Li, Yuntao Zhao, Shengnan Geng, Bo Yu, and Junxing Jia, Vol. 24, No. 3, 2022, pp. 401-409 Article Full Text PDF |
||
3. | Comparison of Multiple Algorithmic Models for Malicious Attack Data Detection of Network Intrusion
|
|
Ronghua Ma, Vol. 24, No. 3, 2022, pp. 410-415 Article Full Text PDF |
||
4. | A Statistical P2P Botnet Detection Resilient to Mimicry Attacks
|
|
Fateme Faraji Daneshgar, Atiyeh Mohammadkhani, and Maghsoud Abbaspour, Vol. 24, No. 3, 2022, pp. 416-427 Article Full Text PDF |
||
5. | Stable Transmission Algorithm for 5G Wireless Sensor Networks Based on Energy Equalization-delay Reduction Mechanism
|
|
Bo Wu, Vol. 24, No. 3, 2022, pp. 428-435 Article Full Text PDF |
||
6. | A Lightweight NFC Authentication Algorithm Based on Modified Hash Function
|
|
Fang-Ming Cao and Dao-Wei Liu, Vol. 24, No. 3, 2022, pp. 436-443 Article Full Text PDF |
||
7. | On the Linear Complexity of Binary Half-l-Sequences
|
|
Zhihua Niu and Yuqi Sang, Vol. 24, No. 3, 2022, pp. 444-449 Article Full Text PDF |
||
8. | An Overview on Network Security Situation Awareness in Internet
|
|
Wei Wu and Cheng-Ying Yang, Vol. 24, No. 3, 2022, pp. 450-456 Article Full Text PDF |
||
9. | Fine-grained Access Control Scheme Supporting Cloud-assisted Write Permission Control in Cloud-aided E-Health System
|
|
Kai He, Ziqi Wang, Jiaoli Shi, Anyuan Deng, and Shunlin Lv, Vol. 24, No. 3, 2022, pp. 457-468 Article Full Text PDF |
||
10. | Comparative Attribute Access Control Scheme Based on Spatio-temporal Constraints in Cloud
|
|
Junling Zhang, Ze Wang, Ping Zhao, Minghua Gao, and Shimin Sun, Vol. 24, No. 3, 2022, pp. 469-481 Article Full Text PDF |
||
11. | A Trust Assessment Mechanism of the IoV Based on Multi-factor Analytic Hierarchy Process
|
|
Peng-Shou Xie, Xin Tong, Hong Wang, Ying-Wen Zhao, Tao Feng, and Yan Yan, Vol. 24, No. 3, 2022, pp. 482-492 Article Full Text PDF |
||
12. | An Assessment Method of Internet of Vehicles User Behavior Based on Hidden Markov Model
|
|
Peng-Shou Xie, Yi-Fan Wang, Zong-Liang Wang, Nan-Nan Li, Tao Feng, and Yan Yan, Vol. 24, No. 3, 2022, pp. 493-500 Article Full Text PDF |
||
13. | Conditional Privacy-Preserving Authentication Scheme for IoV Based on ECC
|
|
Peng-Shou Xie, Xiao-Jie Pan, Hong Wang, Jia-Lu Wang, Tao Feng, and Yan Yan, Vol. 24, No. 3, 2022, pp. 501-510 Article Full Text PDF |
||
14. | Ciphertext-Policy Attribute-Based Encryption Against Post-challenge Continuous Auxiliary Inputs Leakage
|
|
Yuyan Guo, Zhenhua Lu, Mingming Jiang, and Dongbing Zhang, Vol. 24, No. 3, 2022, pp. 511-520 Article Full Text PDF |
||
15. | An Improved Three-Factor Remote User Authentication Protocol Using Elliptic Curve Cryptography
|
|
Wan-Rong Liu, Bin Li, and Zhi-Yong Ji, Vol. 24, No. 3, 2022, pp. 521-532 Article Full Text PDF |
||
16. | Research on Network Intrusion Detection Based on Improved Machine Learning Method
|
|
Yan Jian, Liang Jian, and Xiaoyang Dong, Vol. 24, No. 3, 2022, pp. 533-540 Article Full Text PDF |
||
17. | Research on the Trusted Online Examination Systems
|
|
Anthony Y. H. Liao, Yu-Ying Hsieh, Cheng-Ying Yang, and Min-Shiang Hwang, Vol. 24, No. 3, 2022, pp. 541-550 Article Full Text PDF |
||
18. | Research on Network Security Intrusion Identification and Defense Against Malicious Network Damage in a Cloud Environment
|
|
Yong Zhang, Vol. 24, No. 3, 2022, pp. 551-556 Article Full Text PDF |
||
19. | Browser Forensics: Extracting Evidence from Browser Using Kali Linux and Parrot OS Forensics Tools
|
|
Sirajuddin Qureshi, Jingsha He, Saima Tunio, Nafei Zhu, Faheem Akhtar, Faheem Ullah, Ahsan Nazir, and Ahsan Wajahat, Vol. 24, No. 3, 2022, pp. 557-572 Article Full Text PDF |
||
20. | Formal Security Analysis of OPC UA Protocol in Industrial Control System
|
|
Tao Feng, Zhuang-Yu Ma, and Jun-Li Fang, Vol. 24, No. 3, 2022, pp. 573-585 Article Full Text PDF |
||