-
MHSDN: A Hierarchical Software Defined Network Reliability Framework design
Author: Zhu, Zhengbin; Liu, Qinrang; Liu, Dongpei; Ge, ChenYang; Wang, Chong
Journal: IET INFORMATION SECURITY. 2023; Vol. 17, Issue 1, pp. 102-117. DOI: 10.1049/ise2.12080
-
DeepCatra: Learning flow- and graph-based behaviours for Android malware detection
Author: Wu, Yafei; Shi, Jian; Wang, Peicheng; Zeng, Dongrui; Sun, Cong
Journal: IET INFORMATION SECURITY. 2023; Vol. 17, Issue 1, pp. 118-130. DOI: 10.1049/ise2.12082
-
A semantic-based method for analysing unknown malicious behaviours via hyper-spherical variational auto-encoders
Author: Wang, Yi-feng; Guo, Yuan-bo; Fang, Chen
Journal: IET INFORMATION SECURITY. 2023; Vol. 17, Issue 2, pp. 244-254. DOI: 10.1049/ise2.12088
-
Robust private information retrieval for low encoding/decoding complexity distributed storage
Author: Dai, Mingjun; Deng, Haiyan; Li, Xiaofeng; Su, Gongchao; Zhang, Zhonghao
Journal: IET INFORMATION SECURITY. 2023; Vol. 17, Issue 2, pp. 255-268. DOI: 10.1049/ise2.12090
-
Stacking ensemble learning with heterogeneous models and selected feature subset for prediction of service trust in internet of medical things
Author: Ren, Junyu; Wan, Haibin; Zhu, Chaoyang; Qin, Tuanfa
Journal: IET INFORMATION SECURITY. 2023; Vol. 17, Issue 2, pp. 269-288. DOI: 10.1049/ise2.12091
-
Improved integral cryptanalysis of SPNbox in digital rights management systems
Author: Liu, Jun; Wang, Dachao; Hu, Yupu; Chen, Jie; Wang, Baocang
Journal: IET INFORMATION SECURITY. 2023; Vol. 17, Issue 1, pp. 147-158. DOI: 10.1049/ise2.12087
-
Arithmetic correlation of binary half-l-sequences
Author: Chen, Zhixiong; Edemskiy, Vladimir; Niu, Zhihua; Sang, Yuqi
Journal: IET INFORMATION SECURITY. 2023; Vol. 17, Issue 2, pp. 289-293. DOI: 10.1049/ise2.12093
-
Efficient module learning with errors-based post-quantum password-authenticated key exchange
Author: Ren, Peixin; Gu, Xiaozhuo; Wang, Ziliang
Journal: IET INFORMATION SECURITY. 2023; Vol. 17, Issue 1, pp. 3-17. DOI: 10.1049/ise2.12094