- Shoujun Bao, Shuhong Li, Ziyong Pan, Fuxiang Liang, Shenghai Han. Fault Diagnosis and Optimized Operation and Maintenance of Drop-out Fuses in Alpine Regions Using MKL-SVM and GRU. Network Security, 2024(9):32-41, 2025.
- Saima Kanwal, Feng Tao, Majid Khan. Enhanced Dual-Layer Image Encryption with DWT-DCT-SVD Hybrid Approach. Network Security, 2024(10):52-61, 2025.
- Jiaqi Peng, Baomin Fang, Haiping Ye 0002, Yulin Ma, Bin Ai, Jin Luo. Power Quality Data Security Transmission and Protection Technology of Urban Energy Internet Combining Generation Countermeasure Network and Differential Privacy. Network Security, 2024(10):1-10, 2025.
- Wei Sun, Bo Zhang, Liwei Li, Xiaocen Guo. Improving the User-friendliness and Ease of Use of Network Security Software through Visual Communication Design. Network Security, 2024(10):41-51, 2025.
- Jun Wang. User Behavior Analysis and Security Strategy Optimization of College English Learning Platform Using Dynamic Graph Convolutional Network. Network Security, 2024(9):42-53, 2025.
- Fangzhou He, Wei Bai, Zhiqi Wang. Optimization of the Decision-making Process of Digital Twins in Network Security Based on Graph Neural Networks. Network Security, 2024(10):73-83, 2025.
- Mingyue Wang. Combining Differential Privacy with FedAvgM to Optimize Data Access Control in the Information Platform. Network Security, 2024(9):13-24, 2025.
- Eric Blancaflor, Cailyn Rae Bautista, Bryce Angeles, Donald Oliver Gavino Jr, Jose Roberto Kam, Marianne Sejera. Preventing Cyber Adversaries: Examining BlackCat Ransomware's Tactics and Preventive Measures for Enhanced Cybersecurity. Network Security, 2024(10):22-29, 2025.
- Lei Shi. Discussion on Cluster Analysis and Data Privacy Protection Strategy of Cultural Communication Metaphor Patterns in Online Social Networks. Network Security, 2024(10):30-40, 2025.
- Haofeng Cao. Cloud Computing Architecture Based on Network Security Vulnerabilities and Privacy Protection in the Kinematic Model of Hybrid Robots. Network Security, 2024(10):62-72, 2025.