International Journal of Network Security | ||
1. | Generating Signatures of Unknown Attacks via Flow(s)-Level Anomaly Detection Technology
|
|
Xibin Sun, Jiwei Qiu, Zhenyang Yu, and Jianhua Xie, Vol. 25, No. 6, 2023, pp. 911-919 Article Full Text PDF |
||
2. | Mobile RFID Authentication Protocol Based on Parity Check Patching Operation
|
|
Zhen-Hui Li, Vol. 25, No. 6, 2023, pp. 920-927 Article Full Text PDF |
||
3. | A Study of Web Crawler Recognition Algorithms under the Background of Legal Systems
|
|
Daiwei Zhang, Vol. 25, No. 6, 2023, pp. 928-934 Article Full Text PDF |
||
4. | Spatial Optimal Method of Crowdsourcing Allocation Algorithm Based on Tree Decomposition
|
|
Hui Xia, Shufeng Zhang, and Weiji Yang, Vol. 25, No. 6, 2023, pp. 935-944 Article Full Text PDF |
||
5. | An Improved Time-Varying Collaborative Filtering Algorithm Based on Global Nearest Neighbor
|
|
Xuqi Wang, Weichao Zhang, and Qianchang Xu, Vol. 25, No. 6, 2023, pp. 945-952 Article Full Text PDF |
||
6. | Research on Bayesian-based Network Situational Awareness Algorithm
|
|
Zhiyong Luo, Shuyi Wang, Haifeng Xu, and Weiwei Song, Vol. 25, No. 6, 2023, pp. 953-963 Article Full Text PDF |
||
7. | Blockchain Technology: The Prevention of Corporate Financial Statement Forgery and Frau
|
|
Ke Li, Tianwen Chen, and Weimin Yang, Vol. 25, No. 6, 2023, pp. 964-969 Article Full Text PDF |
||
8. | A Fine-Grained and Dynamic Access Control Model for Smart Home in Cloud Environment
|
|
Pengshou Xie, Pengyun Zhang, Tao Feng, Minghu Zhang, Xiaoye Li, and Linge Qi, Vol. 25, No. 6, 2023, pp. 970-982 Article Full Text PDF |
||
9. | Improving the Transferability of Adversarial Samples through Automatically Learning Augmentation Strategies from Data
|
|
Ru-Zhi Xu and Chang-Ran Lyu, Vol. 25, No. 6, 2023, pp. 983-991 Article Full Text PDF |
||
10. | Effective Blockchain Assisted Certificateless Proxy Re-encryption Scheme for Medical Internet of Things
|
|
Xin Qi, Shu Wu, and Shu-Hao Yu, Vol. 25, No. 6, 2023, pp. 992-1001 Article Full Text PDF |
||
11. | Research on Image Copy-paste Tamper Detection Based on Gray Scale Co-occurrence Matrix and Graph Neural Network
|
|
Jiwei Sun, Vol. 25, No. 6, 2023, pp. 1002-1009 Article Full Text PDF |
||
12. | Secure Encryption of Parallel Chaotic English Education Data Based on 4-order Cellular Neural Network
|
|
Mengya Wei, Vol. 25, No. 6, 2023, pp. 1010-1017 Article Full Text PDF |
||
13. | Abnormal Traffic Detection Scheme Based on RBF Fuzzy Neural Network and Attention Mechanism in Robot Environment
|
|
Jintao Liu, Zhenxing Hao, Jiyue Wang, and Xi Zhang, Vol. 25, No. 6, 2023, pp. 1018-1024 Article Full Text PDF |
||
14. | Effective Data Encryption of Sports Documents Based on Graph Neural Network and Data Fusion
|
|
Yuhang Li, Vol. 25, No. 6, 2023, pp. 1025-1032 Article Full Text PDF |
||
15. | Data Encryption Security of Track and Field Big Data Based on Deep Residual Network and Elliptic Curve Cryptography
|
|
Yiliang Chen, Jie Ren, and Chunlin Luo, Vol. 25, No. 6, 2023, pp. 1033-1041 Article Full Text PDF |
||
16. | A Study on Detection of Malware Attacks Using Machine Learning Techniques
|
|
Daojing Yang, Vol. 25, No. 6, 2023, pp. 1042-1047 Article Full Text PDF |
||
17. | Query-based Local Black-box Adversarial Attacks
|
|
Jing Shi, Xiaolin Zhang, Enhui Xu, Yongping Wang, and Wenwen Zhang, Vol. 25, No. 6, 2023, pp. 1048-1058 Article Full Text PDF |
||
18. | A New Family of Universal Hash Functions for Quantum Key Distribution
|
|
Shuying Yang, Vol. 25, No. 6, 2023, pp. 1059-1063 Article Full Text PDF |
||
19. | Data Encryption by AES: Security Guarantee for Network Communication Sensitive Information
|
|
Jizhou Shan and Hong Ma, Vol. 25, No. 6, 2023, pp. 1064-1069 Article Full Text PDF |
||
20. | A New Secure Channel Free Public Key Encryption with Keyword Search Scheme Based on ElGamal Cryptosystems
|
|
Min-Shiang Hwang, Shih-Ting Hsu, and Cheng-Ying Yang, Vol. 25, No. 6, 2023, pp. 1070-1076 Article Full Text PDF |
||
23. | Reviewer index to volume 25 (2023)
|
|
Article Full Text PDF | ||