Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Citations
Journals Menu
Articles
Archive
Indexing
Aims & Scope
Editorial Board
For Authors
Publication Fees
Open Special Issues
Published Special Issues
Special Issues Guideline
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Journal of Information Security
Submission
Journal of Information Security
ISSN Print:
2153-1234
ISSN Online:
2153-1242
www.scirp.org/journal/jis
E-mail:
jis@scirp.org
Google-based Impact Factor:
3.25
Citations
Journals Menu
Articles
Archive
Indexing
Aims & Scope
Editorial Board
For Authors
Publication Fees
Google-based Impact Factor:
Top Cited Articles
(284 articles with 6735 citations as of July 2024)
Sort by:
Times Cited -- highest to lowest
Times Cited -- lowest to highest
Publication Date -- newest to oldest
Publication Date -- oldest to newest
Malware Analysis and Classification: A Survey
,
Journal of Information Security, Vol.5 No.2, 2014
Ekta Gandotra, Divya Bansal, Sanjeev Sofat
Citations:
597
(Details)
ISO/IEC 27000, 27001 and 27002 for Information Security Management
,
Journal of Information Security, Vol.4 No.2, 2013
Georg Disterer
Citations:
431
(Details)
Design of the Blockchain Smart Contract: A Use Case for Real Estate
,
Journal of Information Security, Vol.9 No.3, 2018
Ioannis Karamitsos, Maria Papadaki, Nedaa Baker Al Barghuthi
Citations:
325
(Details)
Feature Selection for Intrusion Detection Using Random Forest
,
Journal of Information Security, Vol.7 No.3, 2016
Md. Al Mehedi Hasan, Mohammed Nasser, Shamim Ahmad, Khademul Islam Molla
Citations:
220
(Details)
Externalities and the Magnitude of Cyber Security Underinvestment by Private Sector Firms: A Modification of the Gordon-Loeb Model
,
Journal of Information Security, Vol.6 No.1, 2015
Lawrence A. Gordon, Martin P. Loeb, William Lucyshyn, Lei Zhou
Citations:
144
(Details)
Evaluation of Electrocardiogram for Biometric Authentication
,
Journal of Information Security, Vol.3 No.1, 2012
Yogendra Narain Singh, S K Singh
Citations:
142
(Details)
Information Availability: An Insight into the Most Important Attribute of Information Security
,
Journal of Information Security, Vol.7 No.3, 2016
Suhail Qadir, S. M. K. Quadri
Citations:
128
(Details)
Investing in Cybersecurity: Insights from the Gordon-Loeb Model
,
Journal of Information Security, Vol.7 No.2, 2016
Lawrence A. Gordon, Martin P. Loeb, Lei Zhou
Citations:
125
(Details)
A Comparison of Link Layer Attacks on Wireless Sensor Networks
,
Journal of Information Security, Vol.2 No.2, 2011
Shahriar Mohammadi, Reza Ebrahimi Atani, Hossein Jadidoleslamy
Citations:
120
(Details)
Hadoop Based Defense Solution to Handle Distributed Denial of Service (DDoS) Attacks
,
Journal of Information Security, Vol.4 No.3, 2013
Shweta Tripathi, Brij Gupta, Ammar Almomani, Anupama Mishra, Suresh Veluru
Citations:
119
(Details)
A Novel Solution to Handle DDOS Attack in MANET
,
Journal of Information Security, Vol.4 No.3, 2013
Meghna Chhabra, Brij Gupta, Ammar Almomani
Citations:
107
(Details)
A Review of Anomaly Detection Systems in Cloud Networks and Survey of Cloud Security Measures in Cloud Storage Applications
,
Journal of Information Security, Vol.6 No.2, 2015
Arif Sari
Citations:
86
(Details)
An Intelligent Model for Online Recruitment Fraud Detection
,
Journal of Information Security, Vol.10 No.3, 2019
Bandar Alghamdi, Fahad Alharby
Citations:
76
(Details)
New Approach for Fast Color Image Encryption Using Chaotic Map
,
Journal of Information Security, Vol.2 No.4, 2011
Kamlesh Gupta, Sanjay Silakari
Citations:
74
(Details)
Face Recognition across Time Lapse Using Convolutional Neural Networks
,
Journal of Information Security, Vol.7 No.3, 2016
Hachim El Khiyari, Harry Wechsler
Citations:
73
(Details)
Digital Forensics and Cyber Crime Datamining
,
Journal of Information Security, Vol.3 No.3, 2012
K. K. Sindhu, B. B. Meshram
Citations:
72
(Details)
Attacks on Anonymization-Based Privacy-Preserving: A Survey for Data Mining and Data Publishing
,
Journal of Information Security, Vol.4 No.2, 2013
Abou-el-ela Abdou Hussien, Nermin Hamza, Hesham A. Hefny
Citations:
71
(Details)
Personality Traits and Cognitive Determinants—An Empirical Investigation of the Use of Smartphone Security Measures
,
Journal of Information Security, Vol.4 No.4, 2013
Jörg Uffen, Nico Kaemmerer, Michael H. Breitner
Citations:
70
(Details)
Mobile Phishing Attacks and Mitigation Techniques
,
Journal of Information Security, Vol.6 No.3, 2015
Hossain Shahriar, Tulin Klintic, Victor Clincy
Citations:
69
(Details)
Text Independent Automatic Speaker Recognition System Using Mel-Frequency Cepstrum Coefficient and Gaussian Mixture Models
,
Journal of Information Security, Vol.3 No.4, 2012
Alfredo Maesa, Fabio Garzia, Michele Scarpiniti, Roberto Cusani
Citations:
65
(Details)
Social Engineering Threat and Defense: A Literature Survey
,
Journal of Information Security, Vol.9 No.4, 2018
Islam Abdalla Mohamed Abass
Citations:
65
(Details)
End-to-End Encryption in Messaging Services and National Security—Case of WhatsApp Messenger
,
Journal of Information Security, Vol.9 No.1, 2018
Robert E. Endeley
Citations:
63
(Details)
Empirical Evidence on the Determinants of Cybersecurity Investments in Private Sector Firms
,
Journal of Information Security, Vol.9 No.2, 2018
Lawrence A. Gordon, Martin P. Loeb, William Lucyshyn, Lei Zhou
Citations:
61
(Details)
Secure Spread-Spectrum Watermarking for Telemedicine Applications
,
Journal of Information Security, Vol.2 No.2, 2011
Basant Kumar, Harsh Vikram Singh, Surya Pal Singh, Anand Mohan
Citations:
61
(Details)
A Comparative Study of Related Technologies of Intrusion Detection & Prevention Systems
,
Journal of Information Security, Vol.2 No.1, 2011
Indraneel Mukhopadhyay, Mohuya Chakraborty, Satyajit Chakrabarti
Citations:
61
(Details)
Comparative Study of Different Cryptographic Algorithms
,
Journal of Information Security, Vol.11 No.3, 2020
Baha Eldin Hamouda Hassan Hamouda
Citations:
60
(Details)
A Comparative Study of Email Forensic Tools
,
Journal of Information Security, Vol.6 No.2, 2015
Vamshee Krishna Devendran, Hossain Shahriar, Victor Clincy
Citations:
59
(Details)
Public Key Infrastructure: A Survey
,
Journal of Information Security, Vol.6 No.1, 2015
Aysha Albarqi, Ethar Alzaid, Fatimah Al Ghamdi, Somaya Asiri, Jayaprakash Kar
Citations:
59
(Details)
Game Theory Based Network Security
,
Journal of Information Security, Vol.1 No.1, 2010
Yi Luo, Ferenc Szidarovszky, Youssif Al-Nashif, Salim Hariri
Citations:
57
(Details)
Hardware Performance Evaluation of SHA-3 Candidate Algorithms
,
Journal of Information Security, Vol.3 No.2, 2012
Yaser Jararweh, Lo’ai Tawalbeh, Hala Tawalbeh, Abidalrahman Moh’d
Citations:
50
(Details)
Network Defense Methodology: A Comparison of Defense in Depth and Defense in Breadth
,
Journal of Information Security, Vol.4 No.3, 2013
Lance Cleghorn
Citations:
50
(Details)
