| International Journal of Network Security | ||
| 1. | A Location Semantic Sensing Model Based on Markov Process for IoV
|
|
| Pengshou Xie, Xinyu Fan, Yongping Kang, Tao Feng, Cunhuan Tan, and Jiahuan Lei Article Full Text PDF |
||
| 2. | Design and Application of Network Traffic Security Early Warning System Based on Multi-strategy Algorithm Optimization
|
|
| Huiwen Yuan Article Full Text PDF |
||
| 3. | A Close-Range Anonymous Authentication Protocol for Agricultural IoT
|
|
| Tao Wan, Jiangtao Mei, Lingfeng Liu, Weichuan Liao, and Yongcai Xiao Article Full Text PDF |
||
| 4. | SM2-Enabled Certificateless Linkable Ring Signcryption for Privacy Protection in TMIS
|
|
| Yinghui Zhang, Zehua Xiao, Jin Cao, and Dong Zheng Article Full Text PDF |
||
| 5. | A Blockchain and ABAC Based Hierarchical Access Control Model for the Power Data
|
|
| Qi Yuan, Meitong Zhou, Hao Yuan, Jingjing Wen, and Yue Shao Article Full Text PDF |
||
| 6. | Privacy-preserving Verifiable Encrypted Image Retrieval in Secure Cloud Computing
|
|
| Jiahui Tang, Qiuyu Zhang, and Shaozheng Zhang Article Full Text PDF |
||
| 7. | Word-level Attention Scores based Attacker for NLP Classifier
|
|
| Bin Wu, Xiao-Lin Zhang, Yong-Ping Wang, Rui-Chun Gu, and Li-Xin Liu Article Full Text PDF |
||
| 8. | Location Privacy Protection Scheme Based on Secret State Computation for Randomization
|
|
| Xin Zhang, Linming Gong, and Su Pu Article Full Text PDF |
||
| 9. | Sparse Adversarial Attack Based on Salient Region Optimization
|
|
| Xiaojun Xu, Xiaolin Zhang, Yongping Wang, Ruichun Gu, and Enhui Xu Article Full Text PDF |
||
| 10. | Bidirectional Authentication Protocol for RFID System Based on Modular Product Synthesis Algorithm
|
|
| Xi Chen and Zhun Wang Article Full Text PDF |
||
| 11. | Federated Reinforcement Learning-based Intrusion Detection Method in Vehicular Netwoks
|
|
| Yu Song, Zhenshuai Zhang, and Bingkui Li Article Full Text PDF |
||
| 12. | High Capacity Reversible Data Hiding Scheme in Encrypted Images Using Interpolation and XOR Operation
|
|
| Weiwei Zhuang, Yihao Li, and Huaqi Ou Article Full Text PDF |
||
| 13. | DV-Hop Deception Attack Model for Node Information Security in WSNs
|
|
| Kongze Li and Chunyan Ou Article Full Text PDF |
||
| 14. | Homomorphic Encryption Data Fusion Technology for Wireless Sensor Networks in Smart Cities
|
|
| Yiyuan Tu and Guoqing Ding Article Full Text PDF |
||
| 15. | TS-Code Efficient and Low-Cost Recovery in Storage Systems
|
|
| Jinhua Tang, Juan Huang, Hongzhou Yu, Jun Yang, Ningchao Bai, Jing Gong, Dan Tang, Hongliang Cai, Pan Xiong, and Junyan Zhang Article Full Text PDF |
||
| 16. | Power Ciphertext Multi-Party Secure Computing Model Based on Paillier Privacy Computing
|
|
| Yongqiao Zhang, Junjun Hu, Wenjian Chen, Jie Mei, Pengfei Cheng, and Dongdong Zhang Article Full Text PDF |
||
| 17. | Multi-objective Cloud Task Scheduling Based on Multi-Strategy Improved Sparrow Search Algorithm
|
|
| Zhiyong Luo, Wenyao Teng, Hao Jiang, and Guanglu Sun Article Full Text PDF |
||
| 18. | RFID Tag Ownership Transfer Protocol Based on Mms
|
|
| Dao-Wei Liu, Wei Tao, and Ling-Li Fu Article Full Text PDF |
||
| 19. | Network Security Level Protection Evaluation Model Based on Large Language Model and Cluster Analysis
|
|
| Bin Chen, Bin Li, Yuting Tang, and Xiaogang Xie Article Full Text PDF |
||
| 20. | A PCA-LSTM Neural Method for Network Security Posture Prediction
|
|
| Yinsheng Fu and Bin Hu Article Full Text PDF |
||
| 21. | Prediction of Network Security Situation Based on GRU and Multi-Head Attention
|
|
| Changpeng Ji, Tianjie Gao, and Wei Dai Article Full Text PDF |
||
| 22. | An Effective Network Intrusion Detection Systems on Diverse IoT Traffic Datasets: A Hybrid Feature Selection and Extraction Method
|
|
| Taiwo Blessing Ogunseyi, Cossi Blaise Avoussoukpo, Leizhen Wang, and Xu Zhou Article Full Text PDF |
||