


default search action
Journal of Cyber Security and Mobility, Volume 11
Volume 11, Number 1, 2022
- Amirfarhad Nilizadeh

, Shirin Nilizadeh, Wojciech Mazurczyk
, Cliff C. Zou
, Gary T. Leavens
:
Adaptive Matrix Pattern Steganography on RGB Images.
Volume 11, Number 2, 2022
- Shishir Kumar Shandilya

:
Design and Deployment of Network Testbed for Web Data Security.
Volume 11, Number 3, 2022
- Somesha M.

, Alwyn R. Pais
:
Classification of Phishing Email Using Word Embedding and Machine Learning Techniques. 279-320
Volume 11, Number 4, 2022
- Daniel Kyalo Ndambuki, Hitmi Khalifa Alhitmi:

Attack Mitigation and Security for Vehicle Platoon. 497-530 - K. Rajesh Rao

, Aditya Kolpe, Tribikram Pradhan, Bruno Bogaz Zarpelão
:
An Efficient Solution to User Authorization Query Problem in RBAC Systems Using Hierarchical Clustering. 531-548 - Sunpreet Kaur Nanda

, Deepika Ghai, Prashant Ingole:
Analysis of Video Forensics System for Detection of Gun, Mask and Anomaly Using Soft Computing Techniques. 549-574 - Nisha P. Shetty, Balachandra Muniyal, Niraj Yagnik

, Tulika Banerjee, Angad Singh:
A Privacy Preserving Framework to Protect Sensitive Data in Online Social Networks. 575-600 - Hailyie Tekleselassie:

Two-Dimensional Projection Based Wireless Intrusion Classification Using Lightweight EfficientNet. 601-620 - B. N. Chaithanya, S. H. Brahmananda:

AI-enhanced Defense Against Ransomware Within the Organization's Architecture. 621-654
Volume 11, Number 5, 2022
- Sunardi, Herman, Syifa Riski Ardiningtias:

A Comparative Analysis of Digital Forensic Investigation Tools on Facebook Messenger Applications. 655-672 - El Hassane Laaji, Abdelmalek Azizi

:
A Combination of BB84 Quantum Key Distribution and An Improved Scheme of NTRU Post-Quantum Cryptosystem. 673-694 - Bing Bai:

Monitoring and Identification of Abnormal Network Traffic by Different Mathematical Models. 695-712 - Dongliang Bian, Jun Pan, Yanhui Wang:

Study of Encrypted Transmission of Private Data During Network Communication: Performance Comparison of Advanced Encryption Standard and Data Encryption Standard Algorithms. 713-726
Volume 11, Number 6, 2022
- Morten Falch

, Henning Olesen, Knud Erik Skouby
, Reza Tadayoni
, Idongesit Williams
:
Cybersecurity Strategies for SMEs in the Nordic Baltic Region. 727-754 - Xiang Li:

Construction of a Smart City Network Information Security Evaluation Model Based on GRA-BPNN. 755-776
- Zehui Liu, Min Guo, Yun Ju:

Physical Layer Key Generation Method Based on SVD Pre-processing. 777-794

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














