Journal of Information Security

Journal of Information Security

ISSN Print: 2153-1234
ISSN Online: 2153-1242
www.scirp.org/journal/jis
E-mail: jis@scirp.org
"Network Defense Methodology: A Comparison of Defense in Depth and Defense in Breadth"
written by Lance Cleghorn,
published by Journal of Information Security, Vol.4 No.3, 2013
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Adversary-Augmented Simulation to evaluate client-fairness on HyperLedger Fabric
Piergiovanni… - arXiv preprint arXiv …, 2024
[2] Securesdp: a novel software-defined perimeter implementation for enhanced network security and scalability
International Journal of Information Security, 2024
[3] Understanding insiders in cloud adopted organizations: A survey on taxonomies, incident analysis, defensive solutions, challenges
Future Generation Computer Systems, 2024
[4] Communication Safety of Cybernetic Systems in a Smart Factory Environment
Machines, 2023
[5] Cyber defensive capacity and capability:: A perspective from the financial sector of a small state
2023
[6] Optimising a defence-aware threat modelling diagram incorporating a defence-in-depth approach for the internet-of-things
2023
[7] The Cybersecurity Risk Estimation Engine: A Tool for Possibility Based Risk Analysis
Computers & Security, 2022
[8] Egida: Automated security configuration deployment systems with early error detection
Computers & Security, 2022
[9] The AI Family: The Information Security Managers Best Frenemy?
HICSS, 2022
[10] A methodology for selecting hardware performance counters for supporting non-intrusive diagnostic of flood DDoS attacks on web servers
Computers & …, 2021
[11] Detecting cyber attacks in time: combining attack simulation with detection logic
2021
[12] Prediction, Detection, and Mitigation of DDoS Attacks Using HPCs: Design for a Safer Adaptive Infrastructure
2021
[13] Defense Mechanisms with Threat Intelligence Capabilities against Blended Threats
2021
[14] Evaluierung von Open-Source-Tools IDS, NAC und SIEM
2021
[15] Reducing Threats by Using Bayesian Networks to Prioritize and Combine Defense in Depth Security Measures
2020
[16] Repensando la estrategia de defensa en profundidad. Incorporando capacidades claves para aprender y anticipar los movimientos del adversario digital
2020
[17] EVALUATION OF E-GOVERNMENT INFORMATION SECURITY USING THE DEFENSE IN DEPTH MODEL
2020
[18] Using the Latin Square Design Model in the Prioritzation of Network Security Threats: A Quantitative Study ()
2020
[19] Automating the Assessment of Networking and Security in Higher Education
2020
[20] Impact and Key Challenges of Insider Threats on Organizations and Critical Businesses
2020
[21] Using Linear Regression Analysis and Defense in Depth to Protect Networks during the Global Corona Pandemic
2020
[22] EVALUASI KEAMANAN INFORMASI E-GOVERNMENT MENGGUNAKAN MODEL DEFENSE IN DEPTH
2020
[23] Using the Latin Square Design Model in the Prioritzation of Network Security Threats: A Quantitative Study
Journal of Information Security, 2020
[24] Cloud and in-house datacenters: determinants of security innovations at the colleges of education, Ghana
2019
[25] A Comprehensive Cybersecurity Defense Framework for Large Organizations
2019
[26] Ransomware life cycle and how to combat it
2019
[27] Automating the Assessment of Network Security in Higher Education
2019
[28] Méthodologie d'ingénierie des exigences de sécurité réseau
2019
[29] Exploring the Strategies Network Security Managers Need to Protect Their Networks from Backdoor Intrusions
2018
[30] Exploring Strategies for Digital Security
2017
[31] Architecting Cyber Defense: A Survey of the Leading Cyber Reference Architectures and Frameworks
2017
[32] A Review on Online-Banking Security Models, Successes, and Failures
2017
[33] Can the analytical hierarchy process model be effectively applied in the prioritization of information assurance defense in-depth measures?-a quantitative …
ProQuest Dissertations Publishing, 2017
[34] Can the analytical hierarchy process model be effectively applied in the prioritization of information assurance defense in-depth measures?-a quantitative …
2017
[35] Embracing security in all phases of the software development life cycle: A Delphi study
ProQuest Dissertations Publishing, 2016
[36] An Assessment Methodology and Models for Cyber Systems
ProQuest Dissertations Publishing, 2016
[37] Design of an Intrusion Detection System (IDS) and an Intrusion Prevention System (IPS) for the EIU Cybersecurity Laboratory
2016
[38] Layer Based Log Analysis for Enhancing Security of Enterprise Data Center: The Case of Ethiopian Education and Research Network
2015
[39] Network cybersecurity indicators: Determining cybersecurity indicators that accurately reflect the state of cybersecurity of a network
ProQuest Dissertations Publishing, 2015
[40] A Tale of Two Cities: Or How the Wrong Metaphors Lead to Less Security
2015
[41] Layer Based Log Analysis for Enhancing Security of Enterprise Data Center
Thesis, 2015
[42] Predictive modeling of complex cyberthreats with formal concept analysis
2015
[43] Layered Defense in Depth Model for IT Organizations
2014
[44] SCHOOL OF GRADUATE STUDIES COLLEGE OF NATURAL SCIENCE DEPARTMENT OF COMPUTER SCIENCE
Thesis, 2014
[45] School of Graduate Studies College of Natural Sciences Department of Computer Science
2014
[46] Visualizing Information Systems Risk Model Usage Among Professionals: An Analysis of Alternatives to ALE
2014
[47] 矿山灾难纵深防御体系构建及实例分析
中国安全科学学报, 2013
[48] Battlefield Optimization Algorithm
[49] Securing the Software-Defined Perimeter Framework with Automated Security Configuration Deployment Systems
[50] Identificación de" malware" perteneciente a ataques APT mediante la selección de características altamente discriminatorias usando técnicas de" Machine Learning"
Free SCIRP Newsletters
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top