Scientific Research An Academic Publisher
OPEN ACCESS
Journal of Information Security
Optimum Spending on Cybersecurity Measures: Part II ()
Sherita Tara Kissoon
Journal of Information Security Vol.12 No.1, January 21, 2021
DOI: 10.4236/jis.2021.121007 Downloads Views Citations This article belongs to the Special Issue on
Information Segmentation and Investing in Cybersecurity ()
Lawrence A. Gordon, Martin P. Loeb, Lei Zhou
Journal of Information Security Vol.12 No.1, January 19, 2021
DOI: 10.4236/jis.2021.121006 Downloads Views Citations This article belongs to the Special Issue on
Systematic Review on Social Engineering: Hacking by Manipulating Humans ()
Chandra Sekhar Bhusal
DOI: 10.4236/jis.2021.121005 Downloads Views Citations This article belongs to the Special Issue on
Data Migration Need, Strategy, Challenges, Methodology, Categories, Risks, Uses with Cloud Computing, and Improvements in Its Using with Cloud Using Suggested Proposed Model (DMig 1) ()
Abou_el_ela Abdou Hussein
DOI: 10.4236/jis.2021.121004 Downloads Views Citations This article belongs to the Special Issue on
Cyber Security Crimes, Ethics and a Suggested Algorithm to Overcome Cyber-Physical Systems Problems (CybSec1) ()
Abou_el_ela Abdou Hussien
Journal of Information Security Vol.12 No.1, January 15, 2021
DOI: 10.4236/jis.2021.121003 Downloads Views Citations This article belongs to the Special Issue on
The Overview of Database Security Threats’ Solutions: Traditional and Machine Learning ()
Yong Wang, Jinsong Xi, Tong Cheng
Journal of Information Security Vol.12 No.1, January 11, 2021
DOI: 10.4236/jis.2021.121002 Downloads Views Citations This article belongs to the Special Issue on
Information Theoretic Distinguishers for Timing Attacks with Partial Profiles: Solving the Empty Bin Issue ()
Eloi De Chérisey, Sylvain Guilley, Olivier Rioul, Darshana Jayasinghe
Journal of Information Security Vol.12 No.1, December 10, 2020
DOI: 10.4236/jis.2021.121001 Downloads Views Citations This article belongs to the Special Issue on
Fifty-Six Big Data V’s Characteristics and Proposed Strategies to Overcome Security and Privacy Challenges (BD2) ()
Journal of Information Security Vol.11 No.4, October 30, 2020
DOI: 10.4236/jis.2020.114019 Downloads Views Citations This article belongs to the Special Issue on
Concepts of Safety Critical Systems Unification Approach & Security Assurance Process ()
Faisal Nabi, Jianming Yong, Xiaohui Tao, Muhammad Saqib Malhi, Umar Mahmood, Usman Iqbal
Journal of Information Security Vol.11 No.4, October 27, 2020
DOI: 10.4236/jis.2020.114018 Downloads Views Citations This article belongs to the Special Issue on
Using Linear Regression Analysis and Defense in Depth to Protect Networks during the Global Corona Pandemic ()
Rodney Alexander
Journal of Information Security Vol.11 No.4, October 21, 2020
DOI: 10.4236/jis.2020.114017 Downloads Views Citations This article belongs to the Special Issue on
Public Key Infrastructure: An Enhanced Validation Framework ()
Paul Danquah, Henoch Kwabena-Adade
Journal of Information Security Vol.11 No.4, September 25, 2020
DOI: 10.4236/jis.2020.114016 Downloads Views Citations This article belongs to the Special Issue on
Security Operations Center: A Framework for Automated Triage, Containment and Escalation ()
Paul Danquah
DOI: 10.4236/jis.2020.114015 Downloads Views Citations This article belongs to the Special Issue on
A Cloud Computing Security Assessment Framework for Small and Medium Enterprises ()
Satwinder Singh Rupra, Amos Omamo
Journal of Information Security Vol.11 No.4, September 23, 2020
DOI: 10.4236/jis.2020.114014 Downloads Views Citations This article belongs to the Special Issue on
Fuzzy VIKOR Approach to Evaluate the Information Security Policies and Analyze the Content of Press Agencies in Gulf Countries ()
Amir Mohamed Talib
DOI: 10.4236/jis.2020.114013 Downloads Views Citations This article belongs to the Special Issue on
Empirical Evidence for a Descriptive Model of Principles of Information Security Course ()
Adeyemi A. Adekoya, Aurelia M. Donald, Somasheker Akkaladevi, Akinjide A. Akinola
Journal of Information Security Vol.11 No.4, August 21, 2020
DOI: 10.4236/jis.2020.114012 Downloads Views Citations This article belongs to the Special Issue on
Remote Access Communications Security: Analysis of User Authentication Roles in Organizations ()
Ezer Osei Yeboah-Boateng, Grace Dzifa Kwabena-Adade
Journal of Information Security Vol.11 No.3, July 17, 2020
DOI: 10.4236/jis.2020.113011 Downloads Views Citations This article belongs to the Special Issue on
Towards Post-Quantum Cryptography Using Thermal Noise Theory and True Random Numbers Generation ()
Protais Ndagijimana, Fulgence Nahayo, Marc Kokou Assogba, Adoté François-Xavier Ametepe, Juma Shabani
Journal of Information Security Vol.11 No.3, July 15, 2020
DOI: 10.4236/jis.2020.113010 Downloads Views Citations This article belongs to the Special Issue on
Comparative Study of Different Cryptographic Algorithms ()
Baha Eldin Hamouda Hassan Hamouda
Journal of Information Security Vol.11 No.3, June 8, 2020
DOI: 10.4236/jis.2020.113009 Downloads Views Citations This article belongs to the Special Issue on
Reducing Threats by Using Bayesian Networks to Prioritize and Combine Defense in Depth Security Measures ()
DOI: 10.4236/jis.2020.113008 Downloads Views Citations This article belongs to the Special Issue on
Malware Detection for Forensic Memory Using Deep Recurrent Neural Networks ()
Ioannis Karamitsos, Aishwarya Afzulpurkar, Theodore B. Trafalis
Journal of Information Security Vol.11 No.2, April 26, 2020
DOI: 10.4236/jis.2020.112007 Downloads Views Citations This article belongs to the Special Issue on
● Open Special Issues
● Published Special Issues
● Special Issues Guideline