Journal of Information Security

Journal of Information Security

ISSN Print: 2153-1234
ISSN Online: 2153-1242
www.scirp.org/journal/jis
E-mail: jis@scirp.org
"Information Availability: An Insight into the Most Important Attribute of Information Security"
written by Suhail Qadir, S. M. K. Quadri,
published by Journal of Information Security, Vol.7 No.3, 2016
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Design of a hardware Root-of-Trust on embedded systems
2024
[2] Designing a standard-based approach for security of healthcare systems
J. Stat. Appl. Pro, 2024
[3] Comprehensive study of cybersecurity issues and challenges
De Gruyter Series on the …, 2024
[4] Efektivitas Sistem Pelayanan Administrasi Kependudukan Langsung Jadi Secara Elektronik (E-PAK LADI) Di Desa Cangkringmalang Kecamatan Beji Kabupaten …
Publika, 2024
[5] An Analysis of Cybersecurity Architectures
International Conference on Cyber …, 2024
[6] A Comparative Review of Five Leading Document Management Systems Based on Information Security
2024
[7] A secure Model for Student Results Verification Using Salted Hash Functions
2023
[8] Improved technique for order of preference by similarity to ideal solution method for identifying key terrain in cyberspace asset layer
Plos one, 2023
[9] Electronic records management and information culture in Botswana's parastatals.
2023
[10] Cloud computing services and security challenges: A review
Lahore Garrison Univ. Res. J. Comput …, 2023
[11] Cyber insurance: case: a qualitative study of Finnish cyber insurance products offering for SMEs
2023
[12] Political affiliation, collective agency and structural opportunities for lumley market women in Sierra Leone
2023
[13] Definitive Guide to Software Security Metrics
System Reliability and Security, 2023
[14] Pentingnya Peranan CIA Triad Dalam Keamanan Informasi dan Data Untuk Pemangku Kepentingan atau Stakholder
Jurnal Manajemen …, 2023
[15] Human Factors in Cybersecurity: A Cross-Cultural Study on Trust
2023
[16] Ensuring Secure and Efficient Multi-Cloud Storage with Brotli Compression and Hierarchical Data Protection
2023
[17] Characteristics of Cryptoasset-Related Crimes and Convergence-Based Law Enforcement Policies
Jurnal Dinamika Hukum, 2023
[18] AML and Cybersecurity in Banking Industry: Challenges
Anti-Money Laundering, Counter Financing Terrorism …, 2023
[19] Managing Secondary Education for Sustainable Development in Anambra State through Adequate Resources Mobilisation: Challenges and Strategies for …
Journal of Education in Developing …, 2023
[20] The Impact of Information Security Processes on Providing Secure Digital Systems
Qirimli - Journal Port Science Research, 2023
[21] The Cybersecurity, Cyber Threats, Cyberterrorism, and Cybersecurity Framework for Critical Information Infrastructure for the Ministry of Defence of Thailand
National Defence Studies …, 2023
[22] The Risks Associated With ITIL Information Security Management in Micro Companies
Fraud Prevention, Confidentiality …, 2023
[23] Product Security: An Overview of Concepts and Challenges
2023 IEEE 21st Jubilee …, 2023
[24] INFLUENCE OF INFORMATION LITERACY, TRAINING AND ICT COMPETENCE ON JOB PERFORMANCE OF ARTISANS IN NORTH CENTRAL NIGERIA
2023
[25] IMPACT OF INFORMATION COMMUNICATION TECHNOLOGY ON THE MARKETING OF AUTOMOBILE PRODUCTS IN FCT ABUJA
2023
[26] Cross-Layer Security in Cyber-Physical Systems (CPSs)
2023
[27] The survey and meta-analysis of the attacks, transgressions, countermeasures and security aspects common to the Cloud, Edge and IoT
Neurocomputing, 2023
[28] Prospects of cybersecurity in smart cities
Future Internet, 2023
[29] Security of cryptocurrencies: A view on the state-of-the-art research and current developments
Sensors, 2023
[30] A Methodology for Context—Specific Information Systems Design Theorizing
