International Journal of Network Security | ||
1. | A Mobile RFID Authentication Protocol Based on Self-assembling Cross-bit Algorithm
|
|
Sheng-Hua Xu, Dao-Wei Liu, and Wen-Tao Zuo, Vol. 25, No. 1, 2023, pp. 1-9 Article Full Text PDF |
||
2. | Digital Image Copyright Protection Method Based on Blockchain and Perceptual Hashing
|
|
Qiu-Yu Zhang and Guo-Rui Wu, Vol. 25, No. 1, 2023, pp. 10-24 Article Full Text PDF |
||
3. | Research on Coverless Image Steganography
|
|
Kurnia Anggriani, Nan-I Wu, and Min-Shiang Hwang, Vol. 25, No. 1, 2023, pp. 25-31 Article Full Text PDF |
||
4. | Research on Data Mining Detection Algorithms for Abnormal Data
|
|
Yanying Yang, Vol. 25, No. 1, 2023, pp. 32-36 Article Full Text PDF |
||
5. | An Approach for Security Assessment of the Internet of Things in Healthcare for the Disabled
|
|
Reem Almasoudi, Mohammad Arafah, Waleed Alghanem, and Saad Bakry , Vol. 25, No. 1, 2023, pp. 37-47 Article Full Text PDF |
||
6. | CSMTP: An RL-based Adversarial Examples Generation Method for Chinese Social Media Texts Classification Models
|
|
Xin Tong, Jingya Wang, Binjun Wang, Hanming Zhai, and Kaidi Zhang, Vol. 25, No. 1, 2023, pp. 48-60 Article Full Text PDF |
||
7. | Non-linear and Non-steady Time Series Forecasting Method Based on EMD and OSELM
|
|
Xuebin Xu, Meijuan An, Shuxin Cao, Longbin Lu, Liangxu Su, Tao Yang, and Jiaqi Luo, Vol. 25, No. 1, 2023, pp. 61-67 Article Full Text PDF |
||
8. | Privacy-preserving Electronic Medical Records Sharing Solution Based on Blockchain
|
|
Mingqiang Shao, Momeng Liu, and Zhenzhen Wang, Vol. 25, No. 1, 2023, pp. 68-75 Article Full Text PDF |
||
9. | Common Knowledge Based Secure Generation and Exchange of Symmetric Keys
|
|
Hexiong Chen, Jiaping Wu, Wei Guo, Feilu Hang, Zhenyu Luo, and Yilin Wang, Vol. 25, No. 1, 2023, pp. 76-88 Article Full Text PDF |
||
10. | Construction and Deployment of a Distributed Firewall-based Computer Security Defense Network
|
|
Chunjuan Wang, Vol. 25, No. 1, 2023, pp. 89-94 Article Full Text PDF |
||
11. | The Validation Code System of Websites Based on Multi-dimensional Chaotic Logistic Map
|
|
Dahua Song, Chang Liu, and Jiahui Liu, Vol. 25, No. 1, 2023, pp. 95-102 Article Full Text PDF |
||
12. | Secure Search over Encrypted Enterprise Data in the Cloud
|
|
Kaishi Wang and Jiaqi Guo, Vol. 25, No. 1, 2023, pp. 103-112 Article Full Text PDF |
||
13. | Element Extraction Method of Industrial Internet Security Situation Analysis Based on SDAE-IRF
|
|
Peng-Shou Xie, Ying-Wen Zhao, Shuai Wang, Wei Li, Wan-Jun Shao, and Tao Feng, Vol. 25, No. 1, 2023, pp. 113-121 Article Full Text PDF |
||
14. | Enhancing the Robustness of Deep Neural Networks by Meta-Adversarial Training
|
|
You-Kang Chang, Hong Zhao, and Wei-Jie Wang, Vol. 25, No. 1, 2023, pp. 122-130 Article Full Text PDF |
||
15. | A Hybrid-based Feature Selection Method for Intrusion Detection System
|
|
Xibin Sun, Heping Ye, and Xiaolin Liu, Vol. 25, No. 1, 2023, pp. 131-139 Article Full Text PDF |
||
16. | An Efficient Attribute Encryption Scheme with Privacy-Preserving Policy in Smart Grid
|
|
Jing Cheng and Mi Wen, Vol. 25, No. 1, 2023, pp. 140-150 Article Full Text PDF |
||
17. | Bilinear Mapping and Blockchain-based Privacy-Preserving and Data Sharing Scheme for Smart Grid
|
|
Xiaoxu Zhang, Vol. 25, No. 1, 2023, pp. 151-160 Article Full Text PDF |
||
18. | Deep Security Detection Framework Based on ATT&CK
|
|
Rixuan Qiu, Yu Fu, Jian Le, Fuyong Zheng, Gan Qi, Chao Peng, Yi Zhang, Yuancheng Li, and Yan Liu, Vol. 25, No. 1, 2023, pp. 161-170 Article Full Text PDF |
||
19. | Emergent Cybersecurity Information Discovery in Support of Cyber Threat Prevention
|
|
Chia-Mei Chen, Jin-Jie Fang, Zheng-Xun Cai, Boyi Lee, and Dan-Wei Wen, Vol. 25, No. 1, 2023, pp. 171-174 Article Full Text PDF |
||
20. | An Efficient USM Weak Sharpening Detection Method for Small Size Image Forensics
|
|
Jie Zhao, Shuang Song, and Bin Wu, Vol. 25, No. 1, 2023, pp. 175-183 Article Full Text PDF |
||