Journal of Information Security

Journal of Information Security

ISSN Print: 2153-1234
ISSN Online: 2153-1242
www.scirp.org/journal/jis
E-mail: jis@scirp.org
"Information Availability: An Insight into the Most Important Attribute of Information Security"
written by Suhail Qadir, S. M. K. Quadri,
published by Journal of Information Security, Vol.7 No.3, 2016
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Ai-based mobile edge computing for iot: Applications, challenges, and future scope
Arabian Journal for Science and …, 2022
[2] Analysis of information availability for seismic and volcanic monitoring systems: a review
Aguiar, C Tripp-Barba - Sensors, 2022
[3] Biometric system for protecting information and improving service delivery: The case of a developing country's social security and pension organisation
Oware, J Effah - Information Development, 2022
[4] Bat-Inspired Optimization for Intrusion Detection Using an Ensemble Forecasting Method.
Intelligent Automation & Soft …, 2022
[5] On Cybersecurity Risk Assessment in Nuclear Power Systems
IFAC-PapersOnLine, 2022
[6] The cybersecurity-related ethical issues of cloud technology and how to avoid them
Proceedings of the 17th …, 2022
[7] Measuring the Impact of DoS Attack on Availability: Empirical Study Based on Accessibility
Journal of Information Security, 2022
[8] Image Encryption Using Modulated Chaotic Maps
2022 International Symposium on …, 2022
[9] The IoT Threat Landscape vs. Machine Learning, aka Who Attacks IoT, Why Do They Do It, and How to Prevent It?
2022
[10] On the Availability Property and Its Metric for NPP IACS
2022 15th International …, 2022
[11] Security Management System (SMS)
Information Security Handbook, 2022
[12] Data-driven framework and experimental validation for security monitoring of networked systems
2022
[13] Information security for Industry 4.0
2022
[14] Systematic Literature Review: Information security behaviour on smartphone users
Environment-Behaviour …, 2022
[15] Graph Databases and E-commerce Cybersecurity-a Match Made in Heaven? The Innovative Technology to Enhance Cyberthreat Mitigation
2022
[16] CHAOS ENGINEERING WITHIN A DEVOPS ENVIRONMENT i
2022
[17] 10 Security Management System (SMS)
Information Security Handbook, 2022
[18] PENGARUH KETERSEDIAAN INFORMASI, KETEPATAN MEDIA DAN AKSESIBILITAS INFORMASI TERHADAP PARTISIPASI ORANG TUA PESERTA DIDIK DI SDN …
Jurnal Evaluasi Pendidikan, 2022
[19] ДІЯЛЬНІСТЬ ОРГАНІВ ПУБЛІЧНОЇ ВЛАДИ УКРАЇНИ У ПРОТИДІЇ ЕПІДЕМІЇ COVID-19: ІНФОРМАЦІЙНО-БЕЗПЕКОВИЙ КОНТЕКСТ
Сучасне …, 2022
[20] GRYPE СКЕНЕР ЗА ТЕСТИРАЊЕ РАЊИВОСТИ У КОНТЕЈНЕРИМА
Zbornik radova Fakulteta tehničkih nauka u Novom …, 2022
[21] Development of Audit Information System Index KAMI Based on ISO/IEC 27001: 2013
Development, 2022
[22] Cybersecurity Issues in Crowdsourcing Engineering Initiatives
2021 Fall ASEE Middle Atlantic Section …, 2021
[23] Système intelligent basé sur des techniques de l'apprentissage automatique pour l'évaluation de la sécurité et la détection des cyber-intrusions
2021
[24] The Hierarchical Decision Model of cybersecurity risk assessment
2021 12th National Conference with International …, 2021
[25] ФОРМУЛИРОВАНИЕ ЦЕЛИ ЗАЩИТЫ ИНФОРМАЦИИ ДЛЯ РАЗЛИЧНЫХ ТИПОВ ИНФОРМАЦИОННЫХ СИСТЕМ
ПЕРСПЕКТИВЫ РАЗВИТИЯ …, 2021
[26] Comparison of intrusion detection for the internet of things with machine and deep learning methods
2021
[27] Security and Privacy Features Supported by Different Overlay-based ICN/IP Coexistence Architectures
2021
[28] Examining the Relationship between Converged-Network Architecture and Remote Grassfire Alert Transmission Delay in Southeast Colorado
2021
[29] Web security intelligent robot avoiding hacking activities using data mining as parameters of intelligent algorithms
2021
[30] Industrial Control System Availability Assessment with a Metric Based on Delay and Dependency
IFAC-PapersOnLine, 2021
[31] Industrial Control System Cybersecurity Assessment Handling Delay Estimation
International Russian Automation …, 2021
[32] Big data in the metal processing value chain: a systematic digitalization approach under special consideration of standardization and SMEs
Applied Sciences, 2021
[33] Existence-network dimension of information security in modern society
Skhid, 2021
[34] Cloud risk analysis using OCTAVE Allegro: Identifying and analysing risks of a cloud service
2021
[35] Molnbaserade affärssystem och SME-företag: Betydelsefulla trygghetsaspekter för extern datalagring: En kvalitativ studie om vilka aspekter som är betydelsefulla för …
2021
[36] Activities of Ukrainian Public Authorities to Response the COVID-19 Epidemic: Information and Security Context
2021
[37] Factors Affecting Adoption of Wearable Biometric-Tracking Devices: A Predictive Study
2021
[38] Disentangling the Concept of Information Security Properties: Enabling Effective Information Security Governance
2021
[39] EXISTENCE-NETWORK DIMENSION OF INFORMATION SECURITY IN MODERN SOCIETY.
