Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Hacked by Bits and Pieces: What Can We Learn from an Example of Corporate Espionage?
(Articles)
Jack Schafer
,
Marvin Karlins
Journal of Information Security
Vol.12 No.3
,July 9, 2021
DOI:
10.4236/jis.2021.123012
292
Downloads
1,390
Views
Citations
Enhancing Police Officers’ Cybercrime Investigation Skills Using a Checklist Tool
(Articles)
Abdelkhalek Ibrahim Alastal
,
Ashraf Hassan Shaqfa
Journal of Data Analysis and Information Processing
Vol.11 No.2
,April 4, 2023
DOI:
10.4236/jdaip.2023.112008
259
Downloads
2,302
Views
Citations
A Security Architecture for SCADA Systems
(Articles)
Arun Velagapalli
,
Mahalingam Ramkumar
Journal of Information Security
Vol.9 No.1
,January 23, 2018
DOI:
10.4236/jis.2018.91009
1,335
Downloads
3,573
Views
Citations
Enhancing Security in QR Code Technology Using AI: Exploration and Mitigation Strategies
(Articles)
Saranya Vaithilingam
,
Santhosh Aradhya Mohan Shankar
International Journal of Intelligence Science
Vol.14 No.2
,March 26, 2024
DOI:
10.4236/ijis.2024.142003
60
Downloads
395
Views
Citations
Exploring the Characteristics of Data Breaches: A Descriptive Analytic Study
(Articles)
Dominik Molitor
,
Aditya Saharia
,
Viju Raghupathi
,
Wullianallur Raghupathi
Journal of Information Security
Vol.15 No.2
,April 2, 2024
DOI:
10.4236/jis.2024.152011
102
Downloads
571
Views
Citations
Network Intrusion Detection and Visualization Using Aggregations in a Cyber Security Data Warehouse
(Articles)
Bogdan Denny Czejdo
,
Erik M. Ferragut
,
John R. Goodall
,
Jason Laska
Int'l J. of Communications, Network and System Sciences
Vol.5 No.9A
,September 18, 2012
DOI:
10.4236/ijcns.2012.529069
4,784
Downloads
8,412
Views
Citations
This article belongs to the Special Issue on
Models and Algorithms for Applications
A Study on Quantitative Methodology to Assess Cyber Security Risk of Smart Grid
(Articles)
Pil Sung Woo
,
Byung-Hyun Ko
,
Dong-Joo Kang
,
Balho H. Kim
Energy and Power Engineering
Vol.5 No.4B
,November 18, 2013
DOI:
10.4236/epe.2013.54B249
5,376
Downloads
8,060
Views
Citations
A Systematic Approach for Cyber Security in Vehicular Networks
(Articles)
Farhan Ahmad
,
Asma Adnane
,
Virginia N. L. Franqueira
Journal of Computer and Communications
Vol.4 No.16
,December 29, 2016
DOI:
10.4236/jcc.2016.416004
2,153
Downloads
5,793
Views
Citations
This article belongs to the Special Issue on
Vehicular Communications and Networks
Do ICMP Security Attacks Have Same Impact on Servers?
(Articles)
Ganesh Reddy Gunnam
,
Sanjeev Kumar
Journal of Information Security
Vol.8 No.3
,July 25, 2017
DOI:
10.4236/jis.2017.83018
1,534
Downloads
4,317
Views
Citations
Improving General Undergraduate Cyber Security Education: A Responsibility for All Universities?
(Articles)
Stephanie M. Redman
,
Kate J. Yaxley
,
Keith F. Joiner
Creative Education
Vol.11 No.12
,December 9, 2020
DOI:
10.4236/ce.2020.1112187
618
Downloads
1,568
Views
Citations
A DoS Attacks Detection Aglorithm Based on Snort-BASE for Robotic Arm Control Systems
(Articles)
Nana Li
,
Yong Wang
,
Pengfei Shen
,
Shuangfei Li
,
Lin Zhou
Journal of Computer and Communications
Vol.10 No.4
,April 7, 2022
DOI:
10.4236/jcc.2022.104001
142
Downloads
570
Views
Citations
Cyber-Security of Smart Grids: Attacks, Detection, Countermeasure Techniques, and Future Directions
(Articles)
Tala Talaei Khoei
,
Hadjar Ould Slimane
,
Naima Kaabouch
Communications and Network
Vol.14 No.4
,November 24, 2022
DOI:
10.4236/cn.2022.144009
749
Downloads
5,877
Views
Citations
Appraising the Manifestation of Optimism Bias and Its Impact on Human Perception of Cyber Security: A Meta Analysis
(Articles)
Khaled M. Alnifie
,
Charles Kim
Journal of Information Security
Vol.14 No.2
,February 23, 2023
DOI:
10.4236/jis.2023.142007
413
Downloads
1,829
Views
Citations
Study the Effectiveness of ISO 27001 to Mitigate the Cyber Security Threats in the Egyptian Downstream Oil and Gas Industry
(Articles)
Mohamed Shohoud
Journal of Information Security
Vol.14 No.2
,April 28, 2023
DOI:
10.4236/jis.2023.142010
286
Downloads
1,371
Views
Citations
A Study on the Challenges of Human-Centric Cyber-Security and the Guarantee of Information Quality
(Articles)
Mohammed Hussein Kurdi
,
Mohsen Denden
,
David Paul
Journal of Information Security
Vol.15 No.2
,April 24, 2024
DOI:
10.4236/jis.2024.152013
153
Downloads
832
Views
Citations
Cyber Resilience through Real-Time Threat Analysis in Information Security
(Articles)
Aparna Gadhi
,
Ragha Madhavi Gondu
,
Hitendra Chaudhary
,
Olatunde Abiona
Int'l J. of Communications, Network and System Sciences
Vol.17 No.4
,April 30, 2024
DOI:
10.4236/ijcns.2024.174004
51
Downloads
157
Views
Citations
Dissent under Siege: Case Studies of Repression in the Digital Era of Bangladesh
(Articles)
Ahmed Tahsin Shams
Advances in Journalism and Communication
Vol.12 No.1
,March 29, 2024
DOI:
10.4236/ajc.2024.121011
46
Downloads
209
Views
Citations
Relevance of Cybersecurity Education at Pedagogy Levels in Schools
(Articles)
Eric Amankwa
Journal of Information Security
Vol.12 No.4
,September 9, 2021
DOI:
10.4236/jis.2021.124013
1,089
Downloads
8,447
Views
Citations
Cybersecurity Risk Management through Behavior-Based Contextual Analysis of Online Logs
(Articles)
Irawati Edlabadkar
,
Vijay K. Madisetti
Journal of Software Engineering and Applications
Vol.17 No.6
,June 7, 2024
DOI:
10.4236/jsea.2024.176027
30
Downloads
139
Views
Citations
Cyberspace Security Using Adversarial Learning and Conformal Prediction
(Articles)
Harry Wechsler
Intelligent Information Management
Vol.7 No.4
,July 10, 2015
DOI:
10.4236/iim.2015.74016
6,956
Downloads
8,304
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top