Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Cybersecurity: Identifying the Vulnerability Intensity Function (
VIF
) and Vulnerability Index Indicator (
VII
) of a Computer Operating System
(Articles)
Ranju Karki
,
Chris P. Tsokos
Journal of Information Security
Vol.13 No.4
,October 28, 2022
DOI:
10.4236/jis.2022.134019
218
Downloads
1,126
Views
Citations
This article belongs to the Special Issue on
Cryptography and Network Security
Domestic Cyberterrorism & Strategic Communications: Literature Review
(Articles)
Robb Shawe
,
Ian R. McAndrew
Journal of Information Security
Vol.14 No.4
,October 27, 2023
DOI:
10.4236/jis.2023.144027
301
Downloads
1,685
Views
Citations
Cybersecurity and Privacy Protection in Vehicular Networks (VANETs)
(Articles)
Bruno Macena
,
Celio Albuquerque
,
Raphael Machado
Advances in Internet of Things
Vol.13 No.4
,October 30, 2023
DOI:
10.4236/ait.2023.134006
296
Downloads
1,554
Views
Citations
GUARDIAN: A Multi-Tiered Defense Architecture for Thwarting Prompt Injection Attacks on LLMs
(Articles)
Parijat Rai
,
Saumil Sood
,
Vijay K. Madisetti
,
Arshdeep Bahga
Journal of Software Engineering and Applications
Vol.17 No.1
,January 23, 2024
DOI:
10.4236/jsea.2024.171003
675
Downloads
3,252
Views
Citations
The Evolution of Integrated Advance Persistent Threat and Its Defense Solutions: A Literature Review
(Articles)
Jun Zhang
,
Dan Tenney
Open Journal of Business and Management
Vol.12 No.1
,January 26, 2024
DOI:
10.4236/ojbm.2024.121021
396
Downloads
1,835
Views
Citations
ERAD: Enhanced Ransomware Attack Defense System for Healthcare Organizations
(Articles)
Xinyue Li
,
Vijay K. Madisetti
Journal of Software Engineering and Applications
Vol.17 No.5
,May 28, 2024
DOI:
10.4236/jsea.2024.175016
177
Downloads
1,033
Views
Citations
Side-Channel Attacks & Data Exfiltration Using Wall Outlet USB Power Adapters
(Articles)
Andrew Masters
,
Vijay K. Madisetti
Journal of Information Security
Vol.15 No.4
,September 10, 2024
DOI:
10.4236/jis.2024.154025
89
Downloads
676
Views
Citations
PhishGuard: Integrating Fine-Tuned Large Language Models (LLMs) into Password Management
(Articles)
Smith Patel
,
Vijay K. Madisetti
Journal of Information Security
Vol.15 No.4
,October 10, 2024
DOI:
10.4236/jis.2024.154027
72
Downloads
490
Views
Citations
Scale, Complexity, and Cybersecurity Risk Management
(Articles)
Christopher Briscoe
,
Carl Young
Journal of Information Security
Vol.15 No.4
,October 17, 2024
DOI:
10.4236/jis.2024.154029
77
Downloads
502
Views
Citations
AssessITS
: Integrating Procedural Guidelines and Practical Evaluation Metrics for Organizational IT and Cybersecurity Risk Assessment
(Articles)
Mir Mehedi Rahman
,
Naresh Kshetri
,
Sayed Abu Sayeed
,
Md Masud Rana
Journal of Information Security
Vol.15 No.4
,October 29, 2024
DOI:
10.4236/jis.2024.154032
124
Downloads
706
Views
Citations
Cybersecurity Guide for SMEs: Protecting Small and Medium-Sized Enterprises in the Digital Era
(Articles)
Anastasios Papathanasiou
,
George Liontos
,
Athanasios Katsouras
,
Vasiliki Liagkou
,
Euripides Glavas
Journal of Information Security
Vol.16 No.1
,November 19, 2024
DOI:
10.4236/jis.2025.161001
416
Downloads
4,027
Views
Citations
Artificial Intelligence in Cybersecurity to Detect Phishing
(Articles)
Dominique Wasso Kiseki
,
Vincent Havyarimana
,
Désiré Lumonge Zabagunda
,
Walumbuka Ilundu Wail
,
Therence Niyonsaba
Journal of Computer and Communications
Vol.12 No.12
,December 25, 2024
DOI:
10.4236/jcc.2024.1212007
135
Downloads
1,115
Views
Citations
Enhancing Transparency and Efficiency in Auditing and Regulatory Compliance with Disruptive Technologies
(Articles)
Georgios L. Thanasas
,
Georgios Kampiotis
,
Aikaterini Karkantzou
Theoretical Economics Letters
Vol.15 No.1
,February 10, 2025
DOI:
10.4236/tel.2025.151013
160
Downloads
1,361
Views
Citations
Securing Consumer Banking Websites Using Machine Learning: A Mathematical and Practical Approach (Working 2024)
(Articles)
Fahad Al-Zahrani
Journal of Computer and Communications
Vol.13 No.3
,March 20, 2025
DOI:
10.4236/jcc.2025.133002
46
Downloads
245
Views
Citations
Prioritizing Defense in Depth Measures Using Artificial Intelligence (AI) and the Expected Utility Hypothesis
(Articles)
Rodney Alexander
Journal of Information Security
Vol.16 No.2
,March 31, 2025
DOI:
10.4236/jis.2025.162012
66
Downloads
370
Views
Citations
The Impact of Digital Transformation on Botswana’s Banking Strategies
(Articles)
Tshepang Molosiwa
Open Journal of Business and Management
Vol.13 No.3
,April 27, 2025
DOI:
10.4236/ojbm.2025.133079
159
Downloads
797
Views
Citations
Developing a Comprehensive Cyber Risk Assessment Framework for Supply Chains: Insights into Third-Party Vulnerabilities and Security Gaps
(Articles)
Muhannad Almohaimeed
,
Faisal Albalwy
,
Rawan Alharbi
,
Aisha Alqarni
,
Abrar Aljohani
Intelligent Information Management
Vol.17 No.3
,May 21, 2025
DOI:
10.4236/iim.2025.173004
41
Downloads
297
Views
Citations
Cultural Dimensions of Cybersecurity: A Cyberpsychology Analysis of Multinational Corporate Security
(Articles)
Troy C. Troublefield
Journal of Information Security
Vol.16 No.3
,July 4, 2025
DOI:
10.4236/jis.2025.163019
30
Downloads
158
Views
Citations
An Enhanced and Explainable Hybrid Ensemble Intrusion Detection System for Connected Vehicles
(Articles)
Xuemei Li
,
Rui Zhu
,
Huirong Fu
Journal of Information Security
Vol.16 No.3
,July 7, 2025
DOI:
10.4236/jis.2025.163020
23
Downloads
146
Views
Citations
Task-Specific Feature Selection and Detection Algorithms for IoT-Based Networks
(Articles)
Yang Gyun Kim
,
Benito Mendoza
,
Ohbong Kwon
,
John Yoon
Journal of Computer and Communications
Vol.10 No.10
,October 27, 2022
DOI:
10.4236/jcc.2022.1010005
201
Downloads
1,075
Views
Citations
<
...
10
11
12
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top