International Journal of Network Security | ||
1. | Security Situation Assessment Method of Industrial Control System Network Based on Sine-SSA-BP
|
|
Peng-Shou Xie, Hong Wang, Jia-Lu Wang, Xiao-Ye Li, Yin-Chang Pan, and Tao Feng, Vol. 25, No. 4, 2023, pp. 553-562 Article Full Text PDF |
||
2. | LWE-based Key Encapsulation Mechanism in the Multi-User Setting
|
|
Shanshan Zhang, Yupu Hu, and Momeng Liu, Vol. 25, No. 4, 2023, pp. 563-570 Article Full Text PDF |
||
3. | Vulnerability Identification and Detection of Different Software Codes with a Graph Neural Network
|
|
Lei Zhang and Zehui Liu, Vol. 25, No. 4, 2023, pp. 571-575 Article Full Text PDF |
||
4. | Adaptive Salp Swarm Algorithm Based on Lens Imaging and Gaussian Mutation Learning Strategies
|
|
Junfu Xi, Yehua Chen, Xiaoji Chen, and Jun Li, Vol. 25, No. 4, 2023, pp. 576-586 Article Full Text PDF |
||
5. | A Defense Method Based on Moving Target Defense for New Power System APT Attack
|
|
Ruotong Li and Yuancheng Li, Vol. 25, No. 4, 2023, pp. 587-594 Article Full Text PDF |
||
6. | A More Secure and Revocable Anonymous Authentication Scheme for IoT
|
|
Mana Mao, Jiujiu Yu, and Yimin Wang, Vol. 25, No. 4, 2023, pp. 595-602 Article Full Text PDF |
||
7. | Study on Encryption Protection of User Privacy Data in the Logistics Industry from a Legal Perspective
|
|
Can Wei, Vol. 25, No. 4, 2023, pp. 603-608 Article Full Text PDF |
||
8. | Public Data Integrity Auditing Scheme Based on Fuzzy Identity for Cloud Storage System
|
|
Yilin Yuan, Yifan Gu, and Zhenzhen Zhang, Vol. 25, No. 4, 2023, pp. 609-619 Article Full Text PDF |
||
9. | On the Stability of Linear Complexity of 2p^2-periodic q-ary Sequences
|
|
Ruoqi Song, Zhihua Niu, Chenhuang Wu, and Meixiang Chen, Vol. 25, No. 4, 2023, pp. 620-629 Article Full Text PDF |
||
10. | A Real Time Food Auto Traceable Authentication System
|
|
Chia-Chun Wu, Chung-Huei Ling, Shyh-Chang Tsaur, and Min-Shiang Hwang, Vol. 25, No. 4, 2023, pp. 630-639 Article Full Text PDF |
||
11. | A Non-injected Traffic Backdoor Attack on Deep Neural Network
|
|
Jiahui Wang, Jie Yang, Binhao Ma, Dejun Wang, and Bo Meng, Vol. 25, No. 4, 2023, pp. 640-648 Article Full Text PDF |
||
12. | A Lightweight and Flexible Privacy-preserving Electricity Theft Detection Scheme
|
|
Zining Zheng, Siliang Dong, and Yining Liu, Vol. 25, No. 4, 2023, pp. 649-658 Article Full Text PDF |
||
13. | Geospacial Analysis on DNS Servers for Furher Classification of Indicator of Compromise
|
|
Ruo Ando and Hiroshi Itoh, Vol. 25, No. 4, 2023, pp. 659-665 Article Full Text PDF |
||
14. | RBAC-based Delegation Authorization with Trust Computing and Collaborative Security Strategy
|
|
Wei Sun, Vol. 25, No. 4, 2023, pp. 666-679 Article Full Text PDF |
||
15. | Privacy Protection Data Aggregation Scheme Based on Horner Rule and Lightweight Convolutional Neural for Intelligent Education
|
|
Jian Zhang, Vol. 25, No. 4, 2023, pp. 680-687 Article Full Text PDF |
||
16. | Research on Anti-leakage Construction Data Encryption Algorithm Based on Generative Adversarial Networks and Symmetric Encryption
|
|
Yuping Peng, Mingju Zhao, Vol. 25, No. 4, 2023, pp. 688-696 Article Full Text PDF |
||
17. | Swarm Model-based Computing Network for Economic Big Data Privacy Protection
|
|
Limin Chen, Vol. 25, No. 4, 2023, pp. 697-705 Article Full Text PDF |
||
18. | An Efficient Homomorphic Deep Neural Network for Big Data Encryption Transmission Model in Internet of Vehicles
|
|
Junting Zhang, Vol. 25, No. 4, 2023, pp. 706-712 Article Full Text PDF |
||
19. | A Novel Differential Privacy Protection Model Based on Spectral Clustering Algorithm
|
|
Yudi Zhang, Vol. 25, No. 4, 2023, pp. 713-720 Article Full Text PDF |
||
20. | FLADA: Federated Learning-based Association Domain Adaptive Scheme for English Data Privacy Protection
|
|
Xiaobin Guo, Vol. 25, No. 4, 2023, pp. 721-728 Article Full Text PDF |
||