Generation of DDoS Attack Dataset for Effective IDS Development and Evaluation
,
Journal of Information Security, Vol.9 No.4, 2018
Sabah Alzahrani, Liang Hong
Citations:
48
(Details)
Category-Based Intrusion Detection Using PCA
,
Journal of Information Security, Vol.3 No.4, 2012
Gholam Reza Zargar, Tania Baghaie
Citations:
46
(Details)
Proposed Framework for Security Risk Assessment
,
Journal of Information Security, Vol.2 No.2, 2011
Zakaria I. Saleh, Heba Refai, Ahmad Mashhour
Citations:
45
(Details)
Evaluation of Modified Vector Space Representation Using ADFA-LD and ADFA-WD Datasets
,
Journal of Information Security, Vol.6 No.3, 2015
Bhavesh Borisaniya, Dhiren Patel
Citations:
44
(Details)
Analysis of Malware Families on Android Mobiles: Detection Characteristics Recognizable by Ordinary Phone Users and How to Fix It
,
Journal of Information Security, Vol.4 No.4, 2013
Hieu Le Thanh
Citations:
42
(Details)
Novel Hybrid Encryption Algorithm Based on Aes, RSA, and Twofish for Bluetooth Encryption
,
Journal of Information Security, Vol.9 No.2, 2018
Marwan Ali Albahar, Olayemi Olawumi, Keijo Haataja, Pekka Toivanen
Citations:
42
(Details)
A Novel Attack Graph Posterior Inference Model Based on Bayesian Network
,
Journal of Information Security, Vol.2 No.1, 2011
Shaojun Zhang, Shanshan Song
Citations:
39
(Details)
Age Invariant Face Recognition Using Convolutional Neural Networks and Set Distances
,
Journal of Information Security, Vol.8 No.3, 2017
Hachim El Khiyari, Harry Wechsler
Citations:
38
(Details)
A Comparison of Malware Detection Techniques Based on Hidden Markov Model
,
Journal of Information Security, Vol.7 No.3, 2016
Saja Alqurashi, Omar Batarfi
Citations:
36
(Details)
Digital Evidence for Database Tamper Detection
,
Journal of Information Security, Vol.3 No.2, 2012
Shweta Tripathi, Bandu Baburao Meshram
Citations:
36
(Details)
Smartphone Forensic Analysis: A Case Study for Obtaining Root Access of an Android Samsung S3 Device and Analyse the Image without an Expensive Commercial Tool
,
Journal of Information Security, Vol.5 No.3, 2014
Muhammad Faheem, N.-A. Le-Khac, Tahar Kechadi
Citations:
36
(Details)
Control Framework for Secure Cloud Computing
,
Journal of Information Security, Vol.6 No.1, 2015
Harshit Srivastava, Sathish Alampalayam Kumar
Citations:
35
(Details)
Perception on Cyber Terrorism: A Focus Group Discussion Approach
,
Journal of Information Security, Vol.3 No.3, 2012
Rabiah Ahmad, Zahri Yunos, Shahrin Sahib, Mariana Yusoff
Citations:
35
(Details)
Hoeffding Tree Algorithms for Anomaly Detection in Streaming Datasets: A Survey
,
Journal of Information Security, Vol.8 No.4, 2017
Asmah Muallem, Sachin Shetty, Jan Wei Pan, Juan Zhao, Biswajit Biswal
Citations:
35
(Details)
Towards a Comprehensive Security Framework of Cloud Data Storage Based on Multi Agent System Architecture
,
Journal of Information Security, Vol.3 No.4, 2012
Amir Mohamed Talib, Rodziah Atan, Rusli Abdullah, Masrah Azrifah Azmi Murad
Citations:
34
(Details)
A Conceptual Framework for Threat Assessment Based on Organization’s Information Security Policy
,
Journal of Information Security, Vol.5 No.4, 2014
Joseph Elias Mbowe, Irina Zlotnikova, Simon S. Msanjila, George S. Oreku
Citations:
34
(Details)
Anomalous Network Packet Detection Using Data Stream Mining
,
Journal of Information Security, Vol.2 No.4, 2011
Zachary Miller, William Deitrick, Wei Hu
Citations:
33
(Details)
Cybersecurity: A Stochastic Predictive Model to Determine Overall Network Security Risk Using Markovian Process
,
Journal of Information Security, Vol.8 No.2, 2017
Nawa Raj Pokhrel, Chris P. Tsokos
Citations:
32
(Details)
Systematic Review on Social Engineering: Hacking by Manipulating Humans
,
Journal of Information Security, Vol.12 No.1, 2021
Chandra Sekhar Bhusal
Citations:
31
(Details)
I-PRESENT
TM
: An Involutive Lightweight Block Cipher
,
Journal of Information Security, Vol.5 No.3, 2014
Muhammad Reza Z’aba, Norziana Jamil, Mohd Ezanee Rusli, Md. Zaini Jamaludin, Ahmad Azlan Mohd Yasir
Citations:
31
(Details)
A Multi-Leveled Approach to Intrusion Detection and the Insider Threat
,
Journal of Information Security, Vol.4 No.1, 2013
Rita M. Barrios
Citations:
30
(Details)
iPhone Security Analysis
,
Journal of Information Security, Vol.1 No.2, 2010
Vaibhav Ranchhoddas Pandya, Mark Stamp
Citations:
30
(Details)
Denial of Service Due to Direct and Indirect ARP Storm Attacks in LAN Environment
,
Journal of Information Security, Vol.1 No.2, 2010
Sanjeev Kumar, Orifiel Gomez
Citations:
30
(Details)
Privacy Preserving Scheme for Location-Based Services
,
Journal of Information Security, Vol.3 No.2, 2012
Youssef Gahi, Mouhcine Guennoun, Zouhair Guennoun, Khalil El-Khatib
Citations:
29
(Details)
Relevance of Cybersecurity Education at Pedagogy Levels in Schools
,
Journal of Information Security, Vol.12 No.4, 2021
Eric Amankwa
Citations:
29
(Details)
Fifty-Six Big Data V’s Characteristics and Proposed Strategies to Overcome Security and Privacy Challenges (BD2)
,
Journal of Information Security, Vol.11 No.4, 2020
Abou_el_ela Abdou Hussein
Citations:
28
(Details)
Cyber Security: Nonlinear Stochastic Models for Predicting the Exploitability
,
Journal of Information Security, Vol.8 No.2, 2017
Sasith M. Rajasooriya, Chris. P. Tsokos, Pubudu Kalpani Kaluarachchi
Citations:
28
(Details)
Cybersecurity: Time Series Predictive Modeling of Vulnerabilities of Desktop Operating System Using Linear and Non-Linear Approach
,
Journal of Information Security, Vol.8 No.4, 2017
Nawa Raj Pokhrel, Hansapani Rodrigo, Chris P. Tsokos
Citations:
28
(Details)
Simultaneous Hashing of Multiple Messages
,
Journal of Information Security, Vol.3 No.4, 2012
Shay Gueron, Vlad Krasnov
Citations:
28
(Details)
Unsupervised Multi-Level Non-Negative Matrix Factorization Model: Binary Data Case
,
Journal of Information Security, Vol.3 No.4, 2012
Qingquan Sun, Peng Wu, Yeqing Wu, Mengcheng Guo, Jiang Lu
Citations:
27
(Details)
A Visual Cryptography Based Digital Image Copyright Protection
,
Journal of Information Security, Vol.3 No.2, 2012
Adel Hammad Abusitta
Citations:
27
(Details)
Security Policy Management Process within Six Sigma Framework
,
Journal of Information Security, Vol.3 No.1, 2012
Vijay Anand, Jafar Saniie, Erdal Oruklu
Citations:
26
(Details)
Tanimoto Based Similarity Measure for Intrusion Detection System
,
Journal of Information Security, Vol.2 No.4, 2011
Alok Sharma, Sunil Pranit Lal
Citations:
26
(Details)
A Survey on Different Feature Extraction and Classification Techniques Used in Image Steganalysis
,
Journal of Information Security, Vol.8 No.3, 2017
John Babu, Sridevi Rangu, Pradyusha Manogna
Citations:
26
(Details)
Comparing the Area of Data Mining Algorithms in Network Intrusion Detection
,
Journal of Information Security, Vol.11 No.1, 2020
Yasamin Alagrash, Azhar Drebee, Nedda Zirjawi
Citations:
25
(Details)
Stochastic Modelling of Vulnerability Life Cycle and Security Risk Evaluation
