ISSN: 2245-4578 (Online Version) ISSN:2245-1439 (Print Version)
2025: Vol 14 Iss 2
Submit Article
River Publishers Journals
View All Issues
About
About the Journal
Editorial Team
Open Access Information
Indexing & Metrics
Publication Ethics
Privacy Policy
Contact
FOR AUTHORS
Submit Paper
Call for Papers
Manuscript Preparation Guidelines
Journal Charges
Download MS Word Template
Download LaTeX Style File
Special Issue Proposal Guidelines
Best Paper Awards
Search
Journal Home
Register
Login
Journal Home
Register
Login
2025
Published June 4, 2025
Vol 14 Iss 2
Articles
Zinan Zhu, Lin Zhou
311–338
Application of Complex Network Attack and Defense Time Game Model in Network Security Defense Decision
https://doi.org/10.13052/jcsm2245-1439.1423
PDF
HTML
Qiang Wu
339–364
Network Security Maintenance and Detection Based on Diversified Features and Knowledge Graph
https://doi.org/10.13052/jcsm2245-1439.1424
PDF
HTML
Zhiyong Zhan, Xin Wang, Yisha Liu, Zhongliang Sun, Chenhui Gu
391–432
Integration and Optimization Strategy of Blockchain-Enabled Edge Computing System for Internet of Vehicles
https://doi.org/10.13052/jcsm2245-1439.1426
PDF
HTML
Kritsanapong Somsuk
433–456
Enhanced Algorithm for Recovering RSA Plaintext when Two Modulus Values Share at least One Common Prime Factor
https://doi.org/10.13052/jcsm2245-1439.1427
PDF
HTML
Minghui Gao, Zhijun Zhang, Liangliang Cui, Sibo Feng, Jingyi Liu, Yongzhen Jiang
457–474
Temporal and Topological Enhanced Graph Neural Networks for Traffic Anomaly Detection
https://doi.org/10.13052/jcsm2245-1439.1428
PDF
HTML
Lei Zhang
505–530
Implementing RGCN Model in Network Security Big Data Analysis
https://doi.org/10.13052/jcsm2245-1439.14210
PDF
HTML
Cyber Security Issues and Solutions
Peng Zhansong
283–310
Optimization Research of Hyperchaotic Model-Driven Encryption Algorithm in Network Security
https://doi.org/10.13052/jcsm2245-1439.1422
PDF
HTML
Zhi Hua Chang
365–390
Analysis of Collaborative Characteristics of Reinforcement Learning Intelligent Control and Bayesian Network Model in Network Security Protection
https://doi.org/10.13052/jcsm2245-1439.1425
PDF
HTML
Mingshan Fan, Huijuan Guo
475–504
Privacy Attack Identification and Protection Strategy Analysis Based on Vertical Federation Clustering
https://doi.org/10.13052/jcsm2245-1439.1429
PDF
HTML
Chun Zheng, Hua Jin
259–282
Computer Network Security Situation Assessment Integrating Least Squares Support Vector Machines and Optimized Bidirectional Long Short-Term Memory Network Algorithm
https://doi.org/10.13052/jcsm2245-1439.1421
PDF
HTML
×
Username
*
Required
Password
*
Required
Forgot your password?
Keep me logged in
Login
No account?
Register here