ISSN: 2245-4578 (Online Version) ISSN:2245-1439 (Print Version)
2025: Vol 14 Iss 1
Submit Article
River Publishers Journals
View All Issues
About
About the Journal
Editorial Team
Open Access Information
Indexing & Metrics
Publication Ethics
Privacy Policy
Contact
FOR AUTHORS
Submit Paper
Call for Papers
Manuscript Preparation Guidelines
Journal Charges
Download MS Word Template
Download LaTeX Style File
Special Issue Proposal Guidelines
Best Paper Awards
Search
Journal Home
Register
Login
Journal Home
Register
Login
2025
Published February 28, 2025
Vol 14 Iss 1
Cyber Security Issues and Solutions
Fauzi Adi Rafrastara, Guruh Fajar Shidik, Wildanil Ghozi, Nova Rijati, Oki Setiono
1-24
Tree-based Ensemble Algorithms and Feature Selection Method for Intelligent Distributed Denial of Service Attack Detection
https://doi.org/10.13052/jcsm2245-1439.1411
PDF
HTML
Yuanyi Dang
25-46
Research on Collaborative Positioning Algorithm of Wireless Sensor Network Security Under Strong Topology Relation
https://doi.org/10.13052/jcsm2245-1439.1412
PDF
HTML
Weidong Wu, Zheng Tian, Yizhen Sun, Yongfa Li, Yu Cui
47-74
Study on the Application of Dynamic Continuous Trust Assessment Model Based on Clustering Mechanism in Network Security Optimization
https://doi.org/10.13052/jcsm2245-1439.1413
PDF
HTML
Huizhong Zhang, Fanrong Meng, Qinyong Wang
75-100
Computer Network Security System Optimization Based on Improved Neural Network Algorithm and Data Search
https://doi.org/10.13052/jcsm2245-1439.1414
PDF
HTML
Li Qiang
101-126
Research on Performance Optimization and Resource Allocation Strategy of Network Node Encryption Based on RSA Algorithm
https://doi.org/10.13052/jcsm2245-1439.1415
PDF
HTML
Xindi Ying
155-180
Research on Network Security Situational Awareness and Risk Assessment Model Based on Bayesian Network
https://doi.org/10.13052/jcsm2245-1439.1417
PDF
HTML
Yuanyi Dang, Yongbo Wang
181–204
Design and Research of Network Edge Device Security Monitoring System Based on Embedded System and Bi-LSTM
https://doi.org/10.13052/jcsm2245-1439.1418
PDF
HTML
Yun Cao
205–228
Research on the Application of Blockchain Technology in the Security Protection of Sensitive Data in Information Systems
https://doi.org/10.13052/jcsm2245-1439.1419
PDF
HTML
Jing Liang
229–258
Research on Encryption Algorithm and Embedded System Optimization Strategy Based on IoT Security
https://doi.org/10.13052/jcsm2245-1439.14110
PDF
HTML
Xue Bai, Yongguo Bai
127-154
Equilibrium Strategy of Attack and Defense in Computer Networks Based on Markov Signal Game Theory
https://doi.org/10.13052/jcsm2245-1439.1416
PDF
HTML
×
Username
*
Required
Password
*
Required
Forgot your password?
Keep me logged in
Login
No account?
Register here