Current
Archives
About
About the Journal
Submissions
Editorial Team
Privacy Statement
Submit Paper
English
Home
JSSHL
IJOMSR
Register
Login
Current
Archives
About
About the Journal
Submissions
Editorial Team
Privacy Statement
Submit Paper
Language
English
Search
Home
JSSHL
IJOMSR
Register
Login
Vol. 8 No. 7 (2025)
Home
/
Archives
/
Vol. 8 No. 7 (2025)
Published:
2025-07-14
Articles
Threat Factors and Prevention Strategies for Computer Network Security
Okita Dan Odhiambo
1-5
PDF
DOI:
https://doi.org/10.53469/wjimt.2025.08(07).01
Cyber Threat Intelligence Sharing Mechanism and Implementation Based on Blockchain Smart Contracts
Alexander Bilenko
6-10
PDF
DOI:
https://doi.org/10.53469/wjimt.2025.08(07).02
Inquiry into the Integration of Communication Technology and Computer Technology
Abdul Rauf
11-15
PDF
DOI:
https://doi.org/10.53469/wjimt.2025.08(07).03
Discuss the Application of Big Data Technology in Computer Information Security
Budiman Rusli
16-19
PDF
DOI:
https://doi.org/10.53469/wjimt.2025.08(07).04
Loading...