{"id":"https://openalex.org/W3096519388","doi":"https://doi.org/10.1155/2020/8868672","title":"Mimic Encryption Box for Network Multimedia Data Security","display_name":"Mimic Encryption Box for Network Multimedia Data Security","publication_year":2020,"publication_date":"2020-10-28","ids":{"openalex":"https://openalex.org/W3096519388","doi":"https://doi.org/10.1155/2020/8868672","mag":"3096519388"},"language":"en","primary_location":{"id":"doi:10.1155/2020/8868672","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/8868672","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/8868672.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2020/8868672.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046345742","display_name":"Xiabing Zhou","orcid":"https://orcid.org/0000-0002-6497-8118"},"institutions":[{"id":"https://openalex.org/I3923682","display_name":"Soochow University","ror":"https://ror.org/05t8y2r12","country_code":"CN","type":"education","lineage":["https://openalex.org/I3923682"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiabing Zhou","raw_affiliation_strings":["School of Computer Science and Technology, Soochow University, Suzhou 215006, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Soochow University, Suzhou 215006, China","institution_ids":["https://openalex.org/I3923682"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060283626","display_name":"Bin Li","orcid":"https://orcid.org/0000-0003-3455-4901"},"institutions":[{"id":"https://openalex.org/I38877650","display_name":"Zhengzhou University","ror":"https://ror.org/04ypx8c21","country_code":"CN","type":"education","lineage":["https://openalex.org/I38877650"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Bin Li","raw_affiliation_strings":["School of Information Engineering, Zhengzhou University, Zhengzhou 450001, China"],"affiliations":[{"raw_affiliation_string":"School of Information Engineering, Zhengzhou University, Zhengzhou 450001, China","institution_ids":["https://openalex.org/I38877650"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040770689","display_name":"Yanrong Qi","orcid":null},"institutions":[{"id":"https://openalex.org/I38877650","display_name":"Zhengzhou University","ror":"https://ror.org/04ypx8c21","country_code":"CN","type":"education","lineage":["https://openalex.org/I38877650"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yanrong Qi","raw_affiliation_strings":["School of Information Engineering, Zhengzhou University, Zhengzhou 450001, China"],"affiliations":[{"raw_affiliation_string":"School of Information Engineering, Zhengzhou University, Zhengzhou 450001, China","institution_ids":["https://openalex.org/I38877650"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5061619958","display_name":"Wanying Dong","orcid":null},"institutions":[{"id":"https://openalex.org/I38877650","display_name":"Zhengzhou University","ror":"https://ror.org/04ypx8c21","country_code":"CN","type":"education","lineage":["https://openalex.org/I38877650"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wanying Dong","raw_affiliation_strings":["School of Information Engineering, Zhengzhou University, Zhengzhou 450001, China"],"affiliations":[{"raw_affiliation_string":"School of Information Engineering, Zhengzhou University, Zhengzhou 450001, China","institution_ids":["https://openalex.org/I38877650"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5060283626"],"corresponding_institution_ids":["https://openalex.org/I38877650"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":0.9092,"has_fulltext":true,"cited_by_count":14,"citation_normalized_percentile":{"value":0.74700461,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":93,"max":98},"biblio":{"volume":"2020","issue":null,"first_page":"1","last_page":"24"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8878940939903259},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8237742185592651},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6147621870040894},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.4767093062400818},{"id":"https://openalex.org/keywords/40-bit-encryption","display_name":"40-bit encryption","score":0.4612646698951721},{"id":"https://openalex.org/keywords/client-side-encryption","display_name":"Client-side encryption","score":0.44015949964523315},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.41139328479766846},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3718191385269165},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.35940080881118774}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8878940939903259},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8237742185592651},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6147621870040894},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.4767093062400818},{"id":"https://openalex.org/C158215988","wikidata":"https://www.wikidata.org/wiki/Q4637271","display_name":"40-bit encryption","level":3,"score":0.4612646698951721},{"id":"https://openalex.org/C166501710","wikidata":"https://www.wikidata.org/wiki/Q5132476","display_name":"Client-side encryption","level":4,"score":0.44015949964523315},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.41139328479766846},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3718191385269165},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.35940080881118774}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2020/8868672","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/8868672","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/8868672.