International Journal of Security and Networks最新文献

筛选
英文 中文
A Security Control Scheme Based on Quantum Keys for IoT Terminals 基于量子密钥的物联网终端安全控制方案
International Journal of Security and Networks Pub Date : 2023-01-01 DOI: 10.1504/ijsn.2023.10056655
Lijun Song, Jigui Mao, Xiaogang Du, Dexin Zhu
{"title":"A Security Control Scheme Based on Quantum Keys for IoT Terminals","authors":"Lijun Song, Jigui Mao, Xiaogang Du, Dexin Zhu","doi":"10.1504/ijsn.2023.10056655","DOIUrl":"https://doi.org/10.1504/ijsn.2023.10056655","url":null,"abstract":"","PeriodicalId":39544,"journal":{"name":"International Journal of Security and Networks","volume":"73 1","pages":"189-198"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74234819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MalGA-LSTM: a malicious code detection model based on genetic algorithm optimising LSTM trainable parameters MalGA-LSTM:基于遗传算法优化LSTM可训练参数的恶意代码检测模型
International Journal of Security and Networks Pub Date : 2023-01-01 DOI: 10.1504/ijsn.2023.134131
Yudi Zhang, Yongxin Feng, Yuntao Zhao
{"title":"MalGA-LSTM: a malicious code detection model based on genetic algorithm optimising LSTM trainable parameters","authors":"Yudi Zhang, Yongxin Feng, Yuntao Zhao","doi":"10.1504/ijsn.2023.134131","DOIUrl":"https://doi.org/10.1504/ijsn.2023.134131","url":null,"abstract":"","PeriodicalId":39544,"journal":{"name":"International Journal of Security and Networks","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136302287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-modal rumour detection using bilinear pooling and domain adversarial neural networks 基于双线性池化和领域对抗神经网络的多模态谣言检测
International Journal of Security and Networks Pub Date : 2023-01-01 DOI: 10.1504/ijsn.2023.134116
Chao Wang, Hongwei Zhang, Jinrui Zhang, Lichuan Gu
{"title":"Multi-modal rumour detection using bilinear pooling and domain adversarial neural networks","authors":"Chao Wang, Hongwei Zhang, Jinrui Zhang, Lichuan Gu","doi":"10.1504/ijsn.2023.134116","DOIUrl":"https://doi.org/10.1504/ijsn.2023.134116","url":null,"abstract":"","PeriodicalId":39544,"journal":{"name":"International Journal of Security and Networks","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136302289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MalGA-LSTM: A malicious code detection model based on genetic algorithm optimizing LSTM trainable parameters MalGA-LSTM:一种基于遗传算法优化LSTM可训练参数的恶意代码检测模型
International Journal of Security and Networks Pub Date : 2023-01-01 DOI: 10.1504/ijsn.2023.10058068
Yuntao Zhao, Yongxin Feng, Yudi Zhang
{"title":"MalGA-LSTM: A malicious code detection model based on genetic algorithm optimizing LSTM trainable parameters","authors":"Yuntao Zhao, Yongxin Feng, Yudi Zhang","doi":"10.1504/ijsn.2023.10058068","DOIUrl":"https://doi.org/10.1504/ijsn.2023.10058068","url":null,"abstract":"","PeriodicalId":39544,"journal":{"name":"International Journal of Security and Networks","volume":"67 1","pages":"133-142"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85143994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Detailed Analysis of Public Industrial Control System Datasets 公共工业控制系统数据集的详细分析
International Journal of Security and Networks Pub Date : 2023-01-01 DOI: 10.1504/ijsn.2023.10058681
Sinil Mubarak, M.D. Rafiqul Islam, Asaad Babiker, Mohamed Habaebi
{"title":"A Detailed Analysis of Public Industrial Control System Datasets","authors":"Sinil Mubarak, M.D. Rafiqul Islam, Asaad Babiker, Mohamed Habaebi","doi":"10.1504/ijsn.2023.10058681","DOIUrl":"https://doi.org/10.1504/ijsn.2023.10058681","url":null,"abstract":"","PeriodicalId":39544,"journal":{"name":"International Journal of Security and Networks","volume":"14 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73099927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Edge Weight-Based Measure for K-Shell Influential Node Identification in Complex Networks 基于边缘权重的复杂网络k -壳影响节点识别新方法
