{"title":"A security control scheme based on quantum keys for IoT terminals","authors":"Dexin Zhu, Xiaogang Du, Jigui Mao, Lijun Song","doi":"10.1504/ijsn.2023.134123","DOIUrl":"https://doi.org/10.1504/ijsn.2023.134123","url":null,"abstract":"","PeriodicalId":39544,"journal":{"name":"International Journal of Security and Networks","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136302307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Moving object location prediction based on a graph neural network with temporal attention","authors":"Jun Qian, Yubao Wu","doi":"10.1504/ijsn.2023.134133","DOIUrl":"https://doi.org/10.1504/ijsn.2023.134133","url":null,"abstract":"","PeriodicalId":39544,"journal":{"name":"International Journal of Security and Networks","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136302294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-modal Rumor Detection Using Bilinear Pooling and Domain Adversarial Neural Networks","authors":"Jinrui Zhang, Hongwei Zhang, Chao Wang, L. Gu","doi":"10.1504/ijsn.2023.10055515","DOIUrl":"https://doi.org/10.1504/ijsn.2023.10055515","url":null,"abstract":"","PeriodicalId":39544,"journal":{"name":"International Journal of Security and Networks","volume":"38 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76708153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive Fault Diagnosis Model for High-Speed Railway Turnout Using Deep Convolutional Neural Networks","authors":"Xiaoyu Jiang","doi":"10.1504/ijsn.2023.10058289","DOIUrl":"https://doi.org/10.1504/ijsn.2023.10058289","url":null,"abstract":"","PeriodicalId":39544,"journal":{"name":"International Journal of Security and Networks","volume":"53 1","pages":"165-174"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80406134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Moving Object Location Prediction Based on a Graph Neural Network with Temporal Attention","authors":"Yubao Wu, Jun Qian","doi":"10.1504/ijsn.2023.10058288","DOIUrl":"https://doi.org/10.1504/ijsn.2023.10058288","url":null,"abstract":"","PeriodicalId":39544,"journal":{"name":"International Journal of Security and Networks","volume":"6 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73001071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi Group Key Agreement Protocol Using Secret Sharing Scheme","authors":"Rukma Rekha N, Rolla Subrahmanyam, Subba Rao Y.V.","doi":"10.1504/ijsn.2023.10056277","DOIUrl":"https://doi.org/10.1504/ijsn.2023.10056277","url":null,"abstract":"","PeriodicalId":39544,"journal":{"name":"International Journal of Security and Networks","volume":"136 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73240203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enabling Secure Modern Web Browsers against Cache-Based Timing Attacks","authors":"Sangeetha Ganesan N.A.","doi":"10.1504/ijsn.2023.10058114","DOIUrl":"https://doi.org/10.1504/ijsn.2023.10058114","url":null,"abstract":"","PeriodicalId":39544,"journal":{"name":"International Journal of Security and Networks","volume":"26 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83597217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive fault diagnosis model for high-speed railway turnout using deep convolutional neural networks","authors":"Xiaoyu Jiang","doi":"10.1504/ijsn.2023.134134","DOIUrl":"https://doi.org/10.1504/ijsn.2023.134134","url":null,"abstract":"","PeriodicalId":39544,"journal":{"name":"International Journal of Security and Networks","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136303142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Oscar Danilo Gavilánez Alvarez, G. D. Rodriguez Rafael
{"title":"VoIP security auditing model based on COBIT 4.1","authors":"Oscar Danilo Gavilánez Alvarez, G. D. Rodriguez Rafael","doi":"10.1504/ijsn.2022.10047901","DOIUrl":"https://doi.org/10.1504/ijsn.2022.10047901","url":null,"abstract":"","PeriodicalId":39544,"journal":{"name":"International Journal of Security and Networks","volume":"10 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79363135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}