Journal of Applied Security Research最新文献

筛选
英文 中文
The Effects of Justice Views on Turnover Intent, Sick-Leave Views, and Sick-Leave Use Among Private Prison Staff 正义观对私立监狱员工离职意向、病假观和病假使用的影响
IF 1.3
Journal of Applied Security Research Pub Date : 2023-01-04 DOI: 10.1080/19361610.2022.2161798
E. Lambert, N. Hogan, R. Worley, Monica Solinas-Saunders
{"title":"The Effects of Justice Views on Turnover Intent, Sick-Leave Views, and Sick-Leave Use Among Private Prison Staff","authors":"E. Lambert, N. Hogan, R. Worley, Monica Solinas-Saunders","doi":"10.1080/19361610.2022.2161798","DOIUrl":"https://doi.org/10.1080/19361610.2022.2161798","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2023-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42073768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
SAM: A Mechanism to Facilitate Smear-Aware Forensic Analysis of Volatile System Memory SAM:一种促进易失系统记忆Smear感知取证分析的机制
IF 1.3
Journal of Applied Security Research Pub Date : 2022-12-30 DOI: 10.1080/19361610.2022.2161972
Trushna Parida, Kanika Nath, Suvrojit Das
{"title":"SAM: A Mechanism to Facilitate Smear-Aware Forensic Analysis of Volatile System Memory","authors":"Trushna Parida, Kanika Nath, Suvrojit Das","doi":"10.1080/19361610.2022.2161972","DOIUrl":"https://doi.org/10.1080/19361610.2022.2161972","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41318590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preventing Revictimization in Sexual Assault Investigations: Personal Security and Trauma-Informed Case Management* 防止性侵调查中的再次伤害:个人安全和创伤知情案例管理*
IF 1.3
Journal of Applied Security Research Pub Date : 2022-12-30 DOI: 10.1080/19361610.2022.2161799
Katalin Parti
{"title":"Preventing Revictimization in Sexual Assault Investigations: Personal Security and Trauma-Informed Case Management*","authors":"Katalin Parti","doi":"10.1080/19361610.2022.2161799","DOIUrl":"https://doi.org/10.1080/19361610.2022.2161799","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45691356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Multimedia Security Using Shortest Weight First Algorithm and Symmetric Cryptography 利用最短权优先算法和对称密码增强多媒体安全性
IF 1.3
Journal of Applied Security Research Pub Date : 2022-12-19 DOI: 10.1080/19361610.2022.2157193
Karishni Mehta, Glen Dhingra, Ramchandra S. Mangrulkar
{"title":"Enhancing Multimedia Security Using Shortest Weight First Algorithm and Symmetric Cryptography","authors":"Karishni Mehta, Glen Dhingra, Ramchandra S. Mangrulkar","doi":"10.1080/19361610.2022.2157193","DOIUrl":"https://doi.org/10.1080/19361610.2022.2157193","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48085267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Ontology-Based Metrics Computation for System Security Assurance Evaluation 基于本体的系统安全保障评估度量计算
IF 1.3
Journal of Applied Security Research Pub Date : 2022-12-19 DOI: 10.1080/19361610.2022.2157190
Shao Wen, Basel Katt
{"title":"Ontology-Based Metrics Computation for System Security Assurance Evaluation","authors":"Shao Wen, Basel Katt","doi":"10.1080/19361610.2022.2157190","DOIUrl":"https://doi.org/10.1080/19361610.2022.2157190","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46514583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modified Symmetric Image Encryption Approach Based on Mixed Column and Substitution Box 基于混合列和替换盒的改进对称图像加密方法
IF 1.3
Journal of Applied Security Research Pub Date : 2022-11-30 DOI: 10.1080/19361610.2022.2150498
Vaishnavi Sawant, Ahmed Solkar, Ramchandra S. Mangrulkar
{"title":"Modified Symmetric Image Encryption Approach Based on Mixed Column and Substitution Box","authors":"Vaishnavi Sawant, Ahmed Solkar, Ramchandra S. Mangrulkar","doi":"10.1080/19361610.2022.2150498","DOIUrl":"https://doi.org/10.1080/19361610.2022.2150498","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44102271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
DieRoll: A Unique Key Generation and Encryption Technique 一种独特的密钥生成和加密技术
IF 1.3
Journal of Applied Security Research Pub Date : 2022-10-13 DOI: 10.1080/19361610.2022.2124589
Dhruv Mehta, Manish Jha, Hartik Suhagiya, Ramchandra S. Mangrulkar
{"title":"DieRoll: A Unique Key Generation and Encryption Technique","authors":"Dhruv Mehta, Manish Jha, Hartik Suhagiya, Ramchandra S. Mangrulkar","doi":"10.1080/19361610.2022.2124589","DOIUrl":"https://doi.org/10.1080/19361610.2022.2124589","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46750442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Communication in Global Jihad 全球圣战中的交流
IF 1.3
Journal of Applied Security Research Pub Date : 2022-09-28 DOI: 10.1080/19361610.2022.2125253
Frank Musmar
{"title":"Communication in Global Jihad","authors":"Frank Musmar","doi":"10.1080/19361610.2022.2125253","DOIUrl":"https://doi.org/10.1080/19361610.2022.2125253","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45382865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fraud in Online Classified Ads: Strategies, Risks, and Detection Methods: A Survey 网络分类广告中的欺诈:策略、风险和检测方法:一项调查
IF 1.3
Journal of Applied Security Research Pub Date : 2022-09-22 DOI: 10.1080/19361610.2022.2124328
Jamil R. Alzghoul, E. Abdallah, Abdel-hafiz S. Al-khawaldeh
{"title":"Fraud in Online Classified Ads: Strategies, Risks, and Detection Methods: A Survey","authors":"Jamil R. Alzghoul, E. Abdallah, Abdel-hafiz S. Al-khawaldeh","doi":"10.1080/19361610.2022.2124328","DOIUrl":"https://doi.org/10.1080/19361610.2022.2124328","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45173914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
QR Codes to Prevent Copyright Infringement: Case Study of Trusmi Batik in Cirebon, Indonesia 防止侵犯版权的二维码:印度尼西亚井里汶Trusmi Batik案例研究
IF 1.3
Journal of Applied Security Research Pub Date : 2022-09-12 DOI: 10.1080/19361610.2022.2113731
Enni Soerjati Priowirjanto, Eman Suparman, M. Amirulloh, Ema Rahmawati
{"title":"QR Codes to Prevent Copyright Infringement: Case Study of Trusmi Batik in Cirebon, Indonesia","authors":"Enni Soerjati Priowirjanto, Eman Suparman, M. Amirulloh, Ema Rahmawati","doi":"10.1080/19361610.2022.2113731","DOIUrl":"https://doi.org/10.1080/19361610.2022.2113731","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2022-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48139478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信