Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Discussion and Research on Information Security Attack and Defense Platform Construction in Universities Based on Cloud Computing and Virtualization
(Articles)
Xiancheng Ding
Journal of Information Security
Vol.7 No.5
,October 27, 2016
DOI:
10.4236/jis.2016.75025
2,308
Downloads
3,604
Views
Citations
Network Defense Methodology: A Comparison of Defense in Depth and Defense in Breadth
(Articles)
Lance Cleghorn
Journal of Information Security
Vol.4 No.3
,July 12, 2013
DOI:
10.4236/jis.2013.43017
10,209
Downloads
19,187
Views
Citations
Address Resolution Protocol (ARP): Spoofing Attack and Proposed Defense
(Articles)
Ghazi Al Sukkar
,
Ramzi Saifan
,
Sufian Khwaldeh
,
Mahmoud Maqableh
,
Iyad Jafar
Communications and Network
Vol.8 No.3
,July 14, 2016
DOI:
10.4236/cn.2016.83012
3,645
Downloads
8,957
Views
Citations
Efficient Selfish Attack Detection in Cognitive Radio Network
(Articles)
Shailaja C. Patil
,
Amrita Janardhanan
Wireless Engineering and Technology
Vol.7 No.4
,October 21, 2016
DOI:
10.4236/wet.2016.74011
1,701
Downloads
3,091
Views
Citations
Black Box Adversarial Defense Based on Image Denoising and Pix2Pix
(Articles)
Zhenyong Rui
,
Xiugang Gong
Journal of Computer and Communications
Vol.11 No.12
,December 19, 2023
DOI:
10.4236/jcc.2023.1112002
87
Downloads
232
Views
Citations
GUARDIAN: A Multi-Tiered Defense Architecture for Thwarting Prompt Injection Attacks on LLMs
(Articles)
Parijat Rai
,
Saumil Sood
,
Vijay K. Madisetti
,
Arshdeep Bahga
Journal of Software Engineering and Applications
Vol.17 No.1
,January 23, 2024
DOI:
10.4236/jsea.2024.171003
181
Downloads
827
Views
Citations
Research on Cyberspace Mimic Defense Based on Dynamic Heterogeneous Redundancy Mechanism
(Articles)
Junjie Xu
Journal of Computer and Communications
Vol.9 No.7
,July 5, 2021
DOI:
10.4236/jcc.2021.97001
237
Downloads
1,421
Views
Citations
Two-Tier GCT Based Approach for Attack Detection
(Articles)
Zhiwen Wang
,
Qin Xia
,
Ke Lu
Journal of Software Engineering and Applications
Vol.1 No.1
,December 9, 2008
DOI:
10.4236/jsea.2008.11009
4,604
Downloads
8,156
Views
Citations
General Study of Mobile Agent Based Intrusion Detection System (IDS)
(Articles)
Chandrakant Jain
,
Aumreesh Kumar Saxena
Journal of Computer and Communications
Vol.4 No.4
,April 13, 2016
DOI:
10.4236/jcc.2016.44008
2,957
Downloads
4,787
Views
Citations
Effect of Network Traffic on IPS Performance
(Articles)
Shahriar Mohammadi
,
Vahid Allahvakil
,
Mojtaba Khaghani
Journal of Information Security
Vol.3 No.2
,April 26, 2012
DOI:
10.4236/jis.2012.32019
6,413
Downloads
11,122
Views
Citations
Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises
(Articles)
Meysam Tahmasebi
Journal of Information Security
Vol.15 No.2
,February 29, 2024
DOI:
10.4236/jis.2024.152008
31
Downloads
152
Views
Citations
This article belongs to the Special Issue on
Cybersecurity and Information Security
Using the Latin Square Design Model in the Prioritzation of Network Security Threats: A Quantitative Study
(Articles)
Rodney Alexander
Journal of Information Security
Vol.11 No.2
,April 22, 2020
DOI:
10.4236/jis.2020.112006
670
Downloads
2,140
Views
Citations
Reducing Threats by Using Bayesian Networks to Prioritize and Combine Defense in Depth Security Measures
(Articles)
Rodney Alexander
Journal of Information Security
Vol.11 No.3
,June 8, 2020
DOI:
10.4236/jis.2020.113008
586
Downloads
1,978
Views
Citations
Using Linear Regression Analysis and Defense in Depth to Protect Networks during the Global Corona Pandemic
(Articles)
Rodney Alexander
Journal of Information Security
Vol.11 No.4
,October 21, 2020
DOI:
10.4236/jis.2020.114017
814
Downloads
5,163
Views
Citations
User Station Security Protection Method Based on Random Domain Name Detection and Active Defense
(Articles)
Hongyan Yin
,
Xiaokang Ren
,
Jinyu Liu
,
Shuo Zhang
,
Wenkun Liu
Journal of Information Security
Vol.14 No.1
,January 29, 2023
DOI:
10.4236/jis.2023.141004
78
Downloads
438
Views
Citations
Enhanced Timestamp Discrepancy to Limit Impact of Replay Attacks in MANETs
(Articles)
Aziz Baayer
,
Nourddine Enneya
,
Mohammed Elkoutbi
Journal of Information Security
Vol.3 No.3
,July 25, 2012
DOI:
10.4236/jis.2012.33028
4,832
Downloads
8,645
Views
Citations
Blue Screen of Death Observed for Microsoft Windows Server 2012 R2 under DDoS Security Attack
(Articles)
Koushicaa Sundar
,
Sanjeev Kumar
Journal of Information Security
Vol.7 No.4
,July 7, 2016
DOI:
10.4236/jis.2016.74018
2,822
Downloads
5,583
Views
Citations
Quantitative Evaluation of Cyber-Attacks on a Hypothetical School Computer Network
(Articles)
Akinjide A. Akinola
,
Adeyemi A. Adekoya
,
Ayoade O. Kuye
,
Abiodun Ayodeji
Journal of Information Security
Vol.10 No.3
,June 17, 2019
DOI:
10.4236/jis.2019.103006
724
Downloads
2,313
Views
Citations
An Overview of the Pros and Cons of the Jordan Pandemic Defense Order 28: The Case of the Hashemite Kingdom
(Articles)
Mohammed Ibrahim Abu El-Haija
,
Mostafa Mousa Ajarmih
Beijing Law Review
Vol.14 No.2
,June 8, 2023
DOI:
10.4236/blr.2023.142033
43
Downloads
269
Views
Citations
Costs of glucosinolates in
Brassica rapa
: Are they context dependent?
(Articles)
Kirk A. Stowe
,
Cris G. Hochwender
,
Krista Fleck
,
Nichole Duvall
,
Debra Lewkiewicz
,
Steve Trimble
,
Shanon Peters
Open Journal of Ecology
Vol.3 No.2
,May 16, 2013
DOI:
10.4236/oje.2013.32022
4,304
Downloads
7,822
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top