Login / Signup
J. Cyber Secur. Mobil.
Publications
volume 13, number 1, 2024
Peng Xiao
Network Malware Detection Using Deep Learning Network Analysis.
J. Cyber Secur. Mobil.
13 (1) (2024)
Nabeel Mahdy Haddad
,
Mustafa sabah Mustafa
,
Hayder Sabah Salih
,
Mustafa Musa Jaber
,
Mohammed Hasan Ali
Analysis of the Security of Internet of Multimedia Things in Wireless Environment.
J. Cyber Secur. Mobil.
13 (1) (2024)
Syed Shuja Hussain
,
Mohd Faizal Ab Razak
,
Ahmad Firdaus
Deep Learning Based Hybrid Analysis of Malware Detection and Classification: A Recent Review.
J. Cyber Secur. Mobil.
13 (1) (2024)
Liusuo Huang
,
Yan Song
Update Algorithm of Secure Computer Database Based on Deep Belief Network.
J. Cyber Secur. Mobil.
13 (1) (2024)
Vikash Kumar Singh
,
Durga Sivashankar
,
Kishlay Kundan
,
Sushmita Kumari
An Efficient Intrusion Detection and Prevention System for DDOS Attack in WSN Using SS-LSACNN and TCSLR.
J. Cyber Secur. Mobil.
13 (1) (2024)
Peng Xiao
Malware Cyber Threat Intelligence System for Internet of Things (IoT) Using Machine Learning.
J. Cyber Secur. Mobil.
13 (1) (2024)
volume 13, number 2, 2024
Yong Yang
,
Xuan Chen
,
Jiaying Xu
,
Yuxia Li
Research on Chaotic Image Encryption Based on Fibonacci-ILogistic-IHenon.
J. Cyber Secur. Mobil.
13 (2) (2024)
Yongsheng Deng
Design of Industrial IoT Intrusion Security Detection System Based on LightGBM Feature Algorithm and Multi-layer Perception Network.
J. Cyber Secur. Mobil.
13 (2) (2024)
Yimin Yin
Information Security and Risk Control Model Based on Plan-Do-Check-Action for Digital Libraries.
J. Cyber Secur. Mobil.
13 (2) (2024)
John Kwao Dawson
,
Frimpong Twum
,
James Benjamin Hayfron-Acquah
,
Yaw Marfo Missah
Cryptographic Solutions for Data Security in Cloud Computing: A Run Time Trend-based Comparison of NCS, ERSA, and EHS.
J. Cyber Secur. Mobil.
13 (2) (2024)
Cheng Liu
,
Xuanxuan Che
,
Jianshe Xie
,
Yumin Dong
A Multi-Path QKD Algorithm with Multiple Segments.
J. Cyber Secur. Mobil.
13 (2) (2024)
Biaoqi Li
,
Min Xu
,
Yuan Zhou
,
Haibin Liu
,
Renlong Zhang
Optimization of Security Identification in Power Grid Data through Advanced Encryption Standard Algorithm.
J. Cyber Secur. Mobil.
13 (2) (2024)
volume 13, number 3, 2024
Jiafa Zhang
,
Hong Zou
,
Zifeng Zeng
,
Weijie Xu
,
Jiawei Jiang
Feasibility of Using Seq-GAN Model in Vulnerability Detection of Industrial Control Protocols.
J. Cyber Secur. Mobil.
13 (3) (2024)
Huan Wang
,
Xin Li
Optimization of Network Security Intelligent Early Warning System Based on Image Matching Technology of Partial Differential Equation.
J. Cyber Secur. Mobil.
13 (3) (2024)
Yunfei Zhang
,
Xingzhi Xu
,
Yayuan Shi
Construction and Analysis of Network Cloud Security Situation Awareness System Based on DBN-DE Algorithm.
J. Cyber Secur. Mobil.
13 (3) (2024)
Jing Wen
,
Haifeng Li
,
Caihui Lan
On the Security of Key-Aggregate Searchable Encryption.
