ISSN: 2245-4578 (Online Version) ISSN:2245-1439 (Print Version)
2025: Vol 14 Iss 5
Submit Article
River Publishers Journals
View All Issues
About
About the Journal
Editorial Team
Open Access Information
Indexing & Metrics
Publication Ethics
Privacy Policy
Contact
FOR AUTHORS
Submit Paper
Call for Papers
Manuscript Preparation Guidelines
Journal Charges
Download MS Word Template
Download LaTeX Style File
Special Issue Proposal Guidelines
Best Paper Awards
Search
Journal Home
Register
Login
Journal Home
Register
Login
2025
Published December 12, 2025
Vol 14 Iss 5
Articles
Lina Song
1033–1066
A Hybrid Data Protection Mechanisms Using Attribute Based Encryption and Role Based Access Control Mechanism for Digital Music Classrooms
https://doi.org/10.13052/jcsm2245-1439.1451
PDF
HTML
Jingkun Yao, Jie Yang, Yonghao Wang
1067–1088
Intelligent Grid Load Anomaly Detection and Interval Forecasting via GESD-LOF and an Improved Transformer
https://doi.org/10.13052/jcsm2245-1439.1452
PDF
HTML
Shilong Wu, Li Feng
1089–1116
Association Analysis and Prediction of Network Security Vulnerabilities Based on Knowledge Graph
https://doi.org/10.13052/jcsm2245-1439.1453
PDF
HTML
Yinfeng Li
1199–1220
Application Mode of Blockchain Technology in User Data Sovereignty and Privacy Protection
https://doi.org/10.13052/jcsm2245-1439.1457
PDF
HTML
Manpo Li, Ning Yang, Xuerui Yang, Xuezhu Jin, Long Yin, Jian Xu
1221–1244
An Intelligent Penetration Strategy for Power System Networks Using Reinforcement Learning
https://doi.org/10.13052/jcsm2245-1439.1458
PDF
HTML
Bjarne Lill, Clemens Sauerwein, Nico Mexis, Karoline Langner
1245–1288
A Comprehensive Review of Information Security Research regarding SMEs and Future Directions
https://doi.org/10.13052/jcsm2245-1439.1459
PDF
HTML
Cyber Security Issues and Solutions
Tao Qi, Weiming Chen
1117–1150
Innovative Applications of Nature-Inspired Algorithms in Cryptographic Communication
https://doi.org/10.13052/jcsm2245-1439.1454
PDF
HTML
Xiaozhi Deng, Yaoxin Pan, Hongjia Fang
1151–1172
Anomaly Detection in Smart Grid Behavior Monitoring via Federated Learning: A Privacy-Preserving Defense Against Cyber-Physical Attacks
https://doi.org/10.13052/jcsm2245-1439.1455
PDF
HTML
Wenchao Li, Guang Ma, Wenchong Fang, Xiqi He, Jin Li
1173–1198
Multi-Cloud Management Architecture Design and Disaster Recovery Strategy for High Availability
https://doi.org/10.13052/jcsm2245-1439.1456
PDF
HTML
×
Username
*
Required
Password
*
Required
Forgot your password?
Keep me logged in
Login
No account?
Register here