default search action
Journal of Cyber Security and Mobility, Volume 13
Volume 13, Number 1, 2024
- Liusuo Huang, Yan Song:
Update Algorithm of Secure Computer Database Based on Deep Belief Network. 1-26 - Peng Xiao:
Network Malware Detection Using Deep Learning Network Analysis. 27-52 - Peng Xiao:
Malware Cyber Threat Intelligence System for Internet of Things (IoT) Using Machine Learning. 53-90 - Syed Shuja Hussain, Mohd Faizal Ab Razak, Ahmad Firdaus:
Deep Learning Based Hybrid Analysis of Malware Detection and Classification: A Recent Review. 91-134 - Vikash Kumar Singh, Durga Sivashankar, Kishlay Kundan, Sushmita Kumari:
An Efficient Intrusion Detection and Prevention System for DDOS Attack in WSN Using SS-LSACNN and TCSLR. 135-160 - Nabeel Mahdy Haddad, Mustafa sabah Mustafa, Hayder Sabah Salih, Mustafa Musa Jaber, Mohammed Hasan Ali:
Analysis of the Security of Internet of Multimedia Things in Wireless Environment. 161-192
Volume 13, Number 2, 2024
- Cheng Liu, Xuanxuan Che, Jianshe Xie, Yumin Dong:
A Multi-Path QKD Algorithm with Multiple Segments. 193-214 - Yong Yang, Xuan Chen, Jiaying Xu, Yuxia Li:
Research on Chaotic Image Encryption Based on Fibonacci-ILogistic-IHenon. 215-238 - Biaoqi Li, Min Xu, Yuan Zhou, Haibin Liu, Renlong Zhang:
Optimization of Security Identification in Power Grid Data through Advanced Encryption Standard Algorithm. 239-264
- John Kwao Dawson, Frimpong Twum, James Benjamin Hayfron-Acquah, Yaw Marfo Missah:
Cryptographic Solutions for Data Security in Cloud Computing: A Run Time Trend-based Comparison of NCS, ERSA, and EHS. 265-282
- Yimin Yin:
Information Security and Risk Control Model Based on Plan-Do-Check-Action for Digital Libraries. 305-326
- Yongsheng Deng:
Design of Industrial IoT Intrusion Security Detection System Based on LightGBM Feature Algorithm and Multi-layer Perception Network. 327-348
Volume 13, Number 3, 2024
- Atheer Hussein Zyara, Hakeem Imad Mhaibes, Qahtan Makki Shallal:
Enhancement of Tiny Encryption Algorithm for Resource-Constrained WSNs Using Four Connected Additive Fibonacci Generators. 349-368
- Jiafa Zhang, Hong Zou, Zifeng Zeng, Weijie Xu, Jiawei Jiang:
Feasibility of Using Seq-GAN Model in Vulnerability Detection of Industrial Control Protocols. 393-416 - Wentao Li:
Construction and Analysis of QPSO-LSTM Model in Network Security Situation Prediction. 417-438 - Yunfei Zhang, Xingzhi Xu, Yayuan Shi:
Construction and Analysis of Network Cloud Security Situation Awareness System Based on DBN-DE Algorithm. 439-460 - Huan Wang, Xin Li:
Optimization of Network Security Intelligent Early Warning System Based on Image Matching Technology of Partial Differential Equation. 461-488 - Jun Li, Weijun Huang:
A Study of An Image Encryption Model Based on Tent-Ushiki Chaotic Fusion. 489-516 - Jiabin Li:
Attribute Based Signature Encryption Scheme Based on Cloud Computing in Medical Social Networks. 517-540
- Martin Steinebach:
Robustness and Collision-Resistance of PhotoDNA. 541-564
- Jing Wen, Haifeng Li, Caihui Lan:
On the Security of Key-Aggregate Searchable Encryption. 565-584
Volume 13, Number 4, 2024
- Yanliu Nie:
Analysis and Research on Secure Access Control Technology of Industrial Internet of Things Based on ZTM Model. 585-604 - Botao Hou, Zhefeng Li, Xiaojun Zuo, Yuling Guo, Jianchun Zhou:
Application of Intelligent Cloud Computing Technology in Optical Communication Network Security of Smart Grid. 605-632 - Ying Wang, Xiaojun Zuo, Yuling Guo, Huiying Liu, Jianchun Zhou:
