- Chao Wang, Hongwei Zhang, Jinrui Zhang, Lichuan Gu:
Multi-modal rumour detection using bilinear pooling and domain adversarial neural networks. Int. J. Secur. Networks 18(3): 175-188 (2023) - Yan Yan, Eyeleko Anselme Herman, Adnan Mahmood, Zichao Sun, Zhuoyue Dong, Fei Xu:
Privacy preserving dynamic data release based on non-synonymous diverse anatomy. Int. J. Secur. Networks 18(2): 75-90 (2023) - Hao Yan, Zheng Zhang, Yanan Liu, Shuo Qiu, Qiuling Wu:
Comments on a dynamic cloud data integrity verification scheme: security analysis and improvement. Int. J. Secur. Networks 18(2): 125-132 (2023) - Yudi Zhang, Yongxin Feng, Yuntao Zhao:
MalGA-LSTM: a malicious code detection model based on genetic algorithm optimising LSTM trainable parameters. Int. J. Secur. Networks 18(3): 133-142 (2023) - Hehui Zhang, Yong Yang, Xi Song, Wenhui Li, Shuqiang Guo:
An abnormal intrusion detection method based on self-organising model. Int. J. Secur. Networks 18(2): 117-124 (2023) - Changsong Zhou, Guozi Sun, Xuan You, Yu Gu:
A slice-based encryption scheme for IPFS. Int. J. Secur. Networks 18(1): 42-51 (2023) - Dexin Zhu, Xiaogang Du, Jigui Mao, Lijun Song:
A security control scheme based on quantum keys for IoT terminals. Int. J. Secur. Networks 18(3): 189-198 (2023) - 2022
- Anmol Agnihotri, R. Padmavathi, Santanu Chatterjee, Vinod Kumar Mahor:
Privacy in content-centric networking against side channel attacks. Int. J. Secur. Networks 17(1): 13-27 (2022) - Mohammad H. Alshayeji, Sa'ed Abed:
Enhanced video-on-demand security in cloud computing against insider and outsider threats. Int. J. Secur. Networks 17(1): 48-55 (2022) - Oscar Danilo Gavilánez Alvarez, Glen Dario Rodriguez Rafael:
VoIP security auditing model based on COBIT 4.1. Int. J. Secur. Networks 17(2): 63-76 (2022) - Ashutosh Bhatia, Deepak Kumar Vishvakarma, Rekha Kaushik, Ankit Agrawal:
Entropy and likelihood-based detection of DGA generated domain names and their families. Int. J. Secur. Networks 17(3): 147-192 (2022) - Fateh Boutekkouk:
A literature review on security-aware design space exploration approaches for embedded systems. Int. J. Secur. Networks 17(4): 247-268 (2022) - Ponnuru Surya Ganesh, R. Padmavathy, Anil Pinapati:
An efficient scalar multiplication algorithm on Koblitz curves using τ3-NAF. Int. J. Secur. Networks 17(4): 240-246 (2022) - María Hallo, Gabriela Suntaxi:
A survey on SQL injection attacks, detection and prevention techniques - a tertiary study. Int. J. Secur. Networks 17(3): 193-202 (2022) - Shizhen Huang, Anhua Guo, Kaikai Su, Siyu Chen, Ruiqi Chen:
Implementation of quasi-Newton algorithm on FPGA for IoT endpoint devices. Int. J. Secur. Networks 17(2): 124-134 (2022) - Meriem Kherbache, Kamal Amroun, David Espes:
A new wrapper feature selection model for anomaly-based intrusion detection systems. Int. J. Secur. Networks 17(2): 107-123 (2022) - Vinod Kumar Mahor, R. Padmavathy, Santanu Chatterjee:
Chebyshev chaotic map-based efficient authentication scheme for secure access of VoIP services through SIP. Int. J. Secur. Networks 17(1): 39-47 (2022) - Ala' Masarweh, Jaafer Al-Saraireh:
Threat led advanced persistent threat penetration test. Int. J. Secur. Networks 17(3): 203-219 (2022) - Wilson S. Melo Jr., Lucas S. dos Santos, Lucila M. S. Bento, Paulo R. M. Nascimento, Carlos A. R. Oliveira, Ramon R. Rezende:
Using blockchains to protect critical infrastructures: a comparison between Ethereum and Hyperledger Fabric. Int. J. Secur. Networks 17(2): 77-91 (2022) - T. N. Nisha, Dhanya Pramod:
Network event-based model using finite state machine to detect and predict insider intrusion on enterprise networks. Int. J. Secur. Networks 17(4): 269-283 (2022) - Rachana Yogesh Patil, Yogesh H. Patil:
A provably secure signcryption with proxy re-encryption for smart water grid network. Int. J. Secur. Networks 17(4): 231-239 (2022) - Mingyue Qiu, Zhijie Bi:
Police alarm address recognition and classification based on convolutional neural networks. Int. J. Secur. Networks 17(1): 56-62 (2022) - Aaron Rasheed Rababaah:
Simulated study of the influence of node density on the performance of wireless sensor networks. Int. J. Secur. Networks 17(4): 284-292 (2022) - Syed Rameez Rehman, Mudassar Waheed, Ammar Masood:
Security-enhanced Android for an enterprise. Int. J. Secur. Networks 17(2): 92-106 (2022) - Saeed Salah, Mohammad A. AL-Shudeifat, Raid Zaghal:
Desktop and mobile operating system fingerprinting based on IPv6 protocol using machine learning algorithms. Int. J. Secur. Networks 17(1): 1-12 (2022) - Jun Yan, Yupan Tian, Hai Liu, Zhenqiang Wu:
Uncertain graph generating approach based on differential privacy for preserving link relationship of social networks. Int. J. Secur. Networks 17(1): 28-38 (2022) - Xiaoteng Yang, Zhenqiang Wu, Jun Yan, Mubarak Umar:
Network tolerance optimisation to random and target attacks based on percolation theory. Int. J. Secur. Networks 17(3): 135-146 (2022) - Yuan Zuo, Xiaozhou Zhu, Jiangyi Qin, Wen Yao:
Heterogeneous big data fusion in distributed networking systems for anomaly detection and localisation. Int. J. Secur. Networks 17(3): 220-229 (2022) - 2021
- Seham Alnefaie, Suhair Alshehri, Asma Cherif:
A survey on access control in IoT: models, architectures and research opportunities. Int. J. Secur. Networks 16(1): 60-76 (2021) - Guanlin Chen, Qiao Hu, Kaimin Li, Wenyong Weng, Yubo Peng:
A novel security management system for hazardous chemicals. Int. J. Secur. Networks 16(3): 135-140 (2021)