default search action
International Journal of Security and Networks, Volume 19
Volume 19, Number 1, 2024
- Yang Xiong, Yang Cheng:
A new edge weight-based measure for k-shell influential node identification in complex networks. 1-9 - Huajin Liu, Chunhua Ju, Houyuan Zhang:
A social network security user recommendation algorithm based on community user emotions. 10-19 - Chia-Mei Chen, Ze-Yu Lin, Ya-Hui Ou, Jiunn-Wu Lin:
A hybrid malware analysis approach for identifying process-injection malware based on machine learning. 20-30 - Yutao Hu, Yuntao Zhao, Yongxin Feng, Xiangyu Ma:
OneR-DQN: a botnet traffic detection model based on deep Q network algorithm in deep reinforcement learning. 31-42 - Sangeetha Ganesan:
Enabling secure modern web browsers against cache-based timing attacks. 43-54
Volume 19, Number 2, 2024
- Khaleda Afroaz, Y. V. Subba Rao, N. Rukma Rekha:
Secure identity-based encryption: overcoming the key escrow challenge. 55-62 - Rashmi Bhatia, Rohini Sharma:
Multiclassification of DDoS attacks using machine and deep learning techniques. 63-76 - Avinash Srinivasan, Christian Rose, Jie Wu:
slackFS - resilient and persistent information hiding framework. 77-91 - Bailin Zou, Tianhang Liu:
A network traffic classification and anomaly detection method based on parallel cross-convolutional neural networks. 92-100 - Shiva Krishna Nallabothu, N. Rukma Rekha, Y. V. Subba Rao:
Generalised secret sharing scheme for non-monotone access structures using MDS codes. 101-108
Volume 19, Number 3, 2024
- Sumit Chopra, Gagandeep Singh Bains, Simranjot Kaur, Rajesh Sharma, Anchal Nayyar:
A review of the various applications and security issues in IoT and its future aspects. 109-127 - Qinqin Dong:
Safety monitoring system for tourist scenic spots based on crowd scene type recognition. 128-137 - Vipin Vijayachandran, Suchithra Ramachandran Nair:
LR-SDP: lightweight privacy preservation approach for distributed mobile devices in IoT environment. 138-149 - Mohamed Abdelkarim Remmide, Fatima Boumahdi, Narhimene Boustia:
Advancing automated social engineering detection with oversampling-based machine learning. 150-158 - Wenbo Sun, Wei Wang, Chenguang Bai:
A new method of large integer prime decomposition for network public key cryptosystem. 159-167
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.