International Journal of Network Security | ||
1. | Industrial Internet Vulnerability Detection Method Based on CBAM-CNN-SVM
|
|
Peng-Shou Xie, Jia-Lu Wang, Hong Wang, Yin-Chang Pan, Xiao-Ye Li, and Tao Feng, Vol. 25, No. 3, 2023, pp. 385-393 Article Full Text PDF |
||
2. | High Quality Image Steganography Model Based on Encoder-Decoder Networks and 2D Logistic Chaotic Encryption
|
|
Qiu-Yu Zhang, Xue-Wen Hu, and Zhen Wang, Vol. 25, No. 3, 2023, pp. 394-408 Article Full Text PDF |
||
3. | A Deep Learning Algorithm for Detecting Bot Infections in Host Networks
|
|
Tianru Hu, Xiuli Lu, and Hongyan Zuo, Vol. 25, No. 3, 2023, pp. 409-413 Article Full Text PDF |
||
4. | WordDeceiver: Black Box Attack on Chinese Text Classification
|
|
Yan Gong, Xiao-Lin Zhang, Yong-Ping Wang, Li-Xin Liu, and En-Hui Xu, Vol. 25, No. 3, 2023, pp. 414-424 Article Full Text PDF |
||
5. | Secure Multiparty Multisets Computation
|
|
Jiahao Pan and Jiawei Dou, Vol. 25, No. 3, 2023, pp. 425-430 Article Full Text PDF |
||
6. | Data Mining-Based Malicious Traffic Classification Algorithm for Campus Networks
|
|
Ziai Wu, Vol. 25, No. 3, 2023, pp. 431-435 Article Full Text PDF |
||
7. | Mining Method of Code Vulnerability of Multi-Source Power IoT Terminal Based on Reinforcement Learning
|
|
Hao Yang, Junfeng Zhang, Jun Li, and Xin Xie, Vol. 25, No. 3, 2023, pp. 436-448 Article Full Text PDF |
||
8. | Research on Secure Storage of Electronic Data Through Blockchain Technology
|
|
Geng Niu, Vol. 25, No. 3, 2023, pp. 449-455 Article Full Text PDF |
||
9. | Design and Analysis of Hash Function Based on Spark and Chaos System
|
|
Jiandong Liu, Yujie Liu, and Bo Li, Vol. 25, No. 3, 2023, pp. 456-467 Article Full Text PDF |
||
10. | Privacy-preserving Broadcast Protocol in Vehicular Ad Hoc Networks
|
|
Guang Yang, Leyou Zhang, and Ruonan Ma, Vol. 25, No. 3, 2023, pp. 468-476 Article Full Text PDF |
||
11. | A Study on Privacy Protection under Blockchain Data Transaction Based on Legal Perspective
|
|
Yajie Zhang, Vol. 25, No. 3, 2023, pp. 477-482 Article Full Text PDF |
||
12. | Sparrow Search Algorithm Based on Adaptive Weighting and Fusion of Inverse and Local Learning
|
|
Yehua Chen, Junfu Xi, Xia Liu, and Huan Gao, Vol. 25, No. 3, 2023, pp. 483-494 Article Full Text PDF |
||
13. | New Post-quantum Blockchain Privacy Protection Scheme Based on the Signcryption
|
|
Wang-Ke Yu and Xi-En Cheng, Vol. 25, No. 3, 2023, pp. 495-501 Article Full Text PDF |
||
14. | Study on Protection of Genuine Digital Music Works by a Watermarking Algorithm
|
|
Juan Gao and Baike Zuo, Vol. 25, No. 3, 2023, pp. 502-507 Article Full Text PDF |
||
15. | An Improved of Enhancements of a User Authentication Scheme
|
|
Min-Shiang Hwang, Hou-Wen Li, and Cheng-Ying Yang, Vol. 25, No. 3, 2023, pp. 508-514 Article Full Text PDF |
||
16. | Image Encryption Based on Hyperchaotic Systems And DNA Encoding
|
|
Lei Wang, Vol. 25, No. 3, 2023, pp. 515-521 Article Full Text PDF |
||
17. | HWKA: A Novel Homomorphic Encryption and k-center Algorithm for Secure Storage of English Data
|
|
Haiying Liu, Vol. 25, No. 3, 2023, pp. 522-528 Article Full Text PDF |
||
18. | Tackling Pakistan's Cyber Security Challenges: A Comprehensive Approach
|
|
Muhammad Ibrar, Hang Li, Jiachi Wang, and Shahid Karim, Vol. 25, No. 3, 2023, pp. 529-536 Article Full Text PDF |
||
19. | Research on Local Differential Privacy Protection of High Dimensional Data in Embedded System Based on Hybrid Differential Swarm Algorithm
|
|
Shiru Sun, Bin Wang, and Hongwei Zhang, Vol. 25, No. 3, 2023, pp. 537-544 Article Full Text PDF |
||
20. | Data Security Analysis Based on ReXNet Network With Rule-based Reasoning for Intelligent Cooperative Robot Design
|
|
Yu Jiang, Vol. 25, No. 3, 2023, pp. 545-551 Article Full Text PDF |
||