| International Journal of Network Security | ||
| 1. | Active Ransomware Defense through Event Sequence Analysis and Honeyfile Monitoring
|
|
| Iuon-Chang Lin, Chung-Ting Hsiao, Nan-I Wu, and Min-Shiang Hwang, Vol. 27, No. 6, 2025, pp. 1105-1115 Article Full Text PDF |
||
| 2. | A Hybrid Dynamic Access Control Model for Industrial OT Networks
|
|
| Pengshou Xie, Pengfei Li, Yongping Kang, Tao Feng, Xiaoye Li, and Linge Qi, Vol. 27, No. 6, 2025, pp. 1116-1125 Article Full Text PDF |
||
| 3. | Design of Hospital Network Security Management Information System Based on Data Analysis Algorithm
|
|
| Hui Guo, Vol. 27, No. 6, 2025, pp. 1126-1138 Article Full Text PDF |
||
| 4. | On the Maximum Order Complexity of ℓ-Sequences and Related Sequences
|
|
| Jie Zhang, Zhihua Niu, Lingmei Xiao, and Vladimir Edemskiy, Vol. 27, No. 6, 2025, pp. 1139-1145 Article Full Text PDF |
||
| 5. | SCENet: Self-Supervised Contrastive Enhancement Network for Novel Family Malicious Domain Detection
|
|
| Junheng Wang and Wei Liu, Vol. 27, No. 6, 2025, pp. 1146-1155 Article Full Text PDF |
||
| 6. | Spammer Detection of English Social Networks Based on Multi-head Attention and Adaptive Differentiated Graph Convolution
|
|
| Xinjie Zhu, Vol. 27, No. 6, 2025, pp. 1156-1163 Article Full Text PDF |
||
| 7. | Emergency Response Management Model and Application Based on Distributed IPv6 Network
|
|
| Xiaoting Ren, Vol. 27, No. 6, 2025, pp. 1164-1172 Article Full Text PDF |
||
| 8. | Exploration of Facial Forgery Detection Technology Based on ResNet50 Model
|
|
| Xuedong Wu, Bin Liu, Pengji He, Hui He, Rong'an Ou and Yijiang Xing, Vol. 27, No. 6, 2025, pp. 1173-1180 Article Full Text PDF |
||
| 9. | Reversible Data Hiding in Encrypted Binary Images Based on Improved Prediction Methods
|
|
| Fang Ren, Meng-Meng Zeng, Zi-Fan Wang, and Xuan Shi, Vol. 27, No. 6, 2025, pp. 1181-1191 Article Full Text PDF |
||
| 10. | Attacker Model-Based Security Assessment of the TLS1.3 Protocol
|
|
| Pengshou Xie, Wei Li, Yongping Kang, Xinyu Fan, Linge Qi, and Yuxiang Ran, Vol. 27, No. 6, 2025, pp. 1192-1201 Article Full Text PDF |
||
| 11. | Social Internet Privacy Protection Combining K-subgraph and D-KDLD
|
|
| Zhiwei Li, Vol. 27, No. 6, 2025, pp. 1202-1212 Article Full Text PDF |
||
| 12. | Revocable Attribute-based Encryption With Data Integrity and Key Escrow-free in Clouds
|
|
| Ziyao Peng, Yuyan Guo, Taiyang Li, Mingming Jiang, and Ming Xie, Vol. 27, No. 6, 2025, pp. 1213-1222 Article Full Text PDF |
||
| 13. | Two Constructions of Boolean Functions with a Few Walsh Transform Values
|
|
| Weiyu Zhang, Guohao Chen, Jinfeng Chong, and Zepeng Zhuo, Vol. 27, No. 6, 2025, pp. 1223-1231 Article Full Text PDF |
||
| 14. | MalELECTRA: A Malware Semantic Detection Method Integrated with the ELECTRA Model and Multi-Angle Adaptive Weights
|
|
| Longhui Hu, Yuntao Zhao, and Yongxin Feng, Vol. 27, No. 6, 2025, pp. 1232-1243 Article Full Text PDF |
||
| 15. | Generating Universal Targeted Perturbations for Boosting Transferability of Adversarial Examples
|
|
| Yongping Wang, Zhenhao Yan, Xiaolin Zhang, Jingyu Wang, Lixin Liu, and Huanxiang Zhang, Vol. 27, No. 6, 2025, pp. 1244-1255 Article Full Text PDF |
||
| 16. | Risk Assessment and Prediction of Aging Industry Projects Based on Wireless Communication Network Technology
|
|
| Yan Cai, Vol. 27, No. 6, 2025, pp. 1256-1265 Article Full Text PDF |
||
| 17. | Digital Image Chaos Encryption Combining TLBO and GA
|
|
| Xinxin Wang and Xiaoming Zhao, Vol. 27, No. 6, 2025, pp. 1266-1278 Article Full Text PDF |
||
| 18. | Verifiable Forward and Backward Private Searchable Encryption with Search Pattern Privacy
|
|
| Hongjie Lv, Wei Liu, Jiayi Song, and Ke Chen, Vol. 27, No. 6, 2025, pp. 1279-1291 Article Full Text PDF |
||
| 19. | RFID Group Tag Coexistence Proof Protocol Based on Commutation Synthesis Operation
|
|
| Feng-Chun Lin and Wei-Qing Wan, Vol. 27, No. 6, 2025, pp. 1292-1299 Article Full Text PDF |
||
| 20. | Internet of Things Data Security Sharing Based on Blockchain Technology and Credit Scoring Algorithm
|
|
| Jianxi Zhang, Yue Liu, and Peiying Zhao, Vol. 27, No. 6, 2025, pp. 1300-1308 Article Full Text PDF |
||
| 21. | Revocable Group Signature Scheme for UC-based Blockchain Healthcare Data Sharing
|
|
| Tao Feng, Changhui Li, Buzhen He, and Renbin Gong, Vol. 27, No. 6, 2025, pp. 1309-1321 Article Full Text PDF |
||
| 22. | Fed-LSSTAN: Location Semantics and Spatio-Temporal Attention Network for Next Point of Interest Recommendation based on Federated Learning and Differential Privacy
|
|
| Yan Yan, Jie Yang, and Tianqi Hu, Vol. 27, No. 6, 2025, pp. 1322-1335 Article Full Text PDF |
||
| 23. | Subject index to volume 27 (2025)
|
|
| Article Full Text PDF | ||
| 24. | Author index to volume 27 (2025)
|
|
| Article Full Text PDF | ||
| 25. | Reviewer index to volume 27 (2025)
|
|
| Article Full Text PDF | ||
| 26. | All Papers to volume 27 (2025)
|
|
| Article Full Text PDF | ||