International Journal of Network Security | ||
1. | Security Analysis and Optimization of TLS1.3 Protocol Based on HCPN Model
|
|
Pengshou Xie, Wei Li, Yongping Kang, Tao Feng, Jiafeng Zhu, and Xinghui Yang, Vol. 26, No. 6, 2024, pp. 911-923 Article Full Text PDF |
||
2. | Internet of Things Anomaly Detection Method Combining Isolated Forest and K-means Algorithms
|
|
Haiou Zhang and Qinghong Liu, Vol. 26, No. 6, 2024, pp. 924-933 Article Full Text PDF |
||
3. | Face Recognition System Based on Differential Privacy Preserving Algorithm
|
|
Li He, Vol. 26, No. 6, 2024, pp. 934-942 Article Full Text PDF |
||
4. | Parallel Speech Encryption Method Based on BGN Homomorphic Encryption in Cloud Computing
|
|
Qiu-yu Zhang and Kai Wang, Vol. 26, No. 6, 2024, pp. 943-956 Article Full Text PDF |
||
5. | Security Management of Electronic Personnel Files Based on Blockchain
|
|
Yali Chen, Bin Hu, and Yajuan Liu, Vol. 26, No. 6, 2024, pp. 957-963 Article Full Text PDF |
||
6. | An APT Attack Detection Method Based on eBPF and Transformer
|
|
Rixuan Qiu, Hao Luo, Sitong Jing, Xinxiu Li, and Yuancheng Li, Vol. 26, No. 6, 2024, pp. 964-972 Article Full Text PDF |
||
7. | Network Security Situation Assessment Model of New Power Systems Based on Threat Intelligence
|
|
Yi Zhang and Yuancheng Li, Vol. 26, No. 6, 2024, pp. 973-984 Article Full Text PDF |
||
8. | Research on Data Feature Processing and Detection of Encrypted Malicious Traffic in Graph Neural Networks
|
|
Hong Kan and Ran Ren, Vol. 26, No. 6, 2024, pp. 985-991 Article Full Text PDF |
||
9. | Security Optimization of Think Tank Data Resources Based on Fully Convolutional Neural Networks and Bidirectional Gated Recurren
|
|
Wanqing Chen, Wenxin Chen, Zihan Chen, Qiyuan Cai, and Yuanfei Li, Vol. 26, No. 6, 2024, pp. 992-1003 Article Full Text PDF |
||
10. | Risk Assessment Model of Information Base Based on Machine Learning in Big Data Environment
|
|
Dingjun He, Vol. 26, No. 6, 2024, pp. 1004-1014 Article Full Text PDF |
||
11. | Research on Blockchain APT Attack Graph Generation Method Based on DDQN
|
|
Ya Xu, Jian-Bin Li, He-Xiao Li, and Shi-Ke Li, Vol. 26, No. 6, 2024, pp. 1015-1026 Article Full Text PDF |
||
12. | Privacy Protection Methods Research for Healthcare Big Data Based on FCM Clustering Algorithm
|
|
Chao Ran and Wendong Huang, Vol. 26, No. 6, 2024, pp. 1027-1037 Article Full Text PDF |
||
13. | Trace Representation of a Class of Binary Ding Generalized Cyclotomic Sequences with Period a Product of Two Odd Primes
|
|
Jiang Ma, Xiumin Shen, Yanguo Jia, and Jing Ren, Vol. 26, No. 6, 2024, pp. 1038-1043 Article Full Text PDF |
||
14. | Cloud Server-Aided Unbalanced Private Set Intersection Cardinality Protocol
|
|
Yunyun Li, Momeng Liu, and Yingbo Zhang, Vol. 26, No. 6, 2024, pp. 1044-1052 Article Full Text PDF |
||
15. | Support Verifiable IoT Perception Layer Information Search and Encryption Algorithms
|
|
Lijun Zhang, Vol. 26, No. 6, 2024, pp. 1053-1062 Article Full Text PDF |
||
16. | Concept and Construction of Group Signature with Self-proof Capacity for Confirming and Denying
|
|
Xiaogang Cheng and Ren Guo, Vol. 26, No. 6, 2024, pp. 1063-1070 Article Full Text PDF |
||
17. | The Application of Public Communication Network Security Management Based on End-to-End Image Encryption Algorithm of LU Chaotic System
|
|
Yao Wang, Vol. 26, No. 6, 2024, pp. 1071-1081 Article Full Text PDF |
||
18. | Multi-scale Cross-attention Network for Multi-family Fine-grained Malicious Domain Name Detection
|
|
Qing Zhang and Wen-Chuan Zhang, Vol. 26, No. 6, 2024, pp. 1082-1091 Article Full Text PDF |
||
19. | DH-Based Updatable Private Set Intersection
|
|
Yingbo Zhang, Momeng Liu, and Yunyun Li, Vol. 26, No. 6, 2024, pp. 1092-1101 Article Full Text PDF |
||
20. | A Secure and Efficient Group Key Agreement Scheme for VANET
|
|
Eko Fajar Cahyadi and Min-Shiang Hwang, Vol. 26, No. 6, 2024, pp. 1102-1108 Article Full Text PDF |
||
21. | Subject index to volume 26 (2024)
|
|
Article Full Text PDF | ||
22. | Author index to volume 26 (2024)
|
|
Article Full Text PDF | ||
23. | Reviewer index to volume 26 (2024)
|
|
Article Full Text PDF | ||
24. | All Papers to volume 26 (2024)
|
|
Article Full Text PDF | ||