Quick Search:

Volume: 27, No: 6 (November 1, 2025)

International Journal of Network Security

1. Active Ransomware Defense through Event Sequence Analysis and Honeyfile Monitoring
Iuon-Chang Lin, Chung-Ting Hsiao, Nan-I Wu, and Min-Shiang Hwang, Vol. 27, No. 6, 2025, pp. 1105-1115
Article Full Text PDF

2. A Hybrid Dynamic Access Control Model for Industrial OT Networks
Pengshou Xie, Pengfei Li, Yongping Kang, Tao Feng, Xiaoye Li, and Linge Qi, Vol. 27, No. 6, 2025, pp. 1116-1125
Article Full Text PDF

3. Design of Hospital Network Security Management Information System Based on Data Analysis Algorithm
Hui Guo, Vol. 27, No. 6, 2025, pp. 1126-1138
Article Full Text PDF

4. On the Maximum Order Complexity of ℓ-Sequences and Related Sequences
Jie Zhang, Zhihua Niu, Lingmei Xiao, and Vladimir Edemskiy, Vol. 27, No. 6, 2025, pp. 1139-1145
Article Full Text PDF

5. SCENet: Self-Supervised Contrastive Enhancement Network for Novel Family Malicious Domain Detection
Junheng Wang and Wei Liu, Vol. 27, No. 6, 2025, pp. 1146-1155
Article Full Text PDF

6. Spammer Detection of English Social Networks Based on Multi-head Attention and Adaptive Differentiated Graph Convolution
Xinjie Zhu, Vol. 27, No. 6, 2025, pp. 1156-1163
Article Full Text PDF

7. Emergency Response Management Model and Application Based on Distributed IPv6 Network
Xiaoting Ren, Vol. 27, No. 6, 2025, pp. 1164-1172
Article Full Text PDF

8. Exploration of Facial Forgery Detection Technology Based on ResNet50 Model
Xuedong Wu, Bin Liu, Pengji He, Hui He, Rong'an Ou and Yijiang Xing, Vol. 27, No. 6, 2025, pp. 1173-1180
Article Full Text PDF

9. Reversible Data Hiding in Encrypted Binary Images Based on Improved Prediction Methods
Fang Ren, Meng-Meng Zeng, Zi-Fan Wang, and Xuan Shi, Vol. 27, No. 6, 2025, pp. 1181-1191
Article Full Text PDF

10. Attacker Model-Based Security Assessment of the TLS1.3 Protocol
Pengshou Xie, Wei Li, Yongping Kang, Xinyu Fan, Linge Qi, and Yuxiang Ran, Vol. 27, No. 6, 2025, pp. 1192-1201
Article Full Text PDF

11. Social Internet Privacy Protection Combining K-subgraph and D-KDLD
Zhiwei Li, Vol. 27, No. 6, 2025, pp. 1202-1212
Article Full Text PDF

12. Revocable Attribute-based Encryption With Data Integrity and Key Escrow-free in Clouds
Ziyao Peng, Yuyan Guo, Taiyang Li, Mingming Jiang, and Ming Xie, Vol. 27, No. 6, 2025, pp. 1213-1222
Article Full Text PDF

13. Two Constructions of Boolean Functions with a Few Walsh Transform Values
Weiyu Zhang, Guohao Chen, Jinfeng Chong, and Zepeng Zhuo, Vol. 27, No. 6, 2025, pp. 1223-1231
Article Full Text PDF

14. MalELECTRA: A Malware Semantic Detection Method Integrated with the ELECTRA Model and Multi-Angle Adaptive Weights
Longhui Hu, Yuntao Zhao, and Yongxin Feng, Vol. 27, No. 6, 2025, pp. 1232-1243
Article Full Text PDF

15. Generating Universal Targeted Perturbations for Boosting Transferability of Adversarial Examples
Yongping Wang, Zhenhao Yan, Xiaolin Zhang, Jingyu Wang, Lixin Liu, and Huanxiang Zhang, Vol. 27, No. 6, 2025, pp. 1244-1255
Article Full Text PDF

16. Risk Assessment and Prediction of Aging Industry Projects Based on Wireless Communication Network Technology
Yan Cai, Vol. 27, No. 6, 2025, pp. 1256-1265
Article Full Text PDF

17. Digital Image Chaos Encryption Combining TLBO and GA
Xinxin Wang and Xiaoming Zhao, Vol. 27, No. 6, 2025, pp. 1266-1278
Article Full Text PDF

18. Verifiable Forward and Backward Private Searchable Encryption with Search Pattern Privacy
Hongjie Lv, Wei Liu, Jiayi Song, and Ke Chen, Vol. 27, No. 6, 2025, pp. 1279-1291
Article Full Text PDF

19. RFID Group Tag Coexistence Proof Protocol Based on Commutation Synthesis Operation
Feng-Chun Lin and Wei-Qing Wan, Vol. 27, No. 6, 2025, pp. 1292-1299
Article Full Text PDF

20. Internet of Things Data Security Sharing Based on Blockchain Technology and Credit Scoring Algorithm
Jianxi Zhang, Yue Liu, and Peiying Zhao, Vol. 27, No. 6, 2025, pp. 1300-1308
Article Full Text PDF

21. Revocable Group Signature Scheme for UC-based Blockchain Healthcare Data Sharing
Tao Feng, Changhui Li, Buzhen He, and Renbin Gong, Vol. 27, No. 6, 2025, pp. 1309-1321
Article Full Text PDF

22. Fed-LSSTAN: Location Semantics and Spatio-Temporal Attention Network for Next Point of Interest Recommendation based on Federated Learning and Differential Privacy
Yan Yan, Jie Yang, and Tianqi Hu, Vol. 27, No. 6, 2025, pp. 1322-1335
Article Full Text PDF

23. Subject index to volume 27 (2025)
Article Full Text PDF

24. Author index to volume 27 (2025)
Article Full Text PDF

25. Reviewer index to volume 27 (2025)
Article Full Text PDF

26. All Papers to volume 27 (2025)
Article Full Text PDF