


default search action
Network Security, Volume 2024
Volume 2024, Number 1, 2024
- Steve Mansfield-Devine:

Meeting the challenges of cyber security. - Aditya K. Sood, Amit Nagal:

AI as the bedrock for next-generation cyber security solutions. - Gemma Moore:

The challenge of viewing security events in context.
Volume 2024, Number 2, 2024
- Frank Schugar:

When not to do a penetration test. - Faye Ellis:

Enhancing data storage for cloud security. - Tim Freestone:

Managing private content exposure risk in 2024. - Steve Mansfield-Devine:

Grasping the nettle of cyber governance. - Dominic Trott:

A zero-trust journey through the threat landscape.
Volume 2024, Number 3, 2024
- Steve Mansfield-Devine:

Back to basics to fight flaws. - Dan Lattimer:

Can your disaster-recovery process stand up to ransomware? - Robert Guegan:

Continual risk management - getting the basics right. - Rajeev Kumar

, Raees Ahmad Khan:
Securing communication protocols in military computing.
Volume 2024, Number 4, 2024
- Carlos Morales:

Decoding the role of DNS in cyber security. - Karen Renaud

:
The Q-Z of cyber security. - Aare Reintam:

The role of cyber exercises in improving cyber readiness. - Petra Tesch:

Strengthening defences to protect PII. - Niall McConachie:

Does AI signal a new age of cyberthreats?
Volume 2024, Number 5, 2024
- Nils Gerhardt:

Putting cyber-safety first for Industry 4.0. - Richard Menear:

Building a human firewall to keep your organisation secure. - Tomer Nahum, Eric Woodruff:

Forging identity in the cloud - dissecting Silver SAML. - Steve Mansfield-Devine:

Poor cyber hygiene puts the UK at risk. - Ben Walker:

Minimising the risks and maximising the opportunities of generative AI.
Volume 2024, Number 6, 2024
- Dominic Carroll:

Ensuring that cyber security is fit for the future of manufacturing. - Chris Waynforth:

Cyber threats and key mitigation strategies. - Karen Renaud

:
The burden of keeping passwords secret. - Monique Becenti:

Interconnection, NIS2 and the mobile device. - Vincent Lomba:

Is new legislation the answer to curbing cybercrime? - Brendan Walsh:

Enhancing network resilience against growing cyberthreats.
Volume 2024, Number 8, 2024
- Nilesh P. Sable:

Cybersecurity Policies for Critical Infrastructure: Legal Mandates and Network Protection Requirements. 25-31 - Sujata Arya:

Creating Comprehensive Cybersecurity Policies: Balancing Network Protection and Compliance with Privacy Laws. 32-39
Volume 2024, Number 9, 2025
- Yande Xia, Anita Binti Rosli, Aryaty Binti Alwie:

Optimization of the Effect of Network Information Flow Advertising Based on User Behavior Data Encryption and Deep Learning. 1-12 - Mingyue Wang:

Combining Differential Privacy with FedAvgM to Optimize Data Access Control in the Information Platform. 13-24 - Eric Blancaflor, Keith Christian Esteron, Andrade Cy, Wayne Hans Camacho, Bradney Guzon:

Mitigating Cyber Attacks for Organization Assets using UEBA (User and Entity Behavior Analytics) and other Machine Learning Solutions from Cloud Security Threats: A Literature Review. 25-31 - Shoujun Bao, Shuhong Li, Ziyong Pan, Fuxiang Liang, Shenghai Han:

Fault Diagnosis and Optimized Operation and Maintenance of Drop-out Fuses in Alpine Regions Using MKL-SVM and GRU. 32-41 - Jun Wang:

User Behavior Analysis and Security Strategy Optimization of College English Learning Platform Using Dynamic Graph Convolutional Network. 42-53
Volume 2024, Number 10, 2025
- Jiaqi Peng, Baomin Fang, Haiping Ye, Yulin Ma, Bin Ai, Jin Luo:

Power Quality Data Security Transmission and Protection Technology of Urban Energy Internet Combining Generation Countermeasure Network and Differential Privacy. 1-10 - Pan Fan, Yuzhou Wang, Chenyuan Wang, Zihui Li, Jianfeng Wang:

Network Security Situation Assessment Combining Hypergraph Convolutional Network and Improved Traffic Anomaly Detection Model. 11-21 - Eric Blancaflor, Cailyn Rae Bautista, Bryce Angeles, Donald Oliver Gavino Jr, Jose Roberto Kam, Marianne Sejera:

Preventing Cyber Adversaries: Examining BlackCat Ransomware's Tactics and Preventive Measures for Enhanced Cybersecurity. 22-29 - Lei Shi:

Discussion on Cluster Analysis and Data Privacy Protection Strategy of Cultural Communication Metaphor Patterns in Online Social Networks. 30-40 - Wei Sun, Bo Zhang, Liwei Li, Xiaocen Guo:

Improving the User-friendliness and Ease of Use of Network Security Software through Visual Communication Design. 41-51 - Saima Kanwal, Tao Feng, Majid Khan:

Enhanced Dual-Layer Image Encryption with DWT-DCT-SVD Hybrid Approach. 52-61 - Haofeng Cao:

Cloud Computing Architecture Based on Network Security Vulnerabilities and Privacy Protection in the Kinematic Model of Hybrid Robots. 62-72 - Fangzhou He, Wei Bai, Zhiqi Wang:

Optimization of the Decision-making Process of Digital Twins in Network Security Based on Graph Neural Networks. 73-83

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














