| International Journal of Network Security | ||
| 1. | A Location Semantic Sensing Model Based on Markov Process for IoV
|
|
| Pengshou Xie, Xinyu Fan, Yongping Kang, Tao Feng, Cunhuan Tan, and Jiahuan Lei, Vol. 28, No. 1, 2026, pp. 1-010 Article Full Text PDF |
||
| 2. | Design and Application of Network Traffic Security Early Warning System Based on Multi-strategy Algorithm Optimization
|
|
| Huiwen Yuan, Vol. 28, No. 1, 2026, pp. 11-020 Article Full Text PDF |
||
| 3. | A Close-Range Anonymous Authentication Protocol for Agricultural IoT
|
|
| Tao Wan, Jiangtao Mei, Lingfeng Liu, Weichuan Liao, and Yongcai Xiao, Vol. 28, No. 1, 2026, pp. 21-032 Article Full Text PDF |
||
| 4. | SM2-Enabled Certificateless Linkable Ring Signcryption for Privacy Protection in TMIS
|
|
| Yinghui Zhang, Zehua Xiao, Jin Cao, and Dong Zheng, Vol. 28, No. 1, 2026, pp. 33-044 Article Full Text PDF |
||
| 5. | A Blockchain and ABAC Based Hierarchical Access Control Model for the Power Data
|
|
| Qi Yuan, Meitong Zhou, Hao Yuan, Jingjing Wen, and Yue Shao, Vol. 28, No. 1, 2026, pp. 45-053 Article Full Text PDF |
||
| 6. | Privacy-preserving Verifiable Encrypted Image Retrieval in Secure Cloud Computing
|
|
| Jiahui Tang, Qiuyu Zhang, and Shaozheng Zhang, Vol. 28, No. 1, 2026, pp. 54-067 Article Full Text PDF |
||
| 7. | Word-level Attention Scores based Attacker for NLP Classifier
|
|
| Bin Wu, Xiao-Lin Zhang, Yong-Ping Wang, Rui-Chun Gu, and Li-Xin Liu, Vol. 28, No. 1, 2026, pp. 68-079 Article Full Text PDF |
||
| 8. | Location Privacy Protection Scheme Based on Secret State Computation for Randomization
|
|
| Xin Zhang, Linming Gong, and Su Pu, Vol. 28, No. 1, 2026, pp. 80-088 Article Full Text PDF |
||
| 9. | Sparse Adversarial Attack Based on Salient Region Optimization
|
|
| Xiaojun Xu, Xiaolin Zhang, Yongping Wang, Ruichun Gu, and Enhui Xu, Vol. 28, No. 1, 2026, pp. 89-100 Article Full Text PDF |
||
| 10. | Bidirectional Authentication Protocol for RFID System Based on Modular Product Synthesis Algorithm
|
|
| Xi Chen and Zhun Wang, Vol. 28, No. 1, 2026, pp. 101-108 Article Full Text PDF |
||
| 11. | Federated Reinforcement Learning-based Intrusion Detection Method in Vehicular Netwoks
|
|
| Yu Song, Zhenshuai Zhang, and Bingkui Li, Vol. 28, No. 1, 2026, pp. 109-117 Article Full Text PDF |
||
| 12. | High Capacity Reversible Data Hiding Scheme in Encrypted Images Using Interpolation and XOR Operation
|
|
| Weiwei Zhuang, Yihao Li, and Huaqi Ou, Vol. 28, No. 1, 2026, pp. 118-126 Article Full Text PDF |
||
| 13. | DV-Hop Deception Attack Model for Node Information Security in WSNs
|
|
| Kongze Li and Chunyan Ou, Vol. 28, No. 1, 2026, pp. 127-136 Article Full Text PDF |
||
| 14. | Homomorphic Encryption Data Fusion Technology for Wireless Sensor Networks in Smart Cities
|
|
| Yiyuan Tu and Guoqing Ding, Vol. 28, No. 1, 2026, pp. 137-146 Article Full Text PDF |
||
| 15. | TS-Code Efficient and Low-Cost Recovery in Storage Systems
|
|
| Jinhua Tang, Juan Huang, Hongzhou Yu, Jun Yang, Ningchao Bai, Jing Gong, Dan Tang, Hongliang Cai, Pan Xiong, and Junyan Zhang, Vol. 28, No. 1, 2026, pp. 147-157 Article Full Text PDF |
||
| 16. | Power Ciphertext Multi-Party Secure Computing Model Based on Paillier Privacy Computing
|
|
| Yongqiao Zhang, Junjun Hu, Wenjian Chen, Jie Mei, Pengfei Cheng, and Dongdong Zhang, Vol. 28, No. 1, 2026, pp. 158-166 Article Full Text PDF |
||
| 17. | Multi-objective Cloud Task Scheduling Based on Multi-Strategy Improved Sparrow Search Algorithm
|
|
| Zhiyong Luo, Wenyao Teng, Hao Jiang, and Guanglu Sun, Vol. 28, No. 1, 2026, pp. 167-180 Article Full Text PDF |
||
| 18. | RFID Tag Ownership Transfer Protocol Based on Mms
|
|
| Dao-Wei Liu, Wei Tao, and Ling-Li Fu, Vol. 28, No. 1, 2026, pp. 181-188 Article Full Text PDF |
||
| 19. | Network Security Level Protection Evaluation Model Based on Large Language Model and Cluster Analysis
|
|
| Bin Chen, Bin Li, Yuting Tang, and Xiaogang Xie, Vol. 28, No. 1, 2026, pp. 189-197 Article Full Text PDF |
||
| 20. | A PCA-LSTM Neural Method for Network Security Posture Prediction
|
|
| Yinsheng Fu and Bin Hu, Vol. 28, No. 1, 2026, pp. 198-206 Article Full Text PDF |
||
| 21. | Prediction of Network Security Situation Based on GRU and Multi-Head Attention
|
|
| Changpeng Ji, Tianjie Gao, and Wei Dai, Vol. 28, No. 1, 2026, pp. 207-214 Article Full Text PDF |
||
| 22. | An Effective Network Intrusion Detection Systems on Diverse IoT Traffic Datasets: A Hybrid Feature Selection and Extraction Method
|
|
| Taiwo Blessing Ogunseyi, Cossi Blaise Avoussoukpo, Leizhen Wang, and Xu Zhou, Vol. 28, No. 1, 2026, pp. 215-226 Article Full Text PDF |
||
| 23. | Three Classes of Entanglement-assisted Quantum MDS Codes with Flexible Parameters by Negacyclic Codes
|
|
| Ming Yan, Tongjiang Yan, and Yuhua Sun, Vol. 28, No. 1, 2026, pp. 227-234 Article Full Text PDF |
||
| 24. | UAV-Assisted Authenticated Key Agreement Scheme for Precision Agricultural IoT Networks
|
|
| Wenyan Quan, Juan Qu, and Haiyan Zhou, Vol. 28, No. 1, 2026, pp. 235-247 Article Full Text PDF |
||
| 25. | Research on Log Anomaly Detection of English Data System Based on Long and Short Memory Network
|
|
| Qiang Sun, Vol. 28, No. 1, 2026, pp. 248-257 Article Full Text PDF |
||
| 26. | Subject index to volume 28 (2026)
|
|
| Article Full Text PDF | ||
| 27. | Author index to volume 28 (2026)
|
|
| Article Full Text PDF | ||
| 28. | Reviewer index to volume 28 (2026)
|
|
| Article Full Text PDF | ||
| 29. | All Papers to volume 28 (2026)
|
|
| Article Full Text PDF | ||