,
Journal of Information Security, Vol.7 No.4, 2016
Sasith M. Rajasooriya, Chris P. Tsokos, Pubudu Kalpani Kaluarachchi
Citations:
24
(Details)
The Application of Mixed Method in Developing a Cyber Terrorism Framework
,
Journal of Information Security, Vol.3 No.3, 2012
Rabiah Ahmad, Zahri Yunos
Citations:
24
(Details)
A Forensic Traceability Index in Digital Forensic Investigation
,
Journal of Information Security, Vol.4 No.1, 2013
Siti Rahayu Selamat, Shahrin Sahib, Nor Hafeizah, Robiah Yusof, Mohd Faizal Abdollah
Citations:
24
(Details)
The “Iterated Weakest Link” Model of Adaptive Security Investment
,
Journal of Information Security, Vol.7 No.2, 2016
Rainer Böhme, Tyler Moore
Citations:
23
(Details)
Comparative Evaluation of Semi Fragile Watermarking Algorithms for Image Authentication
,
Journal of Information Security, Vol.3 No.3, 2012
Archana Tiwari, Manisha Sharma
Citations:
23
(Details)
On Secure Digital Image Watermarking Techniques
,
Journal of Information Security, Vol.2 No.4, 2011
Manjit Thapa, Sandeep Kumar Sood
Citations:
23
(Details)
Key Incorporation Scheme for Cancelable Biometrics
,
Journal of Information Security, Vol.2 No.4, 2011
Eliza Yingzi Du, Kai Yang, Zhi Zhou
Citations:
22
(Details)
A Tree Model for Identification of Threats as the First Stage of Risk Assessment in HIS
,
Journal of Information Security, Vol.3 No.2, 2012
Ahmad Bakhtiyari Shahri, Zuraini Ismail
Citations:
22
(Details)
Symmetric-Key Based Homomorphic Primitives for End-to-End Secure Data Aggregation in Wireless Sensor Networks
,
Journal of Information Security, Vol.6 No.1, 2015
Keyur Parmar, Devesh C. Jinwala
Citations:
22
(Details)
Security & Privacy Implications in the Placement of Biometric-Based ID Card for Rwanda Universities
,
Journal of Information Security, Vol.6 No.2, 2015
Eugen Harinda, Etienne Ntagwirumugara
Citations:
22
(Details)
SecSPS: A Secure and Privacy-Preserving Framework for Smart Parking Systems
,
Journal of Information Security, Vol.9 No.4, 2018
Ali Alqazzaz, Ibrahim Alrashdi, Esam Aloufi, Mohamed Zohdy, Hua Ming
Citations:
22
(Details)
A Secure Image Steganography Using Advanced Encryption Standard and Discrete Cosine Transform
,
Journal of Information Security, Vol.10 No.3, 2019
Ashraful Tauhid, Maisha Tasnim, Saima Arifin Noor, Nuruzzaman Faruqui, Mohammad Abu Yousuf
Citations:
21
(Details)
A Robust Chaos-Based Image Cryptosystem with an Improved Key Generator and Plain Image Sensitivity Mechanism
,
Journal of Information Security, Vol.8 No.1, 2017
Hidayet Oğraş, Mustafa Türk
Citations:
21
(Details)
Data Migration Need, Strategy, Challenges, Methodology, Categories, Risks, Uses with Cloud Computing, and Improvements in Its Using with Cloud Using Suggested Proposed Model (DMig 1)
,
Journal of Information Security, Vol.12 No.1, 2021
Abou_el_ela Abdou Hussein
Citations:
21
(Details)
Cybersecurity: A Statistical Predictive Model for the Expected Path Length
,
Journal of Information Security, Vol.7 No.3, 2016
Pubudu Kalpani Kaluarachchi, Chris P. Tsokos, Sasith M. Rajasooriya
Citations:
21
(Details)
Determinants in Human Gait Recognition
,
Journal of Information Security, Vol.3 No.2, 2012
Tahir Amin, Dimitrios Hatzinakos
Citations:
20
(Details)
Enhancing Mobile Cloud Computing Security Using Steganography
,
Journal of Information Security, Vol.7 No.4, 2016
Hassan Reza, Madhuri Sonawane
Citations:
20
(Details)
A Secure Robust Gray Scale Image Steganography Using Image Segmentation
,
Journal of Information Security, Vol.7 No.3, 2016
Mohammed J. Bawaneh, Atef A. Obeidat
Citations:
19
(Details)
Effective and Extensive Virtual Private Network
,
Journal of Information Security, Vol.2 No.1, 2011
Tarek S. Sobh, Yasser Aly
Citations:
19
(Details)
Evolution of an Emerging Symmetric Quantum Cryptographic Algorithm
,
Journal of Information Security, Vol.6 No.2, 2015
Omer K. Jasim, Safia Abbas, El-Sayed M. Horbaty, Abdel-Badeeh M. Salem
Citations:
19
(Details)
Watermarking Images in the Frequency Domain by Exploiting Self-Inverting Permutations
,
Journal of Information Security, Vol.4 No.2, 2013
Maria Chroni, Angelos Fylakis, Stavros D. Nikolopoulos
Citations:
19
(Details)
A Socio-Technical Approach to Cyber Risk Management and Impact Assessment
,
Journal of Information Security, Vol.4 No.1, 2013
Konstantinia Charitoudi, Andrew Blyth
Citations:
18
(Details)
On the Significance of Cryptography as a Service
,
Journal of Information Security, Vol.9 No.4, 2018
Nick Rahimi, Jacob J. Reed, Bidyut Gupta
Citations:
18
(Details)
On the Use of
k
-NN in Anomaly Detection
,
Journal of Information Security, Vol.9 No.1, 2018
Theocharis Tsigkritis, George Groumas, Moti Schneider
Citations:
17
(Details)
Attribute-Based Secure Data Sharing with Efficient Revocation in Fog Computing
,
Journal of Information Security, Vol.8 No.3, 2017
Asma Alotaibi, Ahmed Barnawi, Mohammed Buhari
Citations:
17
(Details)
How Secure Having IoT Devices in Our Homes?
,
Journal of Information Security, Vol.11 No.2, 2020
Debora Estrada, Lo’ai Tawalbeh, Robert Vinaja
Citations:
17
(Details)
Apple’s Lion vs Microsoft’s Windows 7: Comparing Built-In Protection against ICMP Flood Attacks
,
Journal of Information Security, Vol.5 No.3, 2014
Rodolfo Baez Junior, Sanjeev Kumar
Citations:
17
(Details)
Conventional and Improved Digital Signature Scheme: A Comparative Study
,
Journal of Information Security, Vol.6 No.1, 2015
Alaa D. Alrehily, Asmaa F. Alotaibi, Suzan B. Almutairy, Mashael S. Alqhtani, Jayaprakash Kar
Citations:
17
(Details)
Enhanced Timestamp Discrepancy to Limit Impact of Replay Attacks in MANETs
,
Journal of Information Security, Vol.3 No.3, 2012
Aziz Baayer, Nourddine Enneya, Mohammed Elkoutbi
Citations:
17
(Details)
Effectiveness of Built-in Security Protection of Microsoft’s Windows Server 2003 against TCP SYN Based DDoS Attacks
,
Journal of Information Security, Vol.2 No.3, 2011
Hari Krishna Vellalacheruvu, Sanjeev Kumar
Citations:
16
(Details)
An Authentication Method for Digital Audio Using a Discrete Wavelet Transform
,
Journal of Information Security, Vol.2 No.2, 2011
Yasunari Yoshitomi, Taro Asada, Yohei Kinugawa, Masayoshi Tabuse
Citations:
16
(Details)
Privacy of Wearable Electronics in the Healthcare and Childcare Sectors: A Survey of Personal Perspectives from Finland and the United Kingdom
,
Journal of Information Security, Vol.5 No.2, 2014
Johanna Virkki, Rebecca Aggarwal
Citations:
16
(Details)
Parallelized Hashing via
j
-Lanes and
j
-Pointers Tree Modes, with Applications to SHA-256
,
Journal of Information Security, Vol.5 No.3, 2014
Shay Gueron
Citations:
16
(Details)
Comparative Evaluation of Elliptic Curve Cryptography Based Homomorphic Encryption Schemes for a Novel Secure Multiparty Computation
,
Journal of Information Security, Vol.5 No.1, 2014
Sankita J. Patel, Ankit Chouhan, Devesh C. Jinwala
Citations:
16
(Details)
Do ICMP Security Attacks Have Same Impact on Servers?
