ISSN: 2245-4578 (Online Version) ISSN:2245-1439 (Print Version)
2025: Vol 14 Iss 3
Submit Article
River Publishers Journals
View All Issues
About
About the Journal
Editorial Team
Open Access Information
Indexing & Metrics
Publication Ethics
Privacy Policy
Contact
FOR AUTHORS
Submit Paper
Call for Papers
Manuscript Preparation Guidelines
Journal Charges
Download MS Word Template
Download LaTeX Style File
Special Issue Proposal Guidelines
Best Paper Awards
Search
Journal Home
Register
Login
Journal Home
Register
Login
2025
Published August 12, 2025
Vol 14 Iss 3
Articles
Chengzhe Liu, Xiaochen Yang, Manpo Li, Tianqu Tong, Long Yin, Yating Jiang
531–552
A Deep Reinforcement Learning Framework for Attack-Fault Tree Analysis and Security Assessment in Power Systems
https://doi.org/10.13052/jcsm2245-1439.1431
PDF
HTML
Yi Liu, Quan Long, Yan Liu, Yadong Fu, Jianqi Li, Yiyang Fu
577–596
Data Security of Network Communication Information Based on Multiple Chaotic Mappings
https://doi.org/10.13052/jcsm2245-1439.1433
PDF
HTML
Shengyang Wang
673–700
Network Security Protection Model of Electric Power Information System Based on Hierarchical Weight Pruning Algorithm Optimizing OD-CNN Algorithm
https://doi.org/10.13052/jcsm2245-1439.1437
PDF
HTML
Cyber Security Issues and Solutions
Yanxin Zhang, Xi Su
553–576
Application of Deep Learning in the Optimization of AES Encryption Algorithm
https://doi.org/10.13052/jcsm2245-1439.1432
PDF
HTML
Shuiping Wang, Yanzhen Wang
597–622
Malware Classification Technology Combining Multimodal Fusion with Deep Learning Algorithms
https://doi.org/10.13052/jcsm2245-1439.1434
PDF
HTML
Jian Hu, Wei Wu, Tao Chuan, Qiuxia Peng
623–652
Enterprise Internal Threat Authentication Traceability Technology Based on Key Authentication System
https://doi.org/10.13052/jcsm2245-1439.1435
PDF
HTML
Sheng Bi, Jiayan Wang, Jiajun Song, Peiyuan Li, Liying Li
653–672
Research on the Intrusion Detection Model for Power Internet of Things Combining Deep Belief Network and BiLSTM
https://doi.org/10.13052/jcsm2245-1439.1436
PDF
HTML
Yuzhi Wang
701–722
Research on Network Threat Hunting System Based on Multi Scale LightGBM Ensemble Learning
https://doi.org/10.13052/jcsm2245-1439.1438
PDF
HTML
Liang Shaoyu
723–746
Design and Research of NB-IoT Lightweight End-to-End Encryption Protocol Based on Lattice Cipher
https://doi.org/10.13052/jcsm2245-1439.1439
PDF
HTML
Xiuli Yang, Xinyuan Wang
747–776
Research on Blockchain-based Security Sharing Algorithm of Social Assistance Data in Internet of Things
https://doi.org/10.13052/jcsm2245-1439.14310
PDF
HTML
×
Username
*
Required
Password
*
Required
Forgot your password?
Keep me logged in
Login
No account?
Register here