| International Journal of Network Security | ||
| 1. | Industrial Internet Vulnerability Detection Method Based on CBAM-CNN-SVM
|
|
| Peng-Shou Xie, Jia-Lu Wang, Hong Wang, Yin-Chang Pan, Xiao-Ye Li, and Tao Feng, Vol. 25, No. 3, 2023, pp. 385-393 Article Full Text PDF |
||
| 2. | High Quality Image Steganography Model Based on Encoder-Decoder Networks and 2D Logistic Chaotic Encryption
|
|
| Qiu-Yu Zhang, Xue-Wen Hu, and Zhen Wang, Vol. 25, No. 3, 2023, pp. 394-408 Article Full Text PDF |
||
| 3. | A Deep Learning Algorithm for Detecting Bot Infections in Host Networks
|
|
| Tianru Hu, Xiuli Lu, and Hongyan Zuo, Vol. 25, No. 3, 2023, pp. 409-413 Article Full Text PDF |
||
| 4. | WordDeceiver: Black Box Attack on Chinese Text Classification
|
|
| Yan Gong, Xiao-Lin Zhang, Yong-Ping Wang, Li-Xin Liu, and En-Hui Xu, Vol. 25, No. 3, 2023, pp. 414-424 Article Full Text PDF |
||
| 5. | Secure Multiparty Multisets Computation
|
|
| Jiahao Pan and Jiawei Dou, Vol. 25, No. 3, 2023, pp. 425-430 Article Full Text PDF |
||
| 6. | Data Mining-Based Malicious Traffic Classification Algorithm for Campus Networks
|
|
| Ziai Wu, Vol. 25, No. 3, 2023, pp. 431-435 Article Full Text PDF |
||
| 7. | Mining Method of Code Vulnerability of Multi-Source Power IoT Terminal Based on Reinforcement Learning
|
|
| Hao Yang, Junfeng Zhang, Jun Li, and Xin Xie, Vol. 25, No. 3, 2023, pp. 436-448 Article Full Text PDF |
||
| 8. | Research on Secure Storage of Electronic Data Through Blockchain Technology
|
|
| Geng Niu, Vol. 25, No. 3, 2023, pp. 449-455 Article Full Text PDF |
||
| 9. | Design and Analysis of Hash Function Based on Spark and Chaos System
|
|
| Jiandong Liu, Yujie Liu, and Bo Li, Vol. 25, No. 3, 2023, pp. 456-467 Article Full Text PDF |
||
| 10. | Privacy-preserving Broadcast Protocol in Vehicular Ad Hoc Networks
|
|
| Guang Yang, Leyou Zhang, and Ruonan Ma, Vol. 25, No. 3, 2023, pp. 468-476 Article Full Text PDF |
||
| 11. | A Study on Privacy Protection under Blockchain Data Transaction Based on Legal Perspective
|
|
| Yajie Zhang, Vol. 25, No. 3, 2023, pp. 477-482 Article Full Text PDF |
||
| 12. | Sparrow Search Algorithm Based on Adaptive Weighting and Fusion of Inverse and Local Learning
|
|
| Yehua Chen, Junfu Xi, Xia Liu, and Huan Gao, Vol. 25, No. 3, 2023, pp. 483-494 Article Full Text PDF |
||
| 13. | New Post-quantum Blockchain Privacy Protection Scheme Based on the Signcryption
|
|
| Wang-Ke Yu and Xi-En Cheng, Vol. 25, No. 3, 2023, pp. 495-501 Article Full Text PDF |
||
| 14. | Study on Protection of Genuine Digital Music Works by a Watermarking Algorithm
|
|
| Juan Gao and Baike Zuo, Vol. 25, No. 3, 2023, pp. 502-507 Article Full Text PDF |
||
| 15. | An Improved of Enhancements of a User Authentication Scheme
|
|
| Min-Shiang Hwang, Hou-Wen Li, and Cheng-Ying Yang, Vol. 25, No. 3, 2023, pp. 508-514 Article Full Text PDF |
||
| 16. | Image Encryption Based on Hyperchaotic Systems And DNA Encoding
|
|
| Lei Wang, Vol. 25, No. 3, 2023, pp. 515-521 Article Full Text PDF |
||
| 17. | HWKA: A Novel Homomorphic Encryption and k-center Algorithm for Secure Storage of English Data
|
|
| Haiying Liu, Vol. 25, No. 3, 2023, pp. 522-528 Article Full Text PDF |
||
| 18. | Tackling Pakistan's Cyber Security Challenges: A Comprehensive Approach
|
|
| Muhammad Ibrar, Hang Li, Jiachi Wang, and Shahid Karim, Vol. 25, No. 3, 2023, pp. 529-536 Article Full Text PDF |
||
| 19. | Research on Local Differential Privacy Protection of High Dimensional Data in Embedded System Based on Hybrid Differential Swarm Algorithm
|
|
| Shiru Sun, Bin Wang, and Hongwei Zhang, Vol. 25, No. 3, 2023, pp. 537-544 Article Full Text PDF |
||
| 20. | Data Security Analysis Based on ReXNet Network With Rule-based Reasoning for Intelligent Cooperative Robot Design
|
|
| Yu Jiang, Vol. 25, No. 3, 2023, pp. 545-551 Article Full Text PDF |
||