| International Journal of Network Security | ||
| 1. | A New Deep Learning Paradigm for IoT Security: Expanding Beyond Traditional DDoS Detection
|
|
| Saima Siraj Qureshi, Jingsha He, Nafei Zhu, Min Jia, Sirajuddin Qureshi, Faheem Ullah, Ahsan Nazir, and Ahsan Wajahat, Vol. 26, No. 3, 2024, pp. 349-360 Article Full Text PDF |
||
| 2. | Efficient Safety Vector Computation and Its Popularization
|
|
| Hui Xia, Chunhua Wang, Lantao You, and Weiji Yang, Vol. 26, No. 3, 2024, pp. 361-369 Article Full Text PDF |
||
| 3. | Research on the Influence of Cooperative Interference on the Physical Layer Security Performance of Wireless Networks
|
|
| Liyun Xing, Vol. 26, No. 3, 2024, pp. 370-374 Article Full Text PDF |
||
| 4. | MDAA: An Unsupervised Anomaly Detection Method for Terminal Traffic in New Power System Based on MDAA
|
|
| Hao Yang, Junfeng Zhang, Jia Sun, and Xin Xie, Vol. 26, No. 3, 2024, pp. 375-385 Article Full Text PDF |
||
| 5. | Taking LM as the Brain: A Novel Approach Integrating Language Model and Generative Agent for Intelligent Decision Systems
|
|
| Jingkang Yang, Xiaodong Cai, Yining Liu, Mingyao Chen, and Chin-Chen Chang, Vol. 26, No. 3, 2024, pp. 386-393 Article Full Text PDF |
||
| 6. | Monitoring and Management of Sudden Online Public Opinion Under Big Data from a Legal Perspective
|
|
| Fan Tu, Vol. 26, No. 3, 2024, pp. 394-401 Article Full Text PDF |
||
| 7. | Research on English Data Security Aggregation Based on Neighbor Propagation Clustering
|
|
| Jianhou Nie, Vol. 26, No. 3, 2024, pp. 402-408 Article Full Text PDF |
||
| 8. | RNN-GSW: A Homomorphic Encryption Scheme for Economic Data Based on Recurrent Neural Network and GSW
|
|
| Yueyue Dong, Vol. 26, No. 3, 2024, pp. 409-416 Article Full Text PDF |
||
| 9. | A Multi-layer Data Encryption Method Based on Reverse Artificial Swarm Algorithm and Packet Convolutional Chaotic Sequence
|
|
| Yuankun Du, Fengping Liu, and Fei Wang, Vol. 26, No. 3, 2024, pp. 417-424 Article Full Text PDF |
||
| 10. | A Model for Sustainable Data Encryption, Storage, and Processing in Edge Computing-driven Internet of Things
|
|
| Chenze Huang and Ying Zhong, Vol. 26, No. 3, 2024, pp. 425-434 Article Full Text PDF |
||
| 11. | Research on Abnormal Traffic Intrusion Detection for Power Generation Enterprise Network
|
|
| Li Tian, Vol. 26, No. 3, 2024, pp. 435-441 Article Full Text PDF |
||
| 12. | Blockchain Collaborative Coin Mixing Scheme Based on Hierarchical Mechanism
|
|
| Yan Yan, Qing Liu, and Jingjing Li, Vol. 26, No. 3, 2024, pp. 442-453 Article Full Text PDF |
||
| 13. | Image Encryption Scheme for Deniable Authentication Based on Chaos Theory
|
|
| Qiu-Yu Zhang, Yi-Lin Liu, and Guo-Rui Wu, Vol. 26, No. 3, 2024, pp. 454-466 Article Full Text PDF |
||
| 14. | Doc2vec-GRU: A Behavior Classification Method for Malicious Code
|
|
| Haiming Wang, Yuntao Zhao, and Zijun Wang, Vol. 26, No. 3, 2024, pp. 467-476 Article Full Text PDF |
||
| 15. | A Study on Influence Maximizing Based on Two Rounds of Filtration Metric in Social Networks
|
|
| Yang Li and Zhiqiang Wang, Vol. 26, No. 3, 2024, pp. 477-485 Article Full Text PDF |
||
| 16. | Verifiable Encrypted Speech Retrieval Method Based on Blockchain and C-BiGRU
|
|
| Fang-Peng Li, Qiu-Yu Zhang, Ying-Jie Hu, and Yi-Bo Huang, Vol. 26, No. 3, 2024, pp. 486-500 Article Full Text PDF |
||
| 17. | An Improved Received Signal Strength Indication Location Algorithm Based on Gaussian Filter and Quasi-Newton Method
|
|
| Xin Qiao, Jing Wang, Haiyang Shen, and Fei Chang, Vol. 26, No. 3, 2024, pp. 501-509 Article Full Text PDF |
||
| 18. | A Trust and Risk Adaptive Access Control Model for Internet of Vehicles
|
|
| Pengshou Xie, Xiaoye Li, Tao Feng, Minghu Zhang, Pengyun Zhang, and Pengfei Li, Vol. 26, No. 3, 2024, pp. 510-520 Article Full Text PDF |
||
| 19. | The Detection and Prevention of Network Illegal Intrusion Vulnerability under Legal Supervision
|
|
| Xia Li, Vol. 26, No. 3, 2024, pp. 521-527 Article Full Text PDF |
||
| 20. | An Improvement of Three-Factor Remote User Authentication Protocol Using ECC
|
|
| Min-Shiang Hwang, Cheng-Ying Lin, and Chia-Chun Wu, Vol. 26, No. 3, 2024, pp. 528-534 Article Full Text PDF |
||