Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
A Study on the Existing Cybersecurity Policies and Strategies in Combating Increased Cybercrime in Zambia
(Articles)
Gerry Mutibo Siampondo
,
Bwalya Chansa
Journal of Information Security
Vol.14 No.4
,August 31, 2023
DOI:
10.4236/jis.2023.144017
140
Downloads
1,299
Views
Citations
This article belongs to the Special Issue on
Cybersecurity and Information Security
A New Cyber Risk: How Teens Expose Corporations in WFH Era
(Articles)
Zahm Siyed
Journal of Information Security
Vol.14 No.4
,October 16, 2023
DOI:
10.4236/jis.2023.144022
136
Downloads
777
Views
Citations
Cloud Computing Security, Protecting University Information
(Articles)
Anita C. Eluwa
Open Access Library Journal
Vol.10 No.11
,November 28, 2023
DOI:
10.4236/oalib.1110925
38
Downloads
187
Views
Citations
Study on the Use of Artificial Intelligence for Cybersecurity in Companies: Case of Companies in Burkina Faso
(Articles)
Yanogo Kiswendsida Jean Hermann
,
Ouedraogo Tounwendyam Frederic
Engineering
Vol.15 No.12
,December 11, 2023
DOI:
10.4236/eng.2023.1512056
107
Downloads
656
Views
Citations
Enhancing Security for Legacy Factory Machines: A Continuous Key Renewal Algorithm for Securing Group of Machines
(Articles)
Nicolas Ferry
,
Paul-Eric Dossou
,
Gabriel Ihowa
,
Gaspard Laouenan
Journal of Software Engineering and Applications
Vol.16 No.12
,December 29, 2023
DOI:
10.4236/jsea.2023.1612037
96
Downloads
354
Views
Citations
A Review of Cybersecurity Challenges in Small Business: The Imperative for a Future Governance Framework
(Articles)
Binita Saha
,
Zahid Anwar
Journal of Information Security
Vol.15 No.1
,January 15, 2024
DOI:
10.4236/jis.2024.151003
191
Downloads
1,462
Views
Citations
Enhancing Mobile Security through Comprehensive Penetration Testing
(Articles)
Maryam Roshanaei
Journal of Information Security
Vol.15 No.2
,February 27, 2024
DOI:
10.4236/jis.2024.152006
155
Downloads
658
Views
Citations
This article belongs to the Special Issue on
Cybersecurity and Information Security
From Standard Policy-Based Zero Trust to Absolute Zero Trust (AZT): A Quantum Leap to Q-Day Security
(Articles)
Fazal Raheman
Journal of Computer and Communications
Vol.12 No.3
,March 29, 2024
DOI:
10.4236/jcc.2024.123016
66
Downloads
342
Views
Citations
Competencies in Computer Security and Resolution of Technological Problems in Higher Education Students
(Articles)
Esteban Pérez Flores
,
Alejandra Aldrette Malacara
,
Sandra R. Murillo Cano
,
Vittorio Zanella Palacios
Journal of Computer and Communications
Vol.12 No.4
,April 24, 2024
DOI:
10.4236/jcc.2024.124013
30
Downloads
148
Views
Citations
Cyber Deception Using NLP
(Articles)
Igor Godefroy Kouam Kamdem
,
Marcellin Nkenlifack
Journal of Information Security
Vol.15 No.2
,April 30, 2024
DOI:
10.4236/jis.2024.152016
46
Downloads
187
Views
Citations
Empirical Evidence for a Descriptive Model of Principles of Information Security Course
(Articles)
Adeyemi A. Adekoya
,
Aurelia M. Donald
,
Somasheker Akkaladevi
,
Akinjide A. Akinola
Journal of Information Security
Vol.11 No.4
,August 21, 2020
DOI:
10.4236/jis.2020.114012
516
Downloads
1,329
Views
Citations
Forensic Investigation in Communication Networks Using Incomplete Digital Evidences
(Articles)
Slim REKHIS
,
Jihene KRICHENE
,
Noureddine BOUDRIGA
Int'l J. of Communications, Network and System Sciences
Vol.2 No.9
,December 21, 2009
DOI:
10.4236/ijcns.2009.29100
6,495
Downloads
12,170
Views
Citations
New Video Watermark Scheme Resistant to Super Strong Cropping Attacks
(Articles)
Ming Tong
,
Tao Chen
,
Wei Zhang
,
Linna Dong
Journal of Information Security
Vol.3 No.2
,April 26, 2012
DOI:
10.4236/jis.2012.32016
4,640
Downloads
7,764
Views
Citations
A Solution for Fighting Spammer's Resources and Minimizing the Impact of Spam
(Articles)
Samir A. Elsagheer Mohamed
Int'l J. of Communications, Network and System Sciences
Vol.5 No.7
,July 25, 2012
DOI:
10.4236/ijcns.2012.57051
4,987
Downloads
7,785
Views
Citations
Distributed and Cooperative Anomaly Detection Scheme for Mobile Ad Hoc Networks
(Articles)
Hisham Mustafa
,
Yan Xiong
,
Khalid Elaalim
Journal of Computer and Communications
Vol.2 No.3
,February 14, 2014
DOI:
10.4236/jcc.2014.23001
2,919
Downloads
5,644
Views
Citations
Evaluation of Microsoft Windows Servers 2008 & 2003 against Cyber Attacks
(Articles)
Sanjeev Kumar
,
Senior Member
,
Raja Sekhar Reddy Gade
Journal of Information Security
Vol.6 No.2
,April 28, 2015
DOI:
10.4236/jis.2015.62016
5,342
Downloads
6,372
Views
Citations
Reliability Analysis of a Redundant Cascade System by Using Markovian Approach
(Articles)
Nalabolu Swathi
,
Tallapureddy Sumathi Uma Maheswari
Journal of Applied Mathematics and Physics
Vol.3 No.7
,July 29, 2015
DOI:
10.4236/jamp.2015.37111
3,123
Downloads
3,828
Views
Citations
Dual Authentication Hashing for Security Enhancement in MANET
(Articles)
L. Raja
,
Dr. P. S. Periasamy
Circuits and Systems
Vol.7 No.4
,April 28, 2016
DOI:
10.4236/cs.2016.74030
1,593
Downloads
2,386
Views
Citations
Implementation of an Efficient Light Weight Security Algorithm for Energy-Constrained Wireless Sensor Nodes
(Articles)
A. Saravanaselvan
,
B. Paramasivan
Circuits and Systems
Vol.7 No.9
,July 18, 2016
DOI:
10.4236/cs.2016.79194
1,505
Downloads
2,571
Views
Citations
A Compact Trust Computation and Management Approach for Defending against Derailed Attacks for Wireless Sensor Networks and Its Applications
(Articles)
R. Mohan Kumar
,
A. V. Ram Prasad
Circuits and Systems
Vol.7 No.10
,August 24, 2016
DOI:
10.4236/cs.2016.710275
1,765
Downloads
2,515
Views
Citations
<
...
3
4
5
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top