J. Cyber Secur. Mobil.
13 (3) (2024)
Martin Steinebach
Robustness and Collision-Resistance of PhotoDNA.
J. Cyber Secur. Mobil.
13 (3) (2024)
Atheer Hussein Zyara
,
Hakeem Imad Mhaibes
,
Qahtan Makki Shallal
Enhancement of Tiny Encryption Algorithm for Resource-Constrained WSNs Using Four Connected Additive Fibonacci Generators.
J. Cyber Secur. Mobil.
13 (3) (2024)
Wentao Li
Construction and Analysis of QPSO-LSTM Model in Network Security Situation Prediction.
J. Cyber Secur. Mobil.
13 (3) (2024)
Jiabin Li
Attribute Based Signature Encryption Scheme Based on Cloud Computing in Medical Social Networks.
J. Cyber Secur. Mobil.
13 (3) (2024)
Jun Li
,
Weijun Huang
A Study of An Image Encryption Model Based on Tent-Ushiki Chaotic Fusion.
J. Cyber Secur. Mobil.
13 (3) (2024)
volume 13, number 4, 2024
Yan Jiang
,
Jing Huang
,
Yunsong Fan
,
Xiaobin Zhu
Design and Implementation of IPsec VPN IoT Gateway System in National Secret Algorithm.
J. Cyber Secur. Mobil.
13 (4) (2024)
Zhimin Lv
,
Jun Wan
Intrusion Detection in Wireless Sensor Networks Based on IPSO-SVM Algorithm.
J. Cyber Secur. Mobil.
13 (4) (2024)
Botao Hou
,
Zhefeng Li
,
Xiaojun Zuo
,
Yuling Guo
,
Jianchun Zhou
Application of Intelligent Cloud Computing Technology in Optical Communication Network Security of Smart Grid.
J. Cyber Secur. Mobil.
13 (4) (2024)
Yanliu Nie
Analysis and Research on Secure Access Control Technology of Industrial Internet of Things Based on ZTM Model.
J. Cyber Secur. Mobil.
13 (4) (2024)
Karam Mustafa Ignaim
,
João M. Fernandes
Improving Incident Management Processes with Feature Models.
J. Cyber Secur. Mobil.
13 (4) (2024)
Xiaobo Song
Analysis and Application of Chaotic Genetic Algorithm Based on Network Security in The Research of Resilience of Cluster Networks.
J. Cyber Secur. Mobil.
13 (4) (2024)
Ying Wang
,
Xiaojun Zuo
,
Yuling Guo
,
Huiying Liu
,
Jianchun Zhou
Encryption Technology of Optical Communication Network Based on Artificial Intelligence Technology.
J. Cyber Secur. Mobil.
13 (4) (2024)
Rui-chao Xu
,
Yue-bin Di
,
Zeng Shou
,
Xiao Ma
,
Heqiu Chai
,
Long Yin
The Homology Determination System for APT Samples Based on Gene Maps.
J. Cyber Secur. Mobil.
13 (4) (2024)
Yanling Wang
,
Yong Yang
A Novel Secure and Energy-efficient Routing Method for the Agricultural Internet of Things Using Whale Optimization Algorithm.
J. Cyber Secur. Mobil.
13 (4) (2024)
volume 12, number 3, 2023
Ivan Izonin
,
Tetiana Hovorushchenko
,
Peter T. Popov
Editorial.
J. Cyber Secur. Mobil.
12 (3) (2023)
Liubomyr S. Sikora
,
Nataliia Lysa
,
Yevhen I. Tsikalo
,
Olga Fedevych
System-Information and Cognitive Technologies of Man-Made Infrastructure Cyber Security.
J. Cyber Secur. Mobil.
12 (3) (2023)
volume 12, number 4, 2023
Julija Gavenaite-Sirvydiene
,
Algita Miecinskiene
The Assessment of Cyber Security's Significance in the Financial Sector of Lithuania.
