Sample articles
You can read all of these full-text articles free of charge - click
International Journal of Security and Networks
Title | Author(s) | Vol. and Issue nos. | Page nos. | Full-text article |
A blockchain-based NFV market in the multi-node edge computing network | Suhan Jiang; Jie Wu | Vol.18 No.1 | 52-64 | |
A slice-based encryption scheme for IPFS | Changsong Zhou; Guozi Sun; Xuan You; Yu Gu | Vol.18 No.1 | 42-51 | |
MB-CIM: a multi-round budgeted competitive influence maximisation | Nadia Niknami; Jie Wu | Vol.18 No.1 | 30-41 | |
A multi-theory model to evaluate new factors influencing information security compliance | Aatish Chiniah; Feroz Ghannoo | Vol.18 No.1 | 19-29 | |
An ex-convict recognition method based on text mining | Mingyue Qiu; Xueying Zhang; Xinmeng Wang | Vol.18 No.1 | 10-18 | |
Security in smart home environment: issues, challenges, and countermeasures - a survey | Redhwan M.A. Saad; Khaled A.M. Al Soufy; Samir I. Shaheen | Vol.18 No.1 | 1-9 |