International Journal of Network Security | ||
1. | A Regulatable Privacy Protection Scheme for Transactions Based on Consortium Blockchain
|
|
Pengshou Xie, Wanjun Shao, Tao Feng, Ye Lu, Yinchang Pan, and Xinyu Fan, Vol. 26, No. 5, 2024, pp. 719-730 Article Full Text PDF |
||
2. | MalYolo5:A Malicious Code Visualized Detection Model Based on Yolov5 with CA Attention Mechanism
|
|
Zipeng He, Yuntao Zhao, and Yongxin Feng, Vol. 26, No. 5, 2024, pp. 731-739 Article Full Text PDF |
||
3. | Secure Localization Method in WSN Based on Improved MCL Algorithm
|
|
Lijun Mao and Yitong Zhang, Vol. 26, No. 5, 2024, pp. 740-750 Article Full Text PDF |
||
4. | Application of NAWL-ILSTM Algorithm in Network Security Situation Awareness Prediction
|
|
Jun Ma, Vol. 26, No. 5, 2024, pp. 751-760 Article Full Text PDF |
||
5. | Research on Encryption Protection of Patients' Electronic Medical Privacy Data from the Legal Perspective
|
|
Feng Wang and Fei Yang, Vol. 26, No. 5, 2024, pp. 761-766 Article Full Text PDF |
||
6. | Network Traffic Intrusion Detection Based on FSP-VSTG-MTL Algorithm
|
|
Jianjun Wu, Vol. 26, No. 5, 2024, pp. 767-775 Article Full Text PDF |
||
7. | Software Vulnerability Detection and Analysis Technology Integrating Static Taint Analysis and Deep Learning
|
|
Li Luo and Honghua Zhu, Vol. 26, No. 5, 2024, pp. 776-785 Article Full Text PDF |
||
8. | Identifying and Intercepting Telecommunications Fraud Numbers on the Internet Through Big Data Technology
|
|
Hui You and Tuo Shi, Vol. 26, No. 5, 2024, pp. 786-793 Article Full Text PDF |
||
9. | Security Management of Students’ English Education Information based on Blockchain Technology
|
|
Ying Lei and Nanchang Zeng, Vol. 26, No. 5, 2024, pp. 794-799 Article Full Text PDF |
||
10. | Spatial Database Indexing Optimization Method based on NVD-GkNN Algorithm
|
|
Huili Xia, Vol. 26, No. 5, 2024, pp. 800-811 Article Full Text PDF |
||
11. | Design of Machine Learning Method for Network Security Situation Awareness
|
|
Wei Li, Xuefeng Jiang, Huan Le, Zhenmin Miao, and Hui Shao, Vol. 26, No. 5, 2024, pp. 812-821 Article Full Text PDF |
||
12. | Construction of Early Warning and Defense Model for Distributed Network Viruses
|
|
Lin Wang and Chuang Wang, Vol. 26, No. 5, 2024, pp. 822-830 Article Full Text PDF |
||
13. | Network Anomaly Attack Detection System Based on Incremental Learning Combined with SCV and SVM Algorithms
|
|
Lijie Li, Vol. 26, No. 5, 2024, pp. 831-839 Article Full Text PDF |
||
14. | SDN-based Privacy Protection Model for IoT Node Awareness
|
|
Fengqing Tian, Haili Xue, Guangchun Fu, and Guohui Liu, Vol. 26, No. 5, 2024, pp. 840-850 Article Full Text PDF |
||
15. | E-commerce Scheme Based on Proxy t-out-of-n Oblivious Signature
|
|
Jingyu Chen, Linming Gong, Xiangxiang Ma, and Daoshun Wang, Vol. 26, No. 5, 2024, pp. 851-860 Article Full Text PDF |
||
16. | A Blockchain Technology: Analysis of a Secure Payment Mode for Enterprise E-Commerce Import and Export Trade
|
|
Xianfeng Dong and Jing Li, Vol. 26, No. 5, 2024, pp. 861-866 Article Full Text PDF |
||
17. | Color Image Encryption Based on Chaotic Systems and Dynamic Transformation Matrices
|
|
Chunming Xu and Yong Zhang, Vol. 26, No. 5, 2024, pp. 867-873 Article Full Text PDF |
||
18. | Cost-Effective EHR Management: Image Compression and Blockchain
|
|
Faheem Ullah, Jingsha He, Nafei Zhu, Ahsan Wajahat, Ahsan Nazir, Siraj uddin Qureshi, and Hasan Shahzad, Vol. 26, No. 5, 2024, pp. 874-884 Article Full Text PDF |
||
19. | Detecting IoT Botnet Attacks through Ensemble and Meta Ensemble Approaches
|
|
Xiangjun Ma, Jingsha He, Ahsan Nazir, Nafei Zhu, Xiao Hu, Faheem Ullah, Ahsan Wajahat, Yehong Luo, And Sirajuddin Qureshi, Vol. 26, No. 5, 2024, pp. 885-900 Article Full Text PDF |
||
20. | Research on Data Security and Privacy of Smart Grids
|
|
Min-Shiang Hwang, Yung-Ling Chang, Ko-Yu Lin, Cheng-Ying Yang, and Iuon-Chang Lin, Vol. 26, No. 5, 2024, pp. 901-910 Article Full Text PDF |
||