Quick Search:

Volume: 25, No: 2 (March 1, 2023)

International Journal of Network Security

1. Fast Face Presentation Attack Detection in Thermal Infrared Images Based on Morphological Filtering
Tai-Hung Lai, Ching-Yu Peng, and Chao-Lung Chou, Vol. 25, No. 2, 2023, pp. 185-193
Article Full Text PDF

2. Chaotic Maps-based Privacy-Preserved Three-Factor Authentication Scheme for Telemedicine Systems
Tzu-Wei Lin and Chien-Lung Hsu, Vol. 25, No. 2, 2023, pp. 194-200
Article Full Text PDF

3. Overlapping Difference Expansion Reversible Data Hiding
Chin-Feng Lee, Jau-Ji Shen, and Chin-Yung Wu, Vol. 25, No. 2, 2023, pp. 201-211
Article Full Text PDF

4. Ransomware Detection and Prevention through Strategically Hidden Decoy File
Yung-She Lin and Chin-Feng Lee, Vol. 25, No. 2, 2023, pp. 212-220
Article Full Text PDF

5. High Embedding Capacity Data Hiding Technique Based on Hybrid AMBTC and LSB Substitutions
Pei-Chun Lai, Jai-Ji Shen, Yung-Chen Chou, Vol. 25, No. 2, 2023, pp. 221-234
Article Full Text PDF

6. Industrial Internet Security Situation Prediction Based on NDPSO-IAFSA-LSTM
Peng-Shou Xie, Zong-Liang Wang, Nan-Nan Li, Peng-Yun Zhang, Jia-Feng Zhu, and Tao Feng, Vol. 25, No. 2, 2023, pp. 235-244
Article Full Text PDF

7. Research on the Application of the Machine Learning Algorithm Based on Parameter Optimization in Network Security Situation Prediction
Xiaoyan Wang and Jiangli Wang, Vol. 25, No. 2, 2023, pp. 245-251
Article Full Text PDF

8. An Image Tamper-proof Encryption Scheme Based on Blockchain and Lorenz Hyperchaotic S-box
Qiu-Yu Zhang, Tian Li, and Guo-Rui Wu, Vol. 25, No. 2, 2023, pp. 252-266
Article Full Text PDF

9. IoT Malware Threat Hunting Method Based on Improved Transformer
Yaping Li and Yuancheng Li, Vol. 25, No. 2, 2023, pp. 267-276
Article Full Text PDF

10. Intelligent Algorithms for Identification and Defense of Telecommunication Network Fraudulent Call Information under Legal System
Jianbing Yan, Vol. 25, No. 2, 2023, pp. 277-284
Article Full Text PDF

11. Security Analysis and Improvement of an Access Control Protocol for WBANs
Parvin Rastegari, Mojtaba Khalili, Ali Sakhaei, Vol. 25, No. 2, 2023, pp. 285-296
Article Full Text PDF

12. An Abnormal Login Detection Method Based on Local Outlier Factor and Gaussian Mixture Model
Wei Guo, Yue He, He-Xiong Chen, Fei-Lu Hang, and Yun-Jie Li, Vol. 25, No. 2, 2023, pp. 297-305
Article Full Text PDF

13. Enhancing Transferability of Adversarial Examples by Successively Attacking Multiple Models
Xiaolin Zhang, Wenwen Zhang, Lixin Liu, Yongping Wang, Lu Gao, and Shuai Zhang, Vol. 25, No. 2, 2023, pp. 306-316
Article Full Text PDF

14. TTP-free Ownership Transfer Protocol Based on R_LWE Cryptosystem
Hong-Wei Qiu and Dao-Wei Liu, Vol. 25, No. 2, 2023, pp. 317-323
Article Full Text PDF

15. An Efficient Heterogeneous Multi-message and Multi-receiver Signcryption IBC-CLC Scheme for Industrial Internet of Things
Pengshou Xie, Nannan Li, Zongliang Wang, Jiafeng Zhu, Pengyun Zhang, and Pengyun Zhang, Vol. 25, No. 2, 2023, pp. 324-331
Article Full Text PDF

16. An Improvement of Babai's Rounding Procedure for CVP
Shuying Yang, Vol. 25, No. 2, 2023, pp. 332-341
Article Full Text PDF

17. Multi-level Program Analysis Method Based on Petri Net System
Huaxu Li, Weidong Tang, and Meiling Liu, Vol. 25, No. 2, 2023, pp. 342-350
Article Full Text PDF

18. An Illegal Image Classification System Based on Deep Residual Network and Convolutional Block Attention Module
Zengyu Cai, Xinhua Hu, Zhi Geng, Jianwei Zhang, and Yuan Feng, Vol. 25, No. 2, 2023, pp. 351-359
Article Full Text PDF

19. Detecting DDoS Attacks in SDN Using Deep Learning Techniques: A Survey
Ntumpha Patrick Mwanza and Jugal Kalita, Vol. 25, No. 2, 2023, pp. 360-376
Article Full Text PDF

20. Research on Privacy and Security of Federated Learning in Intelligent Plant Factory Systems
Wen-Pin Hu, Chin-Bin Lin, Jing-Ting Wu, Cheng-Ying Yang, and Min-Shiang Hwang, Vol. 25, No. 2, 2023, pp. 377-384
Article Full Text PDF