… African Journal of …, 2023
[31] Application of multicriteria methods for improvement of information security metrics
Sustainability, 2023
[32] Development of Audit Information System Index KAMI Based on ISO/IEC 27001: 2013
Development, 2022
[33] Fake News and Threats to IoT—The Crucial Aspects of Cyberspace in the Times of Cyberwar
The International Research & …, 2022
[34] Detection of DDoS Attack on Smart Home Infrastructure Using Artificial Intelligence Models
… Conference on Cyber …, 2022
[35] Factors affecting information security compliance among SMEs in Cape Town
2022
[36] An Exploratory Study: Chaos Engineering Integration Within a Devops Environment
2022
[37] BUSINESS EDUCATION TEACHING RESOURCES AVAILABILITY FOR ACADEMIC STAFF JOB PERFORMANCE IN UNIVERSITIES IN SOUTH-WEST AND …
Psychology, 2022
[38] О СВОЙСТВЕ ДОСТУПНОСТИ И ЕГО МЕТРИКИ ДЛЯ АСУ ТП АЭС
… систем (MLSD'2022), 2022
[39] Ai-based mobile edge computing for iot: Applications, challenges, and future scope
Arabian Journal for Science and …, 2022
[40] Analysis of information availability for seismic and volcanic monitoring systems: a review
Aguiar, C Tripp-Barba - Sensors, 2022
[41] Biometric system for protecting information and improving service delivery: The case of a developing country's social security and pension organisation
Oware, J Effah - Information Development, 2022
[42] Bat-Inspired Optimization for Intrusion Detection Using an Ensemble Forecasting Method.
Intelligent Automation & Soft …, 2022
[43] On Cybersecurity Risk Assessment in Nuclear Power Systems
IFAC-PapersOnLine, 2022
[44] The cybersecurity-related ethical issues of cloud technology and how to avoid them
Proceedings of the 17th …, 2022
[45] Measuring the Impact of DoS Attack on Availability: Empirical Study Based on Accessibility
Journal of Information Security, 2022
[46] Image Encryption Using Modulated Chaotic Maps
2022 International Symposium on …, 2022
[47] The IoT Threat Landscape vs. Machine Learning, aka Who Attacks IoT, Why Do They Do It, and How to Prevent It?
2022
[48] On the Availability Property and Its Metric for NPP IACS
2022 15th International …, 2022
[49] Security Management System (SMS)
Information Security Handbook, 2022
[50] Data-driven framework and experimental validation for security monitoring of networked systems
2022
[51] Information security for Industry 4.0
2022
[52] Systematic Literature Review: Information security behaviour on smartphone users
Environment-Behaviour …, 2022
[53] Graph Databases and E-commerce Cybersecurity-a Match Made in Heaven? The Innovative Technology to Enhance Cyberthreat Mitigation
2022
[54] CHAOS ENGINEERING WITHIN A DEVOPS ENVIRONMENT i
2022
[55] 10 Security Management System (SMS)
Information Security Handbook, 2022
[56] PENGARUH KETERSEDIAAN INFORMASI, KETEPATAN MEDIA DAN AKSESIBILITAS INFORMASI TERHADAP PARTISIPASI ORANG TUA PESERTA DIDIK DI SDN …
Jurnal Evaluasi Pendidikan, 2022
[57] ДІЯЛЬНІСТЬ ОРГАНІВ ПУБЛІЧНОЇ ВЛАДИ УКРАЇНИ У ПРОТИДІЇ ЕПІДЕМІЇ COVID-19: ІНФОРМАЦІЙНО-БЕЗПЕКОВИЙ КОНТЕКСТ
Сучасне …, 2022
[58] GRYPE СКЕНЕР ЗА ТЕСТИРАЊЕ РАЊИВОСТИ У КОНТЕЈНЕРИМА
Zbornik radova Fakulteta tehničkih nauka u Novom …, 2022
[59] ФОРМУЛИРОВАНИЕ ЦЕЛИ ЗАЩИТЫ ИНФОРМАЦИИ ДЛЯ РАЗЛИЧНЫХ ТИПОВ ИНФОРМАЦИОННЫХ СИСТЕМ
ПЕРСПЕКТИВЫ РАЗВИТИЯ …, 2021
[60] О МЕТРИКЕ ДОСТУПНОСТИ ДЛЯ ПРОМЫШЛЕННЫХ СИСТЕМ УПРАВЛЕНИЯ
2021
[61] Système intelligent basé sur des techniques de l'apprentissage automatique pour l'évaluation de la sécurité et la détection des cyber-intrusions
2021
[62] Comparison of intrusion detection for the internet of things with machine and deep learning methods
2021
[63] Security and Privacy Features Supported by Different Overlay-based ICN/IP Coexistence Architectures
2021
[64] Examining the Relationship between Converged-Network Architecture and Remote Grassfire Alert Transmission Delay in Southeast Colorado
