Quick Search:

Volume: 25, No: 6 (November 1, 2023)

International Journal of Network Security

1. Generating Signatures of Unknown Attacks via Flow(s)-Level Anomaly Detection Technology
Xibin Sun, Jiwei Qiu, Zhenyang Yu, and Jianhua Xie, Vol. 25, No. 6, 2023, pp. 911-919
Article Full Text PDF

2. Mobile RFID Authentication Protocol Based on Parity Check Patching Operation
Zhen-Hui Li, Vol. 25, No. 6, 2023, pp. 920-927
Article Full Text PDF

3. A Study of Web Crawler Recognition Algorithms under the Background of Legal Systems
Daiwei Zhang, Vol. 25, No. 6, 2023, pp. 928-934
Article Full Text PDF

4. Spatial Optimal Method of Crowdsourcing Allocation Algorithm Based on Tree Decomposition
Hui Xia, Shufeng Zhang, and Weiji Yang, Vol. 25, No. 6, 2023, pp. 935-944
Article Full Text PDF

5. An Improved Time-Varying Collaborative Filtering Algorithm Based on Global Nearest Neighbor
Xuqi Wang, Weichao Zhang, and Qianchang Xu, Vol. 25, No. 6, 2023, pp. 945-952
Article Full Text PDF

6. Research on Bayesian-based Network Situational Awareness Algorithm
Zhiyong Luo, Shuyi Wang, Haifeng Xu, and Weiwei Song, Vol. 25, No. 6, 2023, pp. 953-963
Article Full Text PDF

7. Blockchain Technology: The Prevention of Corporate Financial Statement Forgery and Frau
Ke Li, Tianwen Chen, and Weimin Yang, Vol. 25, No. 6, 2023, pp. 964-969
Article Full Text PDF

8. A Fine-Grained and Dynamic Access Control Model for Smart Home in Cloud Environment
Pengshou Xie, Pengyun Zhang, Tao Feng, Minghu Zhang, Xiaoye Li, and Linge Qi, Vol. 25, No. 6, 2023, pp. 970-982
Article Full Text PDF

9. Improving the Transferability of Adversarial Samples through Automatically Learning Augmentation Strategies from Data
Ru-Zhi Xu and Chang-Ran Lyu, Vol. 25, No. 6, 2023, pp. 983-991
Article Full Text PDF

10. Effective Blockchain Assisted Certificateless Proxy Re-encryption Scheme for Medical Internet of Things
Xin Qi, Shu Wu, and Shu-Hao Yu, Vol. 25, No. 6, 2023, pp. 992-1001
Article Full Text PDF

11. Research on Image Copy-paste Tamper Detection Based on Gray Scale Co-occurrence Matrix and Graph Neural Network
Jiwei Sun, Vol. 25, No. 6, 2023, pp. 1002-1009
Article Full Text PDF

12. Secure Encryption of Parallel Chaotic English Education Data Based on 4-order Cellular Neural Network
Mengya Wei, Vol. 25, No. 6, 2023, pp. 1010-1017
Article Full Text PDF

13. Abnormal Traffic Detection Scheme Based on RBF Fuzzy Neural Network and Attention Mechanism in Robot Environment
Jintao Liu, Zhenxing Hao, Jiyue Wang, and Xi Zhang, Vol. 25, No. 6, 2023, pp. 1018-1024
Article Full Text PDF

14. Effective Data Encryption of Sports Documents Based on Graph Neural Network and Data Fusion
Yuhang Li, Vol. 25, No. 6, 2023, pp. 1025-1032
Article Full Text PDF

15. Data Encryption Security of Track and Field Big Data Based on Deep Residual Network and Elliptic Curve Cryptography
Yiliang Chen, Jie Ren, and Chunlin Luo, Vol. 25, No. 6, 2023, pp. 1033-1041
Article Full Text PDF

16. A Study on Detection of Malware Attacks Using Machine Learning Techniques
Daojing Yang, Vol. 25, No. 6, 2023, pp. 1042-1047
Article Full Text PDF

17. Query-based Local Black-box Adversarial Attacks
Jing Shi, Xiaolin Zhang, Enhui Xu, Yongping Wang, and Wenwen Zhang, Vol. 25, No. 6, 2023, pp. 1048-1058
Article Full Text PDF

18. A New Family of Universal Hash Functions for Quantum Key Distribution
Shuying Yang, Vol. 25, No. 6, 2023, pp. 1059-1063
Article Full Text PDF

19. Data Encryption by AES: Security Guarantee for Network Communication Sensitive Information
Jizhou Shan and Hong Ma, Vol. 25, No. 6, 2023, pp. 1064-1069
Article Full Text PDF

20. A New Secure Channel Free Public Key Encryption with Keyword Search Scheme Based on ElGamal Cryptosystems
Min-Shiang Hwang, Shih-Ting Hsu, and Cheng-Ying Yang, Vol. 25, No. 6, 2023, pp. 1070-1076
Article Full Text PDF

23. Reviewer index to volume 25 (2023)
Article Full Text PDF