International Journal of Network Security | ||
1. | Adversarial Examples Generation Method for Chinese Text Classification
|
|
En-Hui Xu, Xiao-Lin Zhang, Yong-Ping Wang, Shuai Zhang, Li-Xin Liu, and Li Xu, Vol. 24, No. 4, 2022, pp. 587-596 Article Full Text PDF |
||
2. | Collusion Resistance CP-ABE Scheme with Accountability, Revocation and Privacy Preserving for Cloud-based E-health System
|
|
Zhenhua Liu, Yingying Ding, Ming Yuan, and Baocang Wang, Vol. 24, No. 4, 2022, pp. 597-611 Article Full Text PDF |
||
3. | Analysis of Two Outsourcing Algorithms for Solving Quadratic Congruence
|
|
Lihua Liu and Yujie Li, Vol. 24, No. 4, 2022, pp. 612-616 Article Full Text PDF |
||
4. | Analysis of Policy Anomalies in Distributed Firewalls
|
|
Yu-Zhu Cheng and Qiu-ying Shi, Vol. 24, No. 4, 2022, pp. 617-627 Article Full Text PDF |
||
5. | An Adaptive Speech Homomorphic Encryption Scheme Based on Energy in Cloud Storage
|
|
Qiu-Yu Zhang and Yu-Jiao Ba, Vol. 24, No. 4, 2022, pp. 628-641 Article Full Text PDF |
||
6. | Quantum Synchronizable Codes From Sextic Cyclotomy
|
|
Tao Wang, Xueting Wang, Qian Liu, and Tongjiang Yan, Vol. 24, No. 4, 2022, pp. 642-647 Article Full Text PDF |
||
7. | Adaptive Intrusion Detection Model Based on CNN and C5.0 Classifier
|
|
Wen-Tao Hao, Ye Lu, Rui-Hong Dong, Yong-Li Shui, and Qiu-Yu Zhang, Vol. 24, No. 4, 2022, pp. 648-660 Article Full Text PDF |
||
8. | An Efficient and Secure Identity-based Conditional Privacy-Preserving Authentication Scheme in VANETs
|
|
Xianglong Wang, Qiuting Chen, Zhenwan Peng, and Yimin Wang, Vol. 24, No. 4, 2022, pp. 661-670 Article Full Text PDF |
||
9. | A Technical Review on Network Security Situation Awareness
|
|
Wen Xi, Wei Wu, and Cheng-Ying Yang, Vol. 24, No. 4, 2022, pp. 671-680 Article Full Text PDF |
||
10. | Research on a Trustworthy Digital Learning Roll Call System
|
|
Anthony Y. H. Liao, Yu-Ying Hsieh, Cheng-Ying Yang, and Min-Shiang Hwang, Vol. 24, No. 4, 2022, pp. 681-688 Article Full Text PDF |
||
11. | Research on Network Traffic Data Anomaly Identification and Detection Based on an Intrusion Detection Algorithm
|
|
Hui Zhang, Vol. 24, No. 4, 2022, pp. 689-694 Article Full Text PDF |
||
12. | A Pairing-free Identity-based Cryptosystem Using Elliptic Curve Cryptography
|
|
Poonsuk Ponpurmpoon and Pipat Hiranvanichakorn, Vol. 24, No. 4, 2022, pp. 695-706 Article Full Text PDF |
||
13. | Research on Network Anomaly Data Flow Intrusion Detection and Defense Under Self-Defending Network Architecture
|
|
Bing Bai, Vol. 24, No. 4, 2022, pp. 707-712 Article Full Text PDF |
||
14. | An Improved User Identity Authentication Protocol for Multi-Gateway Wireless Sensor Networks
|
|
Liling Cao, Yu Zhang, Mei Liang, and Shouqi Cao, Vol. 24, No. 4, 2022, pp. 713-726 Article Full Text PDF |
||
15. | Identification and Detection of Malicious Traffic in Communication Networks with a Deep Learning Algorithm
|
|
Fei Yin, Vol. 24, No. 4, 2022, pp. 727-732 Article Full Text PDF |
||
16. | Fusion Dilated CNN for Encrypted Web Traffic Classification
|
|
Benjamin Appiah, Anthony Kingsley Sackey, Owusu-Agyemang Kwabena, Ansuura JohnBosco Aristotle Kanpogninge, and Peter Antwi Buah, Vol. 24, No. 4, 2022, pp. 733-740 Article Full Text PDF |
||
17. | Research on the Security Protection of Network Communication Data Using DES Encryption Algorithm
|
|
Tao Wang and Jia Wang, Vol. 24, No. 4, 2022, pp. 741-746 Article Full Text PDF |
||
18. | Identification of Traffic Flow Using Multi-Convolutional Neural Networks
|
|
Ching-Ta Lu, Yu Huang, Jia-An Lin, and Ling-Ling Wang, Vol. 24, No. 4, 2022, pp. 747-754 Article Full Text PDF |
||
19. | Chinese Unknown Words Extraction for Incomplete Sentences
|
|
Yi-Hui Chen, Eric Jui-Lin Lu, and Jeng-Jie Huang, Vol. 24, No. 4, 2022, pp. 755-764 Article Full Text PDF |
||
20. | A New Approach for Power Signal Disturbances Classification Using Deep Convolutional Neural Networks
|
|
Yeong-Chin Chen, Sunneng Sandino Berutu, Long-Chen Hung, and Mariana Syamsudin, Vol. 24, No. 4, 2022, pp. 765-775 Article Full Text PDF |
||
21. | Subject index to volume 24 (2022)
|
|
Article Full Text PDF | ||
22. | Author index to volume 24 (2022)
|
|
Article Full Text PDF | ||
23. | Reviewer index to volume 24 (2022)
|
|
Article Full Text PDF | ||
24. | All Papers to volume 24 (2022)
|
|
Article Full Text PDF | ||