Quick Search:

Volume: 24, No: 6 (November 1, 2022)

International Journal of Network Security

1. A Hybrid Iterative Greedy Optimization Algorithm for Distributed Assembly Blocking Flow Shop Scheduling Problem
Yongqi Zheng, Vol. 24, No. 6, 2022, pp. 975-983
Article Full Text PDF

2. A Dynamic Trust Evaluation Model of User Behavior Based on Transformer
Xiuwen Yu, Rong Huang, Yuancheng Li, Rixuan Qiu, Xin Zhou, Liang Liang, and Sitong Jing, Vol. 24, No. 6, 2022, pp. 984-993
Article Full Text PDF

3. A Data Sharing Scheme in NDN Based on MOR Primitive
Jiaoli Shi, Anyuan Deng, Chao Luo, Shimao Yao, and Kai He, Vol. 24, No. 6, 2022, pp. 994-1001
Article Full Text PDF

4. Study on the Evidence Collection for Network Security Intrusion Detection
Xindong Wang, Vol. 24, No. 6, 2022, pp. 1002-1007
Article Full Text PDF

5. A Modified ZigZag Transform Method and Its Application in Image Encryption
Chunming Xu and Yong Zhang, Vol. 24, No. 6, 2022, pp. 1008-1014
Article Full Text PDF

6. Privacy-Preserving Scoring Mechanism
Zhuliang Jia, Xueling Zhao, and Jiahao Pan, Vol. 24, No. 6, 2022, pp. 1015-1019
Article Full Text PDF

7. Optimized Jacobian-based Saliency Maps Attacks
Wenwen Zhang, Xiaolin Zhang, Kun Hao, Jingyu Wang, and Shuai Zhang, Vol. 24, No. 6, 2022, pp. 1020-1030
Article Full Text PDF

8. A Software-Defined Security Framework for Power IoT Cloud-Edge Environment
Rixuan Qiu, Yu Fu, Jian Le, Fuyong Zheng, Gan Qi, Chao Peng, and Yuancheng Li, Vol. 24, No. 6, 2022, pp. 1031-1041
Article Full Text PDF

9. A Speech Fully Homomorphic Encryption Scheme for DGHV Based on Multithreading in Cloud Storage
Qiu-yu Zhang and Yu-gui Jia, Vol. 24, No. 6, 2022, pp. 1042-1055
Article Full Text PDF

10. Tag Group Coexistence Protocol for Verifiable RFID System
Yu-Zhen Li, Wen-Tao Zuo, and Dao-Wei Liu, Vol. 24, No. 6, 2022, pp. 1056-1063
Article Full Text PDF

11. A New Scheme of BACnet Protocol Based on HCPN Security Evaluation Method
Tao Feng, Xiao-yan Jiang, Jun-li Fang, and Xiang Gong, Vol. 24, No. 6, 2022, pp. 1064-1075
Article Full Text PDF

12. A Note on One Outsourcing Algorithm for Modular Exponentiations
Lihua Liu and Bin Cheng, Vol. 24, No. 6, 2022, pp. 1076-1080
Article Full Text PDF

13. Security Analysis of TBPKI-2 Protocol Based on Minimal Element Theory
Wen-Bei Zong and Lei Yu, Vol. 24, No. 6, 2022, pp. 1081-1088
Article Full Text PDF

14. Research on the Infringement of Personal Information by Web Crawlers Based on Legal Regulation
Qingyuan Liu and Feng’e Huo, Vol. 24, No. 6, 2022, pp. 1089-1093
Article Full Text PDF

15. Revocable Outsourced Decryption of CP-ABE Based on OBDD
Li Chen, Rui Guo, Lei Xu, Xin Wei, Geng Yang, Chaoyuan Zhuang, and Qianqian Zhao, Vol. 24, No. 6, 2022, pp. 1094-1105
Article Full Text PDF

16. Multi-bit Functional Encryption for Inner Product Predicate over Lattice
Mingming Jiang, Qihong Chen, Yuyan Guo, and Dongbing Zhang, Vol. 24, No. 6, 2022, pp. 1106-1113
Article Full Text PDF

17. Research on Data Hiding Schemes for AMBTC Compressed Images
Kurnia Anggriani, Nan-I Wu, and Min-Shiang Hwang, Vol. 24, No. 6, 2022, pp. 1114-1123
Article Full Text PDF

18. A Multistage Dynamic Defense Method for Evolutionary Games
Zhiyong Luo, Yutong Cao, Weiwei Song, and Jie Li, Vol. 24, No. 6, 2022, pp. 1124-1134
Article Full Text PDF

19. Intrusion Detection Algorithm Based on Residual Neural Network
Zengyu Cai, Jingchao Wang, Jianwei Zhang, and Yajie Si, Vol. 24, No. 6, 2022, pp. 1135-1141
Article Full Text PDF

20. High Capacity Reversible Data Hiding Scheme with Low Distortion Based on Central Prediction
Fang Ren, Xuemei Yao, Feiyuan Xue, and Zhelin Zhang, Vol. 24, No. 6, 2022, pp. 1142-1152
Article Full Text PDF

23. Reviewer index to volume 24 (2022)
Article Full Text PDF