| International Journal of Network Security | ||
| 1. | Markov-Blockchain-based Trust Metrics and Supervision Scheme for Industrial OT Networks and Systems
|
|
| Pengshou Xie, Xinghui Yang, Tao Feng, Yongping Kang, Yuxiang Ran, and Yapeng Liu, Vol. 28, No. 2, 2026, pp. 259-268 Article Full Text PDF |
||
| 2. | Real-time Rice Monitoring Method Based on BeiDou Satellite System and Encrypted Communication in Smart Sensor Networks
|
|
| Hongbo Yu, Yue Yu, Songrui Li, and Yan Li, Vol. 28, No. 2, 2026, pp. 269-279 Article Full Text PDF |
||
| 3. | Application of Enhanced V-detector Algorithm in Network Intrusion Detection
|
|
| Yelin Weng and Xiwu Zhou, Vol. 28, No. 2, 2026, pp. 280-288 Article Full Text PDF |
||
| 4. | Complete Construction Method of Reverse Firewall in IBE Cryptography
|
|
| Hui Xia and Weiji Yang, Vol. 28, No. 2, 2026, pp. 289-299 Article Full Text PDF |
||
| 5. | A Multi-Agent Electricity Privacy Calculation Method for Green Power Consumption Evaluation and Certification
|
|
| Yongqiao Zhang, Junjun Hu, Weijian Chen, Jie Mei, Pengfei Cheng, and Dongdong Zhang, Vol. 28, No. 2, 2026, pp. 300-310 Article Full Text PDF |
||
| 6. | Query protection of network user information data through an encryption protection algorithm
|
|
| Juwen Li, Yuanyuan Yang, and Xiaoqiang Wang, Vol. 28, No. 2, 2026, pp. 311-317 Article Full Text PDF |
||
| 7. | A Multi-View Composite Graph Neural Network Based Contrastive Learning Framework for Anomaly Detection
|
|
| Hao Huang, Jinguo Li, Na Zhao, and Chengming Li, Vol. 28, No. 2, 2026, pp. 318-327 Article Full Text PDF |
||
| 8. | Efficient Sentiment Analysis of Social Media Data Using Dynamic Feature Extraction and Word Embeddings in a CNN Framework
|
|
| Emran Al-Buraihy, Dan Wang, and Wasim Ali, Vol. 28, No. 2, 2026, pp. 328-346 Article Full Text PDF |
||
| 9. | Fused Distortion Design for Efficient H.264 Video Steganography
|
|
| Ying Liu, Shijie Xu, and Hao Xie, Vol. 28, No. 2, 2026, pp. 347-358 Article Full Text PDF |
||
| 10. | An Image-based NFT Plagiarism Detection Model: A Fusion Strategy of Deep Learning and Graph Neural Networks
|
|
| Minfei Wu, Jie Gao, and Hongbing Cheng, Vol. 28, No. 2, 2026, pp. 359-368 Article Full Text PDF |
||
| 11. | From Logs to Images: Log-based APT Detection via Masked Autoencoder
|
|
| Lin Shao, Guobo Hu, Jing Yu, Liming Wang, Zhongxing Fu, Lei Yu, Jianing Wang, and Xiaochao Xue, Vol. 28, No. 2, 2026, pp. 369-378 Article Full Text PDF |
||
| 12. | LLM4SCD: A Novel Vulnerability Detection Scheme for Smart Contracts Based on LLM
|
|
| Minfei Wu, Kun Zhou, and Hongbing Cheng, Vol. 28, No. 2, 2026, pp. 379-389 Article Full Text PDF |
||
| 13. | Evolutionary Game Based Tripartite Attack and Defense Model in Wireless Sensor Network
|
|
| Siyu Hou, Jianguo Ren, and Yonghong Xu, Vol. 28, No. 2, 2026, pp. 390-400 Article Full Text PDF |
||
| 14. | Generating Natural Language Adversarial Examples By Combining Probability and Position Sensitivity
|
|
| Yao Liu, Xiaolin Zhang, Yongping Wang, Jingyu Wang, Lixin Liu, and Huanxiang Zhang, Vol. 28, No. 2, 2026, pp. 401-412 Article Full Text PDF |
||
| 15. | Multi-domain United Transformer for Image Forgery Localization
|
|
| Guang Yang, Qiu-Yu Zhang, and Kaiqi Lu, Vol. 28, No. 2, 2026, pp. 413-422 Article Full Text PDF |
||
| 16. | Block-based Complementary Embedding Reversible Data Hiding
|
|
| Anran Yao, Fang Ren, Xuefeng Zhang, and Mengmeng Zeng, Vol. 28, No. 2, 2026, pp. 423-432 Article Full Text PDF |
||
| 17. | Cryptographic Properties of Binary Sequences Derived from Power Function {n^q mod q mod 2}_(n=0)^(q-1)
|
|
| Bing Qiao, Zhihua Niu, and Jie Zhang, Vol. 28, No. 2, 2026, pp. 433-442 Article Full Text PDF |
||
| 18. | IRDP-Fast Repair Array Code Based on Local Redundancy
|
|
| Juan Huang, Hongzhou Yu, Jinhua Tang, Dan Tang, Hongliang Cai, and Junyan Zhang, Vol. 28, No. 2, 2026, pp. 443-452 Article Full Text PDF |
||
| 19. | More Efficient Access Control Solutions for IPFE
|
|
| Yinyin Ma, Changgen Peng, and Tao Zhang, Vol. 28, No. 2, 2026, pp. 453-460 Article Full Text PDF |
||
| 20. | Research on the Application of Differential Privacy in Defect Detection Image Classification Algorithms
|
|
| Guo Fang and Ren Yan, Vol. 28, No. 2, 2026, pp. 461-473 Article Full Text PDF |
||
| 21. | CP-ABE Scheme Supporting Direct Revocation and Outsourcing Decryption
|
|
| Shuquan Li, Kun She, and Ruojie Li, Vol. 28, No. 2, 2026, pp. 474-486 Article Full Text PDF |
||
| 22. | One-R Random Forest and Fusion Feature Selection for Japanese Data DDoS Attack Detection
|
|
| Junpeng Liu, Vol. 28, No. 2, 2026, pp. 487-494 Article Full Text PDF |
||
| 23. | Wireless Key Generation Protocol for RFID System Based on Parity Check Patching Operation
|
|
| Zhen-Hui Li and Yi-Jie Li, Vol. 28, No. 2, 2026, pp. 495-502 Article Full Text PDF |
||
| 24. | A Secured RFID Authentication Protocol in Telecare Medicine Information System
|
|
| Rong Zhu, Zhi-Yong Ji, and Wan-Rong Liu, Vol. 28, No. 2, 2026, pp. 503-510 Article Full Text PDF |
||
| 25. | An Efficient and Secure RFID Grouping Proof Protocol Conforming to EPC Class-1 Generation-2 Standards
|
|
| Tao Pan, Taochun Wang, Kaizhong Zuo, and Chunhong Deng, Vol. 28, No. 2, 2026, pp. 511-522 Article Full Text PDF |
||
| 26. | Subject index to volume 28 (2026)
|
|
| Article Full Text PDF | ||
| 27. | Author index to volume 28 (2026)
|
|
| Article Full Text PDF | ||
| 28. | Reviewer index to volume 28 (2026)
|
|
| Article Full Text PDF | ||
| 29. | All Papers to volume 28 (2026)
|
|
| Article Full Text PDF | ||