| International Journal of Network Security | ||
| 1. | A Mobile RFID Authentication Protocol Based on Self-assembling Cross-bit Algorithm
|
|
| Sheng-Hua Xu, Dao-Wei Liu, and Wen-Tao Zuo, Vol. 25, No. 1, 2023, pp. 1-9 Article Full Text PDF |
||
| 2. | Digital Image Copyright Protection Method Based on Blockchain and Perceptual Hashing
|
|
| Qiu-Yu Zhang and Guo-Rui Wu, Vol. 25, No. 1, 2023, pp. 10-24 Article Full Text PDF |
||
| 3. | Research on Coverless Image Steganography
|
|
| Kurnia Anggriani, Nan-I Wu, and Min-Shiang Hwang, Vol. 25, No. 1, 2023, pp. 25-31 Article Full Text PDF |
||
| 4. | Research on Data Mining Detection Algorithms for Abnormal Data
|
|
| Yanying Yang, Vol. 25, No. 1, 2023, pp. 32-36 Article Full Text PDF |
||
| 5. | An Approach for Security Assessment of the Internet of Things in Healthcare for the Disabled
|
|
| Reem Almasoudi, Mohammad Arafah, Waleed Alghanem, and Saad Bakry , Vol. 25, No. 1, 2023, pp. 37-47 Article Full Text PDF |
||
| 6. | CSMTP: An RL-based Adversarial Examples Generation Method for Chinese Social Media Texts Classification Models
|
|
| Xin Tong, Jingya Wang, Binjun Wang, Hanming Zhai, and Kaidi Zhang, Vol. 25, No. 1, 2023, pp. 48-60 Article Full Text PDF |
||
| 7. | Non-linear and Non-steady Time Series Forecasting Method Based on EMD and OSELM
|
|
| Xuebin Xu, Meijuan An, Shuxin Cao, Longbin Lu, Liangxu Su, Tao Yang, and Jiaqi Luo, Vol. 25, No. 1, 2023, pp. 61-67 Article Full Text PDF |
||
| 8. | Privacy-preserving Electronic Medical Records Sharing Solution Based on Blockchain
|
|
| Mingqiang Shao, Momeng Liu, and Zhenzhen Wang, Vol. 25, No. 1, 2023, pp. 68-75 Article Full Text PDF |
||
| 9. | Common Knowledge Based Secure Generation and Exchange of Symmetric Keys
|
|
| Hexiong Chen, Jiaping Wu, Wei Guo, Feilu Hang, Zhenyu Luo, and Yilin Wang, Vol. 25, No. 1, 2023, pp. 76-88 Article Full Text PDF |
||
| 10. | Construction and Deployment of a Distributed Firewall-based Computer Security Defense Network
|
|
| Chunjuan Wang, Vol. 25, No. 1, 2023, pp. 89-94 Article Full Text PDF |
||
| 11. | The Validation Code System of Websites Based on Multi-dimensional Chaotic Logistic Map
|
|
| Dahua Song, Chang Liu, and Jiahui Liu, Vol. 25, No. 1, 2023, pp. 95-102 Article Full Text PDF |
||
| 12. | Secure Search over Encrypted Enterprise Data in the Cloud
|
|
| Kaishi Wang and Jiaqi Guo, Vol. 25, No. 1, 2023, pp. 103-112 Article Full Text PDF |
||
| 13. | Element Extraction Method of Industrial Internet Security Situation Analysis Based on SDAE-IRF
|
|
| Peng-Shou Xie, Ying-Wen Zhao, Shuai Wang, Wei Li, Wan-Jun Shao, and Tao Feng, Vol. 25, No. 1, 2023, pp. 113-121 Article Full Text PDF |
||
| 14. | Enhancing the Robustness of Deep Neural Networks by Meta-Adversarial Training
|
|
| You-Kang Chang, Hong Zhao, and Wei-Jie Wang, Vol. 25, No. 1, 2023, pp. 122-130 Article Full Text PDF |
||
| 15. | A Hybrid-based Feature Selection Method for Intrusion Detection System
|
|
| Xibin Sun, Heping Ye, and Xiaolin Liu, Vol. 25, No. 1, 2023, pp. 131-139 Article Full Text PDF |
||
| 16. | An Efficient Attribute Encryption Scheme with Privacy-Preserving Policy in Smart Grid
|
|
| Jing Cheng and Mi Wen, Vol. 25, No. 1, 2023, pp. 140-150 Article Full Text PDF |
||
| 17. | Bilinear Mapping and Blockchain-based Privacy-Preserving and Data Sharing Scheme for Smart Grid
|
|
| Xiaoxu Zhang, Vol. 25, No. 1, 2023, pp. 151-160 Article Full Text PDF |
||
| 18. | Deep Security Detection Framework Based on ATT&CK
|
|
| Rixuan Qiu, Yu Fu, Jian Le, Fuyong Zheng, Gan Qi, Chao Peng, Yi Zhang, Yuancheng Li, and Yan Liu, Vol. 25, No. 1, 2023, pp. 161-170 Article Full Text PDF |
||
| 19. | Emergent Cybersecurity Information Discovery in Support of Cyber Threat Prevention
|
|
| Chia-Mei Chen, Jin-Jie Fang, Zheng-Xun Cai, Boyi Lee, and Dan-Wei Wen, Vol. 25, No. 1, 2023, pp. 171-174 Article Full Text PDF |
||
| 20. | An Efficient USM Weak Sharpening Detection Method for Small Size Image Forensics
|
|
| Jie Zhao, Shuang Song, and Bin Wu, Vol. 25, No. 1, 2023, pp. 175-183 Article Full Text PDF |
||