Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies
(Articles)
Sina Ahmadi
Journal of Information Security
Vol.15 No.2
,March 27, 2024
DOI:
10.4236/jis.2024.152010
473
Downloads
3,792
Views
Citations
AssessITS
: Integrating Procedural Guidelines and Practical Evaluation Metrics for Organizational IT and Cybersecurity Risk Assessment
(Articles)
Mir Mehedi Rahman
,
Naresh Kshetri
,
Sayed Abu Sayeed
,
Md Masud Rana
Journal of Information Security
Vol.15 No.4
,October 29, 2024
DOI:
10.4236/jis.2024.154032
114
Downloads
601
Views
Citations
Awareness of the Potential Threat of Cyberterrorism to the National Security
(Articles)
Abdulrahman Alqahtani
Journal of Information Security
Vol.5 No.4
,September 19, 2014
DOI:
10.4236/jis.2014.54013
6,434
Downloads
9,844
Views
Citations
End-to-End Encryption in Messaging Services and National Security—Case of WhatsApp Messenger
(Articles)
Robert E. Endeley
Journal of Information Security
Vol.9 No.1
,January 23, 2018
DOI:
10.4236/jis.2018.91008
11,408
Downloads
20,043
Views
Citations
Humanitarianism and National Security Conundrum: A Systematic Review on Bangladesh’s Refugee Policy Dilemma, More Owes to Displaced Rohingyas
(Articles)
Shah Jahan Shuvo
,
Jamal Uddin
,
Mahbbat Ali
Open Journal of Social Sciences
Vol.12 No.10
,October 30, 2024
DOI:
10.4236/jss.2024.1210033
90
Downloads
583
Views
Citations
Research on the Convergence of Foreign Investment Security Review Legal Systems in Europe and the United States
(Articles)
Hu Chen
Beijing Law Review
Vol.16 No.2
,May 26, 2025
DOI:
10.4236/blr.2025.162036
14
Downloads
79
Views
Citations
Information Security in the Cloud: Emerging Trends and Challenges
(Articles)
Keerthana Chitreddy
,
Andrew Mikhl Anthony
,
Chinna Manikanta Bandaru
,
Olatunde Abiona
Int'l J. of Communications, Network and System Sciences
Vol.17 No.5
,May 31, 2024
DOI:
10.4236/ijcns.2024.175005
149
Downloads
849
Views
Citations
On Threat Models for Information-Stealing Malware (ISM) Targeting Password Managers
(Articles)
Vedika Sunil Bang
,
Vijay Madisetti
Journal of Information Security
Vol.16 No.2
,April 17, 2025
DOI:
10.4236/jis.2025.162015
41
Downloads
294
Views
Citations
Resilience: The New Paradigm in Disaster Management—An Australian Perspective
(Articles)
Stephen Jenkins
,
Stephen Jenkins
World Journal of Engineering and Technology
Vol.3 No.3C
,October 22, 2015
DOI:
10.4236/wjet.2015.33C020
7,905
Downloads
10,385
Views
Citations
Workplace Accidents: Types, Frequencies, and Costs. Case of Workers Subject to the National Social Security Fund of Haut Katanga I, in the Democratic Republic of the Congo
(Articles)
Jacques Camille Musolo Kwambamba
,
Christian Makali Ntamwenge
,
Néné Moma Kasongo
,
Blandine Ngalula Mubadi
,
Antoine Kasongo Nyandwe
,
Balthas Kabeya
,
Kabyla Ilunga Benjamin
,
Simon Ilunga Kandolo
,
Hendrick Mbutshu Lukuke
Open Access Library Journal
Vol.9 No.8
,August 18, 2022
DOI:
10.4236/oalib.1109092
82
Downloads
861
Views
Citations
The Study on Effectiveness of Internal Audit on the Performance of the Public Sector in Sierra Leone: A Case Study of the National Social Security Insurance Trust
(Articles)
Abu Kai Kamara
Open Access Library Journal
Vol.10 No.8
,August 25, 2023
DOI:
10.4236/oalib.1110431
704
Downloads
6,901
Views
Citations
A Comparative Analysis of Cybersecurity Threat Taxonomies for Healthcare Organizations
(Articles)
Mahima Jaikanth
,
Vijay K. Madisetti
Journal of Software Engineering and Applications
Vol.17 No.5
,May 30, 2024
DOI:
10.4236/jsea.2024.175020
179
Downloads
862
Views
Citations
Research on University’s Cyber Threat Intelligence Sharing Platform Based on New Types of STIX and TAXII Standards
(Articles)
Gang Wang
,
Yuanzhi Huo
,
Zhao Ma Ma
Journal of Information Security
Vol.10 No.4
,October 29, 2019
DOI:
10.4236/jis.2019.104015
1,466
Downloads
3,911
Views
Citations
United States Foreign Policy and the Middle East
(Articles)
Atallah S. Al Sarhan
Open Journal of Political Science
Vol.7 No.4
,September 11, 2017
DOI:
10.4236/ojps.2017.74036
5,953
Downloads
32,405
Views
Citations
The Constitutional Transformation and a Threat of the Environment in Poland
(Articles)
Krzysztof R. Mazurski
Journal of Environmental Protection
Vol.2 No.4
,June 17, 2011
DOI:
10.4236/jep.2011.24044
4,891
Downloads
8,038
Views
Citations
Proposal to Disseminate the Knowledge of Tsunamis in the Caribbean Coast of Costa Rica, Central America
(Articles)
Mario Fernández Arce
,
Daniel Solís
,
Juan Luis Porras
,
Gino González
World Journal of Engineering and Technology
Vol.2 No.3B
,September 18, 2014
DOI:
10.4236/wjet.2014.23B013
3,162
Downloads
3,224
Views
Citations
Groundless Threat of Infringement of Patent
(Articles)
Dharmapuri Selvakumar Madhumitha
Beijing Law Review
Vol.10 No.3
,June 4, 2019
DOI:
10.4236/blr.2019.103029
1,202
Downloads
3,069
Views
Citations
Generative Adversarial Network Based Approach towards Synthetically Generating Insider Threat Scenarios
(Articles)
Mayesh Mohapatra
,
Anshumaan Phukan
,
Vijay K. Madisetti
Journal of Software Engineering and Applications
Vol.16 No.11
,November 28, 2023
DOI:
10.4236/jsea.2023.1611030
145
Downloads
595
Views
Citations
Handwriting Analysis Based on Belief of Targeted Individual Supporting Insider Threat Detection
(Articles)
Jason Slaughter
,
Carole E. Chaski
,
Kellep Charles
Journal of Information Security
Vol.15 No.3
,June 11, 2024
DOI:
10.4236/jis.2024.153018
82
Downloads
466
Views
Citations
GDP Falls as MBA Rises?
(Articles)
T. N. Cummins
Applied Mathematics
Vol.4 No.10
,October 14, 2013
DOI:
10.4236/am.2013.410196
4,593
Downloads
6,383
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top