Quick Search:

Volume: 28, No: 2 (March 1, 2026)

International Journal of Network Security

1. Markov-Blockchain-based Trust Metrics and Supervision Scheme for Industrial OT Networks and Systems
Pengshou Xie, Xinghui Yang, Tao Feng, Yongping Kang, Yuxiang Ran, and Yapeng Liu, Vol. 28, No. 2, 2026, pp. 259-268
Article Full Text PDF

2. Real-time Rice Monitoring Method Based on BeiDou Satellite System and Encrypted Communication in Smart Sensor Networks
Hongbo Yu, Yue Yu, Songrui Li, and Yan Li, Vol. 28, No. 2, 2026, pp. 269-279
Article Full Text PDF

3. Application of Enhanced V-detector Algorithm in Network Intrusion Detection
Yelin Weng and Xiwu Zhou, Vol. 28, No. 2, 2026, pp. 280-288
Article Full Text PDF

4. Complete Construction Method of Reverse Firewall in IBE Cryptography
Hui Xia and Weiji Yang, Vol. 28, No. 2, 2026, pp. 289-299
Article Full Text PDF

5. A Multi-Agent Electricity Privacy Calculation Method for Green Power Consumption Evaluation and Certification
Yongqiao Zhang, Junjun Hu, Weijian Chen, Jie Mei, Pengfei Cheng, and Dongdong Zhang, Vol. 28, No. 2, 2026, pp. 300-310
Article Full Text PDF

6. Query protection of network user information data through an encryption protection algorithm
Juwen Li, Yuanyuan Yang, and Xiaoqiang Wang, Vol. 28, No. 2, 2026, pp. 311-317
Article Full Text PDF

7. A Multi-View Composite Graph Neural Network Based Contrastive Learning Framework for Anomaly Detection
Hao Huang, Jinguo Li, Na Zhao, and Chengming Li, Vol. 28, No. 2, 2026, pp. 318-327
Article Full Text PDF

8. Efficient Sentiment Analysis of Social Media Data Using Dynamic Feature Extraction and Word Embeddings in a CNN Framework
Emran Al-Buraihy, Dan Wang, and Wasim Ali, Vol. 28, No. 2, 2026, pp. 328-346
Article Full Text PDF

9. Fused Distortion Design for Efficient H.264 Video Steganography
Ying Liu, Shijie Xu, and Hao Xie, Vol. 28, No. 2, 2026, pp. 347-358
Article Full Text PDF

10. An Image-based NFT Plagiarism Detection Model: A Fusion Strategy of Deep Learning and Graph Neural Networks
Minfei Wu, Jie Gao, and Hongbing Cheng, Vol. 28, No. 2, 2026, pp. 359-368
Article Full Text PDF

11. From Logs to Images: Log-based APT Detection via Masked Autoencoder
Lin Shao, Guobo Hu, Jing Yu, Liming Wang, Zhongxing Fu, Lei Yu, Jianing Wang, and Xiaochao Xue, Vol. 28, No. 2, 2026, pp. 369-378
Article Full Text PDF

12. LLM4SCD: A Novel Vulnerability Detection Scheme for Smart Contracts Based on LLM
Minfei Wu, Kun Zhou, and Hongbing Cheng, Vol. 28, No. 2, 2026, pp. 379-389
Article Full Text PDF

13. Evolutionary Game Based Tripartite Attack and Defense Model in Wireless Sensor Network
Siyu Hou, Jianguo Ren, and Yonghong Xu, Vol. 28, No. 2, 2026, pp. 390-400
Article Full Text PDF

14. Generating Natural Language Adversarial Examples By Combining Probability and Position Sensitivity
Yao Liu, Xiaolin Zhang, Yongping Wang, Jingyu Wang, Lixin Liu, and Huanxiang Zhang, Vol. 28, No. 2, 2026, pp. 401-412
Article Full Text PDF

15. Multi-domain United Transformer for Image Forgery Localization
Guang Yang, Qiu-Yu Zhang, and Kaiqi Lu, Vol. 28, No. 2, 2026, pp. 413-422
Article Full Text PDF

16. Block-based Complementary Embedding Reversible Data Hiding
Anran Yao, Fang Ren, Xuefeng Zhang, and Mengmeng Zeng, Vol. 28, No. 2, 2026, pp. 423-432
Article Full Text PDF

17. Cryptographic Properties of Binary Sequences Derived from Power Function {n^q mod q mod 2}_(n=0)^(q-1)
Bing Qiao, Zhihua Niu, and Jie Zhang, Vol. 28, No. 2, 2026, pp. 433-442
Article Full Text PDF

18. IRDP-Fast Repair Array Code Based on Local Redundancy
Juan Huang, Hongzhou Yu, Jinhua Tang, Dan Tang, Hongliang Cai, and Junyan Zhang, Vol. 28, No. 2, 2026, pp. 443-452
Article Full Text PDF

19. More Efficient Access Control Solutions for IPFE
Yinyin Ma, Changgen Peng, and Tao Zhang, Vol. 28, No. 2, 2026, pp. 453-460
Article Full Text PDF

20. Research on the Application of Differential Privacy in Defect Detection Image Classification Algorithms
Guo Fang and Ren Yan, Vol. 28, No. 2, 2026, pp. 461-473
Article Full Text PDF

21. CP-ABE Scheme Supporting Direct Revocation and Outsourcing Decryption
Shuquan Li, Kun She, and Ruojie Li, Vol. 28, No. 2, 2026, pp. 474-486
Article Full Text PDF

22. One-R Random Forest and Fusion Feature Selection for Japanese Data DDoS Attack Detection
Junpeng Liu, Vol. 28, No. 2, 2026, pp. 487-494
Article Full Text PDF

23. Wireless Key Generation Protocol for RFID System Based on Parity Check Patching Operation
Zhen-Hui Li and Yi-Jie Li, Vol. 28, No. 2, 2026, pp. 495-502
Article Full Text PDF

24. A Secured RFID Authentication Protocol in Telecare Medicine Information System
Rong Zhu, Zhi-Yong Ji, and Wan-Rong Liu, Vol. 28, No. 2, 2026, pp. 503-510
Article Full Text PDF

25. An Efficient and Secure RFID Grouping Proof Protocol Conforming to EPC Class-1 Generation-2 Standards
Tao Pan, Taochun Wang, Kaizhong Zuo, and Chunhong Deng, Vol. 28, No. 2, 2026, pp. 511-522
Article Full Text PDF

26. Subject index to volume 28 (2026)
Article Full Text PDF

27. Author index to volume 28 (2026)
Article Full Text PDF

28. Reviewer index to volume 28 (2026)
Article Full Text PDF

29. All Papers to volume 28 (2026)
Article Full Text PDF