,
Journal of Information Security, Vol.8 No.3, 2017
Ganesh Reddy Gunnam, Sanjeev Kumar
Citations:
16
(Details)
Security and Privacy Challenges in Cyber-Physical Systems
,
Journal of Information Security, Vol.8 No.4, 2017
Fahd AlDosari
Citations:
15
(Details)
DDoS Attack Detection Using Heuristics Clustering Algorithm and Naïve Bayes Classification
,
Journal of Information Security, Vol.9 No.1, 2018
Sharmila Bista, Roshan Chitrakar
Citations:
15
(Details)
The Necessity of Information Security in the Vulnerable Pharmaceutical Industry
,
Journal of Information Security, Vol.5 No.4, 2014
Shawn Josette Roberts
Citations:
15
(Details)
Experimental Evaluation of Juniper Network's Netscreen-5GT Security Device against Layer4 Flood Attacks
,
Journal of Information Security, Vol.2 No.1, 2011
Sanjeev Kumar, Raja Sekhar Reddy Gade
Citations:
15
(Details)
State of the Art for String Analysis and Pattern Search Using CPU and GPU Based Programming
,
Journal of Information Security, Vol.3 No.4, 2012
Mario Góngora-Blandón, Miguel Vargas-Lombardo
Citations:
15
(Details)
Dynamic Identity Based Authentication Protocol for Two-Server Architecture
,
Journal of Information Security, Vol.3 No.4, 2012
Sandeep K. Sood
Citations:
15
(Details)
A Robust Method to Detect Hidden Data from Digital Images
,
Journal of Information Security, Vol.3 No.2, 2012
Romany F. Mansour, W. F. Awwad, A. A. Mohammed
Citations:
14
(Details)
Study of the Security Enhancements in Various E-Mail Systems
,
Journal of Information Security, Vol.6 No.1, 2015
Afnan S. Babrahem, Eman T. Alharbi, Aisha M. Alshiky, Saja S. Alqurashi, Jayaprakash Kar
Citations:
14
(Details)
Palm Vein Authentication Based on the Coset Decomposition Method
,
Journal of Information Security, Vol.6 No.3, 2015
Mohamed Sayed
Citations:
14
(Details)
Cybersecurity Investment Guidance: Extensions of the Gordon and Loeb Model
,
Journal of Information Security, Vol.7 No.2, 2016
Scott Farrow, Jules Szanton
Citations:
14
(Details)
A Cloud Computing Security Assessment Framework for Small and Medium Enterprises
,
Journal of Information Security, Vol.11 No.4, 2020
Satwinder Singh Rupra, Amos Omamo
Citations:
14
(Details)
A Complex Encryption System Design Implemented by AES
,
Journal of Information Security, Vol.12 No.2, 2021
Zhimao Lu, Houmed Mohamed
Citations:
14
(Details)
Security Operations Center: A Framework for Automated Triage, Containment and Escalation
,
Journal of Information Security, Vol.11 No.4, 2020
Paul Danquah
Citations:
13
(Details)
Multiresolution Video Watermarking Algorithm Exploiting the Block-Based Motion Estimation
,
Journal of Information Security, Vol.7 No.4, 2016
Salwa A. K. Mostafa, Abdelrahman Ali
Citations:
13
(Details)
Detecting Threats of Acoustic Information Leakage Through Fiber Optic Communications
,
Journal of Information Security, Vol.3 No.2, 2012
Vladimir V. Grishachev
Citations:
13
(Details)
Fast Forgery Detection with the Intrinsic Resampling Properties
,
Journal of Information Security, Vol.1 No.1, 2010
Cheng-Chang Lien, Cheng-Lun Shih, Chih-Hsun Chou
Citations:
13
(Details)
Proactive Security Mechanism and Design for Firewall
,
Journal of Information Security, Vol.2 No.3, 2011
Saleem-Ullah Lar, Xiaofeng Liao, Aqeel ur Rehman, MA Qinglu
Citations:
12
(Details)
Keyboard Dependency of Personal Identification Performance by Keystroke Dynamics in Free Text Typing
,
Journal of Information Security, Vol.6 No.3, 2015
Yoshitomo Matsubara, Toshiharu Samura, Haruhiko Nishimura
Citations:
12
(Details)
Hardware Realization of Artificial Neural Network Based Intrusion Detection & Prevention System
,
Journal of Information Security, Vol.5 No.4, 2014
Indraneel Mukhopadhyay, Mohuya Chakraborty
Citations:
12
(Details)
Blue Screen of Death Observed for Microsoft Windows Server 2012 R2 under DDoS Security Attack
,
Journal of Information Security, Vol.7 No.4, 2016
Koushicaa Sundar, Sanjeev Kumar
Citations:
12
(Details)
Using the Analytical Hierarchy Process Model in the Prioritization of Information Assurance Defense In-Depth Measures?—A Quantitative Study
,
Journal of Information Security, Vol.8 No.3, 2017
Rodney Alexander
Citations:
12
(Details)
The Concept of eGovernment: ICT Policy Guidelines for the Policy Makers of Ghana
,
Journal of Information Security, Vol.8 No.2, 2017
S. K. Mahama Ewurah
Citations:
12
(Details)
A Survey of Cloud Computing Detection Techniques against DDoS Attacks
,
Journal of Information Security, Vol.9 No.1, 2018
Sabah Alzahrani, Liang Hong
Citations:
12
(Details)
Ontology-Based Cyber Security Policy Implementation in Saudi Arabia
,
Journal of Information Security, Vol.9 No.4, 2018
Amir Mohamed Talib, Fahad Omar Alomary, Hanan Fouad Alwadi, Rawan Rashed Albusayli
Citations:
12
(Details)
The Overview of Database Security Threats’ Solutions: Traditional and Machine Learning
,
Journal of Information Security, Vol.12 No.1, 2021
Yong Wang, Jinsong Xi, Tong Cheng
Citations:
12
(Details)
Information Segmentation and Investing in Cybersecurity
,
Journal of Information Security, Vol.12 No.1, 2021
Lawrence A. Gordon, Martin P. Loeb, Lei Zhou
Citations:
11
(Details)
Cutting Edge Trends in Deception Based Intrusion Detection Systems—A Survey
,
Journal of Information Security, Vol.12 No.4, 2021
Onyekware U. Oluoha, Terungwa S. Yange, George E. Okereke, Francis S. Bakpo
Citations:
11
(Details)
Android Security and Its Rooting—A Possible Improvement of Its Security Architecture
,
Journal of Information Security, Vol.10 No.2, 2019
Nick Rahimi, John Nolen, Bidyut Gupta
Citations:
11
(Details)
A Dynamic Social Network Data Publishing Algorithm Based on Differential Privacy
,
Journal of Information Security, Vol.8 No.4, 2017
Zhenpeng Liu, Yawei Dong, Xuan Zhao, Bin Zhang
Citations:
11
(Details)
Analyzing Security Threats to Virtual Machines Monitor in Cloud Computing Environment
,
Journal of Information Security, Vol.8 No.1, 2017
Ahmad Fayez S. Althobaiti
Citations:
11
(Details)
Generation of Labelled Datasets to Quantify the Impact of Security Threats to Cloud Data Centers
,
Journal of Information Security, Vol.7 No.3, 2016
Sai Kiran Mukkavilli, Sachin Shetty, Liang Hong
Citations:
11
(Details)
RFID Applications: Prospects and Challenges in Bangladesh
,
Journal of Information Security, Vol.4 No.2, 2013
Abdul Kadar Muhammad Masum, Faruk Bhuiyan, Kazi Golam Azam
Citations:
11
(Details)
Ensuring Security, Confidentiality and Fine-Grained Data Access Control of Cloud Data Storage Implementation Environment
,
Journal of Information Security, Vol.6 No.2, 2015
Amir Mohamed Talib
Citations:
11
(Details)
Evaluation of Microsoft Windows Servers 2008 & 2003 against Cyber Attacks
,
Journal of Information Security, Vol.6 No.2, 2015
Sanjeev Kumar, Senior Member, Raja Sekhar Reddy Gade
Citations:
11
(Details)
SOAP-Based Security Interaction of Web Service inHeterogeneous Platforms
,
Journal of Information Security, Vol.2 No.1, 2011
Tao Xu, Chunxiao Yi
Citations:
11
(Details)
Eliminating Forgers Based on Intra Trial Variability in Online Signature Verification Using Handglove and Photometric Signals
,
Journal of Information Security, Vol.1 No.1, 2010
Andrews Samraj, Shohel Sayeed, Loo Chu Kiong, Nikos E. Mastorokis
Citations:
10
(Details)
Data Stream Subspace Clustering for Anomalous Network Packet Detection
,
Journal of Information Security, Vol.3 No.3, 2012
Zachary Miller, Wei Hu
Citations:
10
(Details)
A
j
-Lanes Tree Hashing Mode and
j
-Lanes SHA-256
