International Journal of Network Security | ||
1. | A New Deep Learning Paradigm for IoT Security: Expanding Beyond Traditional DDoS Detection
|
|
Saima Siraj Qureshi, Jingsha He, Nafei Zhu, Min Jia, Sirajuddin Qureshi, Faheem Ullah, Ahsan Nazir, and Ahsan Wajahat, Vol. 26, No. 3, 2024, pp. 349-360 Article Full Text PDF |
||
2. | Efficient Safety Vector Computation and Its Popularization
|
|
Hui Xia, Chunhua Wang, Lantao You, and Weiji Yang, Vol. 26, No. 3, 2024, pp. 361-369 Article Full Text PDF |
||
3. | Research on the Influence of Cooperative Interference on the Physical Layer Security Performance of Wireless Networks
|
|
Liyun Xing, Vol. 26, No. 3, 2024, pp. 370-374 Article Full Text PDF |
||
4. | MDAA: An Unsupervised Anomaly Detection Method for Terminal Traffic in New Power System Based on MDAA
|
|
Hao Yang, Junfeng Zhang, Jia Sun, and Xin Xie, Vol. 26, No. 3, 2024, pp. 375-385 Article Full Text PDF |
||
5. | Taking LM as the Brain: A Novel Approach Integrating Language Model and Generative Agent for Intelligent Decision Systems
|
|
Jingkang Yang, Xiaodong Cai, Yining Liu, Mingyao Chen, and Chin-Chen Chang, Vol. 26, No. 3, 2024, pp. 386-393 Article Full Text PDF |
||
6. | Monitoring and Management of Sudden Online Public Opinion Under Big Data from a Legal Perspective
|
|
Fan Tu, Vol. 26, No. 3, 2024, pp. 394-401 Article Full Text PDF |
||
7. | Research on English Data Security Aggregation Based on Neighbor Propagation Clustering
|
|
Jianhou Nie, Vol. 26, No. 3, 2024, pp. 402-408 Article Full Text PDF |
||
8. | RNN-GSW: A Homomorphic Encryption Scheme for Economic Data Based on Recurrent Neural Network and GSW
|
|
Yueyue Dong, Vol. 26, No. 3, 2024, pp. 409-416 Article Full Text PDF |
||
9. | A Multi-layer Data Encryption Method Based on Reverse Artificial Swarm Algorithm and Packet Convolutional Chaotic Sequence
|
|
Yuankun Du, Fengping Liu, and Fei Wang, Vol. 26, No. 3, 2024, pp. 417-424 Article Full Text PDF |
||
10. | A Model for Sustainable Data Encryption, Storage, and Processing in Edge Computing-driven Internet of Things
|
|
Chenze Huang and Ying Zhong, Vol. 26, No. 3, 2024, pp. 425-434 Article Full Text PDF |
||
11. | Research on Abnormal Traffic Intrusion Detection for Power Generation Enterprise Network
|
|
Li Tian, Vol. 26, No. 3, 2024, pp. 435-441 Article Full Text PDF |
||
12. | Blockchain Collaborative Coin Mixing Scheme Based on Hierarchical Mechanism
|
|
Yan Yan, Qing Liu, and Jingjing Li, Vol. 26, No. 3, 2024, pp. 442-453 Article Full Text PDF |
||
13. | Image Encryption Scheme for Deniable Authentication Based on Chaos Theory
|
|
Qiu-Yu Zhang, Yi-Lin Liu, and Guo-Rui Wu, Vol. 26, No. 3, 2024, pp. 454-466 Article Full Text PDF |
||
14. | Doc2vec-GRU: A Behavior Classification Method for Malicious Code
|
|
Haiming Wang, Yuntao Zhao, and Zijun Wang, Vol. 26, No. 3, 2024, pp. 467-476 Article Full Text PDF |
||
15. | A Study on Influence Maximizing Based on Two Rounds of Filtration Metric in Social Networks
|
|
Yang Li and Zhiqiang Wang, Vol. 26, No. 3, 2024, pp. 477-485 Article Full Text PDF |
||
16. | Verifiable Encrypted Speech Retrieval Method Based on Blockchain and C-BiGRU
|
|
Fang-Peng Li, Qiu-Yu Zhang, Ying-Jie Hu, and Yi-Bo Huang, Vol. 26, No. 3, 2024, pp. 486-500 Article Full Text PDF |
||
17. | An Improved Received Signal Strength Indication Location Algorithm Based on Gaussian Filter and Quasi-Newton Method
|
|
Xin Qiao, Jing Wang, Haiyang Shen, and Fei Chang, Vol. 26, No. 3, 2024, pp. 501-509 Article Full Text PDF |
||
18. | A Trust and Risk Adaptive Access Control Model for Internet of Vehicles
|
|
Pengshou Xie, Xiaoye Li, Tao Feng, Minghu Zhang, Pengyun Zhang, and Pengfei Li, Vol. 26, No. 3, 2024, pp. 510-520 Article Full Text PDF |
||
19. | The Detection and Prevention of Network Illegal Intrusion Vulnerability under Legal Supervision
|
|
Xia Li, Vol. 26, No. 3, 2024, pp. 521-527 Article Full Text PDF |
||
20. | An Improvement of Three-Factor Remote User Authentication Protocol Using ECC
|
|
Min-Shiang Hwang, Cheng-Ying Lin, and Chia-Chun Wu, Vol. 26, No. 3, 2024, pp. 528-534 Article Full Text PDF |
||