Home / Journals / JCS / Vol.3, No.1, 2021
Special lssues
  • Open AccessOpen Access

    ARTICLE

    The Technical Design and Implementation of Cross-Platform Industrial Product Order System

    Yu Xue1,2,*, Xu Cai1, Shoubao Su2, Junxiang Han1, Romany F. Mansour3
    Journal of Cyber Security, Vol.3, No.1, pp. 1-10, 2021, DOI:10.32604/jcs.2021.016371
    Abstract According to some data in the Industrial Purchasing Trends report released by China in 2017, we can see that e-commerce purchasing channels have ranked first among all industrial products purchasing channels in China compared with European and American countries. In addition, in the whole industrial product purchasing market, we can also see that both manufacturers and suppliers are making active e-commerce transformation, and some other Internet giants are also actively entering the industrial product e-commerce industry. But at present, the revenue of all kinds of subjects is still a lot of room for improvement compared to the United States industrial… More >

  • Open AccessOpen Access

    ARTICLE

    An LSTM-Based Malware Detection Using Transfer Learning

    Zhangjie Fu1,2,3,*, Yongjie Ding1, Musaazi Godfrey1
    Journal of Cyber Security, Vol.3, No.1, pp. 11-28, 2021, DOI:10.32604/jcs.2021.016632
    Abstract Mobile malware occupies a considerable proportion of cyberattacks. With the update of mobile device operating systems and the development of software technology, more and more new malware keep appearing. The emergence of new malware makes the identification accuracy of existing methods lower and lower. There is an urgent need for more effective malware detection models. In this paper, we propose a new approach to mobile malware detection that is able to detect newly-emerged malware instances. Firstly, we build and train the LSTM-based model on original benign and malware samples investigated by both static and dynamic analysis techniques. Then, we build… More >

  • Open AccessOpen Access

    ARTICLE

    A Survey on Security Threats and Solutions of Bitcoin

    Le Lai1,*,Tongqing Zhou1, Zhiping Cai1, Zhiyao Liang2, Hao Bai1
    Journal of Cyber Security, Vol.3, No.1, pp. 29-44, 2021, DOI:10.32604/jcs.2021.016349
    Abstract Bitcoin is known as the first decentralized digital currency around the world. It uses blockchain technology to store transaction data in a distributed public ledger, is a distributed ledger that removes third-party trust institutions. Since its invention, bitcoin has achieved great success, has a market value of about $200 billion. However, while bitcoin has brought a wide and far-reaching impact in the financial field, it has also exposed some security problems, such as selfish mining attacks, Sybil attack, eclipse attacks, routing attacks, EREBUS attacks, and so on. This paper gives a comprehensive overview of various attack scenarios that the bitcoin… More >

  • Open AccessOpen Access

    ARTICLE

    Single-Choice Aided Marking System Research Based on Back Propagation Neural Network

    Yunzuo Zhang*, Yi Li, Wei Guo, Lei Huo, Jiayu Zhang, Kaina Guo
    Journal of Cyber Security, Vol.3, No.1, pp. 45-54, 2021, DOI:10.32604/jcs.2021.017071
    Abstract In the field of educational examination, automatic marking technology plays an essential role in improving the efficiency of marking and liberating the labor force. At present, the implementation of the policy of expanding erolments has caused a serious decline in the teacher-student ratio in colleges and universities. The traditional marking system based on Optical Mark Reader technology can no longer meet the requirements of liberating the labor force of teachers in small and medium-sized examinations. With the development of image processing and artificial neural network technology, the recognition of handwritten character in the field of pattern recognition has attracted the… More >

  • Open AccessOpen Access

    ARTICLE

    IoT Services: Realizing Private Real-Time Detection via Authenticated Conjunctive Searchable Encryption

    Chungen Xu1,*, Lin Mei1, Jinxue Cheng2, Yu Zhao1, Cong Zuo3
    Journal of Cyber Security, Vol.3, No.1, pp. 55-67, 2021, DOI:10.32604/jcs.2021.017217
    Abstract With the rapid development of wireless communication technology, the Internet of Things is playing an increasingly important role in our everyday. The amount of data generated by sensor devices is increasing as a large number of connectable devices are deployed in many fields, including the medical, agricultural, and industrial areas. Uploading data to the cloud solves the problem of data overhead but results in privacy issues. Therefore, the question of how to manage the privacy of uploading data and make it available to be interconnected between devices is a crucial issue. In this paper, we propose a scheme that supports… More >

Per Page:

Share Link