Quick Search:

Paper Preview:

International Journal of Network Security

1. Active Ransomware Defense through Event Sequence Analysis and Honeyfile Monitoring
Iuon-Chang Lin, Chung-Ting Hsiao, Nan-I Wu, and Min-Shiang Hwang
Article Full Text PDF

2. A Hybrid Dynamic Access Control Model for Industrial OT Networks
Pengshou Xie, Pengfei Li, Yongping Kang, Tao Feng, Xiaoye Li, and Linge Qi
Article Full Text PDF

3. Design of Hospital Network Security Management Information System Based on Data Analysis Algorithm
Hui Guo
Article Full Text PDF

4. On the Maximum Order Complexity of ℓ-Sequences and Related Sequences
Jie Zhang, Zhihua Niu, Lingmei Xiao, and Vladimir Edemskiy
Article Full Text PDF

5. SCENet: Self-Supervised Contrastive Enhancement Network for Novel Family Malicious Domain Detection
Junheng Wang and Wei Liu
Article Full Text PDF

6. Markov-Blockchain-based Trust Metrics and Supervision Scheme for Industrial OT Networks and Systems
Pengshou Xie, Xinghui Yang, Tao Feng, Yongping Kang, Yuxiang Ran, and Yapeng Liu
Article Full Text PDF

7. Emergency Response Management Model and Application Based on Distributed IPv6 Network
Xiaoting Ren
Article Full Text PDF

8. Exploration of Facial Forgery Detection Technology Based on ResNet50 Model
Xuedong Wu, Bin Liu, Pengji He, Hui He, Rong'an Ou and Yijiang Xing
Article Full Text PDF

9. Reversible Data Hiding in Encrypted Binary Images Based on Improved Prediction Methods
Fang Ren, Meng-Meng Zeng, Zi-Fan Wang, and Xuan Shi
Article Full Text PDF

10. Attacker Model-Based Security Assessment of the TLS1.3 Protocol
Pengshou Xie, Wei Li, Yongping Kang, Xinyu Fan, Linge Qi, and Yuxiang Ran
Article Full Text PDF

11. Social Internet Privacy Protection Combining K-subgraph and D-KDLD
Zhiwei Li
Article Full Text PDF

12. Revocable Attribute-based Encryption With Data Integrity and Key Escrow-free in Clouds
Ziyao Peng, Yuyan Guo, Taiyang Li, Mingming Jiang, and Ming Xie
Article Full Text PDF

13. Two Constructions of Boolean Functions with a Few Walsh Transform Values
Weiyu Zhang, Guohao Chen, Jinfeng Chong, and Zepeng Zhuo
Article Full Text PDF

14. MalELECTRA: A Malware Semantic Detection Method Integrated with the ELECTRA Model and Multi-Angle Adaptive Weights
Longhui Hu, Yuntao Zhao, and Yongxin Feng
Article Full Text PDF

15. Generating Universal Targeted Perturbations for Boosting Transferability of Adversarial Examples
Yongping Wang, Zhenhao Yan, Xiaolin Zhang, Jingyu Wang, Lixin Liu, and Huanxiang Zhang
Article Full Text PDF

16. Risk Assessment and Prediction of Aging Industry Projects Based on Wireless Communication Network Technology
Yan Cai
Article Full Text PDF

17. Digital Image Chaos Encryption Combining TLBO and GA
Xinxin Wang and Xiaoming Zhao
Article Full Text PDF

18. Verifiable Forward and Backward Private Searchable Encryption with Search Pattern Privacy
Hongjie Lv, Wei Liu, Jiayi Song, and Ke Chen
Article Full Text PDF

19. RFID Group Tag Coexistence Proof Protocol Based on Commutation Synthesis Operation
Feng-Chun Lin and Wei-Qing Wan
Article Full Text PDF

20. Internet of Things Data Security Sharing Based on Blockchain Technology and Credit Scoring Algorithm
Jianxi Zhang, Yue Liu, and Peiying Zhao
Article Full Text PDF

21. Revocable Group Signature Scheme for UC-based Blockchain Healthcare Data Sharing
Tao Feng, Changhui Li, Buzhen He, and Renbin Gong
Article Full Text PDF

22. Fed-LSSTAN: Location Semantics and Spatio-Temporal Attention Network for Next Point of Interest Recommendation based on Federated Learning and Differential Privacy
Yan Yan, Jie Yang, and Tianqi Hu
Article Full Text PDF