Quick Search:

Volume: 25, No: 3 (May 1, 2023)

International Journal of Network Security

1. Industrial Internet Vulnerability Detection Method Based on CBAM-CNN-SVM
Peng-Shou Xie, Jia-Lu Wang, Hong Wang, Yin-Chang Pan, Xiao-Ye Li, and Tao Feng, Vol. 25, No. 3, 2023, pp. 385-393
Article Full Text PDF

2. High Quality Image Steganography Model Based on Encoder-Decoder Networks and 2D Logistic Chaotic Encryption
Qiu-Yu Zhang, Xue-Wen Hu, and Zhen Wang, Vol. 25, No. 3, 2023, pp. 394-408
Article Full Text PDF

3. A Deep Learning Algorithm for Detecting Bot Infections in Host Networks
Tianru Hu, Xiuli Lu, and Hongyan Zuo, Vol. 25, No. 3, 2023, pp. 409-413
Article Full Text PDF

4. WordDeceiver: Black Box Attack on Chinese Text Classification
Yan Gong, Xiao-Lin Zhang, Yong-Ping Wang, Li-Xin Liu, and En-Hui Xu, Vol. 25, No. 3, 2023, pp. 414-424
Article Full Text PDF

5. Secure Multiparty Multisets Computation
Jiahao Pan and Jiawei Dou, Vol. 25, No. 3, 2023, pp. 425-430
Article Full Text PDF

6. Data Mining-Based Malicious Traffic Classification Algorithm for Campus Networks
Ziai Wu, Vol. 25, No. 3, 2023, pp. 431-435
Article Full Text PDF

7. Mining Method of Code Vulnerability of Multi-Source Power IoT Terminal Based on Reinforcement Learning
Hao Yang, Junfeng Zhang, Jun Li, and Xin Xie, Vol. 25, No. 3, 2023, pp. 436-448
Article Full Text PDF

8. Research on Secure Storage of Electronic Data Through Blockchain Technology
Geng Niu, Vol. 25, No. 3, 2023, pp. 449-455
Article Full Text PDF

9. Design and Analysis of Hash Function Based on Spark and Chaos System
Jiandong Liu, Yujie Liu, and Bo Li, Vol. 25, No. 3, 2023, pp. 456-467
Article Full Text PDF

10. Privacy-preserving Broadcast Protocol in Vehicular Ad Hoc Networks
Guang Yang, Leyou Zhang, and Ruonan Ma, Vol. 25, No. 3, 2023, pp. 468-476
Article Full Text PDF

11. A Study on Privacy Protection under Blockchain Data Transaction Based on Legal Perspective
Yajie Zhang, Vol. 25, No. 3, 2023, pp. 477-482
Article Full Text PDF

12. Sparrow Search Algorithm Based on Adaptive Weighting and Fusion of Inverse and Local Learning
Yehua Chen, Junfu Xi, Xia Liu, and Huan Gao, Vol. 25, No. 3, 2023, pp. 483-494
Article Full Text PDF

13. New Post-quantum Blockchain Privacy Protection Scheme Based on the Signcryption
Wang-Ke Yu and Xi-En Cheng, Vol. 25, No. 3, 2023, pp. 495-501
Article Full Text PDF

14. Study on Protection of Genuine Digital Music Works by a Watermarking Algorithm
Juan Gao and Baike Zuo, Vol. 25, No. 3, 2023, pp. 502-507
Article Full Text PDF

15. An Improved of Enhancements of a User Authentication Scheme
Min-Shiang Hwang, Hou-Wen Li, and Cheng-Ying Yang, Vol. 25, No. 3, 2023, pp. 508-514
Article Full Text PDF

16. Image Encryption Based on Hyperchaotic Systems And DNA Encoding
Lei Wang, Vol. 25, No. 3, 2023, pp. 515-521
Article Full Text PDF

17. HWKA: A Novel Homomorphic Encryption and k-center Algorithm for Secure Storage of English Data
Haiying Liu, Vol. 25, No. 3, 2023, pp. 522-528
Article Full Text PDF

18. Tackling Pakistan's Cyber Security Challenges: A Comprehensive Approach
Muhammad Ibrar, Hang Li, Jiachi Wang, and Shahid Karim, Vol. 25, No. 3, 2023, pp. 529-536
Article Full Text PDF

19. Research on Local Differential Privacy Protection of High Dimensional Data in Embedded System Based on Hybrid Differential Swarm Algorithm
Shiru Sun, Bin Wang, and Hongwei Zhang, Vol. 25, No. 3, 2023, pp. 537-544
Article Full Text PDF

20. Data Security Analysis Based on ReXNet Network With Rule-based Reasoning for Intelligent Cooperative Robot Design
Yu Jiang, Vol. 25, No. 3, 2023, pp. 545-551
Article Full Text PDF