-
261
Trusted Microservices: A Security Framework for Users' Interaction with Microservices Applications
Published 2022-12-01“…Journal of Information Security and Cybercrimes Research…”
Get full text
Article -
262
Role of Governance in Achieving Sustainable Cybersecurity for Business Corporations
Published 2020-12-01“…Journal of Information Security and Cybercrimes Research…”
Get full text
Article -
263
Parental Role in Protecting Children and Dangers of Social Networks Sites
Published 2018-05-01“…Journal of Information Security and Cybercrimes Research…”
Get full text
Article -
264
Motivation-based Attacker Modelling for Cyber Risk Management: A Quantitative Content Analysis and a Natural Experiment
Published 2021-12-01“…Journal of Information Security and Cybercrimes Research…”
Get full text
Article -
265
Analysis of Mobile Malware: A Systematic Review of Evolution and Infection Strategies
Published 2021-12-01“…Journal of Information Security and Cybercrimes Research…”
Get full text
Article -
266
Analysis of the "Dandruff attack" on the Tron Network: risks, damage assessment, and solutions
Published 2023-06-01“…Journal of Information Security and Cybercrimes Research…”
Get full text
Article -
267
The Factors Influencing the Use of Password Managers
Published 2022-06-01“…Journal of Information Security and Cybercrimes Research…”
Get full text
Article -
268
Cyberthreats on Implantable Medical Devices
Published 2021-06-01“…Journal of Information Security and Cybercrimes Research…”
Get full text
Article -
269
Comparative Study and Analysis on Integrity of Data Files Using Different Tools and Techniques
Published 2021-06-01“…Journal of Information Security and Cybercrimes Research…”
Get full text
Article -
270
Analysis of Crypto-Ransomware Using Network Traffic
Published 2022-06-01“…Journal of Information Security and Cybercrimes Research…”
Get full text
Article -
271
A Security System for Detecting Denial of Service (DDoS) and Masquerade Attacks on Social Networks
Published 2022-06-01“…Journal of Information Security and Cybercrimes Research…”
Get full text
Article -
272
A URL with Image-based Feature Extraction for Preventing Phishing Attacks
Published 2019-06-01“…Journal of Information Security and Cybercrimes Research…”
Get full text
Article -
273
Security in Health Information Management Records through Blockchain Technology: A Review
Published 2023-06-01“…Journal of Information Security and Cybercrimes Research…”
Get full text
Article -
274
Secure Mobile Computing Authentication Utilizing Hash, Cryptography and Steganography Combination
Published 2019-04-01“…Journal of Information Security and Cybercrimes Research…”
Get full text
Article -
275
Overview of Cyberattack on Saudi Organizations
Published 2018-06-01“…Journal of Information Security and Cybercrimes Research…”
Get full text
Article -
276
Automatic Intrusion Detection System Using Deep Recurrent Neural Network Paradigm
Published 2018-05-01“…Journal of Information Security and Cybercrimes Research…”
Get full text
Article -
277
Survey on Updating IDSs’ Signatures Databases
Published 2018-05-01“…Journal of Information Security and Cybercrimes Research…”
Get full text
Article -
278
Users' Information Security Awareness of Home Closed-Circuit Television Surveillance
Published 2023-06-01“…Journal of Information Security and Cybercrimes Research…”
Get full text
Article -
279
Overview of the Impact of Human Error on Cybersecurity based on ISO/IEC 27001 Information Security Management
Published 2021-06-01“…Journal of Information Security and Cybercrimes Research…”
Get full text
Article -
280
User Acceptance of Password Manager Software: Evidence from Australian Microbusinesses
Published 2021-12-01“…Journal of Information Security and Cybercrimes Research…”
Get full text
Article