ISSN: 2245-4578 (Online Version) ISSN:2245-1439 (Print Version)
2024: Vol 13 Iss 6
Submit Article
River Publishers Journals
View All Issues
About
About the Journal
Editorial Team
Open Access Information
Indexing & Metrics
Publication Ethics
Privacy Policy
Contact
FOR AUTHORS
Submit Paper
Call for Papers
Manuscript Preparation Guidelines
Journal Charges
Download MS Word Template
Download LaTeX Style File
Special Issue Proposal Guidelines
Best Paper Awards
Search
Journal Home
Register
Login
Journal Home
Register
Login
2024
Published November 23, 2024
Vol 13 Iss 6
Articles
Jianhua Wang
1239–1262
Identification of SQL Injection Security Vulnerabilities in Web applications Based on Binary Code Similarity
https://doi.org/10.13052/jcsm2245-1439.1361
PDF
HTML
Li Xiao, Tianheng Pan, Xiaoling Wu, Youkang Zhu
1263–1282
Research on Security Situation Assessment and Prediction Model of Network System in Deep Learning Environment
https://doi.org/10.13052/jcsm2245-1439.1362
PDF
HTML
Yubin Shen, Hanqing Sun, Miaoxin Li
1283–1304
Research on the Quality Assessment and Protection of Network Security Body Based on Intelligent Induction and Deep Learning
https://doi.org/10.13052/jcsm2245-1439.1363
PDF
HTML
Angran Liu, Ying Wang
1305–1330
Study on Traffic Anomaly Detection of Wireless Communication Network Based on Fuzzy Relation Equation
https://doi.org/10.13052/jcsm2245-1439.1364
PDF
HTML
Jiankun Zhao, Kaiyue An, Xiang Wang
1331–1356
Research on Fast Early Warning of False Data Injection Attack in CPS of Electric Power Communication Network
https://doi.org/10.13052/jcsm2245-1439.1365
PDF
HTML
Jizhou Shan, Hong Ma
1357–1378
Optimization of Network Intrusion Detection Model Based on Big Data Analysis
https://doi.org/10.13052/jcsm2245-1439.1366
PDF
HTML
Yue Zhang
1379–1400
Research on Optimization of UAV Communication Network Security Protection Strategy Based on Advanced Encryption Technology
https://doi.org/10.13052/jcsm2245-1439.1367
PDF
HTML
Ganghua Bai
1401–1424
The Application of National Security Algorithm in Wireless Networks for Industrial Automation Process Automation (WIA-PA) Network Data Security Transmission
https://doi.org/10.13052/jcsm2245-1439.1368
PDF
HTML
Zhiqiang Chen, Zhihua Song, Tao Zhang, Yong Wei
1425–1448
Design and Performance of Privacy Protection Model for Big Data Transmission Based on Mixed Encryption
https://doi.org/10.13052/jcsm2245-1439.1369
PDF
HTML
Ahssan Ahmed Mohammed Lehmoud, Fadhil Mohammed Slman, Mohamed Q. Mohamed, Fanar Ali Joda, Mohammed Hasan Aldulaimi
1449–1466
Addressing The Concern of Malicious Drone in The Internet of Drone Sixth Generation Mobile System Powered by WSNs Using Three Security Levels
https://doi.org/10.13052/jcsm2245-1439.13610
PDF
HTML
Cuijuan Liu, Liya Song
1467–1490
K-means Optimized Network Security Management in the Internet Context
https://doi.org/10.13052/jcsm2245-1439.13611
PDF
HTML
×
Username
*
Required
Password
*
Required
Forgot your password?
Keep me logged in
Login
No account?
Register here