,
Journal of Information Security, Vol.4 No.1, 2013
Shay Gueron
Citations:
10
(Details)
Quantifying Malware Evolution through Archaeology
,
Journal of Information Security, Vol.6 No.2, 2015
Jeremy D. Seideman, Bilal Khan, Cesar Vargas
Citations:
10
(Details)
Evaluating the Efficiency and Effectiveness of a Federated SSO Environment Using Shibboleth
,
Journal of Information Security, Vol.6 No.3, 2015
Parves Kamal, Saad Mustafiz, Faisal Md. Abdur Rahman, Raihan Taher
Citations:
10
(Details)
Web Search Query Privacy, an End-User Perspective
,
Journal of Information Security, Vol.8 No.1, 2017
Kato Mivule
Citations:
10
(Details)
Non-Homogeneous Stochastic Model for Cyber Security Predictions
,
Journal of Information Security, Vol.9 No.1, 2018
Pubudu Kalpani Kaluarachchi, Chris P. Tsokos, Sasith M. Rajasooriya
Citations:
10
(Details)
Public Key Infrastructure: An Enhanced Validation Framework
,
Journal of Information Security, Vol.11 No.4, 2020
Paul Danquah, Henoch Kwabena-Adade
Citations:
10
(Details)
Hadoop Distributed File System Security Challenges and Examination of Unauthorized Access Issue
,
Journal of Information Security, Vol.13 No.2, 2022
Wahid Rajeh
Citations:
10
(Details)
A Verifiable Credentials System with Privacy-Preserving Based on Blockchain
,
Journal of Information Security, Vol.13 No.2, 2022
Zhiji Li
Citations:
9
(Details)
Appraising the Manifestation of Optimism Bias and Its Impact on Human Perception of Cyber Security: A Meta Analysis
,
Journal of Information Security, Vol.14 No.2, 2023
Khaled M. Alnifie, Charles Kim
Citations:
9
(Details)
The Study of Secure Congestion Control for TCP in Ad Hoc Networks
,
Journal of Information Security, Vol.9 No.1, 2018
Weinan Zhang, Li Lin, Li Du
Citations:
9
(Details)
Associated Risks in Mobile Applications Permissions
,
Journal of Information Security, Vol.10 No.2, 2019
Mohammed Al Jutail, Mousa Al-Akhras, Abdulaziz Albesher
Citations:
9
(Details)
A Formal Model of Conformity and Security Testing of Inheritance for Object Oriented Constraint Programming
,
Journal of Information Security, Vol.4 No.2, 2013
Khalid Benlhachmi, Mohammed Benattou
Citations:
9
(Details)
Digital Image Watermarking Based on Mixed Error Correcting Code
,
Journal of Information Security, Vol.3 No.2, 2012
Yonghong Chen, Jiancong Chen
Citations:
9
(Details)
Micro-Architecture Support for Integrity Measurement on Dynamic Instruction Trace
,
Journal of Information Security, Vol.1 No.1, 2010
Hui Lin, Gyungho Lee
Citations:
9
(Details)
Vulnerabilities of LDAP As An Authentication Service
,
Journal of Information Security, Vol.2 No.4, 2011
Charlie Obimbo, Benjamin Ferriman
Citations:
9
(Details)
A Multi-Stage Network Anomaly Detection Method for Improving Efficiency and Accuracy
,
Journal of Information Security, Vol.3 No.1, 2012
Yuji Waizumi, Hiroshi Tsunoda, Masashi Tsuji, Yoshiaki Nemoto
Citations:
8
(Details)
A Distributed Secure Mechanism for Resource Protection in a Digital Ecosystem Environment
,
Journal of Information Security, Vol.3 No.1, 2012
Ilung Pranata, Geoff Skinner, Rukshan Athauda
Citations:
8
(Details)
A New Steganography Method Based on the Complex Pixels
,
Journal of Information Security, Vol.3 No.3, 2012
Amin Hashemi Pour, Ali Payandeh
Citations:
8
(Details)
Illegal Access Detection in the Cloud Computing Environment
,
Journal of Information Security, Vol.5 No.2, 2014
Rasim Alguliev, Fargana Abdullaeva
Citations:
8
(Details)
Security of Password Hashing in Cloud
,
Journal of Information Security, Vol.10 No.2, 2019
Parves Kamal
Citations:
8
(Details)
On the Use of Benford’s Law to Detect JPEG Biometric Data Tampering
,
Journal of Information Security, Vol.8 No.3, 2017
Iorliam Aamo, Shangbum F. Caleb
Citations:
8
(Details)
Data Compression for Next Generation Phasor Data Concentrators (PDCs) in a Smart Grid
,
Journal of Information Security, Vol.7 No.5, 2016
Erwan Olivo, Mitch Campion, Prakash Ranganathan
Citations:
8
(Details)
The Economics of Sharing Unclassified Cyber Threat Intelligence by Government Agencies and Departments
,
Journal of Information Security, Vol.13 No.3, 2022
Josiah Dykstra, Lawrence A. Gordon, Martin P. Loeb, Lei Zhou
Citations:
8
(Details)
Meta-Review of Recent and Landmark Honeypot Research and Surveys
,
Journal of Information Security, Vol.13 No.4, 2022
Gbenga Ikuomenisan, Yasser Morgan
Citations:
7
(Details)
The Role of Social Engineering in Cybersecurity and Its Impact
,
Journal of Information Security, Vol.13 No.4, 2022
Bandar S. Almutairi, Abdurahman Alghamdi
Citations:
7
(Details)
Majority Voting Ransomware Detection System
,
Journal of Information Security, Vol.14 No.4, 2023
Simon R. Davies, Richard Macfarlane, William J. Buchanan
Citations:
7
(Details)
The Guidelines to Adopt an Applicable SIEM Solution
,
Journal of Information Security, Vol.11 No.1, 2020
Hassan Mokalled, Rosario Catelli, Valentina Casola, Daniele Debertol, Ermete Meda, Rodolfo Zunino
Citations:
7
(Details)
Blockchain Implications in the Management of Patient Complaints in Healthcare
,
Journal of Information Security, Vol.12 No.3, 2021
Yazan M. Alkhateeb
Citations:
7
(Details)
Reducing Threats by Using Bayesian Networks to Prioritize and Combine Defense in Depth Security Measures
,
Journal of Information Security, Vol.11 No.3, 2020
Rodney Alexander
Citations:
7
(Details)
An Innovative Soft Design Science Methodology for Improving Development of a Secure Information System in Tanzania Using Multi-Layered Approach
,
Journal of Information Security, Vol.8 No.3, 2017
Maduhu Mshangi, Edephonce Ngemera Nfuka, Camilius Sanga
Citations:
7
(Details)
The Hazards of Misusing the Smart Contract: An AHP Approach to Its Risk
,
Journal of Information Security, Vol.10 No.1, 2019
Romulo Luciano
Citations:
7
(Details)
A Comparative Study and Performance Analysis of ATM Card Fraud Detection Techniques
,
Journal of Information Security, Vol.10 No.3, 2019
Md. Mijanur Rahman, Anuva Rani Saha
Citations:
7
(Details)
Design and Development of a Novel Symmetric Algorithm for Enhancing Data Security in Cloud Computing
,
Journal of Information Security, Vol.10 No.4, 2019
Mohammad Anwar Hossain, Ahsan Ullah, Newaz Ibrahim Khan, Md Feroz Alam
Citations:
7
(Details)
False Positive Responses Optimization for Intrusion Detection System
,
Journal of Information Security, Vol.5 No.2, 2014
Jalal Baayer, Boubker Regragui, Aziz Baayer
Citations:
7
(Details)
An Efficient Trusted Computing Base for MANET Security
,
Journal of Information Security, Vol.5 No.4, 2014
Somya D. Mohanty, Vinay Thotakura, Mahalingam Ramkumar
Citations:
7
(Details)
2D Conjugate Maps of DNA Sequences
,
Journal of Information Security, Vol.4 No.4, 2013
Qinxian Bu, Jeffrey Z. J. Zheng
Citations:
7
(Details)
Experimental Evaluation of Cisco ASA-5510 Intrusion Prevention System against Denial of Service Attacks
,
Journal of Information Security, Vol.3 No.2, 2012
Sanjeev Kumar, Raja Sekhar Reddy Gade
Citations:
7
(Details)
New Video Watermark Scheme Resistant to Super Strong Cropping Attacks
,
Journal of Information Security, Vol.3 No.2, 2012
Ming Tong, Tao Chen, Wei Zhang, Linna Dong
Citations:
7
(Details)
SPCS: Secure and Privacy-Preserving Charging-Station Searching using VANET
,
Journal of Information Security, Vol.3 No.1, 2012
Tat Wing Chim, Jeanno Chin Long Cheung, Siu Ming Yiu, Lucas Chi Kwong Hui, Victor On Kwok Li
Citations:
7
(Details)
Random but System-Wide Unique Unlinkable Parameters
,
