Quick Search:

Volume: 24, No: 3 (May 1, 2022)

International Journal of Network Security

1. Attack Chains Construction Method Based on Vulnerabilities Combination
Jing Zhao, Hao Sun, and Yang Cheng, Vol. 24, No. 3, 2022, pp. 389-400
Article Full Text PDF

2. A Feature Selection Method of CERT for Abnormal Network Traffic Detection
Yongxin Feng, Wenxin Li, Yuntao Zhao, Shengnan Geng, Bo Yu, and Junxing Jia, Vol. 24, No. 3, 2022, pp. 401-409
Article Full Text PDF

3. Comparison of Multiple Algorithmic Models for Malicious Attack Data Detection of Network Intrusion
Ronghua Ma, Vol. 24, No. 3, 2022, pp. 410-415
Article Full Text PDF

4. A Statistical P2P Botnet Detection Resilient to Mimicry Attacks
Fateme Faraji Daneshgar, Atiyeh Mohammadkhani, and Maghsoud Abbaspour, Vol. 24, No. 3, 2022, pp. 416-427
Article Full Text PDF

5. Stable Transmission Algorithm for 5G Wireless Sensor Networks Based on Energy Equalization-delay Reduction Mechanism
Bo Wu, Vol. 24, No. 3, 2022, pp. 428-435
Article Full Text PDF

6. A Lightweight NFC Authentication Algorithm Based on Modified Hash Function
Fang-Ming Cao and Dao-Wei Liu, Vol. 24, No. 3, 2022, pp. 436-443
Article Full Text PDF

7. On the Linear Complexity of Binary Half-l-Sequences
Zhihua Niu and Yuqi Sang, Vol. 24, No. 3, 2022, pp. 444-449
Article Full Text PDF

8. An Overview on Network Security Situation Awareness in Internet
Wei Wu and Cheng-Ying Yang, Vol. 24, No. 3, 2022, pp. 450-456
Article Full Text PDF

9. Fine-grained Access Control Scheme Supporting Cloud-assisted Write Permission Control in Cloud-aided E-Health System
Kai He, Ziqi Wang, Jiaoli Shi, Anyuan Deng, and Shunlin Lv, Vol. 24, No. 3, 2022, pp. 457-468
Article Full Text PDF

10. Comparative Attribute Access Control Scheme Based on Spatio-temporal Constraints in Cloud
Junling Zhang, Ze Wang, Ping Zhao, Minghua Gao, and Shimin Sun, Vol. 24, No. 3, 2022, pp. 469-481
Article Full Text PDF

11. A Trust Assessment Mechanism of the IoV Based on Multi-factor Analytic Hierarchy Process
Peng-Shou Xie, Xin Tong, Hong Wang, Ying-Wen Zhao, Tao Feng, and Yan Yan, Vol. 24, No. 3, 2022, pp. 482-492
Article Full Text PDF

12. An Assessment Method of Internet of Vehicles User Behavior Based on Hidden Markov Model
Peng-Shou Xie, Yi-Fan Wang, Zong-Liang Wang, Nan-Nan Li, Tao Feng, and Yan Yan, Vol. 24, No. 3, 2022, pp. 493-500
Article Full Text PDF

13. Conditional Privacy-Preserving Authentication Scheme for IoV Based on ECC
Peng-Shou Xie, Xiao-Jie Pan, Hong Wang, Jia-Lu Wang, Tao Feng, and Yan Yan, Vol. 24, No. 3, 2022, pp. 501-510
Article Full Text PDF

14. Ciphertext-Policy Attribute-Based Encryption Against Post-challenge Continuous Auxiliary Inputs Leakage
Yuyan Guo, Zhenhua Lu, Mingming Jiang, and Dongbing Zhang, Vol. 24, No. 3, 2022, pp. 511-520
Article Full Text PDF

15. An Improved Three-Factor Remote User Authentication Protocol Using Elliptic Curve Cryptography
Wan-Rong Liu, Bin Li, and Zhi-Yong Ji, Vol. 24, No. 3, 2022, pp. 521-532
Article Full Text PDF

16. Research on Network Intrusion Detection Based on Improved Machine Learning Method
Yan Jian, Liang Jian, and Xiaoyang Dong, Vol. 24, No. 3, 2022, pp. 533-540
Article Full Text PDF

17. Research on the Trusted Online Examination Systems
Anthony Y. H. Liao, Yu-Ying Hsieh, Cheng-Ying Yang, and Min-Shiang Hwang, Vol. 24, No. 3, 2022, pp. 541-550
Article Full Text PDF

18. Research on Network Security Intrusion Identification and Defense Against Malicious Network Damage in a Cloud Environment
Yong Zhang, Vol. 24, No. 3, 2022, pp. 551-556
Article Full Text PDF

19. Browser Forensics: Extracting Evidence from Browser Using Kali Linux and Parrot OS Forensics Tools
Sirajuddin Qureshi, Jingsha He, Saima Tunio, Nafei Zhu, Faheem Akhtar, Faheem Ullah, Ahsan Nazir, and Ahsan Wajahat, Vol. 24, No. 3, 2022, pp. 557-572
Article Full Text PDF

20. Formal Security Analysis of OPC UA Protocol in Industrial Control System
Tao Feng, Zhuang-Yu Ma, and Jun-Li Fang, Vol. 24, No. 3, 2022, pp. 573-585
Article Full Text PDF