International Journal of Network Security  
1.  Generating Signatures of Unknown Attacks via Flow(s)Level Anomaly Detection Technology


Xibin Sun, Jiwei Qiu, Zhenyang Yu, and Jianhua Xie, Vol. 25, No. 6, 2023, pp. 911919 Article Full Text PDF 

2.  Mobile RFID Authentication Protocol Based on Parity Check Patching Operation


ZhenHui Li, Vol. 25, No. 6, 2023, pp. 920927 Article Full Text PDF 

3.  A Study of Web Crawler Recognition Algorithms under the Background of Legal Systems


Daiwei Zhang, Vol. 25, No. 6, 2023, pp. 928934 Article Full Text PDF 

4.  Spatial Optimal Method of Crowdsourcing Allocation Algorithm Based on Tree Decomposition


Hui Xia, Shufeng Zhang, and Weiji Yang, Vol. 25, No. 6, 2023, pp. 935944 Article Full Text PDF 

5.  An Improved TimeVarying Collaborative Filtering Algorithm Based on Global Nearest Neighbor


Xuqi Wang, Weichao Zhang, and Qianchang Xu, Vol. 25, No. 6, 2023, pp. 945952 Article Full Text PDF 

6.  Research on Bayesianbased Network Situational Awareness Algorithm


Zhiyong Luo, Shuyi Wang, Haifeng Xu, and Weiwei Song, Vol. 25, No. 6, 2023, pp. 953963 Article Full Text PDF 

7.  Blockchain Technology: The Prevention of Corporate Financial Statement Forgery and Frau


Ke Li, Tianwen Chen, and Weimin Yang, Vol. 25, No. 6, 2023, pp. 964969 Article Full Text PDF 

8.  A FineGrained and Dynamic Access Control Model for Smart Home in Cloud Environment


Pengshou Xie, Pengyun Zhang, Tao Feng, Minghu Zhang, Xiaoye Li, and Linge Qi, Vol. 25, No. 6, 2023, pp. 970982 Article Full Text PDF 

9.  Improving the Transferability of Adversarial Samples through Automatically Learning Augmentation Strategies from Data


RuZhi Xu and ChangRan Lyu, Vol. 25, No. 6, 2023, pp. 983991 Article Full Text PDF 

10.  Effective Blockchain Assisted Certificateless Proxy Reencryption Scheme for Medical Internet of Things


Xin Qi, Shu Wu, and ShuHao Yu, Vol. 25, No. 6, 2023, pp. 9921001 Article Full Text PDF 

11.  Research on Image Copypaste Tamper Detection Based on Gray Scale Cooccurrence Matrix and Graph Neural Network


Jiwei Sun, Vol. 25, No. 6, 2023, pp. 10021009 Article Full Text PDF 

12.  Secure Encryption of Parallel Chaotic English Education Data Based on 4order Cellular Neural Network


Mengya Wei, Vol. 25, No. 6, 2023, pp. 10101017 Article Full Text PDF 

13.  Abnormal Traffic Detection Scheme Based on RBF Fuzzy Neural Network and Attention Mechanism in Robot Environment


Jintao Liu, Zhenxing Hao, Jiyue Wang, and Xi Zhang, Vol. 25, No. 6, 2023, pp. 10181024 Article Full Text PDF 

14.  Effective Data Encryption of Sports Documents Based on Graph Neural Network and Data Fusion


Yuhang Li, Vol. 25, No. 6, 2023, pp. 10251032 Article Full Text PDF 

15.  Data Encryption Security of Track and Field Big Data Based on Deep Residual Network and Elliptic Curve Cryptography


Yiliang Chen, Jie Ren, and Chunlin Luo, Vol. 25, No. 6, 2023, pp. 10331041 Article Full Text PDF 

16.  A Study on Detection of Malware Attacks Using Machine Learning Techniques


Daojing Yang, Vol. 25, No. 6, 2023, pp. 10421047 Article Full Text PDF 

17.  Querybased Local Blackbox Adversarial Attacks


Jing Shi, Xiaolin Zhang, Enhui Xu, Yongping Wang, and Wenwen Zhang, Vol. 25, No. 6, 2023, pp. 10481058 Article Full Text PDF 

18.  A New Family of Universal Hash Functions for Quantum Key Distribution


Shuying Yang, Vol. 25, No. 6, 2023, pp. 10591063 Article Full Text PDF 

19.  Data Encryption by AES: Security Guarantee for Network Communication Sensitive Information


Jizhou Shan and Hong Ma, Vol. 25, No. 6, 2023, pp. 10641069 Article Full Text PDF 

20.  A New Secure Channel Free Public Key Encryption with Keyword Search Scheme Based on ElGamal Cryptosystems


MinShiang Hwang, ShihTing Hsu, and ChengYing Yang, Vol. 25, No. 6, 2023, pp. 10701076 Article Full Text PDF 

23.  Reviewer index to volume 25 (2023)


Article Full Text PDF  