Quick Search:

Volume: 26, No: 5 (September 1, 2024)

International Journal of Network Security

1. A Regulatable Privacy Protection Scheme for Transactions Based on Consortium Blockchain
Pengshou Xie, Wanjun Shao, Tao Feng, Ye Lu, Yinchang Pan, and Xinyu Fan, Vol. 26, No. 5, 2024, pp. 719-730
Article Full Text PDF

2. MalYolo5:A Malicious Code Visualized Detection Model Based on Yolov5 with CA Attention Mechanism
Zipeng He, Yuntao Zhao, and Yongxin Feng, Vol. 26, No. 5, 2024, pp. 731-739
Article Full Text PDF

3. Secure Localization Method in WSN Based on Improved MCL Algorithm
Lijun Mao and Yitong Zhang, Vol. 26, No. 5, 2024, pp. 740-750
Article Full Text PDF

4. Application of NAWL-ILSTM Algorithm in Network Security Situation Awareness Prediction
Jun Ma, Vol. 26, No. 5, 2024, pp. 751-760
Article Full Text PDF

5. Research on Encryption Protection of Patients' Electronic Medical Privacy Data from the Legal Perspective
Feng Wang and Fei Yang, Vol. 26, No. 5, 2024, pp. 761-766
Article Full Text PDF

6. Network Traffic Intrusion Detection Based on FSP-VSTG-MTL Algorithm
Jianjun Wu, Vol. 26, No. 5, 2024, pp. 767-775
Article Full Text PDF

7. Software Vulnerability Detection and Analysis Technology Integrating Static Taint Analysis and Deep Learning
Li Luo and Honghua Zhu, Vol. 26, No. 5, 2024, pp. 776-785
Article Full Text PDF

8. Identifying and Intercepting Telecommunications Fraud Numbers on the Internet Through Big Data Technology
Hui You and Tuo Shi, Vol. 26, No. 5, 2024, pp. 786-793
Article Full Text PDF

9. Security Management of Students’ English Education Information based on Blockchain Technology
Ying Lei and Nanchang Zeng, Vol. 26, No. 5, 2024, pp. 794-799
Article Full Text PDF

10. Spatial Database Indexing Optimization Method based on NVD-GkNN Algorithm
Huili Xia, Vol. 26, No. 5, 2024, pp. 800-811
Article Full Text PDF

11. Design of Machine Learning Method for Network Security Situation Awareness
Wei Li, Xuefeng Jiang, Huan Le, Zhenmin Miao, and Hui Shao, Vol. 26, No. 5, 2024, pp. 812-821
Article Full Text PDF

12. Construction of Early Warning and Defense Model for Distributed Network Viruses
Lin Wang and Chuang Wang, Vol. 26, No. 5, 2024, pp. 822-830
Article Full Text PDF

13. Network Anomaly Attack Detection System Based on Incremental Learning Combined with SCV and SVM Algorithms
Lijie Li, Vol. 26, No. 5, 2024, pp. 831-839
Article Full Text PDF

14. SDN-based Privacy Protection Model for IoT Node Awareness
Fengqing Tian, Haili Xue, Guangchun Fu, and Guohui Liu, Vol. 26, No. 5, 2024, pp. 840-850
Article Full Text PDF

15. E-commerce Scheme Based on Proxy t-out-of-n Oblivious Signature
Jingyu Chen, Linming Gong, Xiangxiang Ma, and Daoshun Wang, Vol. 26, No. 5, 2024, pp. 851-860
Article Full Text PDF

16. A Blockchain Technology: Analysis of a Secure Payment Mode for Enterprise E-Commerce Import and Export Trade
Xianfeng Dong and Jing Li, Vol. 26, No. 5, 2024, pp. 861-866
Article Full Text PDF

17. Color Image Encryption Based on Chaotic Systems and Dynamic Transformation Matrices
Chunming Xu and Yong Zhang, Vol. 26, No. 5, 2024, pp. 867-873
Article Full Text PDF

18. Cost-Effective EHR Management: Image Compression and Blockchain
Faheem Ullah, Jingsha He, Nafei Zhu, Ahsan Wajahat, Ahsan Nazir, Siraj uddin Qureshi, and Hasan Shahzad, Vol. 26, No. 5, 2024, pp. 874-884
Article Full Text PDF

19. Detecting IoT Botnet Attacks through Ensemble and Meta Ensemble Approaches
Xiangjun Ma, Jingsha He, Ahsan Nazir, Nafei Zhu, Xiao Hu, Faheem Ullah, Ahsan Wajahat, Yehong Luo, And Sirajuddin Qureshi, Vol. 26, No. 5, 2024, pp. 885-900
Article Full Text PDF

20. Research on Data Security and Privacy of Smart Grids
Min-Shiang Hwang, Yung-Ling Chang, Ko-Yu Lin, Cheng-Ying Yang, and Iuon-Chang Lin, Vol. 26, No. 5, 2024, pp. 901-910
Article Full Text PDF