Journal of Information Security, Vol.3 No.1, 2012
Peter Schartner
Citations:
6
(Details)
Two Approaches on Implementation of CBR and CRM Technologies to the Spam Filtering Problem
,
Journal of Information Security, Vol.3 No.1, 2012
Rasim Alguliyev, Saadat Nazirova
Citations:
6
(Details)
Sustainable Tourism Using Security Cameras with Privacy Protecting Ability
,
Journal of Information Security, Vol.1 No.2, 2010
V. Prashyanusorn, Y. Fujii, S. Kaviya, S. Mitatha, P. P. Yupapin
Citations:
6
(Details)
Peak-Shaped-Based Steganographic Technique for MP3 Audio
,
Journal of Information Security, Vol.4 No.1, 2013
Raffaele Pinardi, Fabio Garzia, Roberto Cusani
Citations:
6
(Details)
Frequency Hopping Spread Spectrum Security Improvement with Encrypted Spreading Codes in a Partial Band Noise Jamming Environment
,
Journal of Information Security, Vol.4 No.1, 2013
Amirhossein Ebrahimzadeh, Abolfazl Falahati
Citations:
6
(Details)
Awareness of the Potential Threat of Cyberterrorism to the National Security
,
Journal of Information Security, Vol.5 No.4, 2014
Abdulrahman Alqahtani
Citations:
6
(Details)
An Enhanced Dragonfly Key Exchange Protocol against Offline Dictionary Attack
,
Journal of Information Security, Vol.6 No.2, 2015
Eman Alharbi, Noha Alsulami, Omar Batarfi
Citations:
6
(Details)
Authenticated Key Agreement Protocols: A Comparative Study
,
Journal of Information Security, Vol.6 No.1, 2015
Areej Omar Baalghusun, Olfa Fahad Abusalem, Zahra Abbas Al Abbas, Jayaprakash Kar
Citations:
6
(Details)
Security Analysis of Subspace Network Coding
,
Journal of Information Security, Vol.9 No.1, 2018
Yantao Liu, Yasser Morgan
Citations:
6
(Details)
Handwritten Numeric and Alphabetic Character Recognition and Signature Verification Using Neural Network
,
Journal of Information Security, Vol.9 No.3, 2018
Md. Hasan Hasnain Nashif, Md. Badrul Alam Miah, Ahsan Habib, Autish Chandra Moulik, Md. Shariful Islam, Mohammad Zakareya, Arafat Ullah, Md. Atiqur Rahman, Md. Al Hasan
Citations:
6
(Details)
Camera and Voice Control Based Location Services and Information Security on Android
,
Journal of Information Security, Vol.7 No.3, 2016
Jitendra G. Chouhan, Nikhil Kumar Singh, Prashant S. Modi, Keyurbhai A. Jani, Bhavin N. Joshi
Citations:
6
(Details)
Authentication of Video Evidence for Forensic Investigation: A Case of Nigeria
,
Journal of Information Security, Vol.12 No.2, 2021
Beatrice O. Akumba, Aamo Iorliam, Selumun Agber, Emmanuel Odeh Okube, Kenneth Dekera Kwaghtyo
Citations:
6
(Details)
A Generalization of NTRUEncrypt —Cryptosystem Based on Ideal Lattice
,
Journal of Information Security, Vol.13 No.3, 2022
Zhiyong Zheng, Fengxia Liu, Wenlin Huang, Jie Xu, Kun Tian
Citations:
6
(Details)
Knowledge Management Strategy for Handling Cyber Attacks in E-Commerce with Computer Security Incident Response Team (CSIRT)
,
Journal of Information Security, Vol.13 No.4, 2022
Fauziyah Fauziyah, Zhaosun Wang, Gabriel Joy
Citations:
5
(Details)
Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises
,
Journal of Information Security, Vol.15 No.2, 2024
Meysam Tahmasebi
Citations:
5
(Details)
A Systematic Survey for Differential Privacy Techniques in Federated Learning
,
Journal of Information Security, Vol.14 No.2, 2023
Yi Zhang, Yunfan Lu, Fengxia Liu
Citations:
5
(Details)
Concepts of Safety Critical Systems Unification Approach & Security Assurance Process
,
Journal of Information Security, Vol.11 No.4, 2020
Faisal Nabi, Jianming Yong, Xiaohui Tao, Muhammad Saqib Malhi, Umar Mahmood, Usman Iqbal
Citations:
5
(Details)
Process of Security Assurance Technique for Application Functional Logic in E-Commerce Systems
,
Journal of Information Security, Vol.12 No.3, 2021
Faisal Nabi, Jianming Yong, Xiaohui Tao, Muhammad Saqib Malhi, Muhammad Farhan, Umar Mahmood
Citations:
5
(Details)
How Perceived Benefits and Barriers Affect Millennial Professionals’ Online Security Behaviors
,
Journal of Information Security, Vol.10 No.4, 2019
Fabrice Djatsa
Citations:
5
(Details)
Malware Detection for Forensic Memory Using Deep Recurrent Neural Networks
,
Journal of Information Security, Vol.11 No.2, 2020
Ioannis Karamitsos, Aishwarya Afzulpurkar, Theodore B. Trafalis
Citations:
5
(Details)
Cybersecurity: Integrating Information into the Microeconomics of the Consumer and the Firm
,
Journal of Information Security, Vol.7 No.5, 2016
Scott Farrow
Citations:
5
(Details)
Exploring the Effects of Gap-Penalties in Sequence-Alignment Approach to Polymorphic Virus Detection
,
Journal of Information Security, Vol.8 No.4, 2017
Vijay Naidu, Jacqueline Whalley, Ajit Narayanan
Citations:
5
(Details)
Implementation of Network Intrusion Detection System Using Soft Computing Algorithms (Self Organizing Feature Map and Genetic Algorithm)
,
Journal of Information Security, Vol.10 No.1, 2019
Joël T. Hounsou, Thierry Nsabimana, Jules Degila
Citations:
5
(Details)
Generating Rule-Based Signatures for Detecting Polymorphic Variants Using Data Mining and Sequence Alignment Approaches
,
Journal of Information Security, Vol.9 No.4, 2018
Vijay Naidu, Jacqueline Whalley, Ajit Narayanan
Citations:
5
(Details)
Information Security and the Theory of Unfaithful Information
,
Journal of Information Security, Vol.6 No.4, 2015
Aizhan Pernebekovna Pernebekova, Beisenkulov Ayazbi Ahbergenovich
Citations:
5
(Details)
Is Public Co-Ordination of Investment in Information Security Desirable?
,
Journal of Information Security, Vol.7 No.2, 2016
Christos Ioannidis, David Pym, Julian Williams
Citations:
5
(Details)
Feedback Reliability Ratio of an Intrusion Detection System
,
Journal of Information Security, Vol.3 No.3, 2012
Usha Banerjee, Gaurav Batra, K. V. Arya
Citations:
5
(Details)
Design and Implementation of Multilevel Access Control in Synchronized Audio to Audio Steganography Using Symmetric Polynomial Scheme
,
Journal of Information Security, Vol.1 No.1, 2010
Jeddy Nafeesa Begum, Krishnan Kumar, Vembu Sumathy
Citations:
5
(Details)
Audio Watermarking Using Wavelet Transform and Genetic Algorithm for Realizing High Tolerance to MP3 Compression
,
Journal of Information Security, Vol.2 No.3, 2011
Shinichi Murata, Yasunari Yoshitomi, Hiroaki Ishii
Citations:
5
(Details)
McAfee SecurityCenter Evaluation under DDoS Attack Traffic
,
Journal of Information Security, Vol.2 No.3, 2011
Sirisha Surisetty, Student Member, Sanjeev Kumar
Citations:
4
(Details)
Authentication Method Using a Discrete Wavelet Transform for a Digital Moving Image
,
Journal of Information Security, Vol.7 No.1, 2016
Ren Fujii, Yasunari Yoshitomi, Taro Asada, Masayoshi Tabuse
Citations:
4
(Details)
Method of Designing Generators of Pseudorandom Sequences for Information Protection Based on Shift Register with Non-Linear Feedback Function
,
Journal of Information Security, Vol.5 No.4, 2014
Saleh Al-Omar
Citations:
4
(Details)
All-Optical EXOR for Cryptographic Application Based on Spatial Solitons
,
Journal of Information Security, Vol.4 No.3, 2013
Mario Marco Corbelli, Fabio Garzia, Roberto Cusani
Citations:
4
(Details)
Quantitative Evaluation of Cyber-Attacks on a Hypothetical School Computer Network
,
Journal of Information Security, Vol.10 No.3, 2019
Akinjide A. Akinola, Adeyemi A. Adekoya, Ayoade O. Kuye, Abiodun Ayodeji
Citations:
4
(Details)
Threat Perceptions, Avoidance Motivation and Security Behaviors Correlations
,
Journal of Information Security, Vol.11 No.1, 2020
Fabrice Djatsa
Citations:
4
(Details)
