- 2024
- Khaleda Afroaz, Y. V. Subba Rao, N. Rukma Rekha:
Secure identity-based encryption: overcoming the key escrow challenge. Int. J. Secur. Networks 19(2): 55-62 (2024) - Rashmi Bhatia, Rohini Sharma:
Multiclassification of DDoS attacks using machine and deep learning techniques. Int. J. Secur. Networks 19(2): 63-76 (2024) - Chia-Mei Chen, Ze-Yu Lin, Ya-Hui Ou, Jiunn-Wu Lin:
A hybrid malware analysis approach for identifying process-injection malware based on machine learning. Int. J. Secur. Networks 19(1): 20-30 (2024) - Sumit Chopra, Gagandeep Singh Bains, Simranjot Kaur, Rajesh Sharma, Anchal Nayyar:
A review of the various applications and security issues in IoT and its future aspects. Int. J. Secur. Networks 19(3): 109-127 (2024) - Qinqin Dong:
Safety monitoring system for tourist scenic spots based on crowd scene type recognition. Int. J. Secur. Networks 19(3): 128-137 (2024) - Sangeetha Ganesan:
Enabling secure modern web browsers against cache-based timing attacks. Int. J. Secur. Networks 19(1): 43-54 (2024) - Yutao Hu, Yuntao Zhao, Yongxin Feng, Xiangyu Ma:
OneR-DQN: a botnet traffic detection model based on deep Q network algorithm in deep reinforcement learning. Int. J. Secur. Networks 19(1): 31-42 (2024) - Huajin Liu, Chunhua Ju, Houyuan Zhang:
A social network security user recommendation algorithm based on community user emotions. Int. J. Secur. Networks 19(1): 10-19 (2024) - Shiva Krishna Nallabothu, N. Rukma Rekha, Y. V. Subba Rao:
Generalised secret sharing scheme for non-monotone access structures using MDS codes. Int. J. Secur. Networks 19(2): 101-108 (2024) - Mohamed Abdelkarim Remmide, Fatima Boumahdi, Narhimene Boustia:
Advancing automated social engineering detection with oversampling-based machine learning. Int. J. Secur. Networks 19(3): 150-158 (2024) - Avinash Srinivasan, Christian Rose, Jie Wu:
slackFS - resilient and persistent information hiding framework. Int. J. Secur. Networks 19(2): 77-91 (2024) - Wenbo Sun, Wei Wang, Chenguang Bai:
A new method of large integer prime decomposition for network public key cryptosystem. Int. J. Secur. Networks 19(3): 159-167 (2024) - Vipin Vijayachandran, Suchithra Ramachandran Nair:
LR-SDP: lightweight privacy preservation approach for distributed mobile devices in IoT environment. Int. J. Secur. Networks 19(3): 138-149 (2024) - Yang Xiong, Yang Cheng:
A new edge weight-based measure for k-shell influential node identification in complex networks. Int. J. Secur. Networks 19(1): 1-9 (2024) - Bailin Zou, Tianhang Liu:
A network traffic classification and anomaly detection method based on parallel cross-convolutional neural networks. Int. J. Secur. Networks 19(2): 92-100 (2024) - 2023
- Amal Abduallah Nasser Albilali, Maysoon F. Abulkhair, Manal Sarhan Bayousef:
An overview of location privacy protection in spatial crowdsourcing platforms during the task assignment process. Int. J. Secur. Networks 18(4): 227-244 (2023) - Asaad Balla Babiker, Mohamed Hadi Habaebi, Sinil Mubarak, Md. Rafiqul Islam:
A detailed analysis of public industrial control system datasets. Int. J. Secur. Networks 18(4): 245-263 (2023) - Payal Chaudhari:
Privacy-preserving cost-effective work distribution with fine-grained access control for mobile crowdsensing. Int. J. Secur. Networks 18(2): 106-116 (2023) - Aatish Chiniah, Feroz Ghannoo:
A multi-theory model to evaluate new factors influencing information security compliance. Int. J. Secur. Networks 18(1): 19-29 (2023) - Xiaohui Hu, Huiwen Jia, Jingang Liu, Zhiqi Zhao:
Efficient identity-based ring identification scheme and identity-based ring signature scheme on lattices. Int. J. Secur. Networks 18(4): 213-226 (2023) - Angshuman Jana:
Sensitive information leakage analysis of database code by abstract interpretation. Int. J. Secur. Networks 18(2): 91-105 (2023) - Xiaoyu Jiang:
Adaptive fault diagnosis model for high-speed railway turnout using deep convolutional neural networks. Int. J. Secur. Networks 18(3): 165-174 (2023) - Suhan Jiang, Jie Wu:
A blockchain-based NFV market in the multi-node edge computing network. Int. J. Secur. Networks 18(1): 52-64 (2023) - Nadia Niknami, Jie Wu:
MB-CIM: a multi-round budgeted competitive influence maximisation. Int. J. Secur. Networks 18(1): 30-41 (2023) - Jun Qian, Yubao Wu:
Moving object location prediction based on a graph neural network with temporal attention. Int. J. Secur. Networks 18(3): 153-164 (2023) - Mingyue Qiu, Xueying Zhang, Xinmeng Wang:
An ex-convict recognition method based on text mining. Int. J. Secur. Networks 18(1): 10-18 (2023) - Redhwan M. A. Saad, Khaled A. M. Al Soufy, Samir I. Shaheen:
Security in smart home environment: issues, challenges, and countermeasures - a survey. Int. J. Secur. Networks 18(1): 1-9 (2023) - Wuchao Shi:
Research on system safety in the case of component failure based on degree correlation. Int. J. Secur. Networks 18(2): 65-74 (2023) - Rolla Subrahmanyam, N. Rukma Rekha, Y. V. Subba Rao:
Multi-group key agreement protocol using secret sharing scheme. Int. J. Secur. Networks 18(3): 143-152 (2023) - Yixuan Wang, Xian Guo:
CPPABK: conditional privacy-preserving authentication scheme for VANETs based on the key derivation algorithm. Int. J. Secur. Networks 18(4): 199-212 (2023)