International Journal of Network Security | ||
1. | Fast Face Presentation Attack Detection in Thermal Infrared Images Based on Morphological Filtering
|
|
Tai-Hung Lai, Ching-Yu Peng, and Chao-Lung Chou, Vol. 25, No. 2, 2023, pp. 185-193 Article Full Text PDF |
||
2. | Chaotic Maps-based Privacy-Preserved Three-Factor Authentication Scheme for Telemedicine Systems
|
|
Tzu-Wei Lin and Chien-Lung Hsu, Vol. 25, No. 2, 2023, pp. 194-200 Article Full Text PDF |
||
3. | Overlapping Difference Expansion Reversible Data Hiding
|
|
Chin-Feng Lee, Jau-Ji Shen, and Chin-Yung Wu, Vol. 25, No. 2, 2023, pp. 201-211 Article Full Text PDF |
||
4. | Ransomware Detection and Prevention through Strategically Hidden Decoy File
|
|
Yung-She Lin and Chin-Feng Lee, Vol. 25, No. 2, 2023, pp. 212-220 Article Full Text PDF |
||
5. | High Embedding Capacity Data Hiding Technique Based on Hybrid AMBTC and LSB Substitutions
|
|
Pei-Chun Lai, Jai-Ji Shen, Yung-Chen Chou, Vol. 25, No. 2, 2023, pp. 221-234 Article Full Text PDF |
||
6. | Industrial Internet Security Situation Prediction Based on NDPSO-IAFSA-LSTM
|
|
Peng-Shou Xie, Zong-Liang Wang, Nan-Nan Li, Peng-Yun Zhang, Jia-Feng Zhu, and Tao Feng, Vol. 25, No. 2, 2023, pp. 235-244 Article Full Text PDF |
||
7. | Research on the Application of the Machine Learning Algorithm Based on Parameter Optimization in Network Security Situation Prediction
|
|
Xiaoyan Wang and Jiangli Wang, Vol. 25, No. 2, 2023, pp. 245-251 Article Full Text PDF |
||
8. | An Image Tamper-proof Encryption Scheme Based on Blockchain and Lorenz Hyperchaotic S-box
|
|
Qiu-Yu Zhang, Tian Li, and Guo-Rui Wu, Vol. 25, No. 2, 2023, pp. 252-266 Article Full Text PDF |
||
9. | IoT Malware Threat Hunting Method Based on Improved Transformer
|
|
Yaping Li and Yuancheng Li, Vol. 25, No. 2, 2023, pp. 267-276 Article Full Text PDF |
||
10. | Intelligent Algorithms for Identification and Defense of Telecommunication Network Fraudulent Call Information under Legal System
|
|
Jianbing Yan, Vol. 25, No. 2, 2023, pp. 277-284 Article Full Text PDF |
||
11. | Security Analysis and Improvement of an Access Control Protocol for WBANs
|
|
Parvin Rastegari, Mojtaba Khalili, Ali Sakhaei, Vol. 25, No. 2, 2023, pp. 285-296 Article Full Text PDF |
||
12. | An Abnormal Login Detection Method Based on Local Outlier Factor and Gaussian Mixture Model
|
|
Wei Guo, Yue He, He-Xiong Chen, Fei-Lu Hang, and Yun-Jie Li, Vol. 25, No. 2, 2023, pp. 297-305 Article Full Text PDF |
||
13. | Enhancing Transferability of Adversarial Examples by Successively Attacking Multiple Models
|
|
Xiaolin Zhang, Wenwen Zhang, Lixin Liu, Yongping Wang, Lu Gao, and Shuai Zhang, Vol. 25, No. 2, 2023, pp. 306-316 Article Full Text PDF |
||
14. | TTP-free Ownership Transfer Protocol Based on R_LWE Cryptosystem
|
|
Hong-Wei Qiu and Dao-Wei Liu, Vol. 25, No. 2, 2023, pp. 317-323 Article Full Text PDF |
||
15. | An Efficient Heterogeneous Multi-message and Multi-receiver Signcryption IBC-CLC Scheme for Industrial Internet of Things
|
|
Pengshou Xie, Nannan Li, Zongliang Wang, Jiafeng Zhu, Pengyun Zhang, and Pengyun Zhang, Vol. 25, No. 2, 2023, pp. 324-331 Article Full Text PDF |
||
16. | An Improvement of Babai's Rounding Procedure for CVP
|
|
Shuying Yang, Vol. 25, No. 2, 2023, pp. 332-341 Article Full Text PDF |
||
17. | Multi-level Program Analysis Method Based on Petri Net System
|
|
Huaxu Li, Weidong Tang, and Meiling Liu, Vol. 25, No. 2, 2023, pp. 342-350 Article Full Text PDF |
||
18. | An Illegal Image Classification System Based on Deep Residual Network and Convolutional Block Attention Module
|
|
Zengyu Cai, Xinhua Hu, Zhi Geng, Jianwei Zhang, and Yuan Feng, Vol. 25, No. 2, 2023, pp. 351-359 Article Full Text PDF |
||
19. | Detecting DDoS Attacks in SDN Using Deep Learning Techniques: A Survey
|
|
Ntumpha Patrick Mwanza and Jugal Kalita, Vol. 25, No. 2, 2023, pp. 360-376 Article Full Text PDF |
||
20. | Research on Privacy and Security of Federated Learning in Intelligent Plant Factory Systems
|
|
Wen-Pin Hu, Chin-Bin Lin, Jing-Ting Wu, Cheng-Ying Yang, and Min-Shiang Hwang, Vol. 25, No. 2, 2023, pp. 377-384 Article Full Text PDF |
||