Scientific Research An Academic Publisher
OPEN ACCESS
Journal of Information Security
Threat Perceptions, Avoidance Motivation and Security Behaviors Correlations
Fabrice Djatsa
Abstract | References Full-Text HTML XML Pub. Date: December 10, 2019
DOI: 10.4236/jis.2020.111002 Downloads Views Citations
Comparing the Area of Data Mining Algorithms in Network Intrusion Detection
Yasamin Alagrash, Azhar Drebee, Nedda Zirjawi
DOI: 10.4236/jis.2020.111001 Downloads Views Citations
Can Routers Provide Sufficient Protection against Cyber Security Attacks?
David Leal, Sanjeev Kumar
Abstract | References Full-Text HTML XML Pub. Date: October 31, 2019
DOI: 10.4236/jis.2019.104017 Downloads Views Citations
How Perceived Benefits and Barriers Affect Millennial Professionals’ Online Security Behaviors
Abstract | References Full-Text HTML XML Pub. Date: October 30, 2019
DOI: 10.4236/jis.2019.104016 Downloads Views Citations
Research on University’s Cyber Threat Intelligence Sharing Platform Based on New Types of STIX and TAXII Standards
Gang Wang, Yuanzhi Huo, Zhao Ma Ma
Abstract | References Full-Text HTML XML Pub. Date: October 29, 2019
DOI: 10.4236/jis.2019.104015 Downloads Views Citations
Improved Smartphone Application for Remote Access by Network Administrators
Ekwonwune Emmanuel Nwabueze, Etim Emmanuel Okon
Abstract | References Full-Text HTML XML Pub. Date: October 25, 2019
DOI: 10.4236/jis.2019.104014 Downloads Views Citations
Systematizing IT Risks
Georg Disterer
Abstract | References Full-Text HTML XML Pub. Date: October 14, 2019
DOI: 10.4236/jis.2019.104013 Downloads Views Citations
Design and Development of a Novel Symmetric Algorithm for Enhancing Data Security in Cloud Computing
Mohammad Anwar Hossain, Ahsan Ullah, Newaz Ibrahim Khan, Md Feroz Alam
DOI: 10.4236/jis.2019.104012 Downloads Views Citations
A Comparative Study and Performance Analysis of ATM Card Fraud Detection Techniques
Md. Mijanur Rahman, Anuva Rani Saha
Abstract | References Full-Text HTML XML Pub. Date: July 31, 2019
DOI: 10.4236/jis.2019.103011 Downloads Views Citations
Unlink Attack Defense Method Based on New Chunk Structure
Yuanzhi Huo, Gang Wang, Fachang Yang
Abstract | References Full-Text HTML XML Pub. Date: July 19, 2019
DOI: 10.4236/jis.2019.103010 Downloads Views Citations
An Intelligent Model for Online Recruitment Fraud Detection
Bandar Alghamdi, Fahad Alharby
Abstract | References Full-Text HTML XML Pub. Date: July 11, 2019
DOI: 10.4236/jis.2019.103009 Downloads Views Citations
Multi-Value Sequence Generated over Sub Extension Field and Its Properties
Md. Arshad Ali, Yuta Kodera, Takuya Kusaka, Satoshi Uehara, Yasuyuki Nogami, Robert H. Morelos-Zaragoza
Abstract | References Full-Text HTML XML Pub. Date: July 2, 2019
DOI: 10.4236/jis.2019.103008 Downloads Views Citations
A Secure Image Steganography Using Advanced Encryption Standard and Discrete Cosine Transform
Ashraful Tauhid, Maisha Tasnim, Saima Arifin Noor, Nuruzzaman Faruqui, Mohammad Abu Yousuf
DOI: 10.4236/jis.2019.103007 Downloads Views Citations
Quantitative Evaluation of Cyber-Attacks on a Hypothetical School Computer Network
Akinjide A. Akinola, Adeyemi A. Adekoya, Ayoade O. Kuye, Abiodun Ayodeji
Abstract | References Full-Text HTML XML Pub. Date: June 17, 2019
DOI: 10.4236/jis.2019.103006 Downloads Views Citations
Android Security and Its Rooting—A Possible Improvement of Its Security Architecture
Nick Rahimi, John Nolen, Bidyut Gupta
Abstract | References Full-Text HTML XML Pub. Date: April 1, 2019
DOI: 10.4236/jis.2019.102005 Downloads Views Citations
Associated Risks in Mobile Applications Permissions
Mohammed Al Jutail, Mousa Al-Akhras, Abdulaziz Albesher
Abstract | References Full-Text HTML XML Pub. Date: March 26, 2019
DOI: 10.4236/jis.2019.102004 Downloads Views Citations
Security of Password Hashing in Cloud
Parves Kamal
Abstract | References Full-Text HTML XML Pub. Date: February 28, 2019
DOI: 10.4236/jis.2019.102003 Downloads Views Citations
The Hazards of Misusing the Smart Contract: An AHP Approach to Its Risk
Romulo Luciano
Abstract | References Full-Text HTML XML Pub. Date: January 23, 2019
DOI: 10.4236/jis.2019.101002 Downloads Views Citations
Implementation of Network Intrusion Detection System Using Soft Computing Algorithms (Self Organizing Feature Map and Genetic Algorithm)
Joël T. Hounsou, Thierry Nsabimana, Jules Degila
Abstract | References Full-Text HTML XML Pub. Date: December 4, 2018
DOI: 10.4236/jis.2019.101001 Downloads Views Citations
Ontology-Based Cyber Security Policy Implementation in Saudi Arabia
Amir Mohamed Talib, Fahad Omar Alomary, Hanan Fouad Alwadi, Rawan Rashed Albusayli
Abstract | References Full-Text HTML XML Pub. Date: October 26, 2018
DOI: 10.4236/jis.2018.94021 Downloads Views Citations
● Open Special Issues
● Published Special Issues
● Special Issues Guideline