Journal of Information Security

Journal of Information Security

ISSN Print: 2153-1234
ISSN Online: 2153-1242
www.scirp.org/journal/jis
E-mail: jis@scirp.org
"Network Defense Methodology: A Comparison of Defense in Depth and Defense in Breadth"
written by Lance Cleghorn,
published by Journal of Information Security, Vol.4 No.3, 2013
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] The Cybersecurity Risk Estimation Engine: A Tool for Possibility Based Risk Analysis
Computers & Security, 2022
[2] Egida: Automated security configuration deployment systems with early error detection
Computers & Security, 2022
[3] The AI Family: The Information Security Managers Best Frenemy?
HICSS, 2022
[4] A methodology for selecting hardware performance counters for supporting non-intrusive diagnostic of flood DDoS attacks on web servers
Computers & …, 2021
[5] Detecting cyber attacks in time: combining attack simulation with detection logic
2021
[6] Prediction, Detection, and Mitigation of DDoS Attacks Using HPCs: Design for a Safer Adaptive Infrastructure
2021
[7] Defense Mechanisms with Threat Intelligence Capabilities against Blended Threats
2021
[8] Reducing Threats by Using Bayesian Networks to Prioritize and Combine Defense in Depth Security Measures
2020
[9] Repensando la estrategia de defensa en profundidad. Incorporando capacidades claves para aprender y anticipar los movimientos del adversario digital
2020
[10] EVALUATION OF E-GOVERNMENT INFORMATION SECURITY USING THE DEFENSE IN DEPTH MODEL
2020
[11] Using the Latin Square Design Model in the Prioritzation of Network Security Threats: A Quantitative Study ()
2020
[12] Automating the Assessment of Networking and Security in Higher Education
2020
[13] Impact and Key Challenges of Insider Threats on Organizations and Critical Businesses
2020
[14] Using Linear Regression Analysis and Defense in Depth to Protect Networks during the Global Corona Pandemic
2020
[15] EVALUASI KEAMANAN INFORMASI E-GOVERNMENT MENGGUNAKAN MODEL DEFENSE IN DEPTH
2020
[16] Using the Latin Square Design Model in the Prioritzation of Network Security Threats: A Quantitative Study
Journal of Information Security, 2020
[17] Cloud and in-house datacenters: determinants of security innovations at the colleges of education, Ghana
2019
[18] A Comprehensive Cybersecurity Defense Framework for Large Organizations
2019
[19] Ransomware life cycle and how to combat it
2019
[20] Automating the Assessment of Network Security in Higher Education
2019
[21] Méthodologie d'ingénierie des exigences de sécurité réseau
2019
[22] Exploring the Strategies Network Security Managers Need to Protect Their Networks from Backdoor Intrusions
2018
[23] Exploring Strategies for Digital Security
2017
[24] Architecting Cyber Defense: A Survey of the Leading Cyber Reference Architectures and Frameworks
2017
[25] A Review on Online-Banking Security Models, Successes, and Failures
2017
[26] Can the analytical hierarchy process model be effectively applied in the prioritization of information assurance defense in-depth measures?-a quantitative …
ProQuest Dissertations Publishing, 2017
[27] Can the analytical hierarchy process model be effectively applied in the prioritization of information assurance defense in-depth measures?-a quantitative …
2017
[28] Embracing security in all phases of the software development life cycle: A Delphi study
ProQuest Dissertations Publishing, 2016
[29] An Assessment Methodology and Models for Cyber Systems
ProQuest Dissertations Publishing, 2016
[30] Design of an Intrusion Detection System (IDS) and an Intrusion Prevention System (IPS) for the EIU Cybersecurity Laboratory
2016
[31] Layer Based Log Analysis for Enhancing Security of Enterprise Data Center: The Case of Ethiopian Education and Research Network
2015
[32] Network cybersecurity indicators: Determining cybersecurity indicators that accurately reflect the state of cybersecurity of a network
ProQuest Dissertations Publishing, 2015
[33] A Tale of Two Cities: Or How the Wrong Metaphors Lead to Less Security
2015
[34] Layer Based Log Analysis for Enhancing Security of Enterprise Data Center
Thesis, 2015
[35] Predictive modeling of complex cyberthreats with formal concept analysis
2015
[36] Layered Defense in Depth Model for IT Organizations
2014
[37] SCHOOL OF GRADUATE STUDIES COLLEGE OF NATURAL SCIENCE DEPARTMENT OF COMPUTER SCIENCE
Thesis, 2014
[38] School of Graduate Studies College of Natural Sciences Department of Computer Science
2014
[39] 矿山灾难纵深防御体系构建及实例分析
中国安全科学学报, 2013
Free SCIRP Newsletters
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top