International Journal of Security and Networks Pub Date : 2023-01-01 DOI: 10.1504/ijsn.2023.10059505
Yang Cheng, Yang Xiong
{"title":"A New Edge Weight-Based Measure for K-Shell Influential Node Identification in Complex Networks","authors":"Yang Cheng, Yang Xiong","doi":"10.1504/ijsn.2023.10059505","DOIUrl":"https://doi.org/10.1504/ijsn.2023.10059505","url":null,"abstract":"","PeriodicalId":39544,"journal":{"name":"International Journal of Security and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135845326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Overview of Location Privacy Protection in Spatial Crowdsourcing Platforms During the Task Assignment Process 空间众包平台任务分配过程中的位置隐私保护综述
International Journal of Security and Networks Pub Date : 2023-01-01 DOI: 10.1504/ijsn.2023.10058091
Manal Bayousef, Maysoon Maysoon, Amal Albilali
{"title":"An Overview of Location Privacy Protection in Spatial Crowdsourcing Platforms During the Task Assignment Process","authors":"Manal Bayousef, Maysoon Maysoon, Amal Albilali","doi":"10.1504/ijsn.2023.10058091","DOIUrl":"https://doi.org/10.1504/ijsn.2023.10058091","url":null,"abstract":"","PeriodicalId":39544,"journal":{"name":"International Journal of Security and Networks","volume":"33 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72981106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Identity-Based Ring Identification Scheme and Identity-Based Ring Signature Scheme on Lattices 基于格的高效身份环识别方案和基于身份环签名方案
International Journal of Security and Networks Pub Date : 2023-01-01 DOI: 10.1504/ijsn.2023.10060346
Zhiqi Zhao, Jingang Liu, Xiaohui Hu, Huiwen Jia
{"title":"Efficient Identity-Based Ring Identification Scheme and Identity-Based Ring Signature Scheme on Lattices","authors":"Zhiqi Zhao, Jingang Liu, Xiaohui Hu, Huiwen Jia","doi":"10.1504/ijsn.2023.10060346","DOIUrl":"https://doi.org/10.1504/ijsn.2023.10060346","url":null,"abstract":"","PeriodicalId":39544,"journal":{"name":"International Journal of Security and Networks","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135610159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-group key agreement protocol using secret sharing scheme 采用秘密共享方案的多组密钥协议
International Journal of Security and Networks Pub Date : 2023-01-01 DOI: 10.1504/ijsn.2023.134119
Rolla Subrahmanyam, N. Rukma Rekha, Y.V. Subba Rao
{"title":"Multi-group key agreement protocol using secret sharing scheme","authors":"Rolla Subrahmanyam, N. Rukma Rekha, Y.V. Subba Rao","doi":"10.1504/ijsn.2023.134119","DOIUrl":"https://doi.org/10.1504/ijsn.2023.134119","url":null,"abstract":"","PeriodicalId":39544,"journal":{"name":"International Journal of Security and Networks","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136302761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CPPABK: Conditional Privacy-Preserving Authentication Scheme for VANETs Based on the Key Derivation Algorithm 基于密钥派生算法的vanet条件隐私保护认证方案
International Journal of Security and Networks Pub Date : 2023-01-01 DOI: 10.1504/ijsn.2023.10058452
Yixuan Wang, Xian Guo
{"title":"CPPABK: Conditional Privacy-Preserving Authentication Scheme for VANETs Based on the Key Derivation Algorithm","authors":"Yixuan Wang, Xian Guo","doi":"10.1504/ijsn.2023.10058452","DOIUrl":"https://doi.org/10.1504/ijsn.2023.10058452","url":null,"abstract":"","PeriodicalId":39544,"journal":{"name":"International Journal of Security and Networks","volume":"27 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82259901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信