| International Journal of Network Security | ||
| 1. | Active Ransomware Defense through Event Sequence Analysis and Honeyfile Monitoring
|
|
| Iuon-Chang Lin, Chung-Ting Hsiao, Nan-I Wu, and Min-Shiang Hwang Article Full Text PDF |
||
| 2. | A Hybrid Dynamic Access Control Model for Industrial OT Networks
|
|
| Pengshou Xie, Pengfei Li, Yongping Kang, Tao Feng, Xiaoye Li, and Linge Qi Article Full Text PDF |
||
| 3. | Design of Hospital Network Security Management Information System Based on Data Analysis Algorithm
|
|
| Hui Guo Article Full Text PDF |
||
| 4. | On the Maximum Order Complexity of ℓ-Sequences and Related Sequences
|
|
| Jie Zhang, Zhihua Niu, Lingmei Xiao, and Vladimir Edemskiy Article Full Text PDF |
||
| 5. | SCENet: Self-Supervised Contrastive Enhancement Network for Novel Family Malicious Domain Detection
|
|
| Junheng Wang and Wei Liu Article Full Text PDF |
||
| 6. | Markov-Blockchain-based Trust Metrics and Supervision Scheme for Industrial OT Networks and Systems
|
|
| Pengshou Xie, Xinghui Yang, Tao Feng, Yongping Kang, Yuxiang Ran, and Yapeng Liu Article Full Text PDF |
||
| 7. | Emergency Response Management Model and Application Based on Distributed IPv6 Network
|
|
| Xiaoting Ren Article Full Text PDF |
||
| 8. | Exploration of Facial Forgery Detection Technology Based on ResNet50 Model
|
|
| Xuedong Wu, Bin Liu, Pengji He, Hui He, Rong'an Ou and Yijiang Xing Article Full Text PDF |
||
| 9. | Reversible Data Hiding in Encrypted Binary Images Based on Improved Prediction Methods
|
|
| Fang Ren, Meng-Meng Zeng, Zi-Fan Wang, and Xuan Shi Article Full Text PDF |
||
| 10. | Attacker Model-Based Security Assessment of the TLS1.3 Protocol
|
|
| Pengshou Xie, Wei Li, Yongping Kang, Xinyu Fan, Linge Qi, and Yuxiang Ran Article Full Text PDF |
||
| 11. | Social Internet Privacy Protection Combining K-subgraph and D-KDLD
|
|
| Zhiwei Li Article Full Text PDF |
||
| 12. | Revocable Attribute-based Encryption With Data Integrity and Key Escrow-free in Clouds
|
|
| Ziyao Peng, Yuyan Guo, Taiyang Li, Mingming Jiang, and Ming Xie Article Full Text PDF |
||
| 13. | Two Constructions of Boolean Functions with a Few Walsh Transform Values
|
|
| Weiyu Zhang, Guohao Chen, Jinfeng Chong, and Zepeng Zhuo Article Full Text PDF |
||
| 14. | MalELECTRA: A Malware Semantic Detection Method Integrated with the ELECTRA Model and Multi-Angle Adaptive Weights
|
|
| Longhui Hu, Yuntao Zhao, and Yongxin Feng Article Full Text PDF |
||
| 15. | Generating Universal Targeted Perturbations for Boosting Transferability of Adversarial Examples
|
|
| Yongping Wang, Zhenhao Yan, Xiaolin Zhang, Jingyu Wang, Lixin Liu, and Huanxiang Zhang Article Full Text PDF |
||
| 16. | Risk Assessment and Prediction of Aging Industry Projects Based on Wireless Communication Network Technology
|
|
| Yan Cai Article Full Text PDF |
||
| 17. | Digital Image Chaos Encryption Combining TLBO and GA
|
|
| Xinxin Wang and Xiaoming Zhao Article Full Text PDF |
||
| 18. | Verifiable Forward and Backward Private Searchable Encryption with Search Pattern Privacy
|
|
| Hongjie Lv, Wei Liu, Jiayi Song, and Ke Chen Article Full Text PDF |
||
| 19. | RFID Group Tag Coexistence Proof Protocol Based on Commutation Synthesis Operation
|
|
| Feng-Chun Lin and Wei-Qing Wan Article Full Text PDF |
||
| 20. | Internet of Things Data Security Sharing Based on Blockchain Technology and Credit Scoring Algorithm
|
|
| Jianxi Zhang, Yue Liu, and Peiying Zhao Article Full Text PDF |
||
| 21. | Revocable Group Signature Scheme for UC-based Blockchain Healthcare Data Sharing
|
|
| Tao Feng, Changhui Li, Buzhen He, and Renbin Gong Article Full Text PDF |
||
| 22. | Fed-LSSTAN: Location Semantics and Spatio-Temporal Attention Network for Next Point of Interest Recommendation based on Federated Learning and Differential Privacy
|
|
| Yan Yan, Jie Yang, and Tianqi Hu Article Full Text PDF |
||