Security And Communication Networks

Security And Communication Networks

安全和通信网络

  • 4区 中科院分区
  • Q3 JCR分区

高引用文章

文章名称 引用次数
Performance Analysis of Hyperledger Fabric Platforms 21
Security and Privacy in the Medical Internet of Things: A Review 16
A DDoS Attack Detection Method Based on SVM in Software Defined Network 15
A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack 15
A Model Based on Convolutional Neural Network for Online Transaction Fraud Detection 14
New Certificateless Aggregate Signature Scheme for Healthcare Multimedia Social Network on Cloud Environment 13
Detecting Malware with an Ensemble Method Based on Deep Neural Network 13
Perceptual Hashing-Based Image Copy-Move Forgery Detection 12
Research on Defensive Strategy of Real-Time Price Attack Based on Multiperson Zero-Determinant 11
DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation 10
Moving Target Defense Techniques: A Survey 9
Defending against the Advanced Persistent Threat: An Optimal Control Approach 9
An Injective S-Box Design Scheme over an Ordered Isomorphic Elliptic Curve and Its Characterization 9
Use of Data Visualisation for Zero-Day Malware Detection 8
Building an Effective Intrusion Detection System by Using Hybrid Data Optimization Based on Machine Learning Algorithms 7
An Evolutionary Computation Based Feature Selection Method for Intrusion Detection 7
Blockchain-Based Access Control Model to Preserve Privacy for Personal Health Record Systems 7
Security Metric Methods for Network Multistep Attacks Using AMC and Big Data Correlation Analysis 7
A Homomorphic Network Coding Signature Scheme for Multiple Sources and its Application in IoT 6
An Aggregate Signature Based Trust Routing for Data Gathering in Sensor Networks 6
Integrity Audit of Shared Cloud Data with Identity Tracking 6
Dynamics on Hybrid Complex Network: Botnet Modeling and Analysis of Medical IoT 6
Quantum Cryptography for the Future Internet and the Security Analysis 6
A Comparative Analysis of Information Hiding Techniques for Copyright Protection of Text Documents 6
Distance Measurement Methods for Improved Insider Threat Detection 6
Novel Meaningful Image Encryption Based on Block Compressive Sensing 5
5G NB-IoT: Efficient Network Traffic Filtering for Multitenant IoT Cellular Networks 5
Modelling the Spread of Botnet Malware in IoT-Based Wireless Sensor Networks 5
Vulnerability Analysis of Network Scanning on SCADA Systems 5
Secure Virtualization Environment Based on Advanced Memory Introspection 5
Blockchain Based Credibility Verification Method for IoT Entities 5
To Study the Effect of the Generating Polynomial on the Quality of Nonlinear Components in Block Ciphers 5
High Capacity Image Steganography Using Modified LSB Substitution and PVD against Pixel Difference Histogram Analysis 5
Towards a Novel Trust-Based Multicast Routing for VANETs 5
Analysis on Matrix GSW-FHE and Optimizing Bootstrapping 5
Smart Detection: An Online Approach for DoS/DDoS Attack Detection Using Machine Learning 5
Survey of Authentication and Authorization for the Internet of Things 4
A Survey on Security-Aware Measurement in SDN 4
Lightweight and Secure Three-Factor Authentication Scheme for Remote Patient Monitoring Using On-Body Wireless Networks 4
Leverage Website Favicon to Detect Phishing Websites 4
A Lightweight Secure User Authentication and Key Agreement Protocol for Wireless Sensor Networks 4
Network Threats Mitigation Using Software-Defined Networking for the 5G Internet of Radio Light System 4
Secure and Efficient Searchable Public Key Encryption for Resource Constrained Environment Based on Pairings under Prime Order Group 4
Energy-Efficient Cloudlet Management for Privacy Preservation in Wireless Metropolitan Area Networks 4
A Novel Technique for the Construction of Safe Substitution Boxes Based on Cyclic and Symmetric Groups 4
An Effective Framework for Chaotic Image Encryption Based on 3D Logistic Map 4
Blind Image Watermarking Based on Adaptive Data Spreading in n-Level DWT Subbands 4
OverWatch: A Cross-Plane DDoS Attack Defense Framework with Collaborative Intelligence in SDN 4
A Robust Watermarking Scheme for Online Multimedia Copyright Protection Using New Chaotic Map 4
TR-IDS: Anomaly-Based Intrusion Detection through Text-Convolutional Neural Network and Random Forest 4