Vol. 8 No. 7 (2025)

Published: 2025-07-14

  • Threat Factors and Prevention Strategies for Computer Network Security

    Okita Dan Odhiambo
    1-5
    DOI: https://doi.org/10.53469/wjimt.2025.08(07).01
  • Cyber Threat Intelligence Sharing Mechanism and Implementation Based on Blockchain Smart Contracts

    Alexander Bilenko
    6-10
    DOI: https://doi.org/10.53469/wjimt.2025.08(07).02
  • Inquiry into the Integration of Communication Technology and Computer Technology

    Abdul Rauf
    11-15
    DOI: https://doi.org/10.53469/wjimt.2025.08(07).03
  • Discuss the Application of Big Data Technology in Computer Information Security

    Budiman Rusli
    16-19
    DOI: https://doi.org/10.53469/wjimt.2025.08(07).04
Loading...