Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
A Comparative Analysis of Cybersecurity Threat Taxonomies for Healthcare Organizations
(Articles)
Mahima Jaikanth
,
Vijay K. Madisetti
Journal of Software Engineering and Applications
Vol.17 No.5
,May 30, 2024
DOI:
10.4236/jsea.2024.175020
30
Downloads
89
Views
Citations
Ad Blockers & Online Privacy: A Comparative Analysis of Privacy Enhancing Technologies (PET)
(Articles)
Siddharth M. Madikeri
,
Vijay K. Madisetti
Journal of Software Engineering and Applications
Vol.17 No.5
,May 30, 2024
DOI:
10.4236/jsea.2024.175021
47
Downloads
152
Views
Citations
A Framework for Cybersecurity Alert Distribution and Response Network (ADRIAN)
(Articles)
Akarshita Shankar
,
Vijay Madisetti
Journal of Software Engineering and Applications
Vol.17 No.5
,May 31, 2024
DOI:
10.4236/jsea.2024.175022
23
Downloads
102
Views
Citations
Design & Test of an Advanced Web Security Analysis Tool (AWSAT)
(Articles)
Meenakshi S. P. Manikandaswamy
,
Vijay Madisetti
Journal of Software Engineering and Applications
Vol.17 No.5
,May 31, 2024
DOI:
10.4236/jsea.2024.175024
17
Downloads
65
Views
Citations
User Profile & Attitude Analysis Based on Unstructured Social Media and Online Activity
(Articles)
Yuting Tan
,
Vijay K. Madisetti
Journal of Software Engineering and Applications
Vol.17 No.6
,June 7, 2024
DOI:
10.4236/jsea.2024.176025
16
Downloads
56
Views
Citations
Certis: Cloud Asset Management & Threat Evaluation Using Behavioral Fingerprinting at Application Layer
(Articles)
Kumardwij Bhatnagar
,
Vijay K. Madisetti
Journal of Software Engineering and Applications
Vol.17 No.6
,June 7, 2024
DOI:
10.4236/jsea.2024.176026
17
Downloads
87
Views
Citations
Cybersecurity Risk Management through Behavior-Based Contextual Analysis of Online Logs
(Articles)
Irawati Edlabadkar
,
Vijay K. Madisetti
Journal of Software Engineering and Applications
Vol.17 No.6
,June 7, 2024
DOI:
10.4236/jsea.2024.176027
29
Downloads
133
Views
Citations
Task-Specific Feature Selection and Detection Algorithms for IoT-Based Networks
(Articles)
Yang Gyun Kim
,
Benito Mendoza
,
Ohbong Kwon
,
John Yoon
Journal of Computer and Communications
Vol.10 No.10
,October 27, 2022
DOI:
10.4236/jcc.2022.1010005
139
Downloads
692
Views
Citations
The Economics of Sharing Unclassified Cyber Threat Intelligence by Government Agencies and Departments
(Articles)
Josiah Dykstra
,
Lawrence A. Gordon
,
Martin P. Loeb
,
Lei Zhou
Journal of Information Security
Vol.13 No.3
,June 9, 2022
DOI:
10.4236/jis.2022.133006
193
Downloads
1,068
Views
Citations
Object Detection Meets LLMs: Model Fusion for Safety and Security
(Articles)
Zeba Mohsin Wase
,
Vijay K. Madisetti
,
Arshdeep Bahga
Journal of Software Engineering and Applications
Vol.16 No.12
,December 27, 2023
DOI:
10.4236/jsea.2023.1612034
136
Downloads
661
Views
Citations
Whispered Tuning: Data Privacy Preservation in Fine-Tuning LLMs through Differential Privacy
(Articles)
Tanmay Singh
,
Harshvardhan Aditya
,
Vijay K. Madisetti
,
Arshdeep Bahga
Journal of Software Engineering and Applications
Vol.17 No.1
