Quick Search:

Volume: 25, No: 1 (January 1, 2023)

International Journal of Network Security

1. A Mobile RFID Authentication Protocol Based on Self-assembling Cross-bit Algorithm
Sheng-Hua Xu, Dao-Wei Liu, and Wen-Tao Zuo, Vol. 25, No. 1, 2023, pp. 1-9
Article Full Text PDF

2. Digital Image Copyright Protection Method Based on Blockchain and Perceptual Hashing
Qiu-Yu Zhang and Guo-Rui Wu, Vol. 25, No. 1, 2023, pp. 10-24
Article Full Text PDF

3. Research on Coverless Image Steganography
Kurnia Anggriani, Nan-I Wu, and Min-Shiang Hwang, Vol. 25, No. 1, 2023, pp. 25-31
Article Full Text PDF

4. Research on Data Mining Detection Algorithms for Abnormal Data
Yanying Yang, Vol. 25, No. 1, 2023, pp. 32-36
Article Full Text PDF

5. An Approach for Security Assessment of the Internet of Things in Healthcare for the Disabled
Reem Almasoudi, Mohammad Arafah, Waleed Alghanem, and Saad Bakry , Vol. 25, No. 1, 2023, pp. 37-47
Article Full Text PDF

6. CSMTP: An RL-based Adversarial Examples Generation Method for Chinese Social Media Texts Classification Models
Xin Tong, Jingya Wang, Binjun Wang, Hanming Zhai, and Kaidi Zhang, Vol. 25, No. 1, 2023, pp. 48-60
Article Full Text PDF

7. Non-linear and Non-steady Time Series Forecasting Method Based on EMD and OSELM
Xuebin Xu, Meijuan An, Shuxin Cao, Longbin Lu, Liangxu Su, Tao Yang, and Jiaqi Luo, Vol. 25, No. 1, 2023, pp. 61-67
Article Full Text PDF

8. Privacy-preserving Electronic Medical Records Sharing Solution Based on Blockchain
Mingqiang Shao, Momeng Liu, and Zhenzhen Wang, Vol. 25, No. 1, 2023, pp. 68-75
Article Full Text PDF

9. Common Knowledge Based Secure Generation and Exchange of Symmetric Keys
Hexiong Chen, Jiaping Wu, Wei Guo, Feilu Hang, Zhenyu Luo, and Yilin Wang, Vol. 25, No. 1, 2023, pp. 76-88
Article Full Text PDF

10. Construction and Deployment of a Distributed Firewall-based Computer Security Defense Network
Chunjuan Wang, Vol. 25, No. 1, 2023, pp. 89-94
Article Full Text PDF

11. The Validation Code System of Websites Based on Multi-dimensional Chaotic Logistic Map
Dahua Song, Chang Liu, and Jiahui Liu, Vol. 25, No. 1, 2023, pp. 95-102
Article Full Text PDF

12. Secure Search over Encrypted Enterprise Data in the Cloud
Kaishi Wang and Jiaqi Guo, Vol. 25, No. 1, 2023, pp. 103-112
Article Full Text PDF

13. Element Extraction Method of Industrial Internet Security Situation Analysis Based on SDAE-IRF
Peng-Shou Xie, Ying-Wen Zhao, Shuai Wang, Wei Li, Wan-Jun Shao, and Tao Feng, Vol. 25, No. 1, 2023, pp. 113-121
Article Full Text PDF

14. Enhancing the Robustness of Deep Neural Networks by Meta-Adversarial Training
You-Kang Chang, Hong Zhao, and Wei-Jie Wang, Vol. 25, No. 1, 2023, pp. 122-130
Article Full Text PDF

15. A Hybrid-based Feature Selection Method for Intrusion Detection System
Xibin Sun, Heping Ye, and Xiaolin Liu, Vol. 25, No. 1, 2023, pp. 131-139
Article Full Text PDF

16. An Efficient Attribute Encryption Scheme with Privacy-Preserving Policy in Smart Grid
Jing Cheng and Mi Wen, Vol. 25, No. 1, 2023, pp. 140-150
Article Full Text PDF

17. Bilinear Mapping and Blockchain-based Privacy-Preserving and Data Sharing Scheme for Smart Grid
Xiaoxu Zhang, Vol. 25, No. 1, 2023, pp. 151-160
Article Full Text PDF

18. Deep Security Detection Framework Based on ATT&CK
Rixuan Qiu, Yu Fu, Jian Le, Fuyong Zheng, Gan Qi, Chao Peng, Yi Zhang, Yuancheng Li, and Yan Liu, Vol. 25, No. 1, 2023, pp. 161-170
Article Full Text PDF

19. Emergent Cybersecurity Information Discovery in Support of Cyber Threat Prevention
Chia-Mei Chen, Jin-Jie Fang, Zheng-Xun Cai, Boyi Lee, and Dan-Wei Wen, Vol. 25, No. 1, 2023, pp. 171-174
Article Full Text PDF

20. An Efficient USM Weak Sharpening Detection Method for Small Size Image Forensics
Jie Zhao, Shuang Song, and Bin Wu, Vol. 25, No. 1, 2023, pp. 175-183
Article Full Text PDF