Using Linear Regression Analysis and Defense in Depth to Protect Networks during the Global Corona Pandemic
,
Journal of Information Security, Vol.11 No.4, 2020
Rodney Alexander
Citations:
4
(Details)
Optimum Spending on Cybersecurity Measures: Part II
,
Journal of Information Security, Vol.12 No.1, 2021
Sherita Tara Kissoon
Citations:
4
(Details)
Cyber Security Crimes, Ethics and a Suggested Algorithm to Overcome Cyber-Physical Systems Problems (CybSec1)
,
Journal of Information Security, Vol.12 No.1, 2021
Abou_el_ela Abdou Hussien
Citations:
4
(Details)
Cyclic Lattices, Ideal Lattices and Bounds for the Smoothing Parameter
,
Journal of Information Security, Vol.13 No.4, 2022
Zhiyong Zheng, Fengxia Liu, Yunfan Lu, Kun Tian
Citations:
4
(Details)
Security Model for Cloud Computing: Case Report of Organizational Vulnerability
,
Journal of Information Security, Vol.14 No.4, 2023
Sakharkar Shreyas
Citations:
4
(Details)
Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies
,
Journal of Information Security, Vol.15 No.2, 2024
Sina Ahmadi
Citations:
4
(Details)
The Role of AI in Cyber Security: Safeguarding Digital Identity
,
Journal of Information Security, Vol.15 No.2, 2024
Mohammad Binhammad, Shaikha Alqaydi, Azzam Othman, Laila Hatim Abuljadayel
Citations:
3
(Details)
Systematic Review of Graphical Visual Methods in Honeypot Attack Data Analysis
,
Journal of Information Security, Vol.13 No.4, 2022
Gbenga Ikuomenisan, Yasser Morgan
Citations:
3
(Details)
Fuzzy VIKOR Approach to Evaluate the Information Security Policies and Analyze the Content of Press Agencies in Gulf Countries
,
Journal of Information Security, Vol.11 No.4, 2020
Amir Mohamed Talib
Citations:
3
(Details)
A Forensic Investigation of Terrorism in Nigeria: An Apriori Algorithm Approach
,
Journal of Information Security, Vol.12 No.4, 2021
Aamo Iorliam, Raymond U. Dugeri, Beatrice O. Akumba, Samera Otor
Citations:
3
(Details)
Towards Post-Quantum Cryptography Using Thermal Noise Theory and True Random Numbers Generation
,
Journal of Information Security, Vol.11 No.3, 2020
Protais Ndagijimana, Fulgence Nahayo, Marc Kokou Assogba, Adoté François-Xavier Ametepe, Juma Shabani
Citations:
3
(Details)
Remote Access Communications Security: Analysis of User Authentication Roles in Organizations
,
Journal of Information Security, Vol.11 No.3, 2020
Ezer Osei Yeboah-Boateng, Grace Dzifa Kwabena-Adade
Citations:
3
(Details)
Research on University’s Cyber Threat Intelligence Sharing Platform Based on New Types of STIX and TAXII Standards
,
Journal of Information Security, Vol.10 No.4, 2019
Gang Wang, Yuanzhi Huo, Zhao Ma Ma
Citations:
3
(Details)
Authenticated Privacy Preserving Pairing-Based Scheme for Remote Health Monitoring Systems
,
Journal of Information Security, Vol.8 No.1, 2017
Kambombo Mtonga, Eun Jun Yoon, Hyun Sung Kim
Citations:
3
(Details)
Program Counter Encoding for ARM
®
Architecture
,
Journal of Information Security, Vol.8 No.1, 2017
Seho Park, Yongsuk Lee, Gyungho Lee
Citations:
3
(Details)
Web Security and Log Management: An Application Centric Perspective
,
Journal of Information Security, Vol.4 No.3, 2013
Andrew Mwaura Kahonge, William Okello-Odongo, Evans K. Miriti, Elisha Abade
Citations:
3
(Details)
Security Enhanced Adaptive TCP for Wireless Ad Hoc Networks
,
Journal of Information Security, Vol.5 No.4, 2014
Waleed S. Alnumay
Citations:
3
(Details)
On the Matrix and Additive Communication Channels
,
Journal of Information Security, Vol.5 No.4, 2014
Vladimir Leontiev, Garib Movsisyan, Arthur Osipyan, Zhirayr Margaryan
Citations:
3
(Details)
Investigating Approaches of Data Integrity Preservation for Secure Data Aggregation in Wireless Sensor Networks
,
Journal of Information Security, Vol.5 No.1, 2014
Vivaksha Jariwala, Vishal Singh, Prafulla Kumar, Devesh C. Jinwala
Citations:
3
(Details)
Which Bit Is Better in Least Significant Bit?
,
Journal of Information Security, Vol.6 No.3, 2015
Fatin E. M. Al-Obaidi, Ali Jassim Mohamed Ali
Citations:
3
(Details)
Trusted Heartbeat Framework for Cloud Computing
,
Journal of Information Security, Vol.7 No.3, 2016
Dipen Contractor, Dhiren Patel, Shreya Patel
Citations:
3
(Details)
Utility-Based Anonymization Using Generalization Boundaries to Protect Sensitive Attributes
,
Journal of Information Security, Vol.6 No.3, 2015
Abou-el-ela Abdou Hussien, Nagy Ramadan Darwish, Hesham A. Hefny
Citations:
3
(Details)
Extending the Strand Space Method with Timestamps: Part II Application to Kerberos V
,
Journal of Information Security, Vol.1 No.2, 2010
Yongjian Li, Jun Pang
Citations:
3
(Details)
Secure Messaging Implementation in OpenSC
,
Journal of Information Security, Vol.3 No.4, 2012
Maurizio Talamo, Maulahikmah Galinium, Christian H. Schunck, Franco Arcieri
Citations:
3
(Details)
Identifier Migration for Identity Continuance in Single Sign-On
,
Journal of Information Security, Vol.3 No.4, 2012
Yoshio Kakizaki, Kazunari Maeda, Keiichi Iwamura
Citations:
3
(Details)
The Extended Tanh Method for Compactons and Solitons Solutions for the CH(
n
,2
n
– 1,2
n
,–
n
) Equations
,
Journal of Information Security, Vol.3 No.3, 2012
Xinqian Lin, Shengqiang Tang, Wentao Huang
Citations:
3
(Details)
Effect of Network Traffic on IPS Performance
,
Journal of Information Security, Vol.3 No.2, 2012
Shahriar Mohammadi, Vahid Allahvakil, Mojtaba Khaghani
Citations:
2
(Details)
Extending the Strand Space Method with Timestamps: Part I the Theory
,
Journal of Information Security, Vol.1 No.2, 2010
Yongjian Li, Jun Pang
Citations:
2
(Details)
Enhanced Contrast of Reconstructed Image for Image Secret Sharing Scheme Using Mathematical Morphology
,
Journal of Information Security, Vol.6 No.4, 2015
Yogesh K. Meghrajani, Himanshu S. Mazumdar
Citations:
2
(Details)
Profile Generation Methods for Reinforcing Robustness of Keystroke Authentication in Free Text Typing
,
Journal of Information Security, Vol.6 No.2, 2015
Yoshitomo Matsubara, Toshiharu Samura, Haruhiko Nishimura
Citations:
2
(Details)
Encrypted CDMA Audio Network
,
Journal of Information Security, Vol.5 No.3, 2014
Alfredo A. Ortega, Víctor A. Bettachini, Pablo I. Fierens, José Ignacio Alvarez-Hamelin
Citations:
2
(Details)
Diminution in Error Approximation by Identity Authentication with IPAS for FTLSP to Enhance Network Security
,
Journal of Information Security, Vol.4 No.4, 2013
Kuljeet Kaur, Geetha Ganesan
Citations:
2
(Details)
On the Security of Anonymous Authentication Protocol for Mobile Pay-TV
,
Journal of Information Security, Vol.4 No.4, 2013
Walid I. Khedr
Citations:
2
(Details)
Passwords Management via Split-Key
,
Journal of Information Security, Vol.7 No.3, 2016
Kenneth Giuliani, V. Kumar Murty, Guangwu Xu
Citations:
2
(Details)
On Addition of Sets in Boolean Space
,
Journal of Information Security, Vol.7 No.4, 2016
Vladimir Leontiev, Garib Movsisyan, Zhirayr Margaryan
Citations:
2
(Details)
Robust Digital Audio Watermarking Based on SVD and Modified Firefly Algorithm
,
Journal of Information Security, Vol.9 No.1, 2018
Sayed Afzal Mortaza Rizvi, Sanjay Pratap Singh Chauhan
Citations:
2
(Details)
Optimized Homomorphic Scheme on Map Reduce for Data Privacy Preserving
,
Journal of Information Security, Vol.8 No.3, 2017
Konan Martin, Wenyong Wang, Brighter Agyemang
Citations:
2
(Details)
Multi-Value Sequence Generated over Sub Extension Field and Its Properties
,
Journal of Information Security, Vol.10 No.3, 2019