2021
[65] Web security intelligent robot avoiding hacking activities using data mining as parameters of intelligent algorithms
2021
[66] Industrial Control System Availability Assessment with a Metric Based on Delay and Dependency
IFAC-PapersOnLine, 2021
[67] Industrial Control System Cybersecurity Assessment Handling Delay Estimation
International Russian Automation …, 2021
[68] Big data in the metal processing value chain: a systematic digitalization approach under special consideration of standardization and SMEs
Applied Sciences, 2021
[69] Existence-network dimension of information security in modern society
Skhid, 2021
[70] Cloud risk analysis using OCTAVE Allegro: Identifying and analysing risks of a cloud service
2021
[71] Molnbaserade affärssystem och SME-företag: Betydelsefulla trygghetsaspekter för extern datalagring: En kvalitativ studie om vilka aspekter som är betydelsefulla för …
2021
[72] Activities of Ukrainian Public Authorities to Response the COVID-19 Epidemic: Information and Security Context
2021
[73] Factors Affecting Adoption of Wearable Biometric-Tracking Devices: A Predictive Study
2021
[74] Disentangling the Concept of Information Security Properties: Enabling Effective Information Security Governance
2021
[75] EXISTENCE-NETWORK DIMENSION OF INFORMATION SECURITY IN MODERN SOCIETY.
2021
[76] Source-based Defense Mechanism In Sdn With Support Vector Machine
2021
[77] Private Data Sharing in a Secure Cloud-based Application for Acute Stroke Care
2021
[78] Predicting DOS-DDOS Attacks: Review and Evaluation Study of Feature Selection Methods based on Wrapper Process
International Journal of Advanced Computer Science and Applications, 2021
[79] Factors Affecting the Security of Information Systems: A
The International Journal of Engineering and Science, 2021
[80] Aprendizagem Computacional Aplicada à Deteção de Intrusões-Efeito das Técnicas de Balanceamento de Dados
2021
[81] Intelligent system using machine learning techniques for security assessment and cyber intrusion detection
2021
[82] Cybersecurity Issues in Crowdsourcing Engineering Initiatives
2021 Fall ASEE Middle Atlantic Section …, 2021
[83] The Hierarchical Decision Model of cybersecurity risk assessment
2021 12th National Conference with International …, 2021
[84] An Effective Data Privacy Model for Cloud Environment
2020
[85] Examining the Relationship Between Cybersecurity-Employee Vulnerabilities and Reduction of Security Breaches in Information Technology Organization
2020
[86] Applying Security Assurance Cases for Cloud-based Systems in the Medical Domain
2020
[87] Web Services Security and Threats: A Systematic Literature Review
2020
[88] Intrusion Detection of Flooding DoS Attacks on Emulated Smart Meters
2020
[89] Hall Spoofing: A Non-Invasive DoS Attack on Grid-Tied Solar Inverter
2020
[90] Information security in modern society: Sociocultural aspects
2020
[91] A Unified Fuzzy-Based Symmetrical Multi-Criteria Decision-Making Method for Evaluating Sustainable-Security of Web Applications
2020
[92] Determining Factors of Cloud Computing Adoption: A Study of Indonesian Local Government Employees
2020
[93] Secure Software Development Techniques and Challenges in their Practical Application
2020
[94] Secure software design and development: towards practical models for implementing information security into the requirements engineering process
2020
[95] A Fuzzy-AHP based prioritization of trust criteria in fog computing services
2020
[96] Information Security in the Design of Web-Based Software Systems
2020
[97] Enhancing Security of Information Systems in Tanzania: the Case of Education Sector
2020
[98] JamaicaEye: What Does Cybersecurity Look Like In One Of The Most Recently Developed CCTV Networks?
