


default search action
Journal of Cyber Security and Mobility, Volume 11
Volume 11, Number 1, 2022
- Amirfarhad Nilizadeh
, Shirin Nilizadeh, Wojciech Mazurczyk
, Cliff C. Zou
, Gary T. Leavens
:
Adaptive Matrix Pattern Steganography on RGB Images.
Volume 11, Number 2, 2022
- Shishir Kumar Shandilya
:
Design and Deployment of Network Testbed for Web Data Security.
Volume 11, Number 3, 2022
- Somesha M., Alwyn R. Pais
:
Classification of Phishing Email Using Word Embedding and Machine Learning Techniques. 279-320
Volume 11, Number 4, 2022
- Daniel Kyalo Ndambuki, Hitmi Khalifa Alhitmi:
Attack Mitigation and Security for Vehicle Platoon. 497-530 - K. Rajesh Rao
, Aditya Kolpe, Tribikram Pradhan, Bruno Bogaz Zarpelão
:
An Efficient Solution to User Authorization Query Problem in RBAC Systems Using Hierarchical Clustering. 531-548 - Sunpreet Kaur Nanda
, Deepika Ghai, Prashant Ingole:
Analysis of Video Forensics System for Detection of Gun, Mask and Anomaly Using Soft Computing Techniques. 549-574 - Nisha P. Shetty, Balachandra Muniyal, Niraj Yagnik, Tulika Banerjee, Angad Singh:
A Privacy Preserving Framework to Protect Sensitive Data in Online Social Networks. 575-600 - Hailyie Tekleselassie:
Two-Dimensional Projection Based Wireless Intrusion Classification Using Lightweight EfficientNet. 601-620 - B. N. Chaithanya, S. H. Brahmananda:
AI-enhanced Defense Against Ransomware Within the Organization's Architecture. 621-654
Volume 11, Number 5, 2022
- Sunardi, Herman, Syifa Riski Ardiningtias:
A Comparative Analysis of Digital Forensic Investigation Tools on Facebook Messenger Applications. 655-672 - El Hassane Laaji, Abdelmalek Azizi
:
A Combination of BB84 Quantum Key Distribution and An Improved Scheme of NTRU Post-Quantum Cryptosystem. 673-694 - Bing Bai:
Monitoring and Identification of Abnormal Network Traffic by Different Mathematical Models. 695-712 - Dongliang Bian, Jun Pan, Yanhui Wang:
Study of Encrypted Transmission of Private Data During Network Communication: Performance Comparison of Advanced Encryption Standard and Data Encryption Standard Algorithms. 713-726
Volume 11, Number 6, 2022
- Morten Falch, Henning Olesen, Knud Erik Skouby
, Reza Tadayoni
, Idongesit Williams
:
Cybersecurity Strategies for SMEs in the Nordic Baltic Region. 727-754 - Xiang Li:
Construction of a Smart City Network Information Security Evaluation Model Based on GRA-BPNN. 755-776
- Zehui Liu, Min Guo, Yun Ju:
Physical Layer Key Generation Method Based on SVD Pre-processing. 777-794

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.