Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
On Threat Models for Information-Stealing Malware (ISM) Targeting Password Managers
(Articles)
Vedika Sunil Bang
,
Vijay Madisetti
Journal of Information Security
Vol.16 No.2
,April 17, 2025
DOI:
10.4236/jis.2025.162015
52
Downloads
440
Views
Citations
A Comparison of Malware Detection Techniques Based on Hidden Markov Model
(Articles)
Saja Alqurashi
,
Omar Batarfi
Journal of Information Security
Vol.7 No.3
,April 22, 2016
DOI:
10.4236/jis.2016.73017
4,847
Downloads
8,158
Views
Citations
An Overview of Mobile Malware and Solutions
(Review)
Fan Wu
,
Hira Narang
,
Dwayne Clarke
Journal of Computer and Communications
Vol.2 No.12
,October 22, 2014
DOI:
10.4236/jcc.2014.212002
5,483
Downloads
8,311
Views
Citations
Malware Images Classification Using Convolutional Neural Network
(Articles)
Espoir K. Kabanga
,
Chang Hoon Kim
Journal of Computer and Communications
Vol.6 No.1
,December 29, 2017
DOI:
10.4236/jcc.2018.61016
2,355
Downloads
9,103
Views
Citations
A Theoretical Note on Tax Evasion: The Case of the American FairTax Plan
(Articles)
James R. Barth
,
Richard J. Cebula
,
Yinan Ni
Theoretical Economics Letters
Vol.12 No.2
,March 31, 2022
DOI:
10.4236/tel.2022.122020
237
Downloads
1,089
Views
Citations
Detection and Prevention of Malware in Android Mobile Devices: A Literature Review
(Articles)
Joseph Keteku
,
George Owusu Dameh
,
Samuel Ameka Mante
,
Thomas Kwashie Mensah
,
Schneider Laryea Amartey
,
John-Bosco Diekuu
International Journal of Intelligence Science
Vol.14 No.4
,October 30, 2024
DOI:
10.4236/ijis.2024.144005
143
Downloads
1,280
Views
Citations
Analysis of Malware Families on Android Mobiles: Detection Characteristics Recognizable by Ordinary Phone Users and How to Fix It
(Articles)
Hieu Le Thanh
Journal of Information Security
Vol.4 No.4
,September 11, 2013
DOI:
10.4236/jis.2013.44024
9,013
Downloads
15,868
Views
Citations
Quantifying Malware Evolution through Archaeology
(Articles)
Jeremy D. Seideman
,
Bilal Khan
,
Cesar Vargas
Journal of Information Security
Vol.6 No.2
,March 31, 2015
DOI:
10.4236/jis.2015.62011
6,224
Downloads
7,499
Views
Citations
The Connotation, Attribution and Evasion of Employees’ Misconduct
(Articles)
Kefeng Li
Creative Education
Vol.8 No.15
,December 26, 2017
DOI:
10.4236/ce.2017.815172
831
Downloads
1,482
Views
Citations
Improving the Cybersecurity Framework for Future Consumer Networks
(Articles)
Tyler Welker
,
Olatunde Abiona
Int'l J. of Communications, Network and System Sciences
Vol.14 No.4
,April 30, 2021
DOI:
10.4236/ijcns.2021.144004
1,072
Downloads
2,533
Views
Citations
An Analytical Model Modifications and Adaptations for Malware Spread and Containment in Communication Networks
(Articles)
Moses Okechukwu Onyesolu
,
Charles Okechukwu Ugwunna
Open Access Library Journal
Vol.10 No.7
,July 31, 2023
DOI:
10.4236/oalib.1110174
61
Downloads
425
Views
Citations
Do Higher Tax Rates Encourage/Discourage Tax Compliance?
(Articles)
María Jesús Freire-Serén
,
Judith Panadés
Modern Economy
Vol.4 No.12
,December 13, 2013
DOI:
10.4236/me.2013.412086
7,922
Downloads
12,823
Views
Citations
Determinants of Tax Evasion: Empirical Evidence from Ghana
(Articles)
Bismark Ameyaw
,
Dominic Dzaka
Modern Economy
Vol.7 No.14
,December 14, 2016
DOI:
10.4236/me.2016.714145
4,931
Downloads
17,474
Views
Citations
Tax Compliance, Income Distribution and Social Norms
(Articles)
Debora Di Gioacchino
,
Fabrizio Patriarca
Theoretical Economics Letters
Vol.7 No.3
,April 24, 2017
DOI:
10.4236/tel.2017.73044
1,973
Downloads
3,770
Views
Citations
This article belongs to the Special Issue on
Inequalities and Labor Market Institutions
Tax Ethics and Tax Evasion, Evidence from Greece
(Articles)
George Drogalas
,
Evgenia Anagnostopoulou
,
Michail Pazarskis
,
Dimitrios Petkopoulos
Theoretical Economics Letters
Vol.8 No.5
,April 16, 2018
DOI:
10.4236/tel.2018.85070
4,151
Downloads
11,916
Views
Citations
Are Tax Treaties for the Benefits of Taxpayers or Maximisation of State Revenue? A Review of VAT Treaty between Lesotho and South Africa
(Articles)
Malefetsane Nketekete
Open Journal of Business and Management
Vol.9 No.3
,May 31, 2021
DOI:
10.4236/ojbm.2021.93078
414
Downloads
1,533
Views
Citations
A Pragmatic Approach to Evasions at the Press Conferences of the Chinese Ministry of Foreign Affairs
(Articles)
Feifei Zhang
Open Access Library Journal
Vol.8 No.9
,September 26, 2021
DOI:
10.4236/oalib.1107892
200
Downloads
1,215
Views
Citations
Economic Crime: Tax Evasion in a Developing Country
(Articles)
Marina Lamaj
Open Journal of Business and Management
Vol.11 No.3
,May 8, 2023
DOI:
10.4236/ojbm.2023.113047
314
Downloads
2,048
Views
Citations
Phishing Techniques in Mobile Devices
(Articles)
Belal Amro
Journal of Computer and Communications
Vol.6 No.2
,February 13, 2018
DOI:
10.4236/jcc.2018.62003
2,125
Downloads
6,222
Views
Citations
Majority Voting Ransomware Detection System
(Articles)
Simon R. Davies
,
Richard Macfarlane
,
William J. Buchanan
Journal of Information Security
Vol.14 No.4
,August 16, 2023
DOI:
10.4236/jis.2023.144016
212
Downloads
1,140
Views
Citations
This article belongs to the Special Issue on
Cybersecurity and Information Security
<
1
2
3
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top