default search action
International Journal of Security and Networks, Volume 18
Volume 18, Number 1, 2023
- Redhwan M. A. Saad, Khaled A. M. Al Soufy, Samir I. Shaheen:
Security in smart home environment: issues, challenges, and countermeasures - a survey. 1-9 - Mingyue Qiu, Xueying Zhang, Xinmeng Wang:
An ex-convict recognition method based on text mining. 10-18 - Aatish Chiniah, Feroz Ghannoo:
A multi-theory model to evaluate new factors influencing information security compliance. 19-29 - Nadia Niknami, Jie Wu:
MB-CIM: a multi-round budgeted competitive influence maximisation. 30-41 - Changsong Zhou, Guozi Sun, Xuan You, Yu Gu:
A slice-based encryption scheme for IPFS. 42-51 - Suhan Jiang, Jie Wu:
A blockchain-based NFV market in the multi-node edge computing network. 52-64
Volume 18, Number 2, 2023
- Wuchao Shi:
Research on system safety in the case of component failure based on degree correlation. 65-74 - Yan Yan, Eyeleko Anselme Herman, Adnan Mahmood, Zichao Sun, Zhuoyue Dong, Fei Xu:
Privacy preserving dynamic data release based on non-synonymous diverse anatomy. 75-90 - Angshuman Jana:
Sensitive information leakage analysis of database code by abstract interpretation. 91-105 - Payal Chaudhari:
Privacy-preserving cost-effective work distribution with fine-grained access control for mobile crowdsensing. 106-116 - Hehui Zhang, Yong Yang, Xi Song, Wenhui Li, Shuqiang Guo:
An abnormal intrusion detection method based on self-organising model. 117-124 - Hao Yan, Zheng Zhang, Yanan Liu, Shuo Qiu, Qiuling Wu:
Comments on a dynamic cloud data integrity verification scheme: security analysis and improvement. 125-132
Volume 18, Number 3, 2023
- Yudi Zhang, Yongxin Feng, Yuntao Zhao:
MalGA-LSTM: a malicious code detection model based on genetic algorithm optimising LSTM trainable parameters. 133-142 - Rolla Subrahmanyam, N. Rukma Rekha, Y. V. Subba Rao:
Multi-group key agreement protocol using secret sharing scheme. 143-152 - Jun Qian, Yubao Wu:
Moving object location prediction based on a graph neural network with temporal attention. 153-164 - Xiaoyu Jiang:
Adaptive fault diagnosis model for high-speed railway turnout using deep convolutional neural networks. 165-174 - Chao Wang, Hongwei Zhang, Jinrui Zhang, Lichuan Gu:
Multi-modal rumour detection using bilinear pooling and domain adversarial neural networks. 175-188 - Dexin Zhu, Xiaogang Du, Jigui Mao, Lijun Song:
A security control scheme based on quantum keys for IoT terminals. 189-198
Volume 18, Number 4, 2023
- Yixuan Wang, Xian Guo:
CPPABK: conditional privacy-preserving authentication scheme for VANETs based on the key derivation algorithm. 199-212 - Xiaohui Hu, Huiwen Jia, Jingang Liu, Zhiqi Zhao:
Efficient identity-based ring identification scheme and identity-based ring signature scheme on lattices. 213-226 - Amal Abduallah Nasser Albilali, Maysoon F. Abulkhair, Manal Sarhan Bayousef:
An overview of location privacy protection in spatial crowdsourcing platforms during the task assignment process. 227-244 - Asaad Balla Babiker, Mohamed Hadi Habaebi, Sinil Mubarak, Md. Rafiqul Islam:
A detailed analysis of public industrial control system datasets. 245-263
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.