- Angshuman Jana. Sensitive information leakage analysis of database code by abstract interpretation. IJSN, 18(2):91-105, 2023.
- Changsong Zhou, Guozi Sun, Xuan You, Yu Gu. A slice-based encryption scheme for IPFS. IJSN, 18(1):42-51, 2023.
- Nadia Niknami, Jie Wu 0001. MB-CIM: a multi-round budgeted competitive influence maximisation. IJSN, 18(1):30-41, 2023.
- Hao Yan, Zheng Zhang, Yanan Liu, Shuo Qiu, Qiuling Wu. Comments on a dynamic cloud data integrity verification scheme: security analysis and improvement. IJSN, 18(2):125-132, 2023.
- Mingyue Qiu, Xueying Zhang, Xinmeng Wang. An ex-convict recognition method based on text mining. IJSN, 18(1):10-18, 2023.
- Hehui Zhang, Yong Yang, Xi Song, Wenhui Li, Shuqiang Guo. An abnormal intrusion detection method based on self-organising model. IJSN, 18(2):117-124, 2023.
- Suhan Jiang, Jie Wu 0001. A blockchain-based NFV market in the multi-node edge computing network. IJSN, 18(1):52-64, 2023.
- Wuchao Shi. Research on system safety in the case of component failure based on degree correlation. IJSN, 18(2):65-74, 2023.
- Redhwan M. A. Saad, Khaled A. M. Al Soufy, Samir I. Shaheen. Security in smart home environment: issues, challenges, and countermeasures - a survey. IJSN, 18(1):1-9, 2023.
- Yan Yan 0015, Eyeleko Anselme Herman, Adnan Mahmood, Zichao Sun, Zhuoyue Dong, Fei Xu. Privacy preserving dynamic data release based on non-synonymous diverse anatomy. IJSN, 18(2):75-90, 2023.