2021
[40] Source-based Defense Mechanism In Sdn With Support Vector Machine
2021
[41] Private Data Sharing in a Secure Cloud-based Application for Acute Stroke Care
2021
[42] Predicting DOS-DDOS Attacks: Review and Evaluation Study of Feature Selection Methods based on Wrapper Process
International Journal of Advanced Computer Science and Applications, 2021
[43] Factors Affecting the Security of Information Systems: A
The International Journal of Engineering and Science, 2021
[44] Examining the Relationship Between Cybersecurity-Employee Vulnerabilities and Reduction of Security Breaches in Information Technology Organization
2020
[45] Applying Security Assurance Cases for Cloud-based Systems in the Medical Domain
2020
[46] Web Services Security and Threats: A Systematic Literature Review
2020
[47] Intrusion Detection of Flooding DoS Attacks on Emulated Smart Meters
2020
[48] Hall Spoofing: A Non-Invasive DoS Attack on Grid-Tied Solar Inverter
2020
[49] Information security in modern society: Sociocultural aspects
2020
[50] A Unified Fuzzy-Based Symmetrical Multi-Criteria Decision-Making Method for Evaluating Sustainable-Security of Web Applications
2020
[51] Determining Factors of Cloud Computing Adoption: A Study of Indonesian Local Government Employees
2020
[52] Secure Software Development Techniques and Challenges in their Practical Application
2020
[53] Secure software design and development: towards practical models for implementing information security into the requirements engineering process
2020
[54] A Fuzzy-AHP based prioritization of trust criteria in fog computing services
2020
[55] Information Security in the Design of Web-Based Software Systems
2020
[56] Enhancing Security of Information Systems in Tanzania: the Case of Education Sector
2020
[57] An Effective Data Privacy Model for Cloud Environment
2020
[58] JamaicaEye: What Does Cybersecurity Look Like In One Of The Most Recently Developed CCTV Networks?
2019
[59] Analysis of Password and Salt Combination Scheme To Improve Hash Algorithm Security
2019
[60] INFORMATION SECURITY
Knowledge Librarian, 2019
[61] Blockchain-Based Open Data: An Approach for Resolving Data Integrity and Transparency
2019
[62] JamaicaEye: What does cyber security look like in one of the most recently developed CCTV networks?
2019
[63] Framework para Gestão de Dispositivos Móveis: módulo inventário
2019
[64] Research on the Impact of Attacks on Security Characteristics
2019
[65] Website Security Analysis of Department and Integrated Services One Door of XYZ Regency using Kali Linux
2019
[66] Siber riskler karşısında KOBİ'lerin bilgi güvenliği farkındalıklarını ölçen bir ölçek geliştirme: Gaziantep örneklemi
2018
[67] PERANCANGAN DAN PENGIMPLEMENTASIAN SISTEM INFORMASI PELAYANAN JASA KESEHATAN PADA PT. PATHLAB INDONESIA
2018
[68] Curating Research Data-Cyber security perspective from a nascent Brain Machine Interface Laboratory
2018
[69] Data Security Implementations in Cloud Computing: A Critical Review
2018
[70] Oliveira
2018
[71] Investigating the denial of service attack: A major threat to internet and the security of information
JK Research Journal in Mathematics and Computer Sciences, 2018
[72] Waw (we are watching) smart app: accommodating social perception towards public officers' performance
Journal of Physics: Conference Series, 2018
[73] A Survey Paper of Distributed Denial-of-Service Attack in Software Defined Networking (SDN)
International Journal of Applied Engineering Research [IJAER], 2018
[74] Defining Network Exposure Metrics in Security Risk Scoring Models
2018
[75] Management Functions of Information System Components as an Integration Model
Management of Information Systems, 2018
[76] Classification of Data to Enhance Data Security in Cloud Computing
2018
[77] Component based metric for evaluating availability of an information system: an empirical evaluation
International Journal of Information Technology, 2018
[78] Analisis Kesuksesan Aplikasi Mobile Pemesanan Tiket Bioskop M-Tix Cinema 21 Berdasarkan Perspektif Pengguna di Kota Malang Menggunakan …
2018
[79] Metric for evaluating availability of an information system: a quantitative approach based on component dependency
International Journal of Network Security & …, 2017
[80] Quality of experience in eVoting systems: a case study of the Namibian System
2017
[81] METRIC FOR EVALUATING AVAILABILITY OF AN INFORMATION SYSTEM: AQuantitative APPROACH BASED ON COMPONENT DEPENDENCY
International Journal of Network Security & Its Applications, 2017
[82] Proposed model for e-exam availability in WLAN environment
2016
[83] ΔΙΠΛΩΜΑΤΙΚΗ ΕΡΓΑΣΙΑ
2014
[84] О МЕТРИКЕ ДОСТУПНОСТИ ДЛЯ ПРОМЫШЛЕННЫХ СИСТЕМ УПРАВЛЕНИЯ
Free SCIRP Newsletters
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top