Md. Arshad Ali, Yuta Kodera, Takuya Kusaka, Satoshi Uehara, Yasuyuki Nogami, Robert H. Morelos-Zaragoza
Citations:
2
(Details)
Empirical Evidence for a Descriptive Model of Principles of Information Security Course
,
Journal of Information Security, Vol.11 No.4, 2020
Adeyemi A. Adekoya, Aurelia M. Donald, Somasheker Akkaladevi, Akinjide A. Akinola
Citations:
2
(Details)
Using the Latin Square Design Model in the Prioritzation of Network Security Threats: A Quantitative Study
,
Journal of Information Security, Vol.11 No.2, 2020
Rodney Alexander
Citations:
2
(Details)
A Trusted and Privacy-Preserving Carpooling Matching Scheme in Vehicular Networks
,
Journal of Information Security, Vol.13 No.1, 2022
Hongliang Sun, Linfeng Wei, Libo Wang, Juli Yin, Wenxuan Ma
Citations:
2
(Details)
Hybrid Successive CFA Image Encryption-Watermarking Algorithm Based on the Quaternionic Wavelet Transform (QWT)
,
Journal of Information Security, Vol.13 No.4, 2022
Hervé Abena Ndongo, Marcelin Vournone, Mireille Pouyap, Taya Ngakawa, Paul Abena Malobe
Citations:
2
(Details)
Low-Density Parity-Check Codes: Research Status and Development Direction
,
Journal of Information Security, Vol.13 No.4, 2022
Jie Xu, Zhiyong Zheng, Kun Tian
Citations:
2
(Details)
On the LWE Cryptosystem with More General Disturbance
,
Journal of Information Security, Vol.13 No.3, 2022
Zhiyong Zheng, Kun Tian
Citations:
2
(Details)
Secure Web Application Technologies Implementation through Hardening Security Headers Using Automated Threat Modelling Techniques
,
Journal of Information Security, Vol.14 No.1, 2023
Maduhu Mshangi Mlyatu, Camilius Sanga
Citations:
2
(Details)
User Station Security Protection Method Based on Random Domain Name Detection and Active Defense
,
Journal of Information Security, Vol.14 No.1, 2023
Hongyan Yin, Xiaokang Ren, Jinyu Liu, Shuo Zhang, Wenkun Liu
Citations:
2
(Details)
Enhancing Mobile Security through Comprehensive Penetration Testing
,
Journal of Information Security, Vol.15 No.2, 2024
Maryam Roshanaei
Citations:
2
(Details)
Systematic Review: Analysis of Coding Vulnerabilities across Languages
,
Journal of Information Security, Vol.14 No.4, 2023
Shreyas Sakharkar
Citations:
2
(Details)
An Unbounded Fully Homomorphic Encryption Scheme Based on Ideal Lattices and Chinese Remainder Theorem
,
Journal of Information Security, Vol.14 No.4, 2023
Zhiyong Zheng, Fengxia Liu, Kun Tian
Citations:
2
(Details)
A New Cyber Risk: How Teens Expose Corporations in WFH Era
,
Journal of Information Security, Vol.14 No.4, 2023
Zahm Siyed
Citations:
2
(Details)
Security Analysis of a Privacy-Preserving Identity-Based Encryption Architecture
,
Journal of Information Security, Vol.13 No.4, 2022
Carlisle Adams
Citations:
2
(Details)
Cybersecurity: Identifying the Vulnerability Intensity Function (
VIF
) and Vulnerability Index Indicator (
VII
) of a Computer Operating System
,
Journal of Information Security, Vol.13 No.4, 2022
Ranju Karki, Chris P. Tsokos
Citations:
2
(Details)
Study the Effectiveness of ISO 27001 to Mitigate the Cyber Security Threats in the Egyptian Downstream Oil and Gas Industry
,
Journal of Information Security, Vol.14 No.2, 2023
Mohamed Shohoud
Citations:
2
(Details)
Towards Development of a Security Risk Assessment Model for Saudi Arabian Business Environment Based on the ISO/IEC 27005 ISRM Standard
,
Journal of Information Security, Vol.14 No.3, 2023
Wael G. Alheadary
Citations:
1
(Details)
Cybersecurity Requirements for Management Information Systems
,
Journal of Information Security, Vol.14 No.3, 2023
Nadia K. Samara
Citations:
1
(Details)
A New Image Watermarking Scheme Using Genetic Algorithm and Residual Numbers with Discrete Wavelet Transform
,
Journal of Information Security, Vol.14 No.4, 2023
Peter Awonnatemi Agbedemnab, Mohammed Akolgo, Moses Apambila Agebure
Citations:
1
(Details)
Classification of Big Data Security Based on Ontology Web Language
,
Journal of Information Security, Vol.14 No.1, 2023
Alsadig Mohammed Adam Abdallah, Amir Mohamed Talib
Citations:
1
(Details)
Algorithms and Tools for Securing and Protecting Academic Data in the Democratic Republic of the Congo
,
Journal of Information Security, Vol.13 No.4, 2022
Gulain Mugaruka Buduge, Jérémie Ndikumagenge, Justin Buhendwa Nyenyezi
Citations:
1
(Details)
Blockchain Based Redistricting with Public Participation
,
Journal of Information Security, Vol.13 No.3, 2022
Mahalingam Ramkumar, Naresh Adhikari
Citations:
1
(Details)
Study on the Instability of Information Systems and Security Risks in the Public Administration: Case of Burkina Faso Public Administration
,
Journal of Information Security, Vol.13 No.2, 2022
Yanogo Kiswendsida Jean Hermann
Citations:
1
(Details)
Hacked by Bits and Pieces: What Can We Learn from an Example of Corporate Espionage?
,
Journal of Information Security, Vol.12 No.3, 2021
Jack Schafer, Marvin Karlins
Citations:
1
(Details)
Real Time Vehicular Traffic Simulation for Black Hole Attack in the Greater Detroit Area
,
Journal of Information Security, Vol.11 No.1, 2020
Abdulaziz Alshammari, Mohamed A Zohdy, Debatosh Debnath, George Corser
Citations:
1
(Details)
Improved Smartphone Application for Remote Access by Network Administrators
,
Journal of Information Security, Vol.10 No.4, 2019
Ekwonwune Emmanuel Nwabueze, Etim Emmanuel Okon
Citations:
1
(Details)
Human Sensor Web Crowd Sourcing Security Incidents Management in Tanzania Context
,
Journal of Information Security, Vol.9 No.3, 2018
Maduhu Mshangi, Edephonce Ngemera Nfuka, Camilius Sanga
Citations:
1
(Details)
A Security Architecture for SCADA Systems
,
Journal of Information Security, Vol.9 No.1, 2018
Arun Velagapalli, Mahalingam Ramkumar
Citations:
1
(Details)
Discussion and Research on Information Security Attack and Defense Platform Construction in Universities Based on Cloud Computing and Virtualization
,
Journal of Information Security, Vol.7 No.5, 2016
Xiancheng Ding
Citations:
1
(Details)
Features of Virus Detection Mechanism in Microsoft Security Essentials (Microsoft Forefront Endpoint Protection)
,
Journal of Information Security, Vol.4 No.2, 2013
Dmitry Silnov
Citations:
1
(Details)
Detection of Sophisticated Network Enabled Threats via a Novel Micro-Proxy Architecture
,
Journal of Information Security, Vol.5 No.2, 2014
Andrew Blyth
Citations:
1
(Details)
Empirical Investigation of Threats to Loyalty Programs by Using Models Inspired by the Gordon-Loeb Formulation of Security Investment
,
Journal of Information Security, Vol.7 No.2, 2016
Shiori Shinoda, Kanta Matsuura
Citations:
1
(Details)
A Fair Electronic Cash System with Identity-Based Group Signature Scheme
,
Journal of Information Security, Vol.3 No.2, 2012
Khalid. O. Elaalim, Shoubao Yang
Citations:
1
(Details)
Reference Encryption for Access Right Segregation and Domain Representation
,
Journal of Information Security, Vol.3 No.2, 2012
Lanfranco Lopriore
Citations:
1
(Details)
MAMNID: A Load Balance Network Diagnosis Model Based on Mobile Agents
,
Journal of Information Security, Vol.3 No.4, 2012
Thomas Djotio Ndié, Claude Tangha, Guy Bertrand Fopak
Citations:
1
(Details)
Most cited
Most downloaded
E-Mail Alert
JIS Subscription
Publication Ethics & OA Statement
Frequently Asked Questions
Recommend to Peers
Recommend to Library
Contact us
Disclaimer
History Issue
Open Special Issues
Published Special Issues
Special Issues Guideline
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top