


default search action
International Journal of Security and Networks, Volume 19
Volume 19, Number 1, 2024
- Yang Xiong, Yang Cheng:
A new edge weight-based measure for k-shell influential node identification in complex networks. 1-9 - Huajin Liu, Chunhua Ju, Houyuan Zhang:
A social network security user recommendation algorithm based on community user emotions. 10-19 - Chia-Mei Chen, Ze-Yu Lin, Ya-Hui Ou, Jiunn-Wu Lin:
A hybrid malware analysis approach for identifying process-injection malware based on machine learning. 20-30 - Yutao Hu
, Yuntao Zhao, Yongxin Feng, Xiangyu Ma:
OneR-DQN: a botnet traffic detection model based on deep Q network algorithm in deep reinforcement learning. 31-42 - Sangeetha Ganesan
:
Enabling secure modern web browsers against cache-based timing attacks. 43-54
Volume 19, Number 2, 2024
- Khaleda Afroaz, Y. V. Subba Rao, N. Rukma Rekha:
Secure identity-based encryption: overcoming the key escrow challenge. 55-62 - Rashmi Bhatia, Rohini Sharma:
Multiclassification of DDoS attacks using machine and deep learning techniques. 63-76 - Avinash Srinivasan, Christian Rose, Jie Wu:
slackFS - resilient and persistent information hiding framework. 77-91 - Bailin Zou, Tianhang Liu:
A network traffic classification and anomaly detection method based on parallel cross-convolutional neural networks. 92-100 - Shiva Krishna Nallabothu, N. Rukma Rekha, Y. V. Subba Rao:
Generalised secret sharing scheme for non-monotone access structures using MDS codes. 101-108
Volume 19, Number 3, 2024
- Sumit Chopra, Gagandeep Singh Bains, Simranjot Kaur, Rajesh Sharma, Anchal Nayyar:
A review of the various applications and security issues in IoT and its future aspects. 109-127 - Qinqin Dong:
Safety monitoring system for tourist scenic spots based on crowd scene type recognition. 128-137 - Vipin Vijayachandran
, Suchithra Ramachandran Nair:
LR-SDP: lightweight privacy preservation approach for distributed mobile devices in IoT environment. 138-149 - Mohamed Abdelkarim Remmide
, Fatima Boumahdi, Narhimene Boustia:
Advancing automated social engineering detection with oversampling-based machine learning. 150-158 - Wenbo Sun, Wei Wang, Chenguang Bai:
A new method of large integer prime decomposition for network public key cryptosystem. 159-167
Volume 19, Number 4, 2024
- Huiru Zhang, Ruixiao Liu, Huijuan Liu:
Information security based on featureless attack algorithm. 169-177 - Xianmeng Meng, Cuicui Cai, Linglong Tan, Qijian Wang:
Resource allocation for wireless networks based on enhanced Harris hawks optimisation algorithm. 178-187 - Zhilei Ying, Yanan Meng, Ruoxi Chen, Jianlou Lou:
HKB-YOLO: transmission line fire detection method based on hierarchical feature fusion. 188-198 - P. S. Rohini, I. Sowmy:
Hybrid VGG-DenseNet for anomalous behaviour detection in crowded video scenes. 199-209 - Kiruthika Jagannathan, Shina Sheen:
Dynamic deception-based technique for crypto-ransomware detection. 210-223

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.