ISSN: 2245-4578 (Online Version) ISSN:2245-1439 (Print Version)
2025: Vol 14 Iss 1
Vol 14 Iss 1

Cyber Security Issues and Solutions

Fauzi Adi Rafrastara, Guruh Fajar Shidik, Wildanil Ghozi, Nova Rijati, Oki Setiono
1-24
Tree-based Ensemble Algorithms and Feature Selection Method for Intelligent Distributed Denial of Service Attack Detection
https://doi.org/10.13052/jcsm2245-1439.1411
PDF HTML
Yuanyi Dang
25-46
Research on Collaborative Positioning Algorithm of Wireless Sensor Network Security Under Strong Topology Relation
https://doi.org/10.13052/jcsm2245-1439.1412
PDF HTML
Weidong Wu, Zheng Tian, Yizhen Sun, Yongfa Li, Yu Cui
47-74
Study on the Application of Dynamic Continuous Trust Assessment Model Based on Clustering Mechanism in Network Security Optimization
https://doi.org/10.13052/jcsm2245-1439.1413
PDF HTML
Huizhong Zhang, Fanrong Meng, Qinyong Wang
75-100
Computer Network Security System Optimization Based on Improved Neural Network Algorithm and Data Search
https://doi.org/10.13052/jcsm2245-1439.1414
PDF HTML
Li Qiang
101-126
Research on Performance Optimization and Resource Allocation Strategy of Network Node Encryption Based on RSA Algorithm
https://doi.org/10.13052/jcsm2245-1439.1415
PDF HTML
Xindi Ying
155-180
Research on Network Security Situational Awareness and Risk Assessment Model Based on Bayesian Network
https://doi.org/10.13052/jcsm2245-1439.1417
PDF HTML
Yuanyi Dang, Yongbo Wang
181–204
Design and Research of Network Edge Device Security Monitoring System Based on Embedded System and Bi-LSTM
https://doi.org/10.13052/jcsm2245-1439.1418
PDF HTML
Yun Cao
205–228
Research on the Application of Blockchain Technology in the Security Protection of Sensitive Data in Information Systems
https://doi.org/10.13052/jcsm2245-1439.1419
PDF HTML
Jing Liang
229–258
Research on Encryption Algorithm and Embedded System Optimization Strategy Based on IoT Security
https://doi.org/10.13052/jcsm2245-1439.14110
PDF HTML