


default search action
Network Security, Volume 2024
Volume 2024, Number 1, 2024
- Steve Mansfield-Devine:
Meeting the challenges of cyber security. - Aditya K. Sood, Amit Nagal:
AI as the bedrock for next-generation cyber security solutions. - Gemma Moore:
The challenge of viewing security events in context.
Volume 2024, Number 2, 2024
- Frank Schugar:
When not to do a penetration test. - Faye Ellis:
Enhancing data storage for cloud security. - Tim Freestone:
Managing private content exposure risk in 2024. - Steve Mansfield-Devine:
Grasping the nettle of cyber governance. - Dominic Trott:
A zero-trust journey through the threat landscape.
Volume 2024, Number 3, 2024
- Steve Mansfield-Devine:
Back to basics to fight flaws. - Dan Lattimer:
Can your disaster-recovery process stand up to ransomware? - Robert Guegan:
Continual risk management - getting the basics right. - Rajeev Kumar
, Raees Ahmad Khan:
Securing communication protocols in military computing.
Volume 2024, Number 4, 2024
- Carlos Morales:
Decoding the role of DNS in cyber security. - Karen Renaud
:
The Q-Z of cyber security. - Aare Reintam:
The role of cyber exercises in improving cyber readiness. - Petra Tesch:
Strengthening defences to protect PII. - Niall McConachie:
Does AI signal a new age of cyberthreats?
Volume 2024, Number 5, 2024
- Nils Gerhardt:
Putting cyber-safety first for Industry 4.0. - Richard Menear:
Building a human firewall to keep your organisation secure. - Tomer Nahum, Eric Woodruff:
Forging identity in the cloud - dissecting Silver SAML. - Steve Mansfield-Devine:
Poor cyber hygiene puts the UK at risk. - Ben Walker:
Minimising the risks and maximising the opportunities of generative AI.
Volume 2024, Number 6, 2024
- Dominic Carroll:
Ensuring that cyber security is fit for the future of manufacturing. - Chris Waynforth:
Cyber threats and key mitigation strategies. - Karen Renaud
:
The burden of keeping passwords secret. - Monique Becenti:
Interconnection, NIS2 and the mobile device. - Vincent Lomba:
Is new legislation the answer to curbing cybercrime? - Brendan Walsh:
Enhancing network resilience against growing cyberthreats.
Volume 2024, Number 8, 2024
- Nilesh P. Sable:
Cybersecurity Policies for Critical Infrastructure: Legal Mandates and Network Protection Requirements. 25-31 - Sujata Arya:
Creating Comprehensive Cybersecurity Policies: Balancing Network Protection and Compliance with Privacy Laws. 32-39
Volume 2024, Number 9, 2025
- Yande Xia, Anita Binti Rosli, Aryaty Binti Alwie:
Optimization of the Effect of Network Information Flow Advertising Based on User Behavior Data Encryption and Deep Learning. 1-12 - Mingyue Wang:
Combining Differential Privacy with FedAvgM to Optimize Data Access Control in the Information Platform. 13-24 - Eric Blancaflor, Keith Christian Esteron, Andrade Cy, Wayne Hans Camacho, Bradney Guzon:
Mitigating Cyber Attacks for Organization Assets using UEBA (User and Entity Behavior Analytics) and other Machine Learning Solutions from Cloud Security Threats: A Literature Review. 25-31 - Shoujun Bao, Shuhong Li, Ziyong Pan, Fuxiang Liang, Shenghai Han:
Fault Diagnosis and Optimized Operation and Maintenance of Drop-out Fuses in Alpine Regions Using MKL-SVM and GRU. 32-41 - Jun Wang:
User Behavior Analysis and Security Strategy Optimization of College English Learning Platform Using Dynamic Graph Convolutional Network. 42-53
Volume 2024, Number 10, 2025
- Jiaqi Peng, Baomin Fang, Haiping Ye, Yulin Ma, Bin Ai, Jin Luo:
Power Quality Data Security Transmission and Protection Technology of Urban Energy Internet Combining Generation Countermeasure Network and Differential Privacy. 1-10 - Pan Fan, Yuzhou Wang, Chenyuan Wang, Zihui Li, Jianfeng Wang:
Network Security Situation Assessment Combining Hypergraph Convolutional Network and Improved Traffic Anomaly Detection Model. 11-21 - Eric Blancaflor, Cailyn Rae Bautista, Bryce Angeles, Donald Oliver Gavino Jr, Jose Roberto Kam, Marianne Sejera:
Preventing Cyber Adversaries: Examining BlackCat Ransomware's Tactics and Preventive Measures for Enhanced Cybersecurity. 22-29 - Lei Shi:
Discussion on Cluster Analysis and Data Privacy Protection Strategy of Cultural Communication Metaphor Patterns in Online Social Networks. 30-40 - Wei Sun, Bo Zhang, Liwei Li, Xiaocen Guo:
Improving the User-friendliness and Ease of Use of Network Security Software through Visual Communication Design. 41-51 - Saima Kanwal, Feng Tao, Majid Khan:
Enhanced Dual-Layer Image Encryption with DWT-DCT-SVD Hybrid Approach. 52-61 - Haofeng Cao:
Cloud Computing Architecture Based on Network Security Vulnerabilities and Privacy Protection in the Kinematic Model of Hybrid Robots. 62-72 - Fangzhou He, Wei Bai, Zhiqi Wang:
Optimization of the Decision-making Process of Digital Twins in Network Security Based on Graph Neural Networks. 73-83

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.