Journal: IJSN

Volume 19, Issue 4

169 -- 177Huiru Zhang, Ruixiao Liu, Huijuan Liu. Information security based on featureless attack algorithm
178 -- 187Xianmeng Meng, Cuicui Cai, Linglong Tan, Qijian Wang. Resource allocation for wireless networks based on enhanced Harris hawks optimisation algorithm
188 -- 198Zhilei Ying, Yanan Meng, Ruoxi Chen, Jianlou Lou. HKB-YOLO: transmission line fire detection method based on hierarchical feature fusion
199 -- 209P. S. Rohini, I. Sowmy. Hybrid VGG-DenseNet for anomalous behaviour detection in crowded video scenes
210 -- 223Kiruthika Jagannathan, Shina Sheen. Dynamic deception-based technique for crypto-ransomware detection

Volume 19, Issue 3

109 -- 127Sumit Chopra, Gagandeep Singh Bains, Simranjot Kaur, Rajesh Sharma, Anchal Nayyar. A review of the various applications and security issues in IoT and its future aspects
128 -- 137Qinqin Dong. Safety monitoring system for tourist scenic spots based on crowd scene type recognition
138 -- 149Vipin Vijayachandran, Suchithra Ramachandran Nair. LR-SDP: lightweight privacy preservation approach for distributed mobile devices in IoT environment
150 -- 158Mohamed Abdelkarim Remmide, Fatima Boumahdi, Narhimene Boustia. Advancing automated social engineering detection with oversampling-based machine learning
159 -- 167Wenbo Sun, Wei Wang, Chenguang Bai. A new method of large integer prime decomposition for network public key cryptosystem

Volume 19, Issue 2

55 -- 62Khaleda Afroaz, Y. V. Subba Rao, N. Rukma Rekha. Secure identity-based encryption: overcoming the key escrow challenge
63 -- 76Rashmi Bhatia, Rohini Sharma. Multiclassification of DDoS attacks using machine and deep learning techniques
77 -- 91Avinash Srinivasan, Christian Rose, Jie Wu 0001. slackFS - resilient and persistent information hiding framework
92 -- 100Bailin Zou, Tianhang Liu. A network traffic classification and anomaly detection method based on parallel cross-convolutional neural networks
101 -- 108Shiva Krishna Nallabothu, N. Rukma Rekha, Y. V. Subba Rao. Generalised secret sharing scheme for non-monotone access structures using MDS codes

Volume 19, Issue 1

1 -- 9Yang Xiong, Yang Cheng. A new edge weight-based measure for k-shell influential node identification in complex networks
10 -- 19Huajin Liu, Chunhua Ju, Houyuan Zhang. A social network security user recommendation algorithm based on community user emotions
20 -- 30Chia-Mei Chen, Ze-Yu Lin, Ya-Hui Ou, Jiunn-Wu Lin. A hybrid malware analysis approach for identifying process-injection malware based on machine learning
31 -- 42Yutao Hu, Yuntao Zhao, Yongxin Feng, Xiangyu Ma. OneR-DQN: a botnet traffic detection model based on deep Q network algorithm in deep reinforcement learning
43 -- 54Sangeetha Ganesan. Enabling secure modern web browsers against cache-based timing attacks