
International Journal of Security and Networks
2025 Vol.20 No.3
| Pages | Title and author(s) |
| 133-150 | Optimised deep learning-based intrusion detection using Ethereum blockchain framework for secure data sharingAnju Raveendran; R. Dhanapal DOI: 10.1504/IJSN.2025.148971 |
| 151-163 | An automatic access control based on an improved CP-ABE algorithm in wireless sensor networksZhihao Yin; Haowen Zha; Canyu Yang; Qidong Ling DOI: 10.1504/IJSN.2025.148970 |
| 164-174 | Multimodal speech-based human-computer interaction in automotive systems with integrated service recommendationEnlin Xie DOI: 10.1504/IJSN.2025.148973 |
| 175-186 | Network security threat situation assessment by integrating deep learning and parallel feature extraction networksWei Yu; Xiaoling Chen; Jie Luo; Rende Zhang DOI: 10.1504/IJSN.2025.148976 |
| 187-196 | Techniques for discovering broken access control vulnerabilities constructed upon abnormal behavioursShuo Wen; Qi Wu; Lixuan Zhao; Qifeng Li; Kangyuan He; Tingjun Huang DOI: 10.1504/IJSN.2025.148977 |