default search action
Journal of Cyber Security and Mobility, Volume 12
Volume 12, Number 1, 2023
- Zhihong Zhang:
Analysis of Network Security Countermeasures From the Perspective of Improved FS Algorithm and ICT Convergence. 1-24
- Ekhlas Abbas Albahrani, Sadeq H. Lafta, Naeem Howrie Ghayad:
A Chaos-Based Encryption Algorithm for Database System. 25-54 - Junlin Zhang:
WSN Network Node Malicious Intrusion Detection Method Based on Reputation Score. 55-76
- V. N. Hemanth Kollipara, Sai Koushik Kalakota, Sujith Chamarthi, S. Ramani, Preeti Malik, Marimuthu Karuppiah:
Timestamp Based OTP and Enhanced RSA Key Exchange Scheme with SIT Encryption to Secure IoT Devices. 77-102 - Mohammed Mujeer Ulla, Deepak S. Sakkari:
Research on Elliptic Curve Crypto System with Bitcoin Curves - SECP256k1, NIST256p, NIST521p and LLL. 103-128
Volume 12, Number 2, 2023
- Martin Steinebach, Tiberius Berwanger, Huajian Liu:
Image Hashing Robust Against Cropping and Rotation. 129-160 - York Yannikos, Julian Heeger, Martin Steinebach:
Scraping and Analyzing Data of a Large Darknet Marketplace. 161-186 - Florian Platzer, Alexandra Lux:
Inconsistencies in Darknet Researches. 187-204
- Xin Jiang, Huawei Huang, Geyang Pan:
Cryptanalysis of Tropical Encryption Scheme Based on Double Key Exchange. 205-220 - Usman Rauf, Fadi Mohsen, Zhiyuan Wei:
A Taxonomic Classification of Insider Threats: Existing Techniques, Future Directions & Recommendations. 221-252
Volume 12, Number 3, 2023
- Ivan Izonin, Tetiana Hovorushchenko, Peter T. Popov:
Editorial. v-x - Tetiana Hovorushchenko, Yelyzaveta Hnatchuk, Vitaliy Osyadlyi, Mariia Kapustian, Artem Boyarchuk:
Blockchain-Based Medical Decision Support System. 253-274 - Fadhil Mohammed Salman, Ahssan Ahmmed Mohammed, Ahmed Fakhir Mutar:
Optimization of LEACH Protocol for WSNs in Terms of Energy Efficient and Network Lifetime. 275-296 - Tetiana Hovorushchenko, Olga Pavlova, Mariia Kostiuk:
Method of Increasing the Security of Smart Parking System. 297-314 - Vyacheslav Gorev, Alexander Gusev, Valerii Korniienko, Yana I. Shedlovska:
On the Use of the Kolmogorov-Wiener Filter for Heavy-tail Process Prediction. 315-338 - Serhii Ya. Hilgurt, Anatolii Davydenko, Tetyana V. Matovka, Mykhailo P. Prygara:
Tools for Analyzing Signature-Based Hardware Solutions for Cyber Security Systems. 339-366 - Nataliia I. Pravorska:
Additional Detection of Clones Using Locally Sensitive Hashing. 367-388 - Liubomyr S. Sikora, Nataliia Lysa, Yevhen I. Tsikalo, Olga Fedevych:
System-Information and Cognitive Technologies of Man-Made Infrastructure Cyber Security. 389-414 - Petro Shepita, Lyubov Tupychak, Julia Shepita:
Analysis of Cyber Security Threats of the Printing Enterprise. 415-434
Volume 12, Number 4, 2023
- Ali Akram Abdul-Kareem, Waleed Ameen Mahmoud Al-Jawher:
A Hybrid Domain Medical Image Encryption Scheme Using URUK and WAM Chaotic Maps with Wavelet - Fourier Transforms. 435-464 - Nisha P. Shetty, Balachandra Muniyal, Aman Priyanshu, Vedant Rishi Das:
FedBully: A Cross-Device Federated Approach for Privacy Enabled Cyber Bullying Detection using Sentence Encoders. 465-496 - Julija Gavenaite-Sirvydiene, Algita Miecinskiene:
The Assessment of Cyber Security's Significance in the Financial Sector of Lithuania. 497-518 - Khaled Mohammed Ali Hassan, Mohamed Ashraf Madkour, Sayed Abd El Hady Nouh:
A Realtime Adaptive Trust Model Based on Artificial Neural Networks for Wireless Sensor Networks. 519-546 - Liu Zhang, Yanyu Liu:
Network Security Prediction and Situational Assessment Using Neural Network-based Method. 547-568 - Sahel Alouneh:
A Multi-Path Approach to Protect DNS Against DDoS Attacks. 569-588
- Xiao Xue, Yangbing Zheng, Chao Lu:
Wireless Network Safety Status Prediction Based on Fuzzy Logic. 589-604
- Belal M. Amro, Saeed Salah, Mohammed Moreb:
A Comprehensive Architectural Framework of Moving Target Defenses Against DDoS Attacks. 605-628
Volume 12, Number 5, 2023
- Xiaopeng Kan, Zhihong Zhou, Lihong Yao, Yuxin Zuo:
Research on Anomaly Detection in Vehicular CAN Based on Bi-LSTM. 629-652 - Gaili Du:
Security of Encrypted Images in Network Transmission Based on an Improved Chaos Algorithm. 675-696
- Ying Xue:
Machine Learning: Research on Detection of Network Security Vulnerabilities by Extracting and Matching Features. 697-710 - Xingfeng Li:
An Evaluation Model for Network Security Based on an Optimized Circular Algorithm. 711-732 - Min Chen:
Camera Network Topology Mapping Based on the Integration of Network Information and Physical Distribution Under the Background of Communication Security. 733-756 - Xv Zhou, Jinwen He:
Quantum Image Encryption Algorithm Incorporating Bit-plane Color Representation and Real Ket Model. 757-784
- Fadhil Mohammed Salman, Ahssan Ahmmed Mohammed, Fanar Ali Joda:
Adaptation of the Ant Colony Algorithm to Avoid Congestion in Wireless Mesh Networks. 785-812
Volume 12, Number 6, 2023
- Yujing Lu:
Security and Privacy of Internet of Things: A Review of Challenges and Solutions. 813-844 - Hong Zhang, Pei Li:
Research on Location Privacy Protection Technology in Wireless Sensor Networks Based on Big Data. 845-868 - Ruslan Orlovskyi, Sergiy Kharytonov, Igor Samoshchenko, Olha Us, Volodymyr Iemelianenko:
Countering Cybercrime Under Martial Law. 893-910
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.