- Huizhong Zhang, Fanrong Meng, Qinyong Wang. Computer Network Security System Optimization Based on Improved Neural Network Algorithm and Data Search. J. Cyber Secur. Mobil., 14(1):75-100, 2025.
- Yun Cao. Research on the Application of Blockchain Technology in the Security Protection of Sensitive Data in Information Systems. J. Cyber Secur. Mobil., 14(1):205-228, 2025.
- Xindi Ying. Research on Network Security Situational Awareness and Risk Assessment Model Based on Bayesian Network. J. Cyber Secur. Mobil., 14(1):155-180, 2025.
- Yuanyi Dang. Research on Collaborative Positioning Algorithm of Wireless Sensor Network Security Under Strong Topology Relation. J. Cyber Secur. Mobil., 14(1):25-46, 2025.
- Jing Liang. Research on Encryption Algorithm and Embedded System Optimization Strategy Based on IoT Security. J. Cyber Secur. Mobil., 14(1):229-258, 2025.
- Li Qiang. Research on Performance Optimization and Resource Allocation Strategy of Network Node Encryption Based on RSA Algorithm. J. Cyber Secur. Mobil., 14(1):101-126, 2025.
- Weidong Wu, Zheng Tian, Yizhen Sun, Yongfa Li, Yu Cui. Study on the Application of Dynamic Continuous Trust Assessment Model Based on Clustering Mechanism in Network Security Optimization. J. Cyber Secur. Mobil., 14(1):47-74, 2025.
- Fauzi Adi Rafrastara, Guruh Fajar Shidik, Wildanil Ghozi, Nova Rijati, Oki Setiono. Tree-based Ensemble Algorithms and Feature Selection Method for Intelligent Distributed Denial of Service Attack Detection. J. Cyber Secur. Mobil., 14(1):1-24, 2025.
- Yuanyi Dang, Yongbo Wang. Design and Research of Network Edge Device Security Monitoring System Based on Embedded System and Bi-LSTM. J. Cyber Secur. Mobil., 14(1):181-204, 2025.
- John Kwao Dawson, Frimpong Twum, James Benjamin Hayfron-Acquah, Yaw Marfo Missah. Cryptographic Solutions for Data Security in Cloud Computing: A Run Time Trend-based Comparison of NCS, ERSA, and EHS. J. Cyber Secur. Mobil., 13(2):265-282, 2024.