


default search action
Network Security, Volume 2024
Volume 2024, Number 1, 2024
- Steve Mansfield-Devine:
Meeting the challenges of cyber security. - Aditya K. Sood, Amit Nagal:
AI as the bedrock for next-generation cyber security solutions. - Gemma Moore:
The challenge of viewing security events in context.
Volume 2024, Number 2, 2024
- Frank Schugar:
When not to do a penetration test. - Faye Ellis:
Enhancing data storage for cloud security. - Tim Freestone:
Managing private content exposure risk in 2024. - Steve Mansfield-Devine:
Grasping the nettle of cyber governance. - Dominic Trott:
A zero-trust journey through the threat landscape.
Volume 2024, Number 3, 2024
- Steve Mansfield-Devine:
Back to basics to fight flaws. - Dan Lattimer:
Can your disaster-recovery process stand up to ransomware? - Robert Guegan:
Continual risk management - getting the basics right. - Rajeev Kumar
, Raees Ahmad Khan:
Securing communication protocols in military computing.
Volume 2024, Number 4, 2024
- Carlos Morales:
Decoding the role of DNS in cyber security. - Karen Renaud
:
The Q-Z of cyber security. - Aare Reintam:
The role of cyber exercises in improving cyber readiness. - Petra Tesch:
Strengthening defences to protect PII. - Niall McConachie:
Does AI signal a new age of cyberthreats?
Volume 2024, Number 5, 2024
- Nils Gerhardt:
Putting cyber-safety first for Industry 4.0. - Richard Menear:
Building a human firewall to keep your organisation secure. - Tomer Nahum, Eric Woodruff:
Forging identity in the cloud - dissecting Silver SAML. - Steve Mansfield-Devine:
Poor cyber hygiene puts the UK at risk. - Ben Walker:
Minimising the risks and maximising the opportunities of generative AI.
Volume 2024, Number 6, 2024
- Dominic Carroll:
Ensuring that cyber security is fit for the future of manufacturing. - Chris Waynforth:
Cyber threats and key mitigation strategies. - Karen Renaud
:
The burden of keeping passwords secret. - Monique Becenti:
Interconnection, NIS2 and the mobile device. - Vincent Lomba:
Is new legislation the answer to curbing cybercrime? - Brendan Walsh:
Enhancing network resilience against growing cyberthreats.
Volume 2024, Number 8, 2024
- Nilesh P. Sable:
Cybersecurity Policies for Critical Infrastructure: Legal Mandates and Network Protection Requirements. 25-31 - Sujata Arya:
Creating Comprehensive Cybersecurity Policies: Balancing Network Protection and Compliance with Privacy Laws. 32-39
Volume 2024, Number 9, 2025
- Yande Xia, Anita Binti Rosli, Aryaty Binti Alwie:
Optimization of the Effect of Network Information Flow Advertising Based on User Behavior Data Encryption and Deep Learning. 1-12 - Mingyue Wang:
Combining Differential Privacy with FedAvgM to Optimize Data Access Control in the Information Platform. 13-24 - Eric Blancaflor, Keith Christian Esteron, Andrade Cy, Wayne Hans Camacho, Bradney Guzon:
Mitigating Cyber Attacks for Organization Assets using UEBA (User and Entity Behavior Analytics) and other Machine Learning Solutions from Cloud Security Threats: A Literature Review. 25-31 - Shoujun Bao, Shuhong Li, Ziyong Pan, Fuxiang Liang, Shenghai Han:
Fault Diagnosis and Optimized Operation and Maintenance of Drop-out Fuses in Alpine Regions Using MKL-SVM and GRU. 32-41 - Jun Wang:
User Behavior Analysis and Security Strategy Optimization of College English Learning Platform Using Dynamic Graph Convolutional Network. 42-53

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.