JCSOpen Access

Journal of Cyber Security

Publication Frequency:Quarterly

  • Online

  • on board

About Journal

Cybersecurity is the basis of information dissemination in the internet age.The Journal of Cyber Security focuses on all aspects of sciences, technologies, and applications relating to hardware security, software security and system security. Read More


    Design and Implementation of Enterprise Recruitment Mini Program

    Journal of Cyber Security, Vol.3, No.3, pp. 125-132, 2021, DOI:10.32604/jcs.2021.016647
    Abstract Since the 21st century, the Internet has been updated and developed at an alarming speed. At the same time, WeChat applets are constantly improving and introducing new functions. Develop an enterprise recruitment system based on WeChat applets for the majority of job seekers and recruiter users, provide job seekers with easy-to-reach employment opportunities, and provide a convenient and clear screening environment for job seekers. The front-end part of the applet is developed using WeChat developer tools, and the back-end system is developed using MyEclipse. Use Spring Boot + Spring MVC framework, implemented in Java language. Data is managed using MySql… More >


    Awareness about the Online Security Threat and Ways to Secure the Youths

    Journal of Cyber Security, Vol.3, No.3, pp. 133-148, 2021, DOI:10.32604/jcs.2021.024136
    Abstract This study aimed to find out the awareness about the online security threat and understanding of the preventive measuresto secure the youthsfrom online risks. For this, a quantitative method was applied and the survey questionnaire was instituted to collect the data randomly from the youths studying in class eleven and higher. A total of 264 youths, 147 female and 117 male responded to the survey questionnaire. The data was organized and analyzed using Excel data analysis tool package, interpreted and represented in the form of graphs with some explanations. The awareness about the online security threat was found to be… More >


    Securing Fog Computing For E-Learning System Using Integration of Two Encryption Algorithms

    Journal of Cyber Security, Vol.3, No.3, pp. 149-166, 2021, DOI:10.32604/jcs.2021.022112
    Abstract Currently, the majority of institutions have made use of information technologies to improve and develop their diverse educational methods to attract more learners. Through information technologies, e-learning and learning-on-the go have been adopted by the institutions to provide affordability and flexibility of educational services. Most of the educational institutes are offering online teaching classes using the technologies like cloud computing, networking, etc. Educational institutes have developed their e-learning platforms for the online learning process, through this way they have paved the way for distance learning. But e-learning platform has to face a lot of security challenges in terms of cyberattacks… More >


    Enterprise Cyberspace Threat Landscape: An Analysis

    Journal of Cyber Security, Vol.3, No.3, pp. 167-176, 2021, DOI:10.32604/jcs.2021.019158
    Abstract The ecosystem security platform described in this research is already impacting the threat spectrum in quantifiable ways. The global network has undergone a dramatic transformation over the course of 2020, with an unprecedented destabilization of events. Security breaches of all kinds are growing in complexity, sophistication, and impact. The bad actors are bypassing predictable security devices at will by breaching network systems at an escalating rate. This study will analyze these developments by creating awareness among security practitioners so they can be prepared to defend their enterprise systems. More >


    Analysis and Design of University Teaching Equipment Management Information System

    Journal of Cyber Security, Vol.3, No.3, pp. 177-185, 2021, DOI:10.32604/jcs.2021.016657
    Abstract Teaching equipment management is an important factor for colleges and universities to improve their teaching level, and its management level directly affects the service life and efficiency of teaching equipment. But in recent years, our university recruitment of students scale is increasing year by year, the size of the corresponding teaching equipment is also growing, therefore to develop a teaching equipment management information system is necessary, not only can help universities to effective use of the existing teaching resources, also can update scrap equipment, related equipment maintenance, and build a good learning environment to students and to the improvement of… More >