J. Cyber Secur. Mobil.
12 (4) (2023)
Liu Zhang
,
Yanyu Liu
Network Security Prediction and Situational Assessment Using Neural Network-based Method.
J. Cyber Secur. Mobil.
12 (4) (2023)
Belal M. Amro
,
Saeed Salah
,
Mohammed Moreb
A Comprehensive Architectural Framework of Moving Target Defenses Against DDoS Attacks.
J. Cyber Secur. Mobil.
12 (4) (2023)
Ali Akram Abdul-Kareem
,
Waleed Ameen Mahmoud Al-Jawher
A Hybrid Domain Medical Image Encryption Scheme Using URUK and WAM Chaotic Maps with Wavelet - Fourier Transforms.
J. Cyber Secur. Mobil.
12 (4) (2023)
Xiao Xue
,
Yangbing Zheng
,
Chao Lu
Wireless Network Safety Status Prediction Based on Fuzzy Logic.
J. Cyber Secur. Mobil.
12 (4) (2023)
Nisha P. Shetty
,
Balachandra Muniyal
,
Aman Priyanshu
,
Vedant Rishi Das
FedBully: A Cross-Device Federated Approach for Privacy Enabled Cyber Bullying Detection using Sentence Encoders.
J. Cyber Secur. Mobil.
12 (4) (2023)
Khaled Mohammed Ali Hassan
,
Mohamed Ashraf Madkour
,
Sayed Abd El Hady Nouh
A Realtime Adaptive Trust Model Based on Artificial Neural Networks for Wireless Sensor Networks.
J. Cyber Secur. Mobil.
12 (4) (2023)
Sahel Alouneh
A Multi-Path Approach to Protect DNS Against DDoS Attacks.
J. Cyber Secur. Mobil.
12 (4) (2023)
volume 12, number 5, 2023
Xiaopeng Kan
,
Zhihong Zhou
,
Lihong Yao
,
Yuxin Zuo
Research on Anomaly Detection in Vehicular CAN Based on Bi-LSTM.
J. Cyber Secur. Mobil.
12 (5) (2023)
Gaili Du
Security of Encrypted Images in Network Transmission Based on an Improved Chaos Algorithm.
J. Cyber Secur. Mobil.
12 (5) (2023)
Ying Xue
Machine Learning: Research on Detection of Network Security Vulnerabilities by Extracting and Matching Features.
J. Cyber Secur. Mobil.
12 (5) (2023)
Xv Zhou
,
Jinwen He
Quantum Image Encryption Algorithm Incorporating Bit-plane Color Representation and Real Ket Model.
J. Cyber Secur. Mobil.
12 (5) (2023)
Min Chen
Camera Network Topology Mapping Based on the Integration of Network Information and Physical Distribution Under the Background of Communication Security.
J. Cyber Secur. Mobil.
12 (5) (2023)
Fadhil Mohammed Salman
,
Ahssan Ahmmed Mohammed
,
Fanar Ali Joda
Adaptation of the Ant Colony Algorithm to Avoid Congestion in Wireless Mesh Networks.
J. Cyber Secur. Mobil.
12 (5) (2023)
Xingfeng Li
An Evaluation Model for Network Security Based on an Optimized Circular Algorithm.
J. Cyber Secur. Mobil.
12 (5) (2023)
volume 12, number 6, 2023
Hong Zhang
,
Pei Li
Research on Location Privacy Protection Technology in Wireless Sensor Networks Based on Big Data.
J. Cyber Secur. Mobil.
12 (6) (2023)
Ruslan Orlovskyi
,
Sergiy Kharytonov
,
Igor Samoshchenko
,
Olha Us
,
Volodymyr Iemelianenko
Countering Cybercrime Under Martial Law.
J. Cyber Secur. Mobil.
12 (6) (2023)
Yujing Lu
Security and Privacy of Internet of Things: A Review of Challenges and Solutions.
J. Cyber Secur. Mobil.
12 (6) (2023)