Encryption Technology of Optical Communication Network Based on Artificial Intelligence Technology. 633-656 - Xiaobo Song:
Analysis and Application of Chaotic Genetic Algorithm Based on Network Security in The Research of Resilience of Cluster Networks. 657-676 - Yan Jiang, Jing Huang, Yunsong Fan, Xiaobin Zhu:
Design and Implementation of IPsec VPN IoT Gateway System in National Secret Algorithm. 677-700 - Karam Mustafa Ignaim, João M. Fernandes:
Improving Incident Management Processes with Feature Models. 701-724
- Yanling Wang, Yong Yang:
A Novel Secure and Energy-efficient Routing Method for the Agricultural Internet of Things Using Whale Optimization Algorithm. 725-750 - Rui-chao Xu, Yue-bin Di, Zeng Shou, Xiao Ma, Heqiu Chai, Long Yin:
The Homology Determination System for APT Samples Based on Gene Maps. 751-774 - Zhimin Lv, Jun Wan:
Intrusion Detection in Wireless Sensor Networks Based on IPSO-SVM Algorithm. 803-822
Volume 13, Number 5, 2024
- Guo Yunhong, Tang Guoping:
Intelligent Analysis and Dynamic Security of Network Traffic in Context of Big Data. 823-842 - Yubao Wu:
Construction and Application of Internet of Things Network Security Situation Prediction Model Based on BiLSTM Algorithm. 843-862
- Donald R. Reising, Joshua H. Tyler, Mohamed K. M. Fadul, Matthew R. Hilling, T. Daniel Loveless:
Improved RF Fingerprint-based Identity Verification in the Presence of an SEI Mimicking Adversary. 887-916 - Xiaowu Li:
Network Security Behavior Anomaly Detection Based on Improved Empirical Mode Decomposition. 917-940 - Guoying Han, Bin Zhou, Yazi Zhang:
Application of Genetic Algorithm-Grey Wolf Optimization-Support Vector Machine Algorithm in Network Security Services Assessment and Prediction. 941-962
- Herasym Dei, Dmytro Shvets, Nataliia Lytvyn, Olena Sytnichenko, Olena Kobus:
Legal Challenges and Perspectives of Cybersecurity in the System of State Governance of Educational Institutions in Ukraine. 963-982 - Qutaiba Kadhim Abed, Waleed Ameen Mahmoud Al-Jawher:
A Secure and Efficient Optimized Image Encryption Using Block Compressive Sensing and Logistic Map Method. 983-1006 - Tayssir Ismail, Haifa Touati, Nasreddine Hajlaoui, Mohamed Hadded, Paul Muhlethaler, Samia Bouzefrane, Leïla Azouz Saïdane:
A Comprehensive Survey on Vehicular Communication Security. 1007-1038 - Lamia Hamza, Mayliss Yousfi, Lynda Bounehar:
Partially Observable Stochastic Game for Analysing Complex Attacks in IoT Networks. 1039-1060
- Lv Zheng, Fang Xi, Huang Lei, Jiang Dan, Ran Shuang, Liang Lei:
Optimization of Information Security Management Mechanism for Distribution Network Information Storage Based on RBAC and Development of Visual Operation and Maintenance Platform. 1061-1084
- Xiaoyan Luo:
Wireless Sensor Networks Security Enhancement Approach Based on Single Path Secure Routing Algorithm. 1085-1104
- Zambia Diko, Khulumani Sibanda:
Comparative Analysis of Popular Supervised Machine Learning Algorithms for Detecting Malicious Universal Resource Locators. 1105-1128
- Li He:
Design of a Lightweight Network Intrusion Detection System Based on Artificial Intelligence Technology. 1129-1148 - Liwen Xu:
Adaptive Incremental Modeling Combined with Hidden Markov Modeling in Cyber Security. 1149-1172
- Jianhua Wang:
Industrial Internet of Things ARP Virus Attack Detection Method Based on Improved CNN BiLSTM. 1173-1206
- Qutaiba Kadhim Abed, Waleed Ameen Mahmoud Al-Jawher:
Enhanced Hyperchaotic Image Encryption with CAW Transform and Sea-Lion Optimizer. 1207-1238
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.