    The Development of Proxy Re-Encryption

    Journal of Cyber Security, Vol.2, No.1, pp. 1-8, 2020, DOI:10.32604/jcs.2020.05878
    Abstract With the diversification of electronic devices, cloud-based services have become the link between different devices. As a cryptosystem with secure conversion function, proxy re-encryption enables secure sharing of data in a cloud environment. Proxy re-encryption is a public key encryption system with ciphertext security conversion function. A semi-trusted agent plays the role of ciphertext conversion, which can convert the user ciphertext into the same plaintext encrypted by the principal’s public key. Proxy re-encryption has been a hotspot in the field of information security since it was proposed by Blaze et al. [Blaze, Bleumer and Strauss (1998)]. After 20 years of… More >


    Privacy-Preserving Genetic Algorithm Outsourcing in Cloud Computing

    Journal of Cyber Security, Vol.2, No.1, pp. 49-61, 2020, DOI:10.32604/jcs.2020.09308
    Abstract Genetic Algorithm (GA) has been widely used to solve various optimization problems. As the solving process of GA requires large storage and computing resources, it is well motivated to outsource the solving process of GA to the cloud server. However, the algorithm user would never want his data to be disclosed to cloud server. Thus, it is necessary for the user to encrypt the data before transmitting them to the server. But the user will encounter a new problem. The arithmetic operations we are familiar with cannot work directly in the ciphertext domain. In this paper, a privacy-preserving outsourced genetic… More >


    A New Adaptive Regularization Parameter Selection Based on Expected Patch Log Likelihood

    Journal of Cyber Security, Vol.2, No.1, pp. 25-36, 2020, DOI:10.32604/jcs.2020.06429
    Abstract Digital images have been applied to various areas such as evidence in courts. However, it always suffers from noise by criminals. This type of computer network security has become a hot issue that can’t be ignored. In this paper, we focus on noise removal so as to provide guarantees for computer network security. Firstly, we introduce a well-known denoising method called Expected Patch Log Likelihood (EPLL) with Gaussian Mixture Model as its prior. This method achieves exciting results in noise removal. However, there remain problems to be solved such as preserving the edge and meaningful details in image denoising, cause… More >


    Searchable Encryption with Access Control on Keywords in Multi-User Setting

    Journal of Cyber Security, Vol.2, No.1, pp. 9-23, 2020, DOI:10.32604/jcs.2020.06313
    Abstract Searchable encryption technology makes it convenient to search encrypted data with keywords for people. A data owner shared his data with other users on the cloud server. For security, it is necessary for him to build a fine-grained and flexible access control mechanism. The main idea of this paper is to let the owner classify his data and then authorizes others according to categories. The cloud server maintains a permission matrix, which will be used to verify whether a trapdoor is valid or not. In this way we can achieve access control and narrow the search range at the same… More >


    An Amorphous 2-Dimensional Barcode

    Journal of Cyber Security, Vol.2, No.1, pp. 37-48, 2020, DOI:10.32604/jcs.2020.07209
    Abstract Most existing 2-dimensional barcodes are designed with a fixed shape and clear area. Having a fixed shape and clear area makes the barcode difficult to lay out with other text and pictures. To solve this problem, an amorphous 2-dimensional barcode is presented in this paper. The barcode uses encoding graph units to encode data. There are two key points in a 2-dimensional barcode: One is the encoding graph unit, the other is its encoding rules. Because encoding graph units of a 2-dimensional barcode are surrounded by other graphics, the units should be self-positioned and distinguished from other units. This paper… More >


    Data Security Defense and Algorithm for Edge Computing Based on Mean Field Game

    Journal of Cyber Security, Vol.2, No.2, pp. 97-106, 2020, DOI:10.32604/jcs.2020.010548
    Abstract With the development of the Internet of Things, the edge devices are increasing. Cyber security issues in edge computing have also emerged and caused great concern. We propose a defense strategy based on Mean field game to solve the security issues of edge user data during edge computing. Firstly, an individual cost function is formulated to build an edge user data security defense model. Secondly, we research the More >

Share Link

WeChat scan