


default search action
International Journal of Security and Networks, Volume 19
Volume 19, Number 1, 2024
- Yang Xiong, Yang Cheng:

A new edge weight-based measure for k-shell influential node identification in complex networks. 1-9 - Huajin Liu, Chunhua Ju, Houyuan Zhang:

A social network security user recommendation algorithm based on community user emotions. 10-19 - Chia-Mei Chen, Ze-Yu Lin, Ya-Hui Ou, Jiunn-Wu Lin:

A hybrid malware analysis approach for identifying process-injection malware based on machine learning. 20-30 - Yutao Hu

, Yuntao Zhao, Yongxin Feng, Xiangyu Ma:
OneR-DQN: a botnet traffic detection model based on deep Q network algorithm in deep reinforcement learning. 31-42 - Sangeetha Ganesan

:
Enabling secure modern web browsers against cache-based timing attacks. 43-54
Volume 19, Number 2, 2024
- Khaleda Afroaz, Y. V. Subba Rao, N. Rukma Rekha:

Secure identity-based encryption: overcoming the key escrow challenge. 55-62 - Rashmi Bhatia, Rohini Sharma:

Multiclassification of DDoS attacks using machine and deep learning techniques. 63-76 - Avinash Srinivasan, Christian Rose, Jie Wu:

slackFS - resilient and persistent information hiding framework. 77-91 - Bailin Zou, Tianhang Liu:

A network traffic classification and anomaly detection method based on parallel cross-convolutional neural networks. 92-100 - Shiva Krishna Nallabothu

, N. Rukma Rekha, Y. V. Subba Rao:
Generalised secret sharing scheme for non-monotone access structures using MDS codes. 101-108
Volume 19, Number 3, 2024
- Sumit Chopra, Gagandeep Singh Bains, Simranjot Kaur, Rajesh Sharma, Anchal Nayyar:

A review of the various applications and security issues in IoT and its future aspects. 109-127 - Qinqin Dong:

Safety monitoring system for tourist scenic spots based on crowd scene type recognition. 128-137 - Vipin Vijayachandran

, Suchithra Ramachandran Nair:
LR-SDP: lightweight privacy preservation approach for distributed mobile devices in IoT environment. 138-149 - Mohamed Abdelkarim Remmide

, Fatima Boumahdi, Narhimene Boustia:
Advancing automated social engineering detection with oversampling-based machine learning. 150-158 - Wenbo Sun, Wei Wang, Chenguang Bai:

A new method of large integer prime decomposition for network public key cryptosystem. 159-167
Volume 19, Number 4, 2024
- Huiru Zhang, Ruixiao Liu, Huijuan Liu:

Information security based on featureless attack algorithm. 169-177 - Xianmeng Meng, Cuicui Cai, Linglong Tan, Qijian Wang:

Resource allocation for wireless networks based on enhanced Harris hawks optimisation algorithm. 178-187 - Zhilei Ying, Yanan Meng, Ruoxi Chen, Jianlou Lou:

HKB-YOLO: transmission line fire detection method based on hierarchical feature fusion. 188-198 - P. S. Rohini, I. Sowmy

:
Hybrid VGG-DenseNet for anomalous behaviour detection in crowded video scenes. 199-209 - Kiruthika Jagannathan, Shina Sheen:

Dynamic deception-based technique for crypto-ransomware detection. 210-223

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














