International Journal of Network Security | ||
1. | A Hybrid Iterative Greedy Optimization Algorithm for Distributed Assembly Blocking Flow Shop Scheduling Problem
|
|
Yongqi Zheng, Vol. 24, No. 6, 2022, pp. 975-983 Article Full Text PDF |
||
2. | A Dynamic Trust Evaluation Model of User Behavior Based on Transformer
|
|
Xiuwen Yu, Rong Huang, Yuancheng Li, Rixuan Qiu, Xin Zhou, Liang Liang, and Sitong Jing, Vol. 24, No. 6, 2022, pp. 984-993 Article Full Text PDF |
||
3. | A Data Sharing Scheme in NDN Based on MOR Primitive
|
|
Jiaoli Shi, Anyuan Deng, Chao Luo, Shimao Yao, and Kai He, Vol. 24, No. 6, 2022, pp. 994-1001 Article Full Text PDF |
||
4. | Study on the Evidence Collection for Network Security Intrusion Detection
|
|
Xindong Wang, Vol. 24, No. 6, 2022, pp. 1002-1007 Article Full Text PDF |
||
5. | A Modified ZigZag Transform Method and Its Application in Image Encryption
|
|
Chunming Xu and Yong Zhang, Vol. 24, No. 6, 2022, pp. 1008-1014 Article Full Text PDF |
||
6. | Privacy-Preserving Scoring Mechanism
|
|
Zhuliang Jia, Xueling Zhao, and Jiahao Pan, Vol. 24, No. 6, 2022, pp. 1015-1019 Article Full Text PDF |
||
7. | Optimized Jacobian-based Saliency Maps Attacks
|
|
Wenwen Zhang, Xiaolin Zhang, Kun Hao, Jingyu Wang, and Shuai Zhang, Vol. 24, No. 6, 2022, pp. 1020-1030 Article Full Text PDF |
||
8. | A Software-Defined Security Framework for Power IoT Cloud-Edge Environment
|
|
Rixuan Qiu, Yu Fu, Jian Le, Fuyong Zheng, Gan Qi, Chao Peng, and Yuancheng Li, Vol. 24, No. 6, 2022, pp. 1031-1041 Article Full Text PDF |
||
9. | A Speech Fully Homomorphic Encryption Scheme for DGHV Based on Multithreading in Cloud Storage
|
|
Qiu-yu Zhang and Yu-gui Jia, Vol. 24, No. 6, 2022, pp. 1042-1055 Article Full Text PDF |
||
10. | Tag Group Coexistence Protocol for Verifiable RFID System
|
|
Yu-Zhen Li, Wen-Tao Zuo, and Dao-Wei Liu, Vol. 24, No. 6, 2022, pp. 1056-1063 Article Full Text PDF |
||
11. | A New Scheme of BACnet Protocol Based on HCPN Security Evaluation Method
|
|
Tao Feng, Xiao-yan Jiang, Jun-li Fang, and Xiang Gong, Vol. 24, No. 6, 2022, pp. 1064-1075 Article Full Text PDF |
||
12. | A Note on One Outsourcing Algorithm for Modular Exponentiations
|
|
Lihua Liu and Bin Cheng, Vol. 24, No. 6, 2022, pp. 1076-1080 Article Full Text PDF |
||
13. | Security Analysis of TBPKI-2 Protocol Based on Minimal Element Theory
|
|
Wen-Bei Zong and Lei Yu, Vol. 24, No. 6, 2022, pp. 1081-1088 Article Full Text PDF |
||
14. | Research on the Infringement of Personal Information by Web Crawlers Based on Legal Regulation
|
|
Qingyuan Liu and Feng’e Huo, Vol. 24, No. 6, 2022, pp. 1089-1093 Article Full Text PDF |
||
15. | Revocable Outsourced Decryption of CP-ABE Based on OBDD
|
|
Li Chen, Rui Guo, Lei Xu, Xin Wei, Geng Yang, Chaoyuan Zhuang, and Qianqian Zhao, Vol. 24, No. 6, 2022, pp. 1094-1105 Article Full Text PDF |
||
16. | Multi-bit Functional Encryption for Inner Product Predicate over Lattice
|
|
Mingming Jiang, Qihong Chen, Yuyan Guo, and Dongbing Zhang, Vol. 24, No. 6, 2022, pp. 1106-1113 Article Full Text PDF |
||
17. | Research on Data Hiding Schemes for AMBTC Compressed Images
|
|
Kurnia Anggriani, Nan-I Wu, and Min-Shiang Hwang, Vol. 24, No. 6, 2022, pp. 1114-1123 Article Full Text PDF |
||
18. | A Multistage Dynamic Defense Method for Evolutionary Games
|
|
Zhiyong Luo, Yutong Cao, Weiwei Song, and Jie Li, Vol. 24, No. 6, 2022, pp. 1124-1134 Article Full Text PDF |
||
19. | Intrusion Detection Algorithm Based on Residual Neural Network
|
|
Zengyu Cai, Jingchao Wang, Jianwei Zhang, and Yajie Si, Vol. 24, No. 6, 2022, pp. 1135-1141 Article Full Text PDF |
||
20. | High Capacity Reversible Data Hiding Scheme with Low Distortion Based on Central Prediction
|
|
Fang Ren, Xuemei Yao, Feiyuan Xue, and Zhelin Zhang, Vol. 24, No. 6, 2022, pp. 1142-1152 Article Full Text PDF |
||
23. | Reviewer index to volume 24 (2022)
|
|
Article Full Text PDF | ||