ISSN: 2245-4578 (Online Version) ISSN:2245-1439 (Print Version)
2024: Vol 13 Iss 5
Submit Article
River Publishers Journals
View All Issues
About
About the Journal
Editorial Team
Open Access Information
Indexing & Metrics
Publication Ethics
Privacy Policy
Contact
FOR AUTHORS
Submit Paper
Call for Papers
Manuscript Preparation Guidelines
Journal Charges
Download MS Word Template
Download LaTeX Style File
Special Issue Proposal Guidelines
Best Paper Awards
Search
Journal Home
Register
Login
Journal Home
Register
Login
2024
Published September 3, 2024
Vol 13 Iss 5
Articles
Donald R. Reising, Joshua H. Tyler, Mohamed K. M. Fadul, Matthew R. Hilling, T. Daniel Loveless
887-916
Improved RF Fingerprint-based Identity Verification in the Presence of an SEI Mimicking Adversary
https://doi.org/10.13052/jcsm2245-1439.1354
PDF
HTML
Xiaowu Li
917-940
Network Security Behavior Anomaly Detection Based on Improved Empirical Mode Decomposition
https://doi.org/10.13052/jcsm2245-1439.1355
PDF
HTML
Herasym Dei, Dmytro Shvets, Nataliia Lytvyn, Olena Sytnichenko, Olena Kobus
963-982
Legal Challenges and Perspectives of Cybersecurity in the System of State Governance of Educational Institutions in Ukraine
https://doi.org/10.13052/jcsm2245-1439.1357
PDF
HTML
Qutaiba Kadhim Abed, Waleed Ameen Mahmoud Al-Jawher
983-1006
A Secure and Efficient Optimized Image Encryption Using Block Compressive Sensing and Logistic Map Method
https://doi.org/10.13052/jcsm2245-1439.1358
PDF
HTML
Tayssir Ismail, Haifa Touati, Nasreddine Hajlaoui, Mohamed Hadded, Paul Muhlethaler, Samia Bouzefrane, Leila Azouz Saidane
1007-1038
A Comprehensive Survey on Vehicular Communication Security
https://doi.org/10.13052/jcsm2245-1439.1359
PDF
HTML
Lamia Hamza, Mayliss Yousfi, Lynda Bounehar
1039-1060
Partially Observable Stochastic Game for Analysing Complex Attacks in IoT Networks
https://doi.org/10.13052/jcsm2245-1439.13510
PDF
HTML
Xiaoyan Luo
1085-1104
Wireless Sensor Networks Security Enhancement Approach Based on Single Path Secure Routing Algorithm
https://doi.org/10.13052/jcsm2245-1439.13512
PDF
HTML
Qutaiba Kadhim Abed, Waleed Ameen Mahmoud Al-Jawher
1207-1238
Enhanced Hyperchaotic Image Encryption with CAW Transform and Sea-Lion Optimizer
https://doi.org/10.13052/jcsm2245-1439.13517
PDF
HTML
Li He
1129-1148
Design of a Lightweight Network Intrusion Detection System Based on Artificial Intelligence Technology
https://doi.org/10.13052/jcsm2245-1439.13514
PDF
HTML
Cyber Security Issues and Solutions
Guo Yunhong, Tang Guoping
823-842
Intelligent Analysis and Dynamic Security of Network Traffic in Context of Big Data
https://doi.org/10.13052/jcsm2245-1439.1351
PDF
HTML
Yubao Wu
843-862
Construction and Application of Internet of Things Network Security Situation Prediction Model Based on BiLSTM Algorithm
https://doi.org/10.13052/jcsm2245-1439.1352
PDF
HTML
Lv Zheng, Fang Xi, Huang Lei, Jiang Dan, Ran Shuang, Liang Lei
1061-1084
Optimization of Information Security Management Mechanism for Distribution Network Information Storage Based on RBAC and Development of Visual Operation and Maintenance Platform
https://doi.org/10.13052/jcsm2245-1439.13511
PDF
HTML
Zambia Diko, Khulumani Sibanda
1105-1128
Comparative Analysis of Popular Supervised Machine Learning Algorithms for Detecting Malicious Universal Resource Locators
https://doi.org/10.13052/jcsm2245-1439.13513
PDF
HTML
Jianhua Wang
1173-1206
Industrial Internet of Things ARP Virus Attack Detection Method Based on Improved CNN BiLSTM
https://doi.org/10.13052/jcsm2245-1439.13516
PDF
HTML
Yulliwas Ameur, Samia Bouzefrane, Soumya Banerjee
863-886
Developing Adaptive Homomorphic Encryption through Exploration of Differential Privacy
https://doi.org/10.13052/jcsm2245-1439.1353
PDF
HTML
Guoying Han, Bin Zhou, Yazi Zhang
941-962
Application of Genetic Algorithm-Grey Wolf Optimization-Support Vector Machine Algorithm in Network Security Services Assessment and Prediction
https://doi.org/10.13052/jcsm2245-1439.1356
PDF
HTML
Liwen Xu
1149-1172
Adaptive Incremental Modeling Combined with Hidden Markov Modeling in Cyber Security
https://doi.org/10.13052/jcsm2245-1439.13515
PDF
HTML
×
Username
*
Required
Password
*
Required
Forgot your password?
Keep me logged in
Login
No account?
Register here