Quick Search:

Volume: 25, No: 4 (July 1, 2023)

International Journal of Network Security

1. Security Situation Assessment Method of Industrial Control System Network Based on Sine-SSA-BP
Peng-Shou Xie, Hong Wang, Jia-Lu Wang, Xiao-Ye Li, Yin-Chang Pan, and Tao Feng, Vol. 25, No. 4, 2023, pp. 553-562
Article Full Text PDF

2. LWE-based Key Encapsulation Mechanism in the Multi-User Setting
Shanshan Zhang, Yupu Hu, and Momeng Liu, Vol. 25, No. 4, 2023, pp. 563-570
Article Full Text PDF

3. Vulnerability Identification and Detection of Different Software Codes with a Graph Neural Network
Lei Zhang and Zehui Liu, Vol. 25, No. 4, 2023, pp. 571-575
Article Full Text PDF

4. Adaptive Salp Swarm Algorithm Based on Lens Imaging and Gaussian Mutation Learning Strategies
Junfu Xi, Yehua Chen, Xiaoji Chen, and Jun Li, Vol. 25, No. 4, 2023, pp. 576-586
Article Full Text PDF

5. A Defense Method Based on Moving Target Defense for New Power System APT Attack
Ruotong Li and Yuancheng Li, Vol. 25, No. 4, 2023, pp. 587-594
Article Full Text PDF

6. A More Secure and Revocable Anonymous Authentication Scheme for IoT
Mana Mao, Jiujiu Yu, and Yimin Wang, Vol. 25, No. 4, 2023, pp. 595-602
Article Full Text PDF

7. Study on Encryption Protection of User Privacy Data in the Logistics Industry from a Legal Perspective
Can Wei, Vol. 25, No. 4, 2023, pp. 603-608
Article Full Text PDF

8. Public Data Integrity Auditing Scheme Based on Fuzzy Identity for Cloud Storage System
Yilin Yuan, Yifan Gu, and Zhenzhen Zhang, Vol. 25, No. 4, 2023, pp. 609-619
Article Full Text PDF

9. On the Stability of Linear Complexity of 2p^2-periodic q-ary Sequences
Ruoqi Song, Zhihua Niu, Chenhuang Wu, and Meixiang Chen, Vol. 25, No. 4, 2023, pp. 620-629
Article Full Text PDF

10. A Real Time Food Auto Traceable Authentication System
Chia-Chun Wu, Chung-Huei Ling, Shyh-Chang Tsaur, and Min-Shiang Hwang, Vol. 25, No. 4, 2023, pp. 630-639
Article Full Text PDF

11. A Non-injected Traffic Backdoor Attack on Deep Neural Network
Jiahui Wang, Jie Yang, Binhao Ma, Dejun Wang, and Bo Meng, Vol. 25, No. 4, 2023, pp. 640-648
Article Full Text PDF

12. A Lightweight and Flexible Privacy-preserving Electricity Theft Detection Scheme
Zining Zheng, Siliang Dong, and Yining Liu, Vol. 25, No. 4, 2023, pp. 649-658
Article Full Text PDF

13. Geospacial Analysis on DNS Servers for Furher Classification of Indicator of Compromise
Ruo Ando and Hiroshi Itoh, Vol. 25, No. 4, 2023, pp. 659-665
Article Full Text PDF

14. RBAC-based Delegation Authorization with Trust Computing and Collaborative Security Strategy
Wei Sun, Vol. 25, No. 4, 2023, pp. 666-679
Article Full Text PDF

15. Privacy Protection Data Aggregation Scheme Based on Horner Rule and Lightweight Convolutional Neural for Intelligent Education
Jian Zhang, Vol. 25, No. 4, 2023, pp. 680-687
Article Full Text PDF

16. Research on Anti-leakage Construction Data Encryption Algorithm Based on Generative Adversarial Networks and Symmetric Encryption
Yuping Peng, Mingju Zhao, Vol. 25, No. 4, 2023, pp. 688-696
Article Full Text PDF

17. Swarm Model-based Computing Network for Economic Big Data Privacy Protection
Limin Chen, Vol. 25, No. 4, 2023, pp. 697-705
Article Full Text PDF

18. An Efficient Homomorphic Deep Neural Network for Big Data Encryption Transmission Model in Internet of Vehicles
Junting Zhang, Vol. 25, No. 4, 2023, pp. 706-712
Article Full Text PDF

19. A Novel Differential Privacy Protection Model Based on Spectral Clustering Algorithm
Yudi Zhang, Vol. 25, No. 4, 2023, pp. 713-720
Article Full Text PDF

20. FLADA: Federated Learning-based Association Domain Adaptive Scheme for English Data Privacy Protection
Xiaobin Guo, Vol. 25, No. 4, 2023, pp. 721-728
Article Full Text PDF