Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Enhancing Mobile Security through Comprehensive Penetration Testing
(Articles)
Maryam Roshanaei
Journal of Information Security
Vol.15 No.2
,February 27, 2024
DOI:
10.4236/jis.2024.152006
159
Downloads
689
Views
Citations
This article belongs to the Special Issue on
Cybersecurity and Information Security
From Standard Policy-Based Zero Trust to Absolute Zero Trust (AZT): A Quantum Leap to Q-Day Security
(Articles)
Fazal Raheman
Journal of Computer and Communications
Vol.12 No.3
,March 29, 2024
DOI:
10.4236/jcc.2024.123016
69
Downloads
361
Views
Citations
Competencies in Computer Security and Resolution of Technological Problems in Higher Education Students
(Articles)
Esteban Pérez Flores
,
Alejandra Aldrette Malacara
,
Sandra R. Murillo Cano
,
Vittorio Zanella Palacios
Journal of Computer and Communications
Vol.12 No.4
,April 24, 2024
DOI:
10.4236/jcc.2024.124013
34
Downloads
160
Views
Citations
Cyber Deception Using NLP
(Articles)
Igor Godefroy Kouam Kamdem
,
Marcellin Nkenlifack
Journal of Information Security
Vol.15 No.2
,April 30, 2024
DOI:
10.4236/jis.2024.152016
51
Downloads
221
Views
Citations
Empirical Evidence for a Descriptive Model of Principles of Information Security Course
(Articles)
Adeyemi A. Adekoya
,
Aurelia M. Donald
,
Somasheker Akkaladevi
,
Akinjide A. Akinola
Journal of Information Security
Vol.11 No.4
,August 21, 2020
DOI:
10.4236/jis.2020.114012
519
Downloads
1,333
Views
Citations
United States Healthcare Data Breaches: Insights for NIST SP 800-66 Revision 2 from a Review of the NIST SP 800-66 Revision 1
(Articles)
Mohammed Mohammed Raoof
Journal of Information Security
Vol.15 No.2
,April 29, 2024
DOI:
10.4236/jis.2024.152014
20
Downloads
382
Views
Citations
Cyber Threats, Harsh Environment and the European High North (EHN) in a Human Security and Multi-Level Regulatory Global Dimension: Which Framework Applicable to Critical Infrastructures under “Exceptionally Critical Infrastructure Conditions” (ECIC)?
(Articles)
Sandra Cassotta
,
Roman Sidortsov
,
Christer Pursiainen
,
Michael Evan Goodsite
Beijing Law Review
Vol.10 No.2
,March 25, 2019
DOI:
10.4236/blr.2019.102020
970
Downloads
2,411
Views
Citations
This article belongs to the Special Issue on
Law, Policy and Globalization
Using the Latin Square Design Model in the Prioritzation of Network Security Threats: A Quantitative Study
(Articles)
Rodney Alexander
Journal of Information Security
Vol.11 No.2
,April 22, 2020
DOI:
10.4236/jis.2020.112006
704
Downloads
2,094
Views
Citations
Reducing Threats by Using Bayesian Networks to Prioritize and Combine Defense in Depth Security Measures
(Articles)
Rodney Alexander
Journal of Information Security
Vol.11 No.3
,June 8, 2020
DOI:
10.4236/jis.2020.113008
618
Downloads
1,893
Views
Citations
Using Linear Regression Analysis and Defense in Depth to Protect Networks during the Global Corona Pandemic
(Articles)
Rodney Alexander
Journal of Information Security
Vol.11 No.4
,October 21, 2020
DOI:
10.4236/jis.2020.114017
861
Downloads
5,127
Views
Citations
The Application of Epidemiology for Categorising DNS Cyber Risk Factors
(Articles)
Jessemyn Modini
,
Timothy Lynar
,
Elena Sitnikova
,
Keith Joiner
Journal of Computer and Communications
Vol.8 No.12
,December 3, 2020
DOI:
10.4236/jcc.2020.812002
574
Downloads
1,479
Views
Citations
Resilience at the Core: Critical Infrastructure Protection Challenges, Priorities and Cybersecurity Assessment Strategies
(Articles)
Maryam Roshanaei
Journal of Computer and Communications
Vol.9 No.8
,August 26, 2021
DOI:
10.4236/jcc.2021.98006
810
Downloads
4,026
Views
Citations
Cybersecurity Attacks on Academic Data and Personal Information and the Mediating Role of Education and Employment
(Articles)
Ahmad Reda Alzighaibi
Journal of Computer and Communications
Vol.9 No.11
,November 17, 2021
DOI:
10.4236/jcc.2021.911006
293
Downloads
1,983
Views
Citations
Cybersecurity: Identifying the Vulnerability Intensity Function (
VIF
) and Vulnerability Index Indicator (
VII
) of a Computer Operating System
(Articles)
Ranju Karki
,
Chris P. Tsokos
Journal of Information Security
Vol.13 No.4
,October 28, 2022
DOI:
10.4236/jis.2022.134019
154
Downloads
772
Views
Citations
This article belongs to the Special Issue on
Cryptography and Network Security
Domestic Cyberterrorism & Strategic Communications: Literature Review
(Articles)
Robb Shawe
,
Ian R. McAndrew
Journal of Information Security
Vol.14 No.4
,October 27, 2023
DOI:
10.4236/jis.2023.144027
165
Downloads
1,027
Views
Citations
Cybersecurity and Privacy Protection in Vehicular Networks (VANETs)
(Articles)
Bruno Macena
,
Celio Albuquerque
,
Raphael Machado
Advances in Internet of Things
Vol.13 No.4
,October 30, 2023
DOI:
10.4236/ait.2023.134006
156
Downloads
845
Views
Citations
GUARDIAN: A Multi-Tiered Defense Architecture for Thwarting Prompt Injection Attacks on LLMs
(Articles)
Parijat Rai
,
Saumil Sood
,
Vijay K. Madisetti
,
Arshdeep Bahga
Journal of Software Engineering and Applications
Vol.17 No.1
,January 23, 2024
DOI:
10.4236/jsea.2024.171003
264
Downloads
1,138
Views
Citations
The Evolution of Integrated Advance Persistent Threat and Its Defense Solutions: A Literature Review
(Articles)
Jun Zhang
,
Dan Tenney
Open Journal of Business and Management
Vol.12 No.1
,January 26, 2024
DOI:
10.4236/ojbm.2024.121021
138
Downloads
510
Views
Citations
ERAD: Enhanced Ransomware Attack Defense System for Healthcare Organizations
(Articles)
Xinyue Li
,
Vijay K. Madisetti
Journal of Software Engineering and Applications
Vol.17 No.5
,May 28, 2024
DOI:
10.4236/jsea.2024.175016
25
Downloads
106
Views
Citations
Task-Specific Feature Selection and Detection Algorithms for IoT-Based Networks
(Articles)
Yang Gyun Kim
,
Benito Mendoza
,
Ohbong Kwon
,
John Yoon
Journal of Computer and Communications
Vol.10 No.10
,October 27, 2022
DOI:
10.4236/jcc.2022.1010005
136
Downloads
686
Views
Citations
<
...
2
3
4
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top