| International Journal of Network Security | ||
| 1. | Three-party Authentication Protocol for Mobile RFID System Based on Mms
|
|
| Dao-wei Liu, Li He, and Mei-fang Chen Article Full Text PDF |
||
| 2. | Blockchain-based Authentication Scheme for Conditional Privacy Protection in IoV
|
|
| Pengshou Xie, Cunhuan Tan, Tao Feng, Yongping Kang, Xinyu Fan, and Kai Wang Article Full Text PDF |
||
| 3. | RFID Bidirectional Authentication Protocol Based on Cross Modular Composition Operation
|
|
| Nuo-Wei Li, Wei-Ke Zou, and Qiang Liu Article Full Text PDF |
||
| 4. | Network Intrusion Detection Method Integrating Multi-Scale One Dimensional Convolutional Neural Network and BiLSTM
|
|
| Xiaojing Kong and Xiaonan Kong Article Full Text PDF |
||
| 5. | Research on the Defensive Performance of SimViT Classification Model
|
|
| Youkang Chang and Xuanpeng Ma Article Full Text PDF |
||
| 6. | Reliability Analysis of Train-to-Train (T2T) Communication Systems in Subway Tunnels Utilizing Deterministic and Stochastic Petri Nets
|
|
| Yifeng Li, Yating Wu, Xiaoyong Wang, Xi Wang, Hengkai Zhao, and Guoxin Zheng Article Full Text PDF |
||
| 7. | Analysis and Research on Utilizing Model Information to Optimize Differential Privacy in Federated Learning
|
|
| Zhaoxian Liang and Yonghong Chen Article Full Text PDF |
||
| 8. | A Multi-hop Graph Network with Logic Inference for Robust and Trustworthy Reasoning
|
|
| Chao Yang, Xifeng Ning, Hailu Sun, Dejun Yu, Pingping Li, and Yifan Zhu Article Full Text PDF |
||
| 9. | A Network Traffic Classification Method Based on Shapelet Features and Ensemble Learning
|
|
| Xin Xie, Hanxin Zheng, Si Yu, and Xingpeng Zheng Article Full Text PDF |
||
| 10. | Integrating Knowledge Graphs and Large Language Models: Threat Intelligence Analysis in APT Defense
|
|
| Xuanxun Ni and Haiqiao Liao Article Full Text PDF |
||
| 11. | Improved Chameleon Swarm Algorithm with Dual Strategy for Feature Selection in Intrusion Detection
|
|
| Peng Hu, Yuhang Zheng, Chi Yuan, Tianjiao Ni, Ying Liu, Liangchen Hu, and Kaizhong Zuo Article Full Text PDF |
||
| 12. | A Legal Copyright Protection Model Based on Single Stage Object Detection Confronting Samples
|
|
| Peili Huang Article Full Text PDF |
||
| 13. | Some New EAQMDS Codes and Hermitian Hulls of MDS Constacyclic Codes of Length (q^2+1)/29
|
|
| Mengying Gao, Yuhua Sun, Tongjiang Yan, and Chune Zhao Article Full Text PDF |
||
| 14. | Optimization of Programmable Network Routing Based on Bellman Ford Algorithm and Dijkstra Algorithm in the Digital Economy
|
|
| Yan Zhang, Jing Zhang, and Mas Rina Mustaffa Article Full Text PDF |
||
| 15. | A Directed Fuzz Testing Technology Scheme Based on Dynamic Strategy and Mutation Optimization
|
|
| Tao Feng, Xu Wang, and Renbin Gong Article Full Text PDF |
||
| 16. | Algorithm for Black-Box Transfer Attack on Object Detection Utilizing Generative Adversarial Networks
|
|
| Hui Xia, Weiji Yang, and Songping Li Article Full Text PDF |
||
| 17. | WSN Data Fusion Protection Technology Based on LO-SMART Algorithm
|
|
| Li Gong Article Full Text PDF |
||
| 18. | Explainable Lightweight Intrusion Detection for Smart Community Networks via Feature Selection
|
|
| Shi-Jie Xu, Kai-Chuan Kong, and Ying Liu Article Full Text PDF |
||
| 19. | A High Visual Quality Reversible Data Hiding Scheme Based on Absolute Moment Block Truncation Coding Compression Using XOR Operation
|
|
| Song-Hui Wang and Xiaofeng Chen Article Full Text PDF |
||
| 20. | Design of A Two-Way Recommendation Platform for Employment Recruitment Considering Privacy Data Protection
|
|
| Dijing Hao Article Full Text PDF |
||
| 21. | Research on DDoS Attack Detection and Defense Based on SDN
|
|
| Zengyu Cai, Pengrong Li, Jianwei Zhang, Liang Zhu, Liang Ding, and Yuan Feng Article Full Text PDF |
||
| 22. | Research on the Detection and Tracing of Large-Scale Botnets
|
|
| Jin Qian, Ji Zhang, Ang Li, and Libing Xu Article Full Text PDF |
||
| 23. | ProDetector: A Study on APT Detection Based on Provenance Graphs and Deep Learning
|
|
| Lei Yu, Jianing Wang, Xiaochao Xue,Xin Ye, Xiaoyu Wen, Yifan Wang,Xing Chen, Zhongxing Fu, Libin Yu, Rogrong Zou, and Lei Wang Article Full Text PDF |
||
| 24. | Flexible Ciphertext-Policy Weighted Attribute-Based Encryption Scheme with Collaborative Access for E-health Cloud
|
|
| Duanyang Ji, Zhenhua Liu, and Baocang Wang Article Full Text PDF |
||
| 25. | Research on Generative Steganography
|
|
| Kanza Fatima, Nan-I Wu, Cheng-Ying Yang, and Min-Shinag Hwang Article Full Text PDF |
||