- Huan Wang, Xin Li:
Optimization of Network Security Intelligent Early Warning System Based on Image Matching Technology of Partial Differential Equation. J. Cyber Secur. Mobil. 13(3): 461-488 (2024) - Yanling Wang, Yong Yang:
A Novel Secure and Energy-efficient Routing Method for the Agricultural Internet of Things Using Whale Optimization Algorithm. J. Cyber Secur. Mobil. 13(4): 725-750 (2024) - Ying Wang, Xiaojun Zuo, Yuling Guo, Huiying Liu, Jianchun Zhou:
Encryption Technology of Optical Communication Network Based on Artificial Intelligence Technology. J. Cyber Secur. Mobil. 13(4): 633-656 (2024) - Jing Wen, Haifeng Li, Caihui Lan:
On the Security of Key-Aggregate Searchable Encryption. J. Cyber Secur. Mobil. 13(3): 565-584 (2024) - Yubao Wu:
Construction and Application of Internet of Things Network Security Situation Prediction Model Based on BiLSTM Algorithm. J. Cyber Secur. Mobil. 13(5): 843-862 (2024) - Peng Xiao:
Network Malware Detection Using Deep Learning Network Analysis. J. Cyber Secur. Mobil. 13(1): 27-52 (2024) - Peng Xiao:
Malware Cyber Threat Intelligence System for Internet of Things (IoT) Using Machine Learning. J. Cyber Secur. Mobil. 13(1): 53-90 (2024) - Liwen Xu:
Adaptive Incremental Modeling Combined with Hidden Markov Modeling in Cyber Security. J. Cyber Secur. Mobil. 13(5): 1149-1172 (2024) - Rui-chao Xu, Yue-bin Di, Zeng Shou, Xiao Ma, Heqiu Chai, Long Yin:
The Homology Determination System for APT Samples Based on Gene Maps. J. Cyber Secur. Mobil. 13(4): 751-774 (2024) - Yong Yang, Xuan Chen, Jiaying Xu, Yuxia Li:
Research on Chaotic Image Encryption Based on Fibonacci-ILogistic-IHenon. J. Cyber Secur. Mobil. 13(2): 215-238 (2024) - Yimin Yin:
Information Security and Risk Control Model Based on Plan-Do-Check-Action for Digital Libraries. J. Cyber Secur. Mobil. 13(2): 305-326 (2024) - Guo Yunhong, Tang Guoping:
Intelligent Analysis and Dynamic Security of Network Traffic in Context of Big Data. J. Cyber Secur. Mobil. 13(5): 823-842 (2024) - Yunfei Zhang, Xingzhi Xu, Yayuan Shi:
Construction and Analysis of Network Cloud Security Situation Awareness System Based on DBN-DE Algorithm. J. Cyber Secur. Mobil. 13(3): 439-460 (2024) - Jiafa Zhang, Hong Zou, Zifeng Zeng, Weijie Xu, Jiawei Jiang:
Feasibility of Using Seq-GAN Model in Vulnerability Detection of Industrial Control Protocols. J. Cyber Secur. Mobil. 13(3): 393-416 (2024) - Lv Zheng, Fang Xi, Huang Lei, Jiang Dan, Ran Shuang, Liang Lei:
Optimization of Information Security Management Mechanism for Distribution Network Information Storage Based on RBAC and Development of Visual Operation and Maintenance Platform. J. Cyber Secur. Mobil. 13(5): 1061-1084 (2024) - Atheer Hussein Zyara, Hakeem Imad Mhaibes, Qahtan Makki Shallal:
Enhancement of Tiny Encryption Algorithm for Resource-Constrained WSNs Using Four Connected Additive Fibonacci Generators. J. Cyber Secur. Mobil. 13(3): 349-368 (2024) - 2023
- Ali Akram Abdul-Kareem, Waleed Ameen Mahmoud Al-Jawher:
A Hybrid Domain Medical Image Encryption Scheme Using URUK and WAM Chaotic Maps with Wavelet - Fourier Transforms. J. Cyber Secur. Mobil. 12(4): 435-464 (2023) - Ekhlas Abbas Albahrani, Sadeq H. Lafta, Naeem Howrie Ghayad:
A Chaos-Based Encryption Algorithm for Database System. J. Cyber Secur. Mobil. 12(1): 25-54 (2023) - Sahel Alouneh:
A Multi-Path Approach to Protect DNS Against DDoS Attacks. J. Cyber Secur. Mobil. 12(4): 569-588 (2023) - Belal M. Amro, Saeed Salah, Mohammed Moreb:
A Comprehensive Architectural Framework of Moving Target Defenses Against DDoS Attacks. J. Cyber Secur. Mobil. 12(4): 605-628 (2023) - Min Chen:
Camera Network Topology Mapping Based on the Integration of Network Information and Physical Distribution Under the Background of Communication Security. J. Cyber Secur. Mobil. 12(5): 733-756 (2023) - Gaili Du:
Security of Encrypted Images in Network Transmission Based on an Improved Chaos Algorithm. J. Cyber Secur. Mobil. 12(5): 675-696 (2023) - Julija Gavenaite-Sirvydiene, Algita Miecinskiene:
The Assessment of Cyber Security's Significance in the Financial Sector of Lithuania. J. Cyber Secur. Mobil. 12(4): 497-518 (2023) - Vyacheslav Gorev, Alexander Gusev, Valerii Korniienko, Yana I. Shedlovska:
On the Use of the Kolmogorov-Wiener Filter for Heavy-tail Process Prediction. J. Cyber Secur. Mobil. 12(3): 315-338 (2023) - Khaled Mohammed Ali Hassan, Mohamed Ashraf Madkour, Sayed Abd El Hady Nouh:
A Realtime Adaptive Trust Model Based on Artificial Neural Networks for Wireless Sensor Networks. J. Cyber Secur. Mobil. 12(4): 519-546 (2023) - Serhii Ya. Hilgurt, Anatolii Davydenko, Tetyana V. Matovka, Mykhailo P. Prygara:
Tools for Analyzing Signature-Based Hardware Solutions for Cyber Security Systems. J. Cyber Secur. Mobil. 12(3): 339-366 (2023) - Tetiana Hovorushchenko, Yelyzaveta Hnatchuk, Vitaliy Osyadlyi, Mariia Kapustian, Artem Boyarchuk:
Blockchain-Based Medical Decision Support System. J. Cyber Secur. Mobil. 12(3): 253-274 (2023) - Tetiana Hovorushchenko, Olga Pavlova, Mariia Kostiuk:
Method of Increasing the Security of Smart Parking System. J. Cyber Secur. Mobil. 12(3): 297-314 (2023) - Ivan Izonin, Tetiana Hovorushchenko, Peter T. Popov:
Editorial. J. Cyber Secur. Mobil. 12(3): v-x (2023) - Xin Jiang, Huawei Huang, Geyang Pan:
Cryptanalysis of Tropical Encryption Scheme Based on Double Key Exchange. J. Cyber Secur. Mobil. 12(2): 205-220 (2023)