- Zesheng Chen:
Characterising spatial dependence on epidemic thresholds in networks. Int. J. Secur. Networks 15(1): 1-14 (2020) - Tianwei Chen, Yongjun Qiang, Chunming Tang, Zairong Wang, Ping Luo, Lingxi Peng:
Malicious behaviour identification for Android based on an RBF neural network. Int. J. Secur. Networks 15(3): 148-154 (2020) - Guanlin Chen, Xiaolong Shi, Moke Chen, Liang Zhou:
Text similarity semantic calculation based on deep reinforcement learning. Int. J. Secur. Networks 15(1): 59-66 (2020) - Guanlin Chen, Jiawei Shi, Huang Xu, Tian Li, Wujian Yang:
An improved genetic algorithm in shared bicycle parking point allocation. Int. J. Secur. Networks 15(3): 141-147 (2020) - Akram Farahmand-Nejad, Samira Noferesti:
A real-time botnet detection model based on an efficient wrapper feature selection method. Int. J. Secur. Networks 15(1): 36-45 (2020) - Haiqing Han, Siru Zhu, Qin Li, Xiao Wang, Yutian Lei, Yuwei Zhang:
Public-key cryptosystem based on quantum BCH codes and its quantum digital signature. Int. J. Secur. Networks 15(4): 197-205 (2020) - Yufeng Li, Shiyu Gu, Weiping Zhao, Yufeng Huang:
Space-time adaptive processing anti-jamming algorithm for navigation receiver. Int. J. Secur. Networks 15(3): 155-163 (2020) - Haibo Liu, Yujie Dong, Fuzhong Wang:
An improved weighted centroid localisation algorithm for wireless sensor networks in coal mine underground. Int. J. Secur. Networks 15(2): 85-92 (2020) - Bhabendu Kumar Mohanta, Debasish Jena, Srichandan Sobhanayak:
Multi-party computation review for secure data processing in IoT-fog computing environment. Int. J. Secur. Networks 15(3): 164-174 (2020) - Yuan Ping, Xuyang Guo, Baocang Wang, Jingxian Zhou:
Secure outsourcing of modular inverses and scalar multiplications on elliptic curves. Int. J. Secur. Networks 15(2): 101-110 (2020) - Nouhad Sanoussi, Ghizlane Orhanou, Said El Hajji:
A game theoretic approach based on intrusion tolerant systems. Int. J. Secur. Networks 15(3): 175-181 (2020) - Jiacheng Shang, Jie Wu:
AudioKey: a usable device pairing system using audio signals on smartwatches. Int. J. Secur. Networks 15(1): 46-58 (2020) - Rohit Singh, Mala Kalra, Shano Solanki:
A hybrid approach for intrusion detection based on machine learning. Int. J. Secur. Networks 15(4): 233-242 (2020) - Rajrupa Singh, R. Selvakumar:
Designing a secure positioning system using blockchain technology. Int. J. Secur. Networks 15(2): 78-84 (2020) - Zeng-Guang Wang, Yu Lu, Xi Li:
Optimal network defense strategy selection based on Bayesian game. Int. J. Secur. Networks 15(2): 67-77 (2020) - Hao Wang, Xiuyou Wang, Huaming Liu, Dongqing Xu, Zhengyan Liu:
A face recognition algorithm based on multiple convolution kernels and double layer sparse automatic encoder. Int. J. Secur. Networks 15(4): 224-232 (2020) - Yan Yan, Lianxiu Zhang, Bingqian Wang, Xin Gao:
Location big data differential privacy dynamic partition release method. Int. J. Secur. Networks 15(1): 25-35 (2020) - Bing Yang, Gang Zhao, Ming-hua Hu, Chang-ping Liu, Ying-bao Yang:
A cluster collaborative synchronisation dynamic model of the dissipative coupling supply chain network. Int. J. Secur. Networks 15(4): 214-223 (2020) - Along Yu, Jiajia Ji, Hao Cao, Hongbing Sun, Jinqiao Dai:
Wireless corrosion monitoring system based on an interdigital capacitive corrosion sensor. Int. J. Secur. Networks 15(2): 93-100 (2020) - Yong Zhang, Tong Wang, Qi Chen, Yu Shi, Jinzhao Li, Liyi Zhang:
Gas leakage acoustic source localisation with compressed sensing method in sensor networks. Int. J. Secur. Networks 15(4): 206-213 (2020) - 2019
- Naveen Bindra, Manu Sood:
Why, what and how to measure and improve the security of networks (a snapshot of the current situation of security metrics and the way forward). Int. J. Secur. Networks 14(3): 158-166 (2019) - Imen Bouabidi, Pr. Mahmoud Abdellaoui:
A novel cryptographic solution to secure mobile wireless sensors networks. Int. J. Secur. Networks 14(4): 221-237 (2019) - Guillaume Brogi, Elena Di Bernardino:
Hidden Markov models for advanced persistent threats. Int. J. Secur. Networks 14(4): 181-190 (2019) - Victor G. T. da Costa, Sylvio Barbon Junior, Rodrigo Sanches Miani, Joel J. P. C. Rodrigues, Bruno Bogaz Zarpelão:
Mobile botnets detection based on machine learning over system calls. Int. J. Secur. Networks 14(2): 103-118 (2019) - Yani Cui, Jia Ren, Delong Fu, Chao Dong:
A formation generation algorithm of multiple agents in naval battlefield environments. Int. J. Secur. Networks 14(1): 34-46 (2019) - Tayeb Diab, Marc Gilg, Pascal Lorenz:
A secure communication model using lightweight Diffie-Hellman method in vehicular ad hoc networks. Int. J. Secur. Networks 14(2): 61-77 (2019) - Imad El Ghoubach, Rachid Ben Abbou, Fatiha Mrabti:
Efficient and secure data sharing with outsourced decryption and efficient revocation for cloud storage systems. Int. J. Secur. Networks 14(3): 133-145 (2019) - Suresh Prasad Kannojia, Jasvant Kumar:
XOR-based unexpanded meaningful visual secret sharing scheme. Int. J. Secur. Networks 14(1): 1-9 (2019) - L. Mancy, S. Maria Celestin Vigila:
Medical image protection using diffusion, substitution and reversible data hiding based on prediction. Int. J. Secur. Networks 14(4): 238-249 (2019) - Praveen Kumar Premkamal, Syam Kumar Pasupuleti, P. J. A. Alphonse:
Efficient revocable CP-ABE for big data access control in cloud computing. Int. J. Secur. Networks 14(3): 119-132 (2019)