


default search action
Journal of Cyber Security and Mobility, Volume 12
Volume 12, Number 1, 2023
- Zhihong Zhang:

Analysis of Network Security Countermeasures From the Perspective of Improved FS Algorithm and ICT Convergence. 1-24
- Ekhlas Abbas Albahrani

, Sadeq H. Lafta, Naeem Howrie Ghayad:
A Chaos-Based Encryption Algorithm for Database System. 25-54 - Junlin Zhang:

WSN Network Node Malicious Intrusion Detection Method Based on Reputation Score. 55-76
- V. N. Hemanth Kollipara, Sai Koushik Kalakota, Sujith Chamarthi, S. Ramani, Preeti Malik, Marimuthu Karuppiah:

Timestamp Based OTP and Enhanced RSA Key Exchange Scheme with SIT Encryption to Secure IoT Devices. 77-102 - Mohammed Mujeer Ulla

, Deepak S. Sakkari
:
Research on Elliptic Curve Crypto System with Bitcoin Curves - SECP256k1, NIST256p, NIST521p and LLL. 103-128
Volume 12, Number 2, 2023
- Martin Steinebach

, Tiberius Berwanger, Huajian Liu:
Image Hashing Robust Against Cropping and Rotation. 129-160 - York Yannikos

, Julian Heeger
, Martin Steinebach:
Scraping and Analyzing Data of a Large Darknet Marketplace. 161-186 - Florian Platzer

, Alexandra Lux:
Inconsistencies in Darknet Researches. 187-204
- Xin Jiang, Huawei Huang, Geyang Pan:

Cryptanalysis of Tropical Encryption Scheme Based on Double Key Exchange. 205-220 - Usman Rauf, Fadi Mohsen, Zhiyuan Wei

:
A Taxonomic Classification of Insider Threats: Existing Techniques, Future Directions & Recommendations. 221-252
Volume 12, Number 3, 2023
- Ivan Izonin, Tetiana Hovorushchenko, Peter T. Popov:

Editorial. v-x - Tetiana Hovorushchenko

, Yelyzaveta Hnatchuk
, Vitaliy Osyadlyi, Mariia Kapustian
, Artem Boyarchuk:
Blockchain-Based Medical Decision Support System. 253-274 - Fadhil Mohammed Salman, Ahssan Ahmmed Mohammed, Ahmed Fakhir Mutar:

Optimization of LEACH Protocol for WSNs in Terms of Energy Efficient and Network Lifetime. 275-296 - Tetiana Hovorushchenko

, Olga Pavlova, Mariia Kostiuk
:
Method of Increasing the Security of Smart Parking System. 297-314 - Vyacheslav Gorev

, Alexander Gusev, Valerii Korniienko, Yana I. Shedlovska:
On the Use of the Kolmogorov-Wiener Filter for Heavy-tail Process Prediction. 315-338 - Serhii Ya. Hilgurt

, Anatolii Davydenko, Tetyana V. Matovka, Mykhailo P. Prygara:
Tools for Analyzing Signature-Based Hardware Solutions for Cyber Security Systems. 339-366 - Nataliia I. Pravorska

:
Additional Detection of Clones Using Locally Sensitive Hashing. 367-388 - Liubomyr S. Sikora

, Nataliia Lysa
, Yevhen I. Tsikalo, Olga Fedevych:
System-Information and Cognitive Technologies of Man-Made Infrastructure Cyber Security. 389-414 - Petro Shepita

, Lyubov Tupychak, Julia Shepita:
Analysis of Cyber Security Threats of the Printing Enterprise. 415-434
Volume 12, Number 4, 2023
- Ali Akram Abdul-Kareem

, Waleed Ameen Mahmoud Al-Jawher:
A Hybrid Domain Medical Image Encryption Scheme Using URUK and WAM Chaotic Maps with Wavelet - Fourier Transforms. 435-464 - Nisha P. Shetty, Balachandra Muniyal, Aman Priyanshu, Vedant Rishi Das

:
FedBully: A Cross-Device Federated Approach for Privacy Enabled Cyber Bullying Detection using Sentence Encoders. 465-496 - Julija Gavenaite-Sirvydiene

, Algita Miecinskiene:
The Assessment of Cyber Security's Significance in the Financial Sector of Lithuania. 497-518 - Khaled Mohammed Ali Hassan, Mohamed Ashraf Madkour

, Sayed Abd El Hady Nouh:
A Realtime Adaptive Trust Model Based on Artificial Neural Networks for Wireless Sensor Networks. 519-546 - Liu Zhang, Yanyu Liu:

Network Security Prediction and Situational Assessment Using Neural Network-based Method. 547-568 - Sahel Alouneh:

A Multi-Path Approach to Protect DNS Against DDoS Attacks. 569-588
- Xiao Xue, Yangbing Zheng, Chao Lu:

Wireless Network Safety Status Prediction Based on Fuzzy Logic. 589-604
- Belal M. Amro, Saeed Salah, Mohammed Moreb:

A Comprehensive Architectural Framework of Moving Target Defenses Against DDoS Attacks. 605-628
Volume 12, Number 5, 2023
- Xiaopeng Kan, Zhihong Zhou, Lihong Yao, Yuxin Zuo:

Research on Anomaly Detection in Vehicular CAN Based on Bi-LSTM. 629-652 - Gaili Du:

Security of Encrypted Images in Network Transmission Based on an Improved Chaos Algorithm. 675-696
- Ying Xue:

Machine Learning: Research on Detection of Network Security Vulnerabilities by Extracting and Matching Features. 697-710 - Xingfeng Li:

An Evaluation Model for Network Security Based on an Optimized Circular Algorithm. 711-732 - Min Chen:

Camera Network Topology Mapping Based on the Integration of Network Information and Physical Distribution Under the Background of Communication Security. 733-756 - Xv Zhou, Jinwen He:

Quantum Image Encryption Algorithm Incorporating Bit-plane Color Representation and Real Ket Model. 757-784
- Fadhil Mohammed Salman

, Ahssan Ahmmed Mohammed, Fanar Ali Joda:
Adaptation of the Ant Colony Algorithm to Avoid Congestion in Wireless Mesh Networks. 785-812
Volume 12, Number 6, 2023
- Yujing Lu:

Security and Privacy of Internet of Things: A Review of Challenges and Solutions. 813-844 - Hong Zhang, Pei Li:

Research on Location Privacy Protection Technology in Wireless Sensor Networks Based on Big Data. 845-868 - Ruslan Orlovskyi, Sergiy Kharytonov, Igor Samoshchenko, Olha Us, Volodymyr Iemelianenko:

Countering Cybercrime Under Martial Law. 893-910

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














