Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journals
Articles
Journals Menu
Aims & Scope
Articles
Archive
Editorial Board
Publication Fees
Indexing
Guidelines & Policies
Author Guidelines
Reviewer Guidelines
Editorial Policies
Publication Ethics
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462
(WhatsApp)
1655362766
SCIRP WeChat
Journal of Information Security
Submission
Journal of Information Security
ISSN Print:
2153-1234
ISSN Online:
2153-1242
www.scirp.org/journal/jis
E-mail:
jis@scirp.org
Google-based Impact Factor:
3.25
Citations
Journals Menu
Aims & Scope
Articles
Archive
Editorial Board
Publication Fees
Indexing
Guidelines & Policies
Author Guidelines
Reviewer Guidelines
Editorial Policies
Publication Ethics
Robustness, Cost, and Attack-Surface Concentration in Phishing Detection
()
Julian Allagan
,
Mohamed Elbakary
,
Zohreh Safari
,
Weizheng Gao
,
Gabrielle Morgan
,
Essence Morgan
,
Vladimir Deriglazov
Journal of Information Security
Vol.17 No.2
, April 27, 2026
DOI:
10.4236/jis.2026.172009
5
Downloads
44
Views
Citations
This article belongs to the Special Issue on
Cyber Deception and Theft: A Critical Review
()
Paul Danquah
,
Stephen Bekoe
Journal of Information Security
Vol.17 No.2
, April 20, 2026
DOI:
10.4236/jis.2026.172008
10
Downloads
114
Views
Citations
This article belongs to the Special Issue on
Operational Cyberpsychology: Cognitive Targeting and Precision Influence in Contested Digital Environments
()
Troy C. Troublefield
Journal of Information Security
Vol.17 No.2
, March 30, 2026
DOI:
10.4236/jis.2026.172006
49
Downloads
322
Views
Citations
This article belongs to the Special Issue on
Ethical Frameworks and Governance of Operational Cyberpsychology: Principles, Challenges, and Institutional Mechanisms
()
Troy C. Troublefield
Journal of Information Security
Vol.17 No.2
, March 30, 2026
DOI:
10.4236/jis.2026.172007
41
Downloads
235
Views
Citations
This article belongs to the Special Issue on
AI-Driven Adaptive Lightweight Cryptography for IoT Healthcare Systems: A Contextual Security Framework for Resource-Constrained Environments
()
Georgette Jocelyne Elad
,
Ghislain Mengata Mengounou
,
Leandre Nneme Nneme
,
Valdez Wilsons Fotso Tekam
Journal of Information Security
Vol.17 No.2
, March 18, 2026
DOI:
10.4236/jis.2026.172005
45
Downloads
267
Views
Citations
This article belongs to the Special Issue on
Transition Matrix Study for the Max-Mean Dispersion Problem in Mobile Payment Systems
()
Dieudonné Nijimbere
,
Vincent Mbonigaba
Journal of Information Security
Vol.17 No.2
, March 2, 2026
DOI:
10.4236/jis.2026.172004
51
Downloads
257
Views
Citations
This article belongs to the Special Issue on
Secure Data Lake Architecture Leveraging Jamii X-Change for Resilient Educational Assessment in Tanzania
()
Maduhu Mshangi Mlyatu
,
Margreth Venaely
,
Japhet Guyai
Journal of Information Security
Vol.17 No.2
, February 6, 2026
DOI:
10.4236/jis.2026.172003
54
Downloads
254
Views
Citations
This article belongs to the Special Issue on
<
1
2
3
...
>
Page
Special Issues
Open Special Issues
Published Special Issues
Special Issues Guideline
Most Cited
Most Downloaded
Newsletter
Order Print Copy
Contact Us
FAQ
Disclaimer
History Issue
Special Issues
Open Special Issues
Published Special Issues
Special Issues Guideline
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
SCIRP Newsletter
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
News
About SCIRP
Ethics
Editorial Policies
For Authors
Peer-Review Issues
Publication Fees
Special Issues
Service
Manuscript Tracking System
Order Print Copies
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2026 Scientific Research Publishing Inc. All Rights Reserved.
Top