| International Journal of Network Security | ||
| 1. | Security Situation Assessment Method of Industrial Control System Network Based on Sine-SSA-BP
|
|
| Peng-Shou Xie, Hong Wang, Jia-Lu Wang, Xiao-Ye Li, Yin-Chang Pan, and Tao Feng, Vol. 25, No. 4, 2023, pp. 553-562 Article Full Text PDF |
||
| 2. | LWE-based Key Encapsulation Mechanism in the Multi-User Setting
|
|
| Shanshan Zhang, Yupu Hu, and Momeng Liu, Vol. 25, No. 4, 2023, pp. 563-570 Article Full Text PDF |
||
| 3. | Vulnerability Identification and Detection of Different Software Codes with a Graph Neural Network
|
|
| Lei Zhang and Zehui Liu, Vol. 25, No. 4, 2023, pp. 571-575 Article Full Text PDF |
||
| 4. | Adaptive Salp Swarm Algorithm Based on Lens Imaging and Gaussian Mutation Learning Strategies
|
|
| Junfu Xi, Yehua Chen, Xiaoji Chen, and Jun Li, Vol. 25, No. 4, 2023, pp. 576-586 Article Full Text PDF |
||
| 5. | A Defense Method Based on Moving Target Defense for New Power System APT Attack
|
|
| Ruotong Li and Yuancheng Li, Vol. 25, No. 4, 2023, pp. 587-594 Article Full Text PDF |
||
| 6. | A More Secure and Revocable Anonymous Authentication Scheme for IoT
|
|
| Mana Mao, Jiujiu Yu, and Yimin Wang, Vol. 25, No. 4, 2023, pp. 595-602 Article Full Text PDF |
||
| 7. | Study on Encryption Protection of User Privacy Data in the Logistics Industry from a Legal Perspective
|
|
| Can Wei, Vol. 25, No. 4, 2023, pp. 603-608 Article Full Text PDF |
||
| 8. | Public Data Integrity Auditing Scheme Based on Fuzzy Identity for Cloud Storage System
|
|
| Yilin Yuan, Yifan Gu, and Zhenzhen Zhang, Vol. 25, No. 4, 2023, pp. 609-619 Article Full Text PDF |
||
| 9. | On the Stability of Linear Complexity of 2p^2-periodic q-ary Sequences
|
|
| Ruoqi Song, Zhihua Niu, Chenhuang Wu, and Meixiang Chen, Vol. 25, No. 4, 2023, pp. 620-629 Article Full Text PDF |
||
| 10. | A Real Time Food Auto Traceable Authentication System
|
|
| Chia-Chun Wu, Chung-Huei Ling, Shyh-Chang Tsaur, and Min-Shiang Hwang, Vol. 25, No. 4, 2023, pp. 630-639 Article Full Text PDF |
||
| 11. | A Non-injected Traffic Backdoor Attack on Deep Neural Network
|
|
| Jiahui Wang, Jie Yang, Binhao Ma, Dejun Wang, and Bo Meng, Vol. 25, No. 4, 2023, pp. 640-648 Article Full Text PDF |
||
| 12. | A Lightweight and Flexible Privacy-preserving Electricity Theft Detection Scheme
|
|
| Zining Zheng, Siliang Dong, and Yining Liu, Vol. 25, No. 4, 2023, pp. 649-658 Article Full Text PDF |
||
| 13. | Geospacial Analysis on DNS Servers for Furher Classification of Indicator of Compromise
|
|
| Ruo Ando and Hiroshi Itoh, Vol. 25, No. 4, 2023, pp. 659-665 Article Full Text PDF |
||
| 14. | RBAC-based Delegation Authorization with Trust Computing and Collaborative Security Strategy
|
|
| Wei Sun, Vol. 25, No. 4, 2023, pp. 666-679 Article Full Text PDF |
||
| 15. | Privacy Protection Data Aggregation Scheme Based on Horner Rule and Lightweight Convolutional Neural for Intelligent Education
|
|
| Jian Zhang, Vol. 25, No. 4, 2023, pp. 680-687 Article Full Text PDF |
||
| 16. | Research on Anti-leakage Construction Data Encryption Algorithm Based on Generative Adversarial Networks and Symmetric Encryption
|
|
| Yuping Peng, Mingju Zhao, Vol. 25, No. 4, 2023, pp. 688-696 Article Full Text PDF |
||
| 17. | Swarm Model-based Computing Network for Economic Big Data Privacy Protection
|
|
| Limin Chen, Vol. 25, No. 4, 2023, pp. 697-705 Article Full Text PDF |
||
| 18. | An Efficient Homomorphic Deep Neural Network for Big Data Encryption Transmission Model in Internet of Vehicles
|
|
| Junting Zhang, Vol. 25, No. 4, 2023, pp. 706-712 Article Full Text PDF |
||
| 19. | A Novel Differential Privacy Protection Model Based on Spectral Clustering Algorithm
|
|
| Yudi Zhang, Vol. 25, No. 4, 2023, pp. 713-720 Article Full Text PDF |
||
| 20. | FLADA: Federated Learning-based Association Domain Adaptive Scheme for English Data Privacy Protection
|
|
| Xiaobin Guo, Vol. 25, No. 4, 2023, pp. 721-728 Article Full Text PDF |
||