Showing 261 - 280 results of 656 for search '"cybercrime"', query time: 0.06s Refine Results
  1. 261

    Trusted Microservices: A Security Framework for Users' Interaction with Microservices Applications by Mohamed Elkholy, Marwa A. Marzok

    Published 2022-12-01
    “…Journal of Information Security and Cybercrimes Research…”
    Get full text
    Article
  2. 262

    Role of Governance in Achieving Sustainable Cybersecurity for Business Corporations by Shahad A. Alashi, Dhuha H. Badi

    Published 2020-12-01
    “…Journal of Information Security and Cybercrimes Research…”
    Get full text
    Article
  3. 263

    Parental Role in Protecting Children and Dangers of Social Networks Sites by Nabih T Abdelmajeed

    Published 2018-05-01
    “…Journal of Information Security and Cybercrimes Research…”
    Get full text
    Article
  4. 264
  5. 265

    Analysis of Mobile Malware: A Systematic Review of Evolution and Infection Strategies by Ashawa Moses, Sarah Morris

    Published 2021-12-01
    “…Journal of Information Security and Cybercrimes Research…”
    Get full text
    Article
  6. 266
  7. 267

    The Factors Influencing the Use of Password Managers by Hussain Alshahrani, Abdulrahman Alghamdi

    Published 2022-06-01
    “…Journal of Information Security and Cybercrimes Research…”
    Get full text
    Article
  8. 268

    Cyberthreats on Implantable Medical Devices by Mohammed N. A. Sabra

    Published 2021-06-01
    “…Journal of Information Security and Cybercrimes Research…”
    Get full text
    Article
  9. 269
  10. 270

    Analysis of Crypto-Ransomware Using Network Traffic by Otasowie Owolafe, Aderonke F. Thompson

    Published 2022-06-01
    “…Journal of Information Security and Cybercrimes Research…”
    Get full text
    Article
  11. 271

    A Security System for Detecting Denial of Service (DDoS) and Masquerade Attacks on Social Networks by Olaniyi Ayeni, O. Owolafe, O.P Ogunjobi

    Published 2022-06-01
    “…Journal of Information Security and Cybercrimes Research…”
    Get full text
    Article
  12. 272

    A URL with Image-based Feature Extraction for Preventing Phishing Attacks by Dyaa Eldeen Nasr Motawa, Ahamed El Shrief

    Published 2019-06-01
    “…Journal of Information Security and Cybercrimes Research…”
    Get full text
    Article
  13. 273

    Security in Health Information Management Records through Blockchain Technology: A Review by Yasir Hamid, Rameez Yousuf, Atif Chowhan

    Published 2023-06-01
    “…Journal of Information Security and Cybercrimes Research…”
    Get full text
    Article
  14. 274
  15. 275

    Overview of Cyberattack on Saudi Organizations by Salem Alelyani, Harish Kumar G R

    Published 2018-06-01
    “…Journal of Information Security and Cybercrimes Research…”
    Get full text
    Article
  16. 276

    Automatic Intrusion Detection System Using Deep Recurrent Neural Network Paradigm by Ahmed Elsherif

    Published 2018-05-01
    “…Journal of Information Security and Cybercrimes Research…”
    Get full text
    Article
  17. 277

    Survey on Updating IDSs’ Signatures Databases by Mutep Yahya Al-Yosef, Nabih T. Arar

    Published 2018-05-01
    “…Journal of Information Security and Cybercrimes Research…”
    Get full text
    Article
  18. 278

    Users' Information Security Awareness of Home Closed-Circuit Television Surveillance by Yazeed Alkhurayyif

    Published 2023-06-01
    “…Journal of Information Security and Cybercrimes Research…”
    Get full text
    Article
  19. 279

    Overview of the Impact of Human Error on Cybersecurity based on ISO/IEC 27001 Information Security Management by Amar Y. El-Bably

    Published 2021-06-01
    “…Journal of Information Security and Cybercrimes Research…”
    Get full text
    Article
  20. 280

    User Acceptance of Password Manager Software: Evidence from Australian Microbusinesses by Hassan Jamil, Tanveer Zia, Tahmid Nayeem

    Published 2021-12-01
    “…Journal of Information Security and Cybercrimes Research…”
    Get full text
    Article