Quick Search:

Volume: 26, No: 3 (May 1, 2024)

International Journal of Network Security

1. A New Deep Learning Paradigm for IoT Security: Expanding Beyond Traditional DDoS Detection
Saima Siraj Qureshi, Jingsha He, Nafei Zhu, Min Jia, Sirajuddin Qureshi, Faheem Ullah, Ahsan Nazir, and Ahsan Wajahat, Vol. 26, No. 3, 2024, pp. 349-360
Article Full Text PDF

2. Efficient Safety Vector Computation and Its Popularization
Hui Xia, Chunhua Wang, Lantao You, and Weiji Yang, Vol. 26, No. 3, 2024, pp. 361-369
Article Full Text PDF

3. Research on the Influence of Cooperative Interference on the Physical Layer Security Performance of Wireless Networks
Liyun Xing, Vol. 26, No. 3, 2024, pp. 370-374
Article Full Text PDF

4. MDAA: An Unsupervised Anomaly Detection Method for Terminal Traffic in New Power System Based on MDAA
Hao Yang, Junfeng Zhang, Jia Sun, and Xin Xie, Vol. 26, No. 3, 2024, pp. 375-385
Article Full Text PDF

5. Taking LM as the Brain: A Novel Approach Integrating Language Model and Generative Agent for Intelligent Decision Systems
Jingkang Yang, Xiaodong Cai, Yining Liu, Mingyao Chen, and Chin-Chen Chang, Vol. 26, No. 3, 2024, pp. 386-393
Article Full Text PDF

6. Monitoring and Management of Sudden Online Public Opinion Under Big Data from a Legal Perspective
Fan Tu, Vol. 26, No. 3, 2024, pp. 394-401
Article Full Text PDF

7. Research on English Data Security Aggregation Based on Neighbor Propagation Clustering
Jianhou Nie, Vol. 26, No. 3, 2024, pp. 402-408
Article Full Text PDF

8. RNN-GSW: A Homomorphic Encryption Scheme for Economic Data Based on Recurrent Neural Network and GSW
Yueyue Dong, Vol. 26, No. 3, 2024, pp. 409-416
Article Full Text PDF

9. A Multi-layer Data Encryption Method Based on Reverse Artificial Swarm Algorithm and Packet Convolutional Chaotic Sequence
Yuankun Du, Fengping Liu, and Fei Wang, Vol. 26, No. 3, 2024, pp. 417-424
Article Full Text PDF

10. A Model for Sustainable Data Encryption, Storage, and Processing in Edge Computing-driven Internet of Things
Chenze Huang and Ying Zhong, Vol. 26, No. 3, 2024, pp. 425-434
Article Full Text PDF

11. Research on Abnormal Traffic Intrusion Detection for Power Generation Enterprise Network
Li Tian, Vol. 26, No. 3, 2024, pp. 435-441
Article Full Text PDF

12. Blockchain Collaborative Coin Mixing Scheme Based on Hierarchical Mechanism
Yan Yan, Qing Liu, and Jingjing Li, Vol. 26, No. 3, 2024, pp. 442-453
Article Full Text PDF

13. Image Encryption Scheme for Deniable Authentication Based on Chaos Theory
Qiu-Yu Zhang, Yi-Lin Liu, and Guo-Rui Wu, Vol. 26, No. 3, 2024, pp. 454-466
Article Full Text PDF

14. Doc2vec-GRU: A Behavior Classification Method for Malicious Code
Haiming Wang, Yuntao Zhao, and Zijun Wang, Vol. 26, No. 3, 2024, pp. 467-476
Article Full Text PDF

15. A Study on Influence Maximizing Based on Two Rounds of Filtration Metric in Social Networks
Yang Li and Zhiqiang Wang, Vol. 26, No. 3, 2024, pp. 477-485
Article Full Text PDF

16. Verifiable Encrypted Speech Retrieval Method Based on Blockchain and C-BiGRU
Fang-Peng Li, Qiu-Yu Zhang, Ying-Jie Hu, and Yi-Bo Huang, Vol. 26, No. 3, 2024, pp. 486-500
Article Full Text PDF

17. An Improved Received Signal Strength Indication Location Algorithm Based on Gaussian Filter and Quasi-Newton Method
Xin Qiao, Jing Wang, Haiyang Shen, and Fei Chang, Vol. 26, No. 3, 2024, pp. 501-509
Article Full Text PDF

18. A Trust and Risk Adaptive Access Control Model for Internet of Vehicles
Pengshou Xie, Xiaoye Li, Tao Feng, Minghu Zhang, Pengyun Zhang, and Pengfei Li, Vol. 26, No. 3, 2024, pp. 510-520
Article Full Text PDF

19. The Detection and Prevention of Network Illegal Intrusion Vulnerability under Legal Supervision
Xia Li, Vol. 26, No. 3, 2024, pp. 521-527
Article Full Text PDF

20. An Improvement of Three-Factor Remote User Authentication Protocol Using ECC
Min-Shiang Hwang, Cheng-Ying Lin, and Chia-Chun Wu, Vol. 26, No. 3, 2024, pp. 528-534
Article Full Text PDF