Quick Search:

Paper Preview:

International Journal of Network Security

1. Three-party Authentication Protocol for Mobile RFID System Based on Mms
Dao-wei Liu, Li He, and Mei-fang Chen
Article Full Text PDF

2. Blockchain-based Authentication Scheme for Conditional Privacy Protection in IoV
Pengshou Xie, Cunhuan Tan, Tao Feng, Yongping Kang, Xinyu Fan, and Kai Wang
Article Full Text PDF

3. RFID Bidirectional Authentication Protocol Based on Cross Modular Composition Operation
Nuo-Wei Li, Wei-Ke Zou, and Qiang Liu
Article Full Text PDF

4. Network Intrusion Detection Method Integrating Multi-Scale One Dimensional Convolutional Neural Network and BiLSTM
Xiaojing Kong and Xiaonan Kong
Article Full Text PDF

5. Research on the Defensive Performance of SimViT Classification Model
Youkang Chang and Xuanpeng Ma
Article Full Text PDF

6. Reliability Analysis of Train-to-Train (T2T) Communication Systems in Subway Tunnels Utilizing Deterministic and Stochastic Petri Nets
Yifeng Li, Yating Wu, Xiaoyong Wang, Xi Wang, Hengkai Zhao, and Guoxin Zheng
Article Full Text PDF

7. Analysis and Research on Utilizing Model Information to Optimize Differential Privacy in Federated Learning
Zhaoxian Liang and Yonghong Chen
Article Full Text PDF

8. A Multi-hop Graph Network with Logic Inference for Robust and Trustworthy Reasoning
Chao Yang, Xifeng Ning, Hailu Sun, Dejun Yu, Pingping Li, and Yifan Zhu
Article Full Text PDF

9. A Network Traffic Classification Method Based on Shapelet Features and Ensemble Learning
Xin Xie, Hanxin Zheng, Si Yu, and Xingpeng Zheng
Article Full Text PDF

10. Integrating Knowledge Graphs and Large Language Models: Threat Intelligence Analysis in APT Defense
Xuanxun Ni and Haiqiao Liao
Article Full Text PDF

11. Improved Chameleon Swarm Algorithm with Dual Strategy for Feature Selection in Intrusion Detection
Peng Hu, Yuhang Zheng, Chi Yuan, Tianjiao Ni, Ying Liu, Liangchen Hu, and Kaizhong Zuo
Article Full Text PDF

12. A Legal Copyright Protection Model Based on Single Stage Object Detection Confronting Samples
Peili Huang
Article Full Text PDF

13. Some New EAQMDS Codes and Hermitian Hulls of MDS Constacyclic Codes of Length (q^2+1)/29
Mengying Gao, Yuhua Sun, Tongjiang Yan, and Chune Zhao
Article Full Text PDF

14. Optimization of Programmable Network Routing Based on Bellman Ford Algorithm and Dijkstra Algorithm in the Digital Economy
Yan Zhang, Jing Zhang, and Mas Rina Mustaffa
Article Full Text PDF

15. A Directed Fuzz Testing Technology Scheme Based on Dynamic Strategy and Mutation Optimization
Tao Feng, Xu Wang, and Renbin Gong
Article Full Text PDF

16. Algorithm for Black-Box Transfer Attack on Object Detection Utilizing Generative Adversarial Networks
Hui Xia, Weiji Yang, and Songping Li
Article Full Text PDF

17. WSN Data Fusion Protection Technology Based on LO-SMART Algorithm
Li Gong
Article Full Text PDF

18. Explainable Lightweight Intrusion Detection for Smart Community Networks via Feature Selection
Shi-Jie Xu, Kai-Chuan Kong, and Ying Liu
Article Full Text PDF

19. A High Visual Quality Reversible Data Hiding Scheme Based on Absolute Moment Block Truncation Coding Compression Using XOR Operation
Song-Hui Wang and Xiaofeng Chen
Article Full Text PDF

20. Design of A Two-Way Recommendation Platform for Employment Recruitment Considering Privacy Data Protection
Dijing Hao
Article Full Text PDF

21. Research on DDoS Attack Detection and Defense Based on SDN
Zengyu Cai, Pengrong Li, Jianwei Zhang, Liang Zhu, Liang Ding, and Yuan Feng
Article Full Text PDF

22. Research on the Detection and Tracing of Large-Scale Botnets
Jin Qian, Ji Zhang, Ang Li, and Libing Xu
Article Full Text PDF

23. ProDetector: A Study on APT Detection Based on Provenance Graphs and Deep Learning
Lei Yu, Jianing Wang, Xiaochao Xue,Xin Ye, Xiaoyu Wen, Yifan Wang,Xing Chen, Zhongxing Fu, Libin Yu, Rogrong Zou, and Lei Wang
Article Full Text PDF

24. Flexible Ciphertext-Policy Weighted Attribute-Based Encryption Scheme with Collaborative Access for E-health Cloud
Duanyang Ji, Zhenhua Liu, and Baocang Wang
Article Full Text PDF

25. Research on Generative Steganography
Kanza Fatima, Nan-I Wu, Cheng-Ying Yang, and Min-Shinag Hwang
Article Full Text PDF