ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Journal of Applied Security Research
Latest Publications
TOTAL DOCUMENTS
482
(FIVE YEARS 135)
H-INDEX
13
(FIVE YEARS 2)
Published By Informa Uk (Taylor & Francis)
1936-1629, 1936-1610
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Performance Analysis of Channel Estimation for Massive MIMO Communication Using DL-Based Fully Connected Neural Network (DL-FCNN) Architecture
Journal of Applied Security Research
◽
10.1080/19361610.2021.2024050
◽
2022
◽
pp. 1-13
Author(s):
Swapna Tangelapalli
◽
Pokkunuri PardhaSaradhi
◽
Rahul Jashvantbhai Pandya
◽
Sridhar Iyer
Keyword(s):
Neural Network
◽
Performance Analysis
◽
Channel Estimation
◽
Massive Mimo
◽
Mimo Communication
◽
Fully Connected
Download Full-text
Investigation of Card Skimming Cases: An Indian Perspective
Journal of Applied Security Research
◽
10.1080/19361610.2021.2024049
◽
2022
◽
pp. 1-14
Author(s):
Anoop A. Shetty
◽
K. Venkatesh Murthy
Keyword(s):
Indian Perspective
Download Full-text
Addressing the Threat of a bioterrorist Attack by Means of an Unmanned Drone
Journal of Applied Security Research
◽
10.1080/19361610.2021.2018923
◽
2022
◽
pp. 1-24
Author(s):
Katalin Pethő-Kiss
Download Full-text
Developing a System of Indicators for Clustering Financial Cybercrime
Journal of Applied Security Research
◽
10.1080/19361610.2021.2013112
◽
2021
◽
pp. 1-20
Author(s):
Boris Sturc
◽
Tatyana Gurova
◽
Natália Zelenková
◽
Viktor Shestak
Download Full-text
A Study of Lightweight Approaches to Analyze Crime Conditions in India
Journal of Applied Security Research
◽
10.1080/19361610.2021.2006031
◽
2021
◽
pp. 1-25
Author(s):
Bhavna Saini
◽
Dinesh Kumar Saini
◽
Sumit Srivastava
◽
Mayank Aggarwal
Download Full-text
Securing Relational Databases against Security Vulnerabilities: A Case of Microsoft SQL Server and PostgreSQL
Journal of Applied Security Research
◽
10.1080/19361610.2021.2006032
◽
2021
◽
pp. 1-15
Author(s):
Hassan Kilavo
◽
Salehe I. Mrutu
◽
Robert G. Dudu
Keyword(s):
Relational Databases
◽
Sql Server
◽
Security Vulnerabilities
Download Full-text
Achieving Cyber Power Through Integrated Government Capability: Factors Jeopardizing Civil-Military Cooperation on Cyber Defense
Journal of Applied Security Research
◽
10.1080/19361610.2021.2006033
◽
2021
◽
pp. 1-26
Author(s):
Roman Pačka
◽
Miroslav Mareš
Keyword(s):
Cyber Defense
◽
Military Cooperation
Download Full-text
The Concept of Lawful Behavior in the Digital Age
Journal of Applied Security Research
◽
10.1080/19361610.2021.2006034
◽
2021
◽
pp. 1-13
Author(s):
Roza Zhamiyeva
◽
Leila Arenova
◽
Abzal Serikbayev
◽
Bakytzhan Zhakupov
◽
Gulnara Balgimbekova
Keyword(s):
Digital Age
Download Full-text
Modeling Public Policy: Influences on Terrorism and Public Opinion
Journal of Applied Security Research
◽
10.1080/19361610.2021.2005503
◽
2021
◽
pp. 1-19
Author(s):
Omi Hodwitz
◽
Steff King
Keyword(s):
Public Policy
◽
Public Opinion
Download Full-text
Cluster Based Malicious Node Detection System for Mobile Ad-Hoc Network Using ANFIS Classifier
Journal of Applied Security Research
◽
10.1080/19361610.2021.2002118
◽
2021
◽
pp. 1-19
Author(s):
Gopalakrishnan Subburayalu
◽
Hemanand Duraivelu
◽
Arun Prasath Raveendran
◽
Rajesh Arunachalam
◽
Deepika Kongara
◽
...
Keyword(s):
Ad Hoc Network
◽
Ad Hoc
◽
Mobile Ad Hoc Network
◽
Detection System
◽
Malicious Node
◽
Malicious Node Detection
◽
Mobile Ad Hoc
◽
Anfis Classifier
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close