Quick Search:

Volume: 25, No: 5 (September 1, 2023)

International Journal of Network Security

1. Security Situation Prediction Method of Industrial Control System Based on Self-Attention and GRU Neural Network
Peng-Shou Xie, Shuai Wang, Ying-Wen Zhao, Wan-Jun Shao, Wei Li, and Tao Feng, Vol. 25, No. 5, 2023, pp. 729-735
Article Full Text PDF

2. Trust and Risk based on Access Control Model in Social Internet of Things
Hongbin Zhang, Jian Liu, Dongmei Zhao, Bin Liu, Yanxia Wang, Fan Fan, Vol. 25, No. 5, 2023, pp. 736-744
Article Full Text PDF

3. Analysis Distributed Denial-of-Service Attack Deploy Deep Learning Techniques
Sirajuddin Qureshi, Jingsha He, Saima Tunio, Nafei Zhu, Faheem Ullah, Ahsan Nazir, and Ahsan Wajahat, Vol. 25, No. 5, 2023, pp. 745-757
Article Full Text PDF

4. An Improved Software Defined Network Detection Algorithm for Real-Time Detection and Anomaly Identification of Network Traffic
Ke Zhang, Vol. 25, No. 5, 2023, pp. 758-763
Article Full Text PDF

5. Cryptanalysis and Improvement of a Multi-factor Authenticated Key Exchange Protocol
Zhiqiang Ma and Jun He, Vol. 25, No. 5, 2023, pp. 764-776
Article Full Text PDF

6. A Lightweight Network Security Authentication Protocol Based on PUF
Zhao-Hui Xu, Vol. 25, No. 5, 2023, pp. 777-783
Article Full Text PDF

7. Database Storage Security Analysis of Enterprise Financial Management System
Yajie Gong, Xiaodan Xing, and Chang Zhang, Vol. 25, No. 5, 2023, pp. 784-790
Article Full Text PDF

8. Effects of Shadow Fading on Energy Detection and Matched Filter Detection in Cognitive Radio Network
Hong Du, Dacheng Wang, and Long Chen, Vol. 25, No. 5, 2023, pp. 791-797
Article Full Text PDF

9. Research on SDN Security Detection Algorithm Based on Bayesian Network
Zhiyong Luo, Shuyi Wang, Haifeng Xu, and Yu Zhang, Vol. 25, No. 5, 2023, pp. 798-807
Article Full Text PDF

10. Research on Key Management of Network Communication Protocols Based on IoT Security
Hongbo Yao and Li Yang, Vol. 25, No. 5, 2023, pp. 808-813
Article Full Text PDF

11. Centered-Ranking Learning Against Adversarial Attacks in Neural Networks
Benjamin Appiah, Adolph S. Y. Adu, Isaac Osei, Gabriel Assamah, and Ebenezer N. A. Hammond, Vol. 25, No. 5, 2023, pp. 814-820
Article Full Text PDF

12. A Feature-Based Network Traffic Classification Approach
Qian Mao, Charles O'Neill, and Ke Bao, Vol. 25, No. 5, 2023, pp. 821-828
Article Full Text PDF

13. A Novel Image Encryption Algorithm Based on Advanced Hill Cipher and 6D Hyperchaotic System
Mohammed Naim and Adda Ali Pacha, Vol. 25, No. 5, 2023, pp. 829-840
Article Full Text PDF

14. Semantic Location Privacy Protection Method Based on Differential Privacy and Temporal Association under Continuous Query
Yonglu Wang, Kaizhong Zuo, Tao Pan, and Zhongchun Huang, Vol. 25, No. 5, 2023, pp. 841-848
Article Full Text PDF

15. Privacy-Preserving Vehicular Cloud Computing Based on Blockchain and Decentralized Identifier
Zaishuang Liu, Xiaoxu Ma, Jian Bai, Min Xiao, and Fei Tang, Vol. 25, No. 5, 2023, pp. 849-858
Article Full Text PDF

16. An Efficient Sine Cosine Algorithm for Global Complex Optimization Problems
Jing-Sen Liu, Fang-Yuan Zhao, and Ping Hu, Vol. 25, No. 5, 2023, pp. 859-871
Article Full Text PDF

17. Deep Learning Models: Vulnerability Mining Research for Network Security
Lili Ban and Yan Li, Vol. 25, No. 5, 2023, pp. 872-878
Article Full Text PDF

18. An Image Denoising Fractional-Order Model with Coupling of Fidelity Terms
Donghong Zhao, Xinyao Yu, and Haoyu Liu, Vol. 25, No. 5, 2023, pp. 879-892
Article Full Text PDF

19. Freeze-Phish: An ANN Based Phishing Detection System
Cheng-Ying Yang, Chun-Yi Shih, Chou-Chen Yang, and Min-Shiang Hwang, Vol. 25, No. 5, 2023, pp. 893-898
Article Full Text PDF

20. Trustworthy Delegation-authorization Model Based on Collaborative Access Control
Wei Sun, Vol. 25, No. 5, 2023, pp. 899-909
Article Full Text PDF