


default search action
International Journal of Security and Networks, Volume 15
Volume 15, Number 1, 2020
- Zesheng Chen:

Characterising spatial dependence on epidemic thresholds in networks. 1-14 - Sunitha Basodi, Song Tan, WenZhan Song

, Yi Pan
:
Data integrity attack detection in smart grid: a deep learning approach. 15-24 - Yan Yan, Lianxiu Zhang, Bingqian Wang, Xin Gao:

Location big data differential privacy dynamic partition release method. 25-35 - Akram Farahmand-Nejad, Samira Noferesti:

A real-time botnet detection model based on an efficient wrapper feature selection method. 36-45 - Jiacheng Shang, Jie Wu:

AudioKey: a usable device pairing system using audio signals on smartwatches. 46-58 - Guanlin Chen, Xiaolong Shi, Moke Chen, Liang Zhou:

Text similarity semantic calculation based on deep reinforcement learning. 59-66
Volume 15, Number 2, 2020
- Zeng-Guang Wang, Yu Lu, Xi Li:

Optimal network defense strategy selection based on Bayesian game. 67-77 - Rajrupa Singh, R. Selvakumar

:
Designing a secure positioning system using blockchain technology. 78-84 - Haibo Liu, Yujie Dong, Fuzhong Wang:

An improved weighted centroid localisation algorithm for wireless sensor networks in coal mine underground. 85-92 - Along Yu, Jiajia Ji, Hao Cao, Hongbing Sun, Jinqiao Dai:

Wireless corrosion monitoring system based on an interdigital capacitive corrosion sensor. 93-100 - Yuan Ping

, Xuyang Guo, Baocang Wang, Jingxian Zhou:
Secure outsourcing of modular inverses and scalar multiplications on elliptic curves. 101-110 - Wesam Almobaideen, Muhyidean Altarawneh:

Fog computing: survey on decoy information technology. 111-121
Volume 15, Number 3, 2020
- Ahmad Azab:

Packing resistant solution to group malware binaries. 123-132 - Cláudio Alves, Flávia Bernardini, Edwin B. Mitacc Meza, Leandro Sousa:

Evaluating the behaviour of stream learning algorithms for detecting invasion on wireless networks. 133-140 - Guanlin Chen, Jiawei Shi, Huang Xu

, Tian Li, Wujian Yang:
An improved genetic algorithm in shared bicycle parking point allocation. 141-147 - Tianwei Chen

, Yongjun Qiang, Chunming Tang, Zairong Wang, Ping Luo, Lingxi Peng:
Malicious behaviour identification for Android based on an RBF neural network. 148-154 - Yufeng Li, Shiyu Gu, Weiping Zhao, Yufeng Huang:

Space-time adaptive processing anti-jamming algorithm for navigation receiver. 155-163 - Bhabendu Kumar Mohanta, Debasish Jena, Srichandan Sobhanayak

:
Multi-party computation review for secure data processing in IoT-fog computing environment. 164-174 - Nouhad Sanoussi, Ghizlane Orhanou, Said El Hajji:

A game theoretic approach based on intrusion tolerant systems. 175-181
Volume 15, Number 4, 2020
- Mostafa H. Ammar, Ayman A. Abdel-Hamid

, Mohamed R. M. Rizk, Magdy A. Ahmed:
A framework for security enhancement in multitenant SDN-based datacentres. 183-196 - Haiqing Han, Siru Zhu, Qin Li, Xiao Wang, Yutian Lei, Yuwei Zhang:

Public-key cryptosystem based on quantum BCH codes and its quantum digital signature. 197-205 - Yong Zhang, Tong Wang, Qi Chen, Yu Shi, Jinzhao Li, Liyi Zhang:

Gas leakage acoustic source localisation with compressed sensing method in sensor networks. 206-213 - Bing Yang, Gang Zhao, Ming-hua Hu, Chang-ping Liu, Ying-bao Yang:

A cluster collaborative synchronisation dynamic model of the dissipative coupling supply chain network. 214-223 - Hao Wang, Xiuyou Wang, Huaming Liu, Dongqing Xu, Zhengyan Liu:

A face recognition algorithm based on multiple convolution kernels and double layer sparse automatic encoder. 224-232 - Rohit Singh

, Mala Kalra
, Shano Solanki:
A hybrid approach for intrusion detection based on machine learning. 233-242

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














