Loading…
Statistical Techniques for Detecting Cyberattacks on Computer Networks Based on an Analysis of Abnormal Traffic Behavior
Hu, Zhengbing, Odarchenko, Roman, Gnatyuk, Sergiy, Zaliskyi, Maksym, Chaplits, Anastasia, Bondar, Sergiy, Borovik, Vadim
Published in International journal of computer network and information security (08.12.2021)
Published in International journal of computer network and information security (08.12.2021)
Get full text
Journal Article
Loading…
Loading…
Loading…
Loading…
Performance Analysis of Cryptographic Hash Functions Suitable for Use in Blockchain
Kuznetsov, Alexandr, Oleshko, Inna, Tymchenko, Vladyslav, Lisitsky, Konstantin, Rodinko, Mariia, Kolhatin, Andrii
Published in International journal of computer network and information security (01.04.2021)
Published in International journal of computer network and information security (01.04.2021)
Get full text
Journal Article
Loading…
Network Intrusion Detection System based PSO-SVM for Cloud Computing
Sakr, Mahmoud M, Tawfeeq, Medhat A, El-Sisi, Ashraf B
Published in International journal of computer network and information security (08.03.2019)
Published in International journal of computer network and information security (08.03.2019)
Get full text
Journal Article
Loading…
Malware Classification with Improved Convolutional Neural Network Model
Lad, Sumit S., Adamuthe, Amol C.
Published in International journal of computer network and information security (08.12.2021)
Published in International journal of computer network and information security (08.12.2021)
Get full text
Journal Article
Loading…
Loading…
Auto-metric Graph Neural Network for Attack Detection on IoT-based Smart Environment and Secure Data Transmission using Advanced Wild Horse Standard Encryption Method
Yadawad, Ranganath, Kulkarni, Umakant P., Alzubi, Jafar A.
Published in International journal of computer network and information security (08.06.2024)
Published in International journal of computer network and information security (08.06.2024)
Get full text
Journal Article
Loading…
Loading…
Loading…
On Cryptanalysis of 3-DES using Nature-Inspired Algorithms
Sikdar, Subinoy, Dutta, Sagnik, Kule, Malay
Published in International journal of computer network and information security (08.06.2025)
Published in International journal of computer network and information security (08.06.2025)
Get full text
Journal Article
Loading…
Big Data Time Series Forecasting Using Pattern Sequencing Similarity
Sharma, Gaurav, Bandhu, Kailash Chandra
Published in International journal of computer network and information security (08.06.2025)
Published in International journal of computer network and information security (08.06.2025)
Get full text
Journal Article
Loading…
Preliminary Study of Step-Count Authentication using Wearable Device
Boonkrong, Sirapat, Kanjanapruthipong, Wata
Published in International journal of computer network and information security (08.06.2025)
Published in International journal of computer network and information security (08.06.2025)
Get full text
Journal Article
Loading…
Sturdy Blockchain Combined with E-apps Repositories Based on Reliable Camouflaging and Integrating Mechanisms
Razzaq, Rasha Hallem, Tahayur, Duaa Hammoud, Jebbar, Wid Alaa, Al-Zubaidie, Mishall
Published in International journal of computer network and information security (08.06.2025)
Published in International journal of computer network and information security (08.06.2025)
Get full text
Journal Article
Loading…
Development and Testing of Voice User Interfaces Based on BERT Models for Speech Recognition in Distance Learning and Smart Home Systems
Vysotska, Victoria, Hu, Zhengbing, Mykytyn, Nikita, Nagachevska, Olena, Hazdiuk, Kateryna, Uhryn, Dmytro
Published in International journal of computer network and information security (08.06.2025)
Published in International journal of computer network and information security (08.06.2025)
Get full text
Journal Article
Loading…
Post-quantum Digital Signatures using ElGamal Approach
Iavich, Maksim, Sairangazhykyzy, Dana Amirkhanova
Published in International journal of computer network and information security (08.06.2025)
Published in International journal of computer network and information security (08.06.2025)
Get full text
Journal Article
Loading…
GraphConvDeep: A Deep Learning Approach for Enhancing Binary Code Similarity Detection using Graph Embeddings
M., Nandish, Kumar, Jalesh, G., Mohan H., Krishnamurthy, Manjunath Sargur
Published in International journal of computer network and information security (08.06.2025)
Published in International journal of computer network and information security (08.06.2025)
Get full text
Journal Article
Loading…
Loading…
A Risk-Assessment of Cyber Attacks and Defense Strategies in Industry 4.0 Ecosystem
Süzen, Ahmet Ali
Published in International journal of computer network and information security (01.02.2020)
Published in International journal of computer network and information security (01.02.2020)
Get full text
Journal Article