Quick Search:

Volume: 26, No: 6 (November 1, 2024)

International Journal of Network Security

1. Security Analysis and Optimization of TLS1.3 Protocol Based on HCPN Model
Pengshou Xie, Wei Li, Yongping Kang, Tao Feng, Jiafeng Zhu, and Xinghui Yang, Vol. 26, No. 6, 2024, pp. 911-923
Article Full Text PDF

2. Internet of Things Anomaly Detection Method Combining Isolated Forest and K-means Algorithms
Haiou Zhang and Qinghong Liu, Vol. 26, No. 6, 2024, pp. 924-933
Article Full Text PDF

3. Face Recognition System Based on Differential Privacy Preserving Algorithm
Li He, Vol. 26, No. 6, 2024, pp. 934-942
Article Full Text PDF

4. Parallel Speech Encryption Method Based on BGN Homomorphic Encryption in Cloud Computing
Qiu-yu Zhang and Kai Wang, Vol. 26, No. 6, 2024, pp. 943-956
Article Full Text PDF

5. Security Management of Electronic Personnel Files Based on Blockchain
Yali Chen, Bin Hu, and Yajuan Liu, Vol. 26, No. 6, 2024, pp. 957-963
Article Full Text PDF

6. An APT Attack Detection Method Based on eBPF and Transformer
Rixuan Qiu, Hao Luo, Sitong Jing, Xinxiu Li, and Yuancheng Li, Vol. 26, No. 6, 2024, pp. 964-972
Article Full Text PDF

7. Network Security Situation Assessment Model of New Power Systems Based on Threat Intelligence
Yi Zhang and Yuancheng Li, Vol. 26, No. 6, 2024, pp. 973-984
Article Full Text PDF

8. Research on Data Feature Processing and Detection of Encrypted Malicious Traffic in Graph Neural Networks
Hong Kan and Ran Ren, Vol. 26, No. 6, 2024, pp. 985-991
Article Full Text PDF

9. Security Optimization of Think Tank Data Resources Based on Fully Convolutional Neural Networks and Bidirectional Gated Recurren
Wanqing Chen, Wenxin Chen, Zihan Chen, Qiyuan Cai, and Yuanfei Li, Vol. 26, No. 6, 2024, pp. 992-1003
Article Full Text PDF

10. Risk Assessment Model of Information Base Based on Machine Learning in Big Data Environment
Dingjun He, Vol. 26, No. 6, 2024, pp. 1004-1014
Article Full Text PDF

11. Research on Blockchain APT Attack Graph Generation Method Based on DDQN
Ya Xu, Jian-Bin Li, He-Xiao Li, and Shi-Ke Li, Vol. 26, No. 6, 2024, pp. 1015-1026
Article Full Text PDF

12. Privacy Protection Methods Research for Healthcare Big Data Based on FCM Clustering Algorithm
Chao Ran and Wendong Huang, Vol. 26, No. 6, 2024, pp. 1027-1037
Article Full Text PDF

13. Trace Representation of a Class of Binary Ding Generalized Cyclotomic Sequences with Period a Product of Two Odd Primes
Jiang Ma, Xiumin Shen, Yanguo Jia, and Jing Ren, Vol. 26, No. 6, 2024, pp. 1038-1043
Article Full Text PDF

14. Cloud Server-Aided Unbalanced Private Set Intersection Cardinality Protocol
Yunyun Li, Momeng Liu, and Yingbo Zhang, Vol. 26, No. 6, 2024, pp. 1044-1052
Article Full Text PDF

15. Support Verifiable IoT Perception Layer Information Search and Encryption Algorithms
Lijun Zhang, Vol. 26, No. 6, 2024, pp. 1053-1062
Article Full Text PDF

16. Concept and Construction of Group Signature with Self-proof Capacity for Confirming and Denying
Xiaogang Cheng and Ren Guo, Vol. 26, No. 6, 2024, pp. 1063-1070
Article Full Text PDF

17. The Application of Public Communication Network Security Management Based on End-to-End Image Encryption Algorithm of LU Chaotic System
Yao Wang, Vol. 26, No. 6, 2024, pp. 1071-1081
Article Full Text PDF

18. Multi-scale Cross-attention Network for Multi-family Fine-grained Malicious Domain Name Detection
Qing Zhang and Wen-Chuan Zhang, Vol. 26, No. 6, 2024, pp. 1082-1091
Article Full Text PDF

19. DH-Based Updatable Private Set Intersection
Yingbo Zhang, Momeng Liu, and Yunyun Li, Vol. 26, No. 6, 2024, pp. 1092-1101
Article Full Text PDF

20. A Secure and Efficient Group Key Agreement Scheme for VANET
Eko Fajar Cahyadi and Min-Shiang Hwang, Vol. 26, No. 6, 2024, pp. 1102-1108
Article Full Text PDF

21. Subject index to volume 26 (2024)
Article Full Text PDF

22. Author index to volume 26 (2024)
Article Full Text PDF

23. Reviewer index to volume 26 (2024)
Article Full Text PDF

24. All Papers to volume 26 (2024)
Article Full Text PDF