Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Generative Adversarial Network Based Approach towards Synthetically Generating Insider Threat Scenarios
(Articles)
Mayesh Mohapatra
,
Anshumaan Phukan
,
Vijay K. Madisetti
Journal of Software Engineering and Applications
Vol.16 No.11
,November 28, 2023
DOI:
10.4236/jsea.2023.1611030
158
Downloads
668
Views
Citations
Handwriting Analysis Based on Belief of Targeted Individual Supporting Insider Threat Detection
(Articles)
Jason Slaughter
,
Carole E. Chaski
,
Kellep Charles
Journal of Information Security
Vol.15 No.3
,June 11, 2024
DOI:
10.4236/jis.2024.153018
85
Downloads
524
Views
Citations
A Multi-Leveled Approach to Intrusion Detection and the Insider Threat
(Articles)
Rita M. Barrios
Journal of Information Security
Vol.4 No.1
,January 30, 2013
DOI:
10.4236/jis.2013.41007
6,900
Downloads
11,259
Views
Citations
C4 Framework for Healthcare Cybersecurity Defense: A Human-Centric, Socio-Technical Approach
(Articles)
Mostafa Rahmany
,
Arunmozhi Selvi
E-Health Telecommunication Systems and Networks
Vol.14 No.3
,July 17, 2025
DOI:
10.4236/etsn.2025.143004
7
Downloads
52
Views
Citations
CARE Framework for Healthcare Cybersecurity Defense: A Human-Centric Approach
(Articles)
Mostafa Rahmany
,
Arunmozhi Selvi
E-Health Telecommunication Systems and Networks
Vol.14 No.2
,June 30, 2025
DOI:
10.4236/etsn.2025.142003
12
Downloads
56
Views
Citations
A Comparative Analysis of Cybersecurity Threat Taxonomies for Healthcare Organizations
(Articles)
Mahima Jaikanth
,
Vijay K. Madisetti
Journal of Software Engineering and Applications
Vol.17 No.5
,May 30, 2024
DOI:
10.4236/jsea.2024.175020
197
Downloads
960
Views
Citations
Research on University’s Cyber Threat Intelligence Sharing Platform Based on New Types of STIX and TAXII Standards
(Articles)
Gang Wang
,
Yuanzhi Huo
,
Zhao Ma Ma
Journal of Information Security
Vol.10 No.4
,October 29, 2019
DOI:
10.4236/jis.2019.104015
1,482
Downloads
3,986
Views
Citations
Does Inside Trading Affect Managers’ Decision-Making? A Theoretical Investigation
(Articles)
Ning Cao
,
Shanmin Li
,
Yong Li
Journal of Mathematical Finance
Vol.5 No.4
,November 17, 2015
DOI:
10.4236/jmf.2015.54030
2,846
Downloads
3,960
Views
Citations
The Constitutional Transformation and a Threat of the Environment in Poland
(Articles)
Krzysztof R. Mazurski
Journal of Environmental Protection
Vol.2 No.4
,June 17, 2011
DOI:
10.4236/jep.2011.24044
4,902
Downloads
8,073
Views
Citations
A Tree Model for Identification of Threats as the First Stage of Risk Assessment in HIS
(Articles)
Ahmad Bakhtiyari Shahri
,
Zuraini Ismail
Journal of Information Security
Vol.3 No.2
,April 26, 2012
DOI:
10.4236/jis.2012.32020
8,403
Downloads
13,028
Views
Citations
Proposal to Disseminate the Knowledge of Tsunamis in the Caribbean Coast of Costa Rica, Central America
(Articles)
Mario Fernández Arce
,
Daniel Solís
,
Juan Luis Porras
,
Gino González
World Journal of Engineering and Technology
Vol.2 No.3B
,September 18, 2014
DOI:
10.4236/wjet.2014.23B013
3,169
Downloads
3,238
Views
Citations
Groundless Threat of Infringement of Patent
(Articles)
Dharmapuri Selvakumar Madhumitha
Beijing Law Review
Vol.10 No.3
,June 4, 2019
DOI:
10.4236/blr.2019.103029
1,210
Downloads
3,108
Views
Citations
A Conceptual Framework for Threat Assessment Based on Organization’s Information Security Policy
(Articles)
Joseph Elias Mbowe
,
Irina Zlotnikova
,
Simon S. Msanjila
,
George S. Oreku
Journal of Information Security
Vol.5 No.4
,September 29, 2014
DOI:
10.4236/jis.2014.54016
7,053
Downloads
10,871
Views
Citations
A Systematic Review of Perceived Insider Status
(Articles)
Liangtie Dai
,
Yuwei Chen
Journal of Human Resource and Sustainability Studies
Vol.3 No.2
,June 11, 2015
DOI:
10.4236/jhrss.2015.32010
5,304
Downloads
7,974
Views
Citations
Internal Transactions for Multiple Risky Assets
(Articles)
Qiong Zhang
,
Shuang Chen
Open Journal of Statistics
Vol.9 No.1
,January 30, 2019
DOI:
10.4236/ojs.2019.91008
767
Downloads
1,444
Views
Citations
Problems and Suggestions for Private Equity Funds
(Articles)
Dongjun Zhao
,
Jianwei Wan
Open Journal of Business and Management
Vol.7 No.3
,May 6, 2019
DOI:
10.4236/ojbm.2019.73074
1,167
Downloads
4,118
Views
Citations
The Announcement Effect of Executive Increasing Shareholdings in Chinese Stock Markets: The Perspectives of Existed Shareholders and Outside Investors
(Articles)
Jiarui Zhang
,
Dongjun Wu
,
Qiuyu Du
American Journal of Industrial and Business Management
Vol.14 No.12
,December 23, 2024
DOI:
10.4236/ajibm.2024.1412084
51
Downloads
257
Views
Citations
Unveiling Insider Threats: Examining Vulnerabilities in an Organizational Structure: A Case Study of NamPost
(Articles)
Iyaloo N. Waiganjo
,
Linekela S. Nandjenda
Open Access Library Journal
Vol.12 No.1
,January 8, 2025
DOI:
10.4236/oalib.1112797
47
Downloads
396
Views
Citations
Getting by with a Little Help from My Friends: Mental Rotation Ability after Tacit Peer Encouragement
(Articles)
Sheila Brownlow
,
Amanda J. Janas
,
Kathleen A. Blake
,
Kathleen T. Rebadow
,
Lindsay M. Mello
Psychology
Vol.2 No.4
,July 25, 2011
DOI:
10.4236/psych.2011.24057
6,329
Downloads
10,398
Views
Citations
Can Rewards Obviate Stereotype Threat Effects on Mental Rotation Tasks?
(Articles)
Amanda Kanoy
,
Sheila Brownlow
,
Tiffany F. Sowers
Psychology
Vol.3 No.7
,June 18, 2012
DOI:
10.4236/psych.2012.37080
5,283
Downloads
8,607
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top