| International Journal of Network Security | ||
| 1. | A Hybrid Iterative Greedy Optimization Algorithm for Distributed Assembly Blocking Flow Shop Scheduling Problem
|
|
| Yongqi Zheng, Vol. 24, No. 6, 2022, pp. 975-983 Article Full Text PDF |
||
| 2. | A Dynamic Trust Evaluation Model of User Behavior Based on Transformer
|
|
| Xiuwen Yu, Rong Huang, Yuancheng Li, Rixuan Qiu, Xin Zhou, Liang Liang, and Sitong Jing, Vol. 24, No. 6, 2022, pp. 984-993 Article Full Text PDF |
||
| 3. | A Data Sharing Scheme in NDN Based on MOR Primitive
|
|
| Jiaoli Shi, Anyuan Deng, Chao Luo, Shimao Yao, and Kai He, Vol. 24, No. 6, 2022, pp. 994-1001 Article Full Text PDF |
||
| 4. | Study on the Evidence Collection for Network Security Intrusion Detection
|
|
| Xindong Wang, Vol. 24, No. 6, 2022, pp. 1002-1007 Article Full Text PDF |
||
| 5. | A Modified ZigZag Transform Method and Its Application in Image Encryption
|
|
| Chunming Xu and Yong Zhang, Vol. 24, No. 6, 2022, pp. 1008-1014 Article Full Text PDF |
||
| 6. | Privacy-Preserving Scoring Mechanism
|
|
| Zhuliang Jia, Xueling Zhao, and Jiahao Pan, Vol. 24, No. 6, 2022, pp. 1015-1019 Article Full Text PDF |
||
| 7. | Optimized Jacobian-based Saliency Maps Attacks
|
|
| Wenwen Zhang, Xiaolin Zhang, Kun Hao, Jingyu Wang, and Shuai Zhang, Vol. 24, No. 6, 2022, pp. 1020-1030 Article Full Text PDF |
||
| 8. | A Software-Defined Security Framework for Power IoT Cloud-Edge Environment
|
|
| Rixuan Qiu, Yu Fu, Jian Le, Fuyong Zheng, Gan Qi, Chao Peng, and Yuancheng Li, Vol. 24, No. 6, 2022, pp. 1031-1041 Article Full Text PDF |
||
| 9. | A Speech Fully Homomorphic Encryption Scheme for DGHV Based on Multithreading in Cloud Storage
|
|
| Qiu-yu Zhang and Yu-gui Jia, Vol. 24, No. 6, 2022, pp. 1042-1055 Article Full Text PDF |
||
| 10. | Tag Group Coexistence Protocol for Verifiable RFID System
|
|
| Yu-Zhen Li, Wen-Tao Zuo, and Dao-Wei Liu, Vol. 24, No. 6, 2022, pp. 1056-1063 Article Full Text PDF |
||
| 11. | A New Scheme of BACnet Protocol Based on HCPN Security Evaluation Method
|
|
| Tao Feng, Xiao-yan Jiang, Jun-li Fang, and Xiang Gong, Vol. 24, No. 6, 2022, pp. 1064-1075 Article Full Text PDF |
||
| 12. | A Note on One Outsourcing Algorithm for Modular Exponentiations
|
|
| Lihua Liu and Bin Cheng, Vol. 24, No. 6, 2022, pp. 1076-1080 Article Full Text PDF |
||
| 13. | Security Analysis of TBPKI-2 Protocol Based on Minimal Element Theory
|
|
| Wen-Bei Zong and Lei Yu, Vol. 24, No. 6, 2022, pp. 1081-1088 Article Full Text PDF |
||
| 14. | Research on the Infringement of Personal Information by Web Crawlers Based on Legal Regulation
|
|
| Qingyuan Liu and Feng’e Huo, Vol. 24, No. 6, 2022, pp. 1089-1093 Article Full Text PDF |
||
| 15. | Revocable Outsourced Decryption of CP-ABE Based on OBDD
|
|
| Li Chen, Rui Guo, Lei Xu, Xin Wei, Geng Yang, Chaoyuan Zhuang, and Qianqian Zhao, Vol. 24, No. 6, 2022, pp. 1094-1105 Article Full Text PDF |
||
| 16. | Multi-bit Functional Encryption for Inner Product Predicate over Lattice
|
|
| Mingming Jiang, Qihong Chen, Yuyan Guo, and Dongbing Zhang, Vol. 24, No. 6, 2022, pp. 1106-1113 Article Full Text PDF |
||
| 17. | Research on Data Hiding Schemes for AMBTC Compressed Images
|
|
| Kurnia Anggriani, Nan-I Wu, and Min-Shiang Hwang, Vol. 24, No. 6, 2022, pp. 1114-1123 Article Full Text PDF |
||
| 18. | A Multistage Dynamic Defense Method for Evolutionary Games
|
|
| Zhiyong Luo, Yutong Cao, Weiwei Song, and Jie Li, Vol. 24, No. 6, 2022, pp. 1124-1134 Article Full Text PDF |
||
| 19. | Intrusion Detection Algorithm Based on Residual Neural Network
|
|
| Zengyu Cai, Jingchao Wang, Jianwei Zhang, and Yajie Si, Vol. 24, No. 6, 2022, pp. 1135-1141 Article Full Text PDF |
||
| 20. | High Capacity Reversible Data Hiding Scheme with Low Distortion Based on Central Prediction
|
|
| Fang Ren, Xuemei Yao, Feiyuan Xue, and Zhelin Zhang, Vol. 24, No. 6, 2022, pp. 1142-1152 Article Full Text PDF |
||
| 23. | Reviewer index to volume 24 (2022)
|
|
| Article Full Text PDF | ||