{"title":"A Security Control Scheme Based on Quantum Keys for IoT Terminals","authors":"Lijun Song, Jigui Mao, Xiaogang Du, Dexin Zhu","doi":"10.1504/ijsn.2023.10056655","DOIUrl":"https://doi.org/10.1504/ijsn.2023.10056655","url":null,"abstract":"","PeriodicalId":39544,"journal":{"name":"International Journal of Security and Networks","volume":"73 1","pages":"189-198"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74234819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MalGA-LSTM: a malicious code detection model based on genetic algorithm optimising LSTM trainable parameters","authors":"Yudi Zhang, Yongxin Feng, Yuntao Zhao","doi":"10.1504/ijsn.2023.134131","DOIUrl":"https://doi.org/10.1504/ijsn.2023.134131","url":null,"abstract":"","PeriodicalId":39544,"journal":{"name":"International Journal of Security and Networks","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136302287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MalGA-LSTM: A malicious code detection model based on genetic algorithm optimizing LSTM trainable parameters","authors":"Yuntao Zhao, Yongxin Feng, Yudi Zhang","doi":"10.1504/ijsn.2023.10058068","DOIUrl":"https://doi.org/10.1504/ijsn.2023.10058068","url":null,"abstract":"","PeriodicalId":39544,"journal":{"name":"International Journal of Security and Networks","volume":"67 1","pages":"133-142"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85143994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Detailed Analysis of Public Industrial Control System Datasets","authors":"Sinil Mubarak, M.D. Rafiqul Islam, Asaad Babiker, Mohamed Habaebi","doi":"10.1504/ijsn.2023.10058681","DOIUrl":"https://doi.org/10.1504/ijsn.2023.10058681","url":null,"abstract":"","PeriodicalId":39544,"journal":{"name":"International Journal of Security and Networks","volume":"14 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73099927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Edge Weight-Based Measure for K-Shell Influential Node Identification in Complex Networks","authors":"Yang Cheng, Yang Xiong","doi":"10.1504/ijsn.2023.10059505","DOIUrl":"https://doi.org/10.1504/ijsn.2023.10059505","url":null,"abstract":"","PeriodicalId":39544,"journal":{"name":"International Journal of Security and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135845326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Overview of Location Privacy Protection in Spatial Crowdsourcing Platforms During the Task Assignment Process","authors":"Manal Bayousef, Maysoon Maysoon, Amal Albilali","doi":"10.1504/ijsn.2023.10058091","DOIUrl":"https://doi.org/10.1504/ijsn.2023.10058091","url":null,"abstract":"","PeriodicalId":39544,"journal":{"name":"International Journal of Security and Networks","volume":"33 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72981106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Identity-Based Ring Identification Scheme and Identity-Based Ring Signature Scheme on Lattices","authors":"Zhiqi Zhao, Jingang Liu, Xiaohui Hu, Huiwen Jia","doi":"10.1504/ijsn.2023.10060346","DOIUrl":"https://doi.org/10.1504/ijsn.2023.10060346","url":null,"abstract":"","PeriodicalId":39544,"journal":{"name":"International Journal of Security and Networks","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135610159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CPPABK: Conditional Privacy-Preserving Authentication Scheme for VANETs Based on the Key Derivation Algorithm","authors":"Yixuan Wang, Xian Guo","doi":"10.1504/ijsn.2023.10058452","DOIUrl":"https://doi.org/10.1504/ijsn.2023.10058452","url":null,"abstract":"","PeriodicalId":39544,"journal":{"name":"International Journal of Security and Networks","volume":"27 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82259901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}