The old submission system has been replaced by a new version for the journal "Journal of Cyber Security". Please be noticed, the old submission system for this journal is now no longer accessible. The email ID registered to the old submission system can be used to log in to the new system by using your registered email address. If you have trouble logging in, please click on "Forgot your password" to reset your password. Please click here to access the new submission system. If you meet any questions, please do not hesitate to contact us.

Journal of Cyber Security

About the Journal

Cybersecurity is the basis of information dissemination in the internet age.The Journal of Cyber Security focuses on all aspects of sciences, technologies, and applications relating to hardware security, software security and system security.

  • Large-Scale KPI Anomaly Detection Based on Ensemble Learning and Clustering
  • Abstract Anomaly detection using KPI (Key Performance Indicator) is critical for Internet-based services to maintain high service availability. However, given the velocity, volume, and diversified nature of monitoring data, it is difficult to obtain enough labelled data to build an accurate anomaly detection model for using supervised machine leaning methods. In this paper, we propose an automatic and generic transfer learning strategy: Detecting anomalies on a new KPI by using pretrained model on existing selected labelled KPI. Our approach, called KADT (KPI Anomaly Detection based on Transfer Learning), integrates KPI clustering and model pretrained techniques. KPI clustering is used to obtain… More
  •   Views:278       Downloads:202        Download PDF
  • Excellent Practical Byzantine Fault Tolerance
  • Abstract With the rapid development of blockchain technology, more and more people are paying attention to the consensus mechanism of blockchain. Practical Byzantine Fault Tolerance (PBFT), as the first efficient consensus algorithm solving the Byzantine Generals Problem, plays an important role. But PBFT also has its problems. First, it runs in a completely closed environment, and any node can't join or exit without rebooting the system. Second, the communication complexity in the network is as high as O(n2), which makes the algorithm only applicable to small-scale networks. For these problems, this paper proposes an Optimized consensus algorithm, Excellent Practical Byzantine Fault… More
  •   Views:284       Downloads:159        Download PDF
  • A Two-Stage Highly Robust Text Steganalysis Model
  • Abstract With the development of natural language processing, deep learning, and other technologies, text steganography is rapidly developing. However, adversarial attack methods have emerged that gives text steganography the ability to actively spoof steganalysis. If terrorists use the text steganography method to spread terrorist messages, it will greatly disturb social stability. Steganalysis methods, especially those for resisting adversarial attacks, need to be further improved. In this paper, we propose a two-stage highly robust model for text steganalysis. The proposed method analyzes and extracts anomalous features at both intra-sentential and inter-sentential levels. In the first phase, every sentence is first transformed into… More
  •   Views:241       Downloads:192        Download PDF
  • Improvement of the Firework Algorithm for Classification Problems
  • Abstract Attracted numerous analysts’ consideration, classification is one of the primary issues in Machine learning. Numerous evolutionary algorithms (EAs) were utilized to improve their global search ability. In the previous years, many scientists have attempted to tackle this issue, yet regardless of the endeavors, there are still a few inadequacies. Based on solving the classification problem, this paper introduces a new optimization classification model, which can be applied to the majority of evolutionary computing (EC) techniques. Firework algorithm (FWA) is one of the EC methods, Although the Firework algorithm (FWA) is a proficient algorithm for solving complex optimization issue. The proficient… More
  •   Views:215       Downloads:134        Download PDF
  • An Overview of Face Manipulation Detection
  • Abstract Due to the power of editing tools, new types of fake faces are being created and synthesized, which has attracted great attention on social media. It is reasonable to acknowledge that one human cannot distinguish whether the face is manipulated from the real faces. Therefore, the detection of face manipulation becomes a critical issue in digital media forensics. This paper provides an overview of recent deep learning detection models for face manipulation. Some public dataset used for face manipulation detection is introduced. On this basis, the challenges for the research and the potential future directions are analyzed and discussed. More
  •   Views:254       Downloads:241        Download PDF