ISSN: 2245-4578 (Online Version) ISSN:2245-1439 (Print Version)
2026: Vol 15 Iss 2
Submit Article
River Publishers Journals
View All Issues
About
About the Journal
Editorial Team
Open Access Information
Indexing & Metrics
Publication Ethics
Privacy Policy
Contact
FOR AUTHORS
Submit Paper
Call for Papers
Manuscript Preparation Guidelines
Journal Charges
Download MS Word Template
Download LaTeX Style File
Special Issue Proposal Guidelines
Best Paper Awards
Search
Journal Home
Register
Login
Journal Home
Register
Login
2026
Published April 30, 2026
Vol 15 Iss 2
Articles
Jiang Luo, Fuxin Hong, Shuai Liu, Yang Yang, Hailong Chi
273–302
Security Assessment of Commercial Password Applications: A Framework that Integrates Randomness Visualization and Spatiotemporal Deep Learning
https://doi.org/10.13052/jcsm2245-1439.1521
PDF
HTML
Rui Huang
335–364
Efficient Network Attack Detection Method Combining SSPCA and Layered Detection
https://doi.org/10.13052/jcsm2245-1439.1523
PDF
HTML
Changyao Yang, Yuan Yan
365–390
Research on a Network Security Situation Intelligent Awareness and Prediction Model Based on Big Data Technology and Its Supporting Applications
https://doi.org/10.13052/jcsm2245-1439.1524
PDF
HTML
Xiaoli Tang
415–442
Research on a Lightweight SM4 Algorithm-Driven Secure Communication Mechanism for Communication Links
https://doi.org/10.13052/jcsm2245-1439.1526
PDF
HTML
Qi Liang
443–466
Information Security Risk Assessment Based on Markov Chain Optimization SPA Model
https://doi.org/10.13052/jcsm2245-1439.1527
PDF
HTML
Rui Qiao, Jinbo Han
497–524
Blockchain-Based Mechanism for Privacy Data Integrity Protection in Pharmaceutical Supply Chains
https://doi.org/10.13052/jcsm2245-1439.1529
PDF
HTML
Cyber Security Issues and Solutions
Chengbo Hu, Xueqiong Zhu, Yongling Lu, Ziquan Liu, Zhen Wang
303–334
Lightweight Attribute-Based Cross-Domain Authentication for Power IoT with Edge Computing Integration
https://doi.org/10.13052/jcsm2245-1439.1522
PDF
HTML
Dongxi Lu, Chenwei Yang, Yu Liang
391–414
Smart Grid Security Vulnerability and Defense Frameworks: A Knowledge Graph and Blockchain-based Collaborative Vulnerability Security Defense Framework
https://doi.org/10.13052/jcsm2245-1439.1525
PDF
HTML
Chu-Hui Li, Zhong-Ming Dong, Tian-Xiong Huang, Yi Dong
467–496
Blockchain and Fully Homomorphic Encryption for Secure Data Management in Smart Grids
https://doi.org/10.13052/jcsm2245-1439.1528
PDF
HTML
×
Username
*
Required
Password
*
Required
Forgot your password?
Keep me logged in
Login
No account?
Register here