ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Information Security Journal A Global Perspective
Latest Publications
TOTAL DOCUMENTS
422
(FIVE YEARS 107)
H-INDEX
14
(FIVE YEARS 2)
Published By Informa Uk (Taylor & Francis)
1939-3547, 1939-3555
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Id-PC: An Identification Scheme based on Polar Codes
Information Security Journal A Global Perspective
◽
10.1080/19393555.2021.2023239
◽
2022
◽
pp. 1-14
Author(s):
Reza Hooshmand
◽
Alireza Jafari
◽
Gholamreza Karamali
Keyword(s):
Polar Codes
◽
Identification Scheme
Download Full-text
An analysis of data breaches in the U.S. healthcare industry: diversity, trends, and risk profiling
Information Security Journal A Global Perspective
◽
10.1080/19393555.2021.2017522
◽
2021
◽
pp. 1-13
Author(s):
In Lee
Keyword(s):
Healthcare Industry
◽
Data Breaches
◽
Risk Profiling
◽
The U.S
Download Full-text
Multimodal biometric system based on fusion techniques: a review
Information Security Journal A Global Perspective
◽
10.1080/19393555.2021.1974130
◽
2021
◽
pp. 1-49
Author(s):
Neeru Bala
◽
Rashmi Gupta
◽
Anil Kumar
Keyword(s):
Biometric System
◽
Multimodal Biometric System
Download Full-text
A Cross-layer Method for Identifying and Isolating the Blackhole Nodes in Vehicular Ad-hoc Networks
Information Security Journal A Global Perspective
◽
10.1080/19393555.2021.2007316
◽
2021
◽
pp. 1-15
Author(s):
Naib Rabiaa
◽
Ali Cherif Moussa
◽
Boukli Hacene Sofiane
Keyword(s):
Ad Hoc Networks
◽
Vehicular Ad Hoc Networks
◽
Ad Hoc
◽
Cross Layer
◽
Layer Method
◽
Hoc Networks
Download Full-text
The role risk-management plays in reducing insider threat’s in the federal Government
Information Security Journal A Global Perspective
◽
10.1080/19393555.2021.1998735
◽
2021
◽
pp. 1-8
Author(s):
Alexander Gregory Stone
Keyword(s):
Risk Management
◽
Federal Government
Download Full-text
Security and privacy consideration for the deployment of electronic health records: a qualitative study covering Greece and Oman
Information Security Journal A Global Perspective
◽
10.1080/19393555.2021.2003914
◽
2021
◽
pp. 1-17
Author(s):
Ourania Koutzampasopoulou Xanthidou
◽
Dimitrios Xanthidis
◽
Christos Manolas
◽
Han-I Wang
Keyword(s):
Qualitative Study
◽
Electronic Health Records
◽
Security And Privacy
◽
Health Records
◽
Electronic Health
Download Full-text
A tokenization technique for improving the security of EMV contactless cards
Information Security Journal A Global Perspective
◽
10.1080/19393555.2021.2001120
◽
2021
◽
pp. 1-16
Author(s):
Ossama Al-Maliki
◽
Hisham Al-Assam
Download Full-text
New chaotic satellite image encryption by using some or all the rounds of the AES algorithm
Information Security Journal A Global Perspective
◽
10.1080/19393555.2021.1982082
◽
2021
◽
pp. 1-25
Author(s):
M. Naim
◽
A. Ali Pacha
Keyword(s):
Image Encryption
◽
Satellite Image
◽
Aes Algorithm
Download Full-text
A systematic review of detection and prevention techniques of SQL injection attacks
Information Security Journal A Global Perspective
◽
10.1080/19393555.2021.1995537
◽
2021
◽
pp. 1-14
Author(s):
Mohammed Nasereddin
◽
Ashaar ALKhamaiseh
◽
Malik Qasaimeh
◽
Raad Al-Qassas
Keyword(s):
Systematic Review
◽
Sql Injection
◽
Injection Attacks
◽
Prevention Techniques
◽
Sql Injection Attacks
Download Full-text
Jack pandemus – Cyber incident and emergency response during a pandemic
Information Security Journal A Global Perspective
◽
10.1080/19393555.2021.1980159
◽
2021
◽
pp. 1-14
Author(s):
Erik B. Korn
◽
Douglas M. Fletcher
◽
Erica M. Mitchell
◽
Aryn A. Pyke
◽
Steven M. Whitham
Keyword(s):
Emergency Response
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close