ISSN: 2245-4578 (Online Version) ISSN:2245-1439 (Print Version)
2025: Vol 14 Iss 6
Submit Article
River Publishers Journals
View All Issues
About
About the Journal
Editorial Team
Open Access Information
Indexing & Metrics
Publication Ethics
Privacy Policy
Contact
FOR AUTHORS
Submit Paper
Call for Papers
Manuscript Preparation Guidelines
Journal Charges
Download MS Word Template
Download LaTeX Style File
Special Issue Proposal Guidelines
Best Paper Awards
Search
Journal Home
Register
Login
Journal Home
Register
Login
2025
Published January 29, 2026
Vol 14 Iss 6
Articles
Tingting Yan
1289–1320
Application of Mathematical Statistical Methods Based on Random Forest Algorithm in Big Data Anomaly Detection
https://doi.org/10.13052/jcsm2245-1439.1461
PDF
HTML
Zongjian Fu
1321–1346
Edge Computation Network Resource Scheduling and Privacy Protection Mechanism Based on Federated Learning
https://doi.org/10.13052/jcsm2245-1439.1462
PDF
HTML
Li Xiaomeng, Lin Bingjie, Li Huimin
1347–1372
Intelligent Detection and Early Warning of Power System Cybersecurity Threats Based on Multi-modal Large Language Models
https://doi.org/10.13052/jcsm2245-1439.1463
PDF
HTML
Zhou Yuan, Ang Xia, Teng Lu
1373–1412
Causal Reasoning System for Power Grid Security Alerts Based on Graph Neural Networks and Pre-trained Language Models
https://doi.org/10.13052/jcsm2245-1439.1464
PDF
HTML
Shuang Yang, Sha Lyu, Chunjuan Zhao, Zifeng Luo
1413–1446
Homomorphic Encryption-Based NFT Copyright Protection for Digital Art
https://doi.org/10.13052/jcsm2245-1439.1465
PDF
HTML
Hao Lu, Peng Zhu, Lifeng Liu
1447–1474
Data Privacy Protection and Access Control Mechanisms in Cross-Domain Cloud Computing Environments
https://doi.org/10.13052/jcsm2245-1439.1466
PDF
HTML
Cyber Security Issues and Solutions
Ying Chen, Xiaojuan Yue, Wang Pan
1475–1504
Privacy Protection and Management in Logistics Supply Chains Based on Blockchain Technology and Encryption Algorithms
https://doi.org/10.13052/jcsm2245-1439.1467
PDF
HTML
Zijie Zhou, Tao Zhang
1505–1534
Prediction of Financial Data Security Risks and Privacy Protection Methods for Listed Companies Based on Hypergraph Learning
https://doi.org/10.13052/jcsm2245-1439.1468
PDF
HTML
×
Username
*
Required
Password
*
Required
Forgot your password?
Keep me logged in
Login
No account?
Register here