default search action
International Journal of Security and Networks, Volume 15
Volume 15, Number 1, 2020
- Zesheng Chen:
Characterising spatial dependence on epidemic thresholds in networks. 1-14 - Sunitha Basodi, Song Tan, WenZhan Song, Yi Pan:
Data integrity attack detection in smart grid: a deep learning approach. 15-24 - Yan Yan, Lianxiu Zhang, Bingqian Wang, Xin Gao:
Location big data differential privacy dynamic partition release method. 25-35 - Akram Farahmand-Nejad, Samira Noferesti:
A real-time botnet detection model based on an efficient wrapper feature selection method. 36-45 - Jiacheng Shang, Jie Wu:
AudioKey: a usable device pairing system using audio signals on smartwatches. 46-58 - Guanlin Chen, Xiaolong Shi, Moke Chen, Liang Zhou:
Text similarity semantic calculation based on deep reinforcement learning. 59-66
Volume 15, Number 2, 2020
- Zeng-Guang Wang, Yu Lu, Xi Li:
Optimal network defense strategy selection based on Bayesian game. 67-77 - Rajrupa Singh, R. Selvakumar:
Designing a secure positioning system using blockchain technology. 78-84 - Haibo Liu, Yujie Dong, Fuzhong Wang:
An improved weighted centroid localisation algorithm for wireless sensor networks in coal mine underground. 85-92 - Along Yu, Jiajia Ji, Hao Cao, Hongbing Sun, Jinqiao Dai:
Wireless corrosion monitoring system based on an interdigital capacitive corrosion sensor. 93-100 - Yuan Ping, Xuyang Guo, Baocang Wang, Jingxian Zhou:
Secure outsourcing of modular inverses and scalar multiplications on elliptic curves. 101-110 - Wesam Almobaideen, Muhyidean Altarawneh:
Fog computing: survey on decoy information technology. 111-121
Volume 15, Number 3, 2020
- Ahmad Azab:
Packing resistant solution to group malware binaries. 123-132 - Cláudio Alves, Flávia Bernardini, Edwin B. Mitacc Meza, Leandro Sousa:
Evaluating the behaviour of stream learning algorithms for detecting invasion on wireless networks. 133-140 - Guanlin Chen, Jiawei Shi, Huang Xu, Tian Li, Wujian Yang:
An improved genetic algorithm in shared bicycle parking point allocation. 141-147 - Tianwei Chen, Yongjun Qiang, Chunming Tang, Zairong Wang, Ping Luo, Lingxi Peng:
Malicious behaviour identification for Android based on an RBF neural network. 148-154 - Yufeng Li, Shiyu Gu, Weiping Zhao, Yufeng Huang:
Space-time adaptive processing anti-jamming algorithm for navigation receiver. 155-163 - Bhabendu Kumar Mohanta, Debasish Jena, Srichandan Sobhanayak:
Multi-party computation review for secure data processing in IoT-fog computing environment. 164-174 - Nouhad Sanoussi, Ghizlane Orhanou, Said El Hajji:
A game theoretic approach based on intrusion tolerant systems. 175-181
Volume 15, Number 4, 2020
- Mostafa H. Ammar, Ayman A. Abdel-Hamid, Mohamed R. M. Rizk, Magdy A. Ahmed:
A framework for security enhancement in multitenant SDN-based datacentres. 183-196 - Haiqing Han, Siru Zhu, Qin Li, Xiao Wang, Yutian Lei, Yuwei Zhang:
Public-key cryptosystem based on quantum BCH codes and its quantum digital signature. 197-205 - Yong Zhang, Tong Wang, Qi Chen, Yu Shi, Jinzhao Li, Liyi Zhang:
Gas leakage acoustic source localisation with compressed sensing method in sensor networks. 206-213 - Bing Yang, Gang Zhao, Ming-hua Hu, Chang-ping Liu, Ying-bao Yang:
A cluster collaborative synchronisation dynamic model of the dissipative coupling supply chain network. 214-223 - Hao Wang, Xiuyou Wang, Huaming Liu, Dongqing Xu, Zhengyan Liu:
A face recognition algorithm based on multiple convolution kernels and double layer sparse automatic encoder. 224-232 - Rohit Singh, Mala Kalra, Shano Solanki:
A hybrid approach for intrusion detection based on machine learning. 233-242
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.