Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Domestic Cyberterrorism & Strategic Communications: Literature Review
(Articles)
Robb Shawe
,
Ian R. McAndrew
Journal of Information Security
Vol.14 No.4
,October 27, 2023
DOI:
10.4236/jis.2023.144027
303
Downloads
1,695
Views
Citations
Cybersecurity and Privacy Protection in Vehicular Networks (VANETs)
(Articles)
Bruno Macena
,
Celio Albuquerque
,
Raphael Machado
Advances in Internet of Things
Vol.13 No.4
,October 30, 2023
DOI:
10.4236/ait.2023.134006
300
Downloads
1,565
Views
Citations
GUARDIAN: A Multi-Tiered Defense Architecture for Thwarting Prompt Injection Attacks on LLMs
(Articles)
Parijat Rai
,
Saumil Sood
,
Vijay K. Madisetti
,
Arshdeep Bahga
Journal of Software Engineering and Applications
Vol.17 No.1
,January 23, 2024
DOI:
10.4236/jsea.2024.171003
683
Downloads
3,293
Views
Citations
The Evolution of Integrated Advance Persistent Threat and Its Defense Solutions: A Literature Review
(Articles)
Jun Zhang
,
Dan Tenney
Open Journal of Business and Management
Vol.12 No.1
,January 26, 2024
DOI:
10.4236/ojbm.2024.121021
400
Downloads
1,850
Views
Citations
ERAD: Enhanced Ransomware Attack Defense System for Healthcare Organizations
(Articles)
Xinyue Li
,
Vijay K. Madisetti
Journal of Software Engineering and Applications
Vol.17 No.5
,May 28, 2024
DOI:
10.4236/jsea.2024.175016
179
Downloads
1,048
Views
Citations
Side-Channel Attacks & Data Exfiltration Using Wall Outlet USB Power Adapters
(Articles)
Andrew Masters
,
Vijay K. Madisetti
Journal of Information Security
Vol.15 No.4
,September 10, 2024
DOI:
10.4236/jis.2024.154025
91
Downloads
684
Views
Citations
PhishGuard: Integrating Fine-Tuned Large Language Models (LLMs) into Password Management
(Articles)
Smith Patel
,
Vijay K. Madisetti
Journal of Information Security
Vol.15 No.4
,October 10, 2024
DOI:
10.4236/jis.2024.154027
76
Downloads
509
Views
Citations
Scale, Complexity, and Cybersecurity Risk Management
(Articles)
Christopher Briscoe
,
Carl Young
Journal of Information Security
Vol.15 No.4
,October 17, 2024
DOI:
10.4236/jis.2024.154029
80
Downloads
510
Views
Citations
AssessITS
: Integrating Procedural Guidelines and Practical Evaluation Metrics for Organizational IT and Cybersecurity Risk Assessment
(Articles)
Mir Mehedi Rahman
,
Naresh Kshetri
,
Sayed Abu Sayeed
,
Md Masud Rana
Journal of Information Security
Vol.15 No.4
,October 29, 2024
DOI:
10.4236/jis.2024.154032
126
Downloads
716
Views
Citations
Cybersecurity Guide for SMEs: Protecting Small and Medium-Sized Enterprises in the Digital Era
(Articles)
Anastasios Papathanasiou
,
George Liontos
,
Athanasios Katsouras
,
Vasiliki Liagkou
,
Euripides Glavas
Journal of Information Security
Vol.16 No.1
,November 19, 2024
DOI:
10.4236/jis.2025.161001
432
Downloads
4,172
Views
Citations
Artificial Intelligence in Cybersecurity to Detect Phishing
(Articles)
Dominique Wasso Kiseki
,
Vincent Havyarimana
,
Désiré Lumonge Zabagunda
,
Walumbuka Ilundu Wail
,
Therence Niyonsaba
Journal of Computer and Communications
Vol.12 No.12
,December 25, 2024
DOI:
10.4236/jcc.2024.1212007
136
Downloads
1,147
Views
Citations
Enhancing Transparency and Efficiency in Auditing and Regulatory Compliance with Disruptive Technologies
(Articles)
Georgios L. Thanasas
,
Georgios Kampiotis
,
Aikaterini Karkantzou
Theoretical Economics Letters
Vol.15 No.1
,February 10, 2025
DOI:
10.4236/tel.2025.151013
161
Downloads
1,400
Views
Citations
Securing Consumer Banking Websites Using Machine Learning: A Mathematical and Practical Approach (Working 2024)
(Articles)
Fahad Al-Zahrani
Journal of Computer and Communications
Vol.13 No.3
,March 20, 2025
DOI:
10.4236/jcc.2025.133002
47
Downloads
258
Views
Citations
Prioritizing Defense in Depth Measures Using Artificial Intelligence (AI) and the Expected Utility Hypothesis
(Articles)
Rodney Alexander
Journal of Information Security
Vol.16 No.2
,March 31, 2025
DOI:
10.4236/jis.2025.162012
71
Downloads
387
Views
Citations
The Impact of Digital Transformation on Botswana’s Banking Strategies
(Articles)
Tshepang Molosiwa
Open Journal of Business and Management
Vol.13 No.3
,April 27, 2025
DOI:
10.4236/ojbm.2025.133079
164
Downloads
848
Views
Citations
Developing a Comprehensive Cyber Risk Assessment Framework for Supply Chains: Insights into Third-Party Vulnerabilities and Security Gaps
(Articles)
Muhannad Almohaimeed
,
Faisal Albalwy
,
Rawan Alharbi
,
Aisha Alqarni
,
Abrar Aljohani
Intelligent Information Management
Vol.17 No.3
,May 21, 2025
DOI:
10.4236/iim.2025.173004
47
Downloads
338
Views
Citations
Cultural Dimensions of Cybersecurity: A Cyberpsychology Analysis of Multinational Corporate Security
(Articles)
Troy C. Troublefield
Journal of Information Security
Vol.16 No.3
,July 4, 2025
DOI:
10.4236/jis.2025.163019
38
Downloads
198
Views
Citations
An Enhanced and Explainable Hybrid Ensemble Intrusion Detection System for Connected Vehicles
(Articles)
Xuemei Li
,
Rui Zhu
,
Huirong Fu
Journal of Information Security
Vol.16 No.3
,July 7, 2025
DOI:
10.4236/jis.2025.163020
30
Downloads
177
Views
Citations
Integrated Catchment Value Systems
(Articles)
Mark EVERARD
,
John D COLVIN
,
Myles MANDER
,
Chris DICKENS
,
Sam CHIMBUYA
Journal of Water Resource and Protection
Vol.1 No.3
,September 21, 2009
DOI:
10.4236/jwarp.2009.13022
5,483
Downloads
10,203
Views
Citations
Occurrence of Fungi and Mycotoxins in Some Commercial Baby Foods in North Africa
(Articles)
Kofi Edirisah Aidoo
,
Shadlia Matug Mohamed
,
Alan Alexander Candlish
,
Richard Frank Tester
,
Ali Mohamed Elgerbi
Food and Nutrition Sciences
Vol.2 No.7
,September 20, 2011
DOI:
10.4236/fns.2011.27103
7,388
Downloads
13,951
Views
Citations
<
...
7
8
9
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top