


default search action
Journal of Cyber Security and Mobility, Volume 14
Volume 14, Number 1, 2025
- Fauzi Adi Rafrastara, Guruh Fajar Shidik, Wildanil Ghozi, Nova Rijati, Oki Setiono:
Tree-based Ensemble Algorithms and Feature Selection Method for Intelligent Distributed Denial of Service Attack Detection. 1-24 - Yuanyi Dang:
Research on Collaborative Positioning Algorithm of Wireless Sensor Network Security Under Strong Topology Relation. 25-46 - Weidong Wu, Zheng Tian, Yizhen Sun, Yongfa Li, Yu Cui:
Study on the Application of Dynamic Continuous Trust Assessment Model Based on Clustering Mechanism in Network Security Optimization. 47-74 - Huizhong Zhang, Fanrong Meng, Qinyong Wang:
Computer Network Security System Optimization Based on Improved Neural Network Algorithm and Data Search. 75-100 - Li Qiang:
Research on Performance Optimization and Resource Allocation Strategy of Network Node Encryption Based on RSA Algorithm. 101-126 - Xindi Ying:
Research on Network Security Situational Awareness and Risk Assessment Model Based on Bayesian Network. 155-180 - Yuanyi Dang, Yongbo Wang:
Design and Research of Network Edge Device Security Monitoring System Based on Embedded System and Bi-LSTM. 181-204 - Yun Cao:
Research on the Application of Blockchain Technology in the Security Protection of Sensitive Data in Information Systems. 205-228 - Jing Liang:
Research on Encryption Algorithm and Embedded System Optimization Strategy Based on IoT Security. 229-258

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.