International Journal of Network Security | ||
1. | Security Situation Prediction Method of Industrial Control System Based on Self-Attention and GRU Neural Network
|
|
Peng-Shou Xie, Shuai Wang, Ying-Wen Zhao, Wan-Jun Shao, Wei Li, and Tao Feng, Vol. 25, No. 5, 2023, pp. 729-735 Article Full Text PDF |
||
2. | Trust and Risk based on Access Control Model in Social Internet of Things
|
|
Hongbin Zhang, Jian Liu, Dongmei Zhao, Bin Liu, Yanxia Wang, Fan Fan, Vol. 25, No. 5, 2023, pp. 736-744 Article Full Text PDF |
||
3. | Analysis Distributed Denial-of-Service Attack Deploy Deep Learning Techniques
|
|
Sirajuddin Qureshi, Jingsha He, Saima Tunio, Nafei Zhu, Faheem Ullah, Ahsan Nazir, and Ahsan Wajahat, Vol. 25, No. 5, 2023, pp. 745-757 Article Full Text PDF |
||
4. | An Improved Software Defined Network Detection Algorithm for Real-Time Detection and Anomaly Identification of Network Traffic
|
|
Ke Zhang, Vol. 25, No. 5, 2023, pp. 758-763 Article Full Text PDF |
||
5. | Cryptanalysis and Improvement of a Multi-factor Authenticated Key Exchange Protocol
|
|
Zhiqiang Ma and Jun He, Vol. 25, No. 5, 2023, pp. 764-776 Article Full Text PDF |
||
6. | A Lightweight Network Security Authentication Protocol Based on PUF
|
|
Zhao-Hui Xu, Vol. 25, No. 5, 2023, pp. 777-783 Article Full Text PDF |
||
7. | Database Storage Security Analysis of Enterprise Financial Management System
|
|
Yajie Gong, Xiaodan Xing, and Chang Zhang, Vol. 25, No. 5, 2023, pp. 784-790 Article Full Text PDF |
||
8. | Effects of Shadow Fading on Energy Detection and Matched Filter Detection in Cognitive Radio Network
|
|
Hong Du, Dacheng Wang, and Long Chen, Vol. 25, No. 5, 2023, pp. 791-797 Article Full Text PDF |
||
9. | Research on SDN Security Detection Algorithm Based on Bayesian Network
|
|
Zhiyong Luo, Shuyi Wang, Haifeng Xu, and Yu Zhang, Vol. 25, No. 5, 2023, pp. 798-807 Article Full Text PDF |
||
10. | Research on Key Management of Network Communication Protocols Based on IoT Security
|
|
Hongbo Yao and Li Yang, Vol. 25, No. 5, 2023, pp. 808-813 Article Full Text PDF |
||
11. | Centered-Ranking Learning Against Adversarial Attacks in Neural Networks
|
|
Benjamin Appiah, Adolph S. Y. Adu, Isaac Osei, Gabriel Assamah, and Ebenezer N. A. Hammond, Vol. 25, No. 5, 2023, pp. 814-820 Article Full Text PDF |
||
12. | A Feature-Based Network Traffic Classification Approach
|
|
Qian Mao, Charles O'Neill, and Ke Bao, Vol. 25, No. 5, 2023, pp. 821-828 Article Full Text PDF |
||
13. | A Novel Image Encryption Algorithm Based on Advanced Hill Cipher and 6D Hyperchaotic System
|
|
Mohammed Naim and Adda Ali Pacha, Vol. 25, No. 5, 2023, pp. 829-840 Article Full Text PDF |
||
14. | Semantic Location Privacy Protection Method Based on Differential Privacy and Temporal Association under Continuous Query
|
|
Yonglu Wang, Kaizhong Zuo, Tao Pan, and Zhongchun Huang, Vol. 25, No. 5, 2023, pp. 841-848 Article Full Text PDF |
||
15. | Privacy-Preserving Vehicular Cloud Computing Based on Blockchain and Decentralized Identifier
|
|
Zaishuang Liu, Xiaoxu Ma, Jian Bai, Min Xiao, and Fei Tang, Vol. 25, No. 5, 2023, pp. 849-858 Article Full Text PDF |
||
16. | An Efficient Sine Cosine Algorithm for Global Complex Optimization Problems
|
|
Jing-Sen Liu, Fang-Yuan Zhao, and Ping Hu, Vol. 25, No. 5, 2023, pp. 859-871 Article Full Text PDF |
||
17. | Deep Learning Models: Vulnerability Mining Research for Network Security
|
|
Lili Ban and Yan Li, Vol. 25, No. 5, 2023, pp. 872-878 Article Full Text PDF |
||
18. | An Image Denoising Fractional-Order Model with Coupling of Fidelity Terms
|
|
Donghong Zhao, Xinyao Yu, and Haoyu Liu, Vol. 25, No. 5, 2023, pp. 879-892 Article Full Text PDF |
||
19. | Freeze-Phish: An ANN Based Phishing Detection System
|
|
Cheng-Ying Yang, Chun-Yi Shih, Chou-Chen Yang, and Min-Shiang Hwang, Vol. 25, No. 5, 2023, pp. 893-898 Article Full Text PDF |
||
20. | Trustworthy Delegation-authorization Model Based on Collaborative Access Control
|
|
Wei Sun, Vol. 25, No. 5, 2023, pp. 899-909 Article Full Text PDF |
||