Volume 11 Number 2 December 2024

    
Network Security Education with Machine Learning Optimization

Xiaoyan Yao,Wei Liu

https://doi.org/10.6025/isej/2024/11/2/37-43

Abstract The current network security environment is increasingly severe, and more than static network protection mechanisms are needed to meet network security demands. Dynamic intrusion detection methods can provide real-time protection and detection for the network security environment. Therefore, this paper builds an intrusion detection education based on the machine learning algorithm and random forest and optimizes the model using the FSCA and TPE algorithms. Experimental results... Read More


Genetic Algorithm Model for Information Security Communication

Miaomiao Fan

https://doi.org/10.6025/isej/2024/11/2/44-51

Abstract With the increase in the scale and complexity of information communication networks, the security of communication networks has become increasingly prominent, making it a key research direction in communication network studies. In this paper, a mathematical model for information communication is constructed, and a genetic algorithm is introduced for model optimization. Experimental results show that the genetic algorithm effectively enhances network reliability and significantly reduces link... Read More


A Brief Review of Blockchain Technology and Cryptocurrency Education

Prathima D

https://doi.org/10.6025/isej/2024/11/2/52-59

Abstract Blockchain is a record-keeping technology designed to make it impossible to hack the system or forge the data stored on the blockchain, making it secure and immutable. It’s a distributed ledger technology (DLT), a digital record-keeping system for simultaneously recording transactions and related data in multiple places.A digital currency is one in which transactions are verified, and records are maintained by a de ce nt... Read More