Vol. 1 No. 4 (2024)

					View Vol. 1 No. 4 (2024)

All content published in this issue has undergone peer review and strict repetition rate checks have been conducted.

Number of articles in this issue: 10
Number of pages in this issue: 88

If you have any questions about the content of this issue, you can contact each author via email. For questions about the journal itself, you can directly contact SUAS Press.

Published: 2024-08-16

Articles

  • Authors: Qiang Chen, Daoming Li, Lun Wang
    Resource Type: Article
    Publication ID: v1n4a01
    Abstract: Ransomware attacks have emerged as one of the most significant threats to network security in recent years. These attacks not only target large organizations but also small businesses and individuals, indicating the pervasive nature of this...
    1-8
    DOI Icon Abstract views: 133 | DOI Icon PDF downloads: 49 | DOI Icon references: 38
    DOI Icon DOI: 10.5281/zenodo.13194418
    DOI Icon ARK: ark:/40704/JETBM.v1n4a01
  • Authors: Lun Wang, Qiang Chen, Daoming Li
    Resource Type: Article
    Publication ID: v1n4a02
    Abstract: Advanced Persistent Threats (APTs) represent one of the most significant challenges in cybersecurity today. These threats are characterized by their stealthy, sophisticated, and persistent nature, often targeting high-value entities such as...
    9-17
    DOI Icon Abstract views: 98 | DOI Icon PDF downloads: 73 | DOI Icon references: 32
    DOI Icon DOI: 10.5281/zenodo.13212276
    DOI Icon ARK: ark:/40704/JETBM.v1n4a02
  • Authors: Qianfeng Zhang, Lun Wang, Daoming Li
    Resource Type: Article
    Publication ID: v1n4a03
    Abstract: Cloud computing has revolutionized the way businesses operate, offering unparalleled flexibility, scalability, and cost savings. However, the shift to cloud environments has also introduced new security challenges. This paper delves into the...
    18-27
    DOI Icon Abstract views: 74 | DOI Icon PDF downloads: 58 | DOI Icon references: 37
    DOI Icon DOI: 10.5281/zenodo.13232751
    DOI Icon ARK: ark:/40704/JETBM.v1n4a03
  • Authors: Qianfeng Zhang, Lun Wang, Chengqian Fu
    Resource Type: Article
    Publication ID: v1n4a04
    Abstract: Distributed Denial of Service (DDoS) attacks have evolved significantly over the years, becoming more sophisticated and challenging to mitigate. As organizations increasingly rely on modern networks for critical operations, the need for advanced...
    28-37
    DOI Icon Abstract views: 124 | DOI Icon PDF downloads: 71 | DOI Icon references: 42
    DOI Icon DOI: 10.5281/zenodo.13232838
    DOI Icon ARK: ark:/40704/JETBM.v1n4a04
  • Authors: Gang Zhao, Cen Song, Binghan Wu
    Resource Type: Article
    Publication ID: v1n4a05
    Abstract: Low-Noise Amplifiers (LNAs) are among the key components of Analog Signal Processing, and the design of Integrated Circuits for applications that are high in frequency is quite important. This paper looks into strategic management and optimization...
    38-45
    DOI Icon Abstract views: 61 | DOI Icon PDF downloads: 21 | DOI Icon references: 42
    DOI Icon DOI: 10.5281/zenodo.13253431
    DOI Icon ARK: ark:/40704/JETBM.v1n4a05
  • Authors: Shenhan Zhang, Cen Song, Binghan Wu
    Resource Type: Article
    Publication ID: v1n4a06
    Abstract: This paper explores the strategic management of Power Management Integrated Circuits (PMICs) within Mixed-Signal System-on-Chip (SoC) architectures, with a focus on enhancing efficiency and minimizing noise. As mixed-signal SoCs become...
    46-52
    DOI Icon Abstract views: 85 | DOI Icon PDF downloads: 36 | DOI Icon references: 37
    DOI Icon DOI: 10.5281/zenodo.13253445
    DOI Icon ARK: ark:/40704/JETBM.v1n4a06
  • Authors: Shenhan Zhang, Cen Song, Binghan Wu
    Resource Type: Article
    Publication ID: v1n4a07
    Abstract: This paper explores the strategic management of mixed-signal circuit design for high-resolution Analog-to-Digital Converters (ADCs) within System-on-Chip (SoC) architectures, with a focus on enhancing linearity and reducing power consumption. As...
    53-60
    DOI Icon Abstract views: 62 | DOI Icon PDF downloads: 27 | DOI Icon references: 42
    DOI Icon DOI: 10.5281/zenodo.13253475
    DOI Icon ARK: ark:/40704/JETBM.v1n4a07
  • Authors: Haosen Xu, Siyang Li, Kaiyi Niu, Gang Ping
    Resource Type: Article
    Publication ID: v1n4a08
    Abstract: This study investigates the application of deep learning techniques and automated feature engineering in credit card fraud detection. The research employs a Convolutional Neural Network (CNN) model integrated with Deep Feature Synthesis (DFS) to...
    61-71
    DOI Icon Abstract views: 522 | DOI Icon PDF downloads: 186 | DOI Icon references: 40
    DOI Icon DOI: 10.5281/zenodo.13294459
    DOI Icon ARK: ark:/40704/JETBM.v1n4a08
  • Authors: Yuchen Xiao
    Resource Type: Article
    Publication ID: v1n4a09
    Abstract: The "Inspector Law" clearly stipulates that we should promote the construction of a high-quality and professional team of inspectors. Effectively strengthening the professional capacity building of inspectors is an important prerequisite...
    72-78
    DOI Icon Abstract views: 60 | DOI Icon PDF downloads: 21 | DOI Icon references: 15
    DOI Icon DOI: 10.5281/zenodo.13317271
    DOI Icon ARK: ark:/40704/JETBM.v1n4a09
  • Authors: Qi Lou
    Resource Type: Article
    Publication ID: v1n4a10
    Abstract: The initiation of the reform of the State supervision system and the deepening of the reform of the judicial system are the new elements that have led to the innovative development of administrative supervision. People-centered, win-win, precise...
    79-88
    DOI Icon Abstract views: 56 | DOI Icon PDF downloads: 51 | DOI Icon references: 11
    DOI Icon DOI: 10.5281/zenodo.13318762
    DOI Icon ARK: ark:/40704/JETBM.v1n4a10