,January 23, 2024
DOI:
10.4236/jsea.2024.171001
281
Downloads
1,416
Views
Citations
Smaller & Smarter: Score-Driven Network Chaining of Smaller Language Models
(Articles)
Gunika Dhingra
,
Siddansh Chawla
,
Vijay K. Madisetti
,
Arshdeep Bahga
Journal of Software Engineering and Applications
Vol.17 No.1
,January 23, 2024
DOI:
10.4236/jsea.2024.171002
136
Downloads
641
Views
Citations
GUARDIAN: A Multi-Tiered Defense Architecture for Thwarting Prompt Injection Attacks on LLMs
(Articles)
Parijat Rai
,
Saumil Sood
,
Vijay K. Madisetti
,
Arshdeep Bahga
Journal of Software Engineering and Applications
Vol.17 No.1
,January 23, 2024
DOI:
10.4236/jsea.2024.171003
280
Downloads
1,210
Views
Citations
Evaluating Privacy Leakage and Memorization Attacks on Large Language Models (LLMs) in Generative AI Applications
(Articles)
Harshvardhan Aditya
,
Siddansh Chawla
,
Gunika Dhingra
,
Parijat Rai
,
Saumil Sood
,
Tanmay Singh
,
Zeba Mohsin Wase
,
Arshdeep Bahga
,
Vijay K. Madisetti
Journal of Software Engineering and Applications
Vol.17 No.5
,May 31, 2024
DOI:
10.4236/jsea.2024.175023
46
Downloads
194
Views
Citations
Inmap-t
: Leveraging TTCN-3 to Test the Security Impact of Intra Network Elements
(Articles)
Antonino Vitale
,
Marc Dacier
Journal of Computer and Communications
Vol.9 No.6
,June 29, 2021
DOI:
10.4236/jcc.2021.96010
214
Downloads
776
Views
Citations
Security Vulnerability Analyses of Large Language Models (LLMs) through Extension of the Common Vulnerability Scoring System (CVSS) Framework
(Articles)
Alicia Biju
,
Vishnupriya Ramesh
,
Vijay K. Madisetti
Journal of Software Engineering and Applications
Vol.17 No.5
,May 30, 2024
DOI:
10.4236/jsea.2024.175019
52
Downloads
217
Views
Citations
Defence Against Command Injection Attacks in a Distributed Network Environment
(Articles)
Oluwatobi Akinmerese
,
Samuel Fasanya
,
Daniel Aderotoye
,
Ngozichukwuka Adingupu
,
Evelyn Ezeoke
,
Rukayat Muritala
,
Oyindamola Lawal
,
Blessing Akingbade
,
Chiamaka Ifekandu
Open Access Library Journal
Vol.11 No.5
,May 31, 2024
DOI:
10.4236/oalib.1111491
11
Downloads
54
Views
Citations
Design of an E-Administration Platform and Its Cryptography-Based Security Model
(Articles)
Ohwobeno Omohwo
,
Iwasokun Gabriel Babatunde
,
Boyinbode Olutayo Kehinde
,
Gabriel Junior Arome
Journal of Computer and Communications
Vol.11 No.4
,April 28, 2023
DOI:
10.4236/jcc.2023.114008
131
Downloads
1,243
Views
Citations
Handwriting Analysis Based on Belief of Targeted Individual Supporting Insider Threat Detection
(Articles)
Jason Slaughter
,
Carole E. Chaski
,
Kellep Charles
Journal of Information Security
Vol.15 No.3
,June 11, 2024
DOI:
10.4236/jis.2024.153018
8
Downloads
95
Views
Citations
Biomarker Testing Rates in Patients with Advanced Non-Small Cell Lung Cancer Treated in the Community
(Articles)
Eric Nadler
,
Melissa Pavilack
,
Jamyia Clark
,
Janet Espirito
,
Ancilla Fernandes
Journal of Cancer Therapy
Vol.10 No.12
,December 23, 2019
DOI:
10.4236/jct.2019.1012083
1,009
Downloads
2,499
Views
Citations
<
...
5
6
7
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top