Journal: Network Security

Volume 2024, Issue 9

1 -- 12Yande Xia, Anita Binti Rosli, Aryaty Binti Alwie. Optimization of the Effect of Network Information Flow Advertising Based on User Behavior Data Encryption and Deep Learning
13 -- 24Mingyue Wang. Combining Differential Privacy with FedAvgM to Optimize Data Access Control in the Information Platform
25 -- 31Eric Blancaflor, Keith Christian Esteron, Andrade Cy, Wayne Hans Camacho, Bradney Guzon. Mitigating Cyber Attacks for Organization Assets using UEBA (User and Entity Behavior Analytics) and other Machine Learning Solutions from Cloud Security Threats: A Literature Review
32 -- 41Shoujun Bao, Shuhong Li, Ziyong Pan, Fuxiang Liang, Shenghai Han. Fault Diagnosis and Optimized Operation and Maintenance of Drop-out Fuses in Alpine Regions Using MKL-SVM and GRU
42 -- 53Jun Wang. User Behavior Analysis and Security Strategy Optimization of College English Learning Platform Using Dynamic Graph Convolutional Network

Volume 2024, Issue 8

25 -- 31Nilesh P. Sable. Cybersecurity Policies for Critical Infrastructure: Legal Mandates and Network Protection Requirements
32 -- 39Sujata Arya. Creating Comprehensive Cybersecurity Policies: Balancing Network Protection and Compliance with Privacy Laws

Volume 2024, Issue 6

0 -- 0Karen Renaud. The burden of keeping passwords secret
0 -- 0Dominic Carroll. Ensuring that cyber security is fit for the future of manufacturing
0 -- 0Monique Becenti. Interconnection, NIS2 and the mobile device
0 -- 0Brendan Walsh. Enhancing network resilience against growing cyberthreats
0 -- 0Vincent Lomba. Is new legislation the answer to curbing cybercrime?
0 -- 0Chris Waynforth. Cyber threats and key mitigation strategies

Volume 2024, Issue 5

0 -- 0Steve Mansfield-Devine. Poor cyber hygiene puts the UK at risk
0 -- 0Nils Gerhardt. Putting cyber-safety first for Industry 4.0
0 -- 0Richard Menear. Building a human firewall to keep your organisation secure
0 -- 0Tomer Nahum, Eric Woodruff. Forging identity in the cloud - dissecting Silver SAML
0 -- 0Ben Walker. Minimising the risks and maximising the opportunities of generative AI

Volume 2024, Issue 4

0 -- 0Niall McConachie. Does AI signal a new age of cyberthreats?
0 -- 0Aare Reintam. The role of cyber exercises in improving cyber readiness
0 -- 0Carlos Morales. Decoding the role of DNS in cyber security
0 -- 0Karen Renaud. The Q-Z of cyber security
0 -- 0Petra Tesch. Strengthening defences to protect PII

Volume 2024, Issue 3

0 -- 0Dan Lattimer. Can your disaster-recovery process stand up to ransomware?
0 -- 0Robert Guegan. Continual risk management - getting the basics right
0 -- 0Rajeev Kumar 0001, Raees Ahmad Khan. Securing communication protocols in military computing
0 -- 0Steve Mansfield-Devine. Back to basics to fight flaws

Volume 2024, Issue 2

0 -- 0Frank Schugar. When not to do a penetration test
0 -- 0Steve Mansfield-Devine. Grasping the nettle of cyber governance
0 -- 0Faye Ellis. Enhancing data storage for cloud security
0 -- 0Tim Freestone. Managing private content exposure risk in 2024
0 -- 0Dominic Trott. A zero-trust journey through the threat landscape

Volume 2024, Issue 10

1 -- 10Jiaqi Peng, Baomin Fang, Haiping Ye 0002, Yulin Ma, Bin Ai, Jin Luo. Power Quality Data Security Transmission and Protection Technology of Urban Energy Internet Combining Generation Countermeasure Network and Differential Privacy
11 -- 21Pan Fan, Yuzhou Wang, Chenyuan Wang, Zihui Li, Jianfeng Wang. Network Security Situation Assessment Combining Hypergraph Convolutional Network and Improved Traffic Anomaly Detection Model
22 -- 29Eric Blancaflor, Cailyn Rae Bautista, Bryce Angeles, Donald Oliver Gavino Jr, Jose Roberto Kam, Marianne Sejera. Preventing Cyber Adversaries: Examining BlackCat Ransomware's Tactics and Preventive Measures for Enhanced Cybersecurity
30 -- 40Lei Shi. Discussion on Cluster Analysis and Data Privacy Protection Strategy of Cultural Communication Metaphor Patterns in Online Social Networks
41 -- 51Wei Sun, Bo Zhang, Liwei Li, Xiaocen Guo. Improving the User-friendliness and Ease of Use of Network Security Software through Visual Communication Design
52 -- 61Saima Kanwal, Feng Tao, Majid Khan. Enhanced Dual-Layer Image Encryption with DWT-DCT-SVD Hybrid Approach
62 -- 72Haofeng Cao. Cloud Computing Architecture Based on Network Security Vulnerabilities and Privacy Protection in the Kinematic Model of Hybrid Robots
73 -- 83Fangzhou He, Wei Bai, Zhiqi Wang. Optimization of the Decision-making Process of Digital Twins in Network Security Based on Graph Neural Networks

Volume 2024, Issue 1

0 -- 0Aditya K. Sood, Amit Nagal. AI as the bedrock for next-generation cyber security solutions
0 -- 0Gemma Moore. The challenge of viewing security events in context
0 -- 0Steve Mansfield-Devine. Meeting the challenges of cyber security