2019
[99] Analysis of Password and Salt Combination Scheme To Improve Hash Algorithm Security
2019
[100] INFORMATION SECURITY
Knowledge Librarian, 2019
[101] Blockchain-Based Open Data: An Approach for Resolving Data Integrity and Transparency
2019
[102] JamaicaEye: What does cyber security look like in one of the most recently developed CCTV networks?
2019
[103] Framework para Gestão de Dispositivos Móveis: módulo inventário
2019
[104] Research on the Impact of Attacks on Security Characteristics
2019
[105] Website Security Analysis of Department and Integrated Services One Door of XYZ Regency using Kali Linux
2019
[106] Siber riskler karşısında KOBİ'lerin bilgi güvenliği farkındalıklarını ölçen bir ölçek geliştirme: Gaziantep örneklemi
2018
[107] PERANCANGAN DAN PENGIMPLEMENTASIAN SISTEM INFORMASI PELAYANAN JASA KESEHATAN PADA PT. PATHLAB INDONESIA
2018
[108] Curating Research Data-Cyber security perspective from a nascent Brain Machine Interface Laboratory
2018
[109] Data Security Implementations in Cloud Computing: A Critical Review
2018
[110] Oliveira
2018
[111] Investigating the denial of service attack: A major threat to internet and the security of information
JK Research Journal in Mathematics and Computer Sciences, 2018
[112] Waw (we are watching) smart app: accommodating social perception towards public officers' performance
Journal of Physics: Conference Series, 2018
[113] A Survey Paper of Distributed Denial-of-Service Attack in Software Defined Networking (SDN)
International Journal of Applied Engineering Research [IJAER], 2018
[114] Defining Network Exposure Metrics in Security Risk Scoring Models
2018
[115] Management Functions of Information System Components as an Integration Model
Management of Information Systems, 2018
[116] Classification of Data to Enhance Data Security in Cloud Computing
2018
[117] Component based metric for evaluating availability of an information system: an empirical evaluation
International Journal of Information Technology, 2018
[118] Analisis Kesuksesan Aplikasi Mobile Pemesanan Tiket Bioskop M-Tix Cinema 21 Berdasarkan Perspektif Pengguna di Kota Malang Menggunakan …
2018
[119] Enhancement of information management & systems: towards business efficiency and productivity within the asset creation department of Eskom in Kwa …
2018
[120] Metric for evaluating availability of an information system: a quantitative approach based on component dependency
International Journal of Network Security & …, 2017
[121] Quality of experience in eVoting systems: a case study of the Namibian System
2017
[122] METRIC FOR EVALUATING AVAILABILITY OF AN INFORMATION SYSTEM: AQuantitative APPROACH BASED ON COMPONENT DEPENDENCY
International Journal of Network Security & Its Applications, 2017
[123] Proposed model for e-exam availability in WLAN environment
2016
[124] ΔΙΠΛΩΜΑΤΙΚΗ ΕΡΓΑΣΙΑ
2014
[125] Stefnumótun og upplýsingafræði. Um upplýsinga-og skjalastefnur afhendingarskyldra aðila
[126] Dokunma dinamiği ile mobil kullanıcılar için kimlik doğrulama
[127] Aplicação segura de saúde em nuvem: projeto, implementação e avaliação no estudo de caso de tratamento de acidente vascular cerebral agudo
[128] Information Security: Issues, Processes, and Challenges
SCIRP Newsletter
Copyright © 2006-2026 Scientific Research Publishing Inc. All Rights Reserved.
Top