Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Navigating AI Cybersecurity: Evolving Landscape and Challenges
(Articles)
Maryam Roshanaei
,
Mahir R. Khan
,
Natalie N. Sylvester
Journal of Intelligent Learning Systems and Applications
Vol.16 No.3
,June 19, 2024
DOI:
10.4236/jilsa.2024.163010
10
Downloads
53
Views
Citations
Defining Quantum Advantage for Building a Sustainable MVP to Deliver Quantum Computing Services
(Articles)
Fazal Raheman
Open Journal of Applied Sciences
Vol.14 No.6
,June 24, 2024
DOI:
10.4236/ojapps.2024.146102
3
Downloads
44
Views
Citations
Empirical Evidence for a Descriptive Model of Principles of Information Security Course
(Articles)
Adeyemi A. Adekoya
,
Aurelia M. Donald
,
Somasheker Akkaladevi
,
Akinjide A. Akinola
Journal of Information Security
Vol.11 No.4
,August 21, 2020
DOI:
10.4236/jis.2020.114012
528
Downloads
1,354
Views
Citations
Cyber Threats, Harsh Environment and the European High North (EHN) in a Human Security and Multi-Level Regulatory Global Dimension: Which Framework Applicable to Critical Infrastructures under “Exceptionally Critical Infrastructure Conditions” (ECIC)?
(Articles)
Sandra Cassotta
,
Roman Sidortsov
,
Christer Pursiainen
,
Michael Evan Goodsite
Beijing Law Review
Vol.10 No.2
,March 25, 2019
DOI:
10.4236/blr.2019.102020
974
Downloads
2,435
Views
Citations
This article belongs to the Special Issue on
Law, Policy and Globalization
Using the Latin Square Design Model in the Prioritzation of Network Security Threats: A Quantitative Study
(Articles)
Rodney Alexander
Journal of Information Security
Vol.11 No.2
,April 22, 2020
DOI:
10.4236/jis.2020.112006
719
Downloads
2,134
Views
Citations
Reducing Threats by Using Bayesian Networks to Prioritize and Combine Defense in Depth Security Measures
(Articles)
Rodney Alexander
Journal of Information Security
Vol.11 No.3
,June 8, 2020
DOI:
10.4236/jis.2020.113008
629
Downloads
1,924
Views
Citations
Using Linear Regression Analysis and Defense in Depth to Protect Networks during the Global Corona Pandemic
(Articles)
Rodney Alexander
Journal of Information Security
Vol.11 No.4
,October 21, 2020
DOI:
10.4236/jis.2020.114017
875
Downloads
5,211
Views
Citations
The Application of Epidemiology for Categorising DNS Cyber Risk Factors
(Articles)
Jessemyn Modini
,
Timothy Lynar
,
Elena Sitnikova
,
Keith Joiner
Journal of Computer and Communications
Vol.8 No.12
,December 3, 2020
DOI:
10.4236/jcc.2020.812002
588
Downloads
1,526
Views
Citations
Resilience at the Core: Critical Infrastructure Protection Challenges, Priorities and Cybersecurity Assessment Strategies
(Articles)
Maryam Roshanaei
Journal of Computer and Communications
Vol.9 No.8
,August 26, 2021
DOI:
10.4236/jcc.2021.98006
840
Downloads
4,117
Views
Citations
Cybersecurity Attacks on Academic Data and Personal Information and the Mediating Role of Education and Employment
(Articles)
Ahmad Reda Alzighaibi
Journal of Computer and Communications
Vol.9 No.11
,November 17, 2021
DOI:
10.4236/jcc.2021.911006
297
Downloads
2,022
Views
Citations
Cybersecurity: Identifying the Vulnerability Intensity Function (
VIF
) and Vulnerability Index Indicator (
VII
) of a Computer Operating System
(Articles)
Ranju Karki
,
Chris P. Tsokos
Journal of Information Security
Vol.13 No.4
,October 28, 2022
DOI:
10.4236/jis.2022.134019
156
Downloads
800
Views
Citations
This article belongs to the Special Issue on
Cryptography and Network Security
Domestic Cyberterrorism & Strategic Communications: Literature Review
(Articles)
Robb Shawe
,
Ian R. McAndrew
Journal of Information Security
Vol.14 No.4
,October 27, 2023
DOI:
10.4236/jis.2023.144027
170
Downloads
1,050
Views
Citations
Cybersecurity and Privacy Protection in Vehicular Networks (VANETs)
(Articles)
Bruno Macena
,
Celio Albuquerque
,
Raphael Machado
Advances in Internet of Things
Vol.13 No.4
,October 30, 2023
DOI:
10.4236/ait.2023.134006
166
Downloads
874
Views
Citations
GUARDIAN: A Multi-Tiered Defense Architecture for Thwarting Prompt Injection Attacks on LLMs
(Articles)
Parijat Rai
,
Saumil Sood
,
Vijay K. Madisetti
,
Arshdeep Bahga
Journal of Software Engineering and Applications
Vol.17 No.1
,January 23, 2024
DOI:
10.4236/jsea.2024.171003
282
Downloads
1,220
Views
Citations
The Evolution of Integrated Advance Persistent Threat and Its Defense Solutions: A Literature Review
(Articles)
Jun Zhang
,
Dan Tenney
Open Journal of Business and Management
Vol.12 No.1
,January 26, 2024
DOI:
10.4236/ojbm.2024.121021
146
Downloads
559
Views
Citations
ERAD: Enhanced Ransomware Attack Defense System for Healthcare Organizations
(Articles)
Xinyue Li
,
Vijay K. Madisetti
Journal of Software Engineering and Applications
Vol.17 No.5
,May 28, 2024
DOI:
10.4236/jsea.2024.175016
32
Downloads
153
Views
Citations
Task-Specific Feature Selection and Detection Algorithms for IoT-Based Networks
(Articles)
Yang Gyun Kim
,
Benito Mendoza
,
Ohbong Kwon
,
John Yoon
Journal of Computer and Communications
Vol.10 No.10
,October 27, 2022
DOI:
10.4236/jcc.2022.1010005
139
Downloads
696
Views
Citations
User Profile & Attitude Analysis Based on Unstructured Social Media and Online Activity
(Articles)
Yuting Tan
,
Vijay K. Madisetti
Journal of Software Engineering and Applications
Vol.17 No.6
,June 7, 2024
DOI:
10.4236/jsea.2024.176025
19
Downloads
66
Views
Citations
Accelerating Quantum Computing Readiness: Risk Management and Strategies for Sectors
(Articles)
Abdullah Ibrahim Salman Alsalman
Journal of Quantum Information Science
Vol.13 No.2
,June 13, 2023
DOI:
10.4236/jqis.2023.132003
498
Downloads
1,538
Views
Citations
Enable Excel-Based Basic Cybersecurity Features for End Users by Using Python-Excel Integration
(Articles)
Mohamed Breik
,
Osama Magdy
,
Essam Amin
,
Tarek Aly
,
Mervat Gheith
Journal of Software Engineering and Applications
Vol.17 No.6
,June 24, 2024
DOI:
10.4236/jsea.2024.176029
9
Downloads
71
Views
Citations
<
...
2
3
4
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top