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:127ea908d6ab46cc803b33c3a7c377dc","is_oa":true,"landing_page_url":"https://doaj.org/article/127ea908d6ab46cc803b33c3a7c377dc","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2020 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2020/8868672","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/8868672","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/8868672.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3096519388.pdf","grobid_xml":"https://content.openalex.org/works/W3096519388.grobid-xml"},"referenced_works_count":49,"referenced_works":["https://openalex.org/W1529923522","https://openalex.org/W1612694023","https://openalex.org/W2044200883","https://openalex.org/W2260073882","https://openalex.org/W2274365030","https://openalex.org/W2293796414","https://openalex.org/W2323708796","https://openalex.org/W2466396324","https://openalex.org/W2515677778","https://openalex.org/W2518121053","https://openalex.org/W2567699270","https://openalex.org/W2584090589","https://openalex.org/W2605104453","https://openalex.org/W2612580082","https://openalex.org/W2625871177","https://openalex.org/W2752901856","https://openalex.org/W2762598533","https://openalex.org/W2775782358","https://openalex.org/W2783544968","https://openalex.org/W2783638182","https://openalex.org/W2787811971","https://openalex.org/W2788364373","https://openalex.org/W2790543264","https://openalex.org/W2790934671","https://openalex.org/W2791875802","https://openalex.org/W2794554712","https://openalex.org/W2801393164","https://openalex.org/W2885098807","https://openalex.org/W2896464970","https://openalex.org/W2903945215","https://openalex.org/W2914464959","https://openalex.org/W2915600598","https://openalex.org/W2916460413","https://openalex.org/W2920921060","https://openalex.org/W2945183771","https://openalex.org/W2950174048","https://openalex.org/W2967777333","https://openalex.org/W2970533884","https://openalex.org/W2971913919","https://openalex.org/W2999225884","https://openalex.org/W3000651374","https://openalex.org/W3010133854","https://openalex.org/W3012314402","https://openalex.org/W3031935844","https://openalex.org/W6748604199","https://openalex.org/W6749697716","https://openalex.org/W6756129568","https://openalex.org/W6760534270","https://openalex.org/W6774397333"],"related_works":["https://openalex.org/W222001389","https://openalex.org/W4308992061","https://openalex.org/W2372014581","https://openalex.org/W2091359829","https://openalex.org/W2379631527","https://openalex.org/W2888614508","https://openalex.org/W2490080356","https://openalex.org/W4239572594","https://openalex.org/W2184640972","https://openalex.org/W1484220609"],"abstract_inverted_index":{"With":[0],"the":[1,5,7,39,64,67,74,89,96,125,129,152,155,159,170,173,176,191,195,205,213,228,248],"rapid":[2],"development":[3],"of":[4,9,41,91,158,172,194,267],"Internet,":[6],"security":[8,40,255],"network":[10,42,53,65,85,107,120,238,268],"multimedia":[11,43,54,68],"data":[12,55,108,160,188,245],"has":[13,133,236,271],"attracted":[14],"increasingly":[15],"more":[16],"attention.":[17],"The":[18,57,221],"moving":[19],"target":[20],"defense":[21,26,256],"(MTD)":[22],"and":[23,78,82,94,109,119,139,150,175,189,224,241,270],"cyber":[24],"mimic":[25,49,58,97,130,229,254],"(CMD)":[27],"approaches":[28],"provide":[29,76],"a":[30,48,101,134,253,265],"new":[31],"way":[32],"to":[33,88,105,123,162,185,211,215],"solve":[34],"this":[35,45,234],"problem.":[36],"To":[37],"enhance":[38],"data,":[44],"paper":[46,235],"proposes":[47],"encryption":[50,59,80,98,103,131,230,239],"box":[51,60,99,132,231],"for":[52],"security.":[56,273],"can":[61,144,182,242,262],"directly":[62],"access":[63,179],"where":[66],"device":[69],"is":[70,203,209],"located,":[71],"automatically":[72],"complete":[73],"negotiation,":[75],"safe":[77],"convenient":[79],"services,":[81],"effectively":[83,243,263],"prevent":[84,244],"attacks.":[86],"According":[87],"principles":[90],"dynamization,":[92],"diversification,":[93],"randomization,":[95],"uses":[100,110],"reconfigurable":[102],"algorithm":[104],"encrypt":[106],"IP":[111],"address":[112],"hopping,":[113,116],"port":[114],"number":[115,137],"protocol":[117],"camouflage,":[118],"channel":[121],"change":[122],"increase":[124],"attack":[126],"threshold.":[127],"Second,":[128],"built-in":[135],"pseudorandom":[136],"generator":[138],"key":[140,149,153],"management":[141],"system,":[142],"which":[143,261],"generate":[145],"an":[146,178,201],"initial":[147],"random":[148],"update":[151],"with":[154],"hash":[156],"value":[157],"packet":[161],"achieve":[163],"\u201cone":[164],"packet,":[165],"one":[166],"key.\u201d":[167],"Finally,":[168],"through":[169],"cooperation":[171],"ARM":[174],"FPGA,":[177],"control":[180],"list":[181],"be":[183],"used":[184,210],"filter":[186],"illegal":[187],"monitor":[190],"working":[192],"status":[193],"system":[196],"in":[197,233],"real":[198],"time.":[199],"If":[200],"abnormality":[202],"found,":[204],"feedback":[206],"reconstruction":[207],"mechanism":[208,257],"\u201cclean\u201d":[212],"FPGA":[214],"make":[216],"it":[217,251],"work":[218],"normally":[219],"again.":[220],"experimental":[222],"results":[223],"analysis":[225],"show":[226],"that":[227],"designed":[232],"high":[237,272],"performance":[240],"leakage.":[246],"At":[247],"same":[249],"time,":[250],"provides":[252],"at":[258],"multiple":[259],"levels,":[260],"resist":[264],"variety":[266],"attacks":[269]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
