信息安全(英文)最新文献

筛选
英文 中文
Security Model for Cloud Computing: Case Report of Organizational Vulnerability 云计算安全模型:组织漏洞案例报告
信息安全(英文) Pub Date : 2023-01-01 DOI: 10.4236/jis.2023.144015
Sakharkar Shreyas
{"title":"Security Model for Cloud Computing: Case Report of Organizational Vulnerability","authors":"Sakharkar Shreyas","doi":"10.4236/jis.2023.144015","DOIUrl":"https://doi.org/10.4236/jis.2023.144015","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70335400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Learning with Errors Public Key Cryptosystem with Its Security 带错误学习的公钥密码系统及其安全性
信息安全(英文) Pub Date : 2023-01-01 DOI: 10.4236/jis.2023.141003
Zhiyong Zheng, Kun Tian, Yan Zhang, Yunfan Lu
{"title":"Learning with Errors Public Key Cryptosystem with Its Security","authors":"Zhiyong Zheng, Kun Tian, Yan Zhang, Yunfan Lu","doi":"10.4236/jis.2023.141003","DOIUrl":"https://doi.org/10.4236/jis.2023.141003","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity Requirements for Management Information Systems 管理信息系统的网络安全要求
信息安全(英文) Pub Date : 2023-01-01 DOI: 10.4236/jis.2023.143013
N. K. Samara
{"title":"Cybersecurity Requirements for Management Information Systems","authors":"N. K. Samara","doi":"10.4236/jis.2023.143013","DOIUrl":"https://doi.org/10.4236/jis.2023.143013","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70335383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FastAttacker: Semantic Perturbation Functions via Three Classifications 快速攻击者:通过三种分类的语义扰动函数
信息安全(英文) Pub Date : 2023-01-01 DOI: 10.4236/jis.2023.142011
Meng Lu
{"title":"FastAttacker: Semantic Perturbation Functions via Three Classifications","authors":"Meng Lu","doi":"10.4236/jis.2023.142011","DOIUrl":"https://doi.org/10.4236/jis.2023.142011","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70335333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hardware Security for IoT in the Quantum Era: Survey and Challenges 量子时代物联网硬件安全:调查与挑战
信息安全(英文) Pub Date : 2023-01-01 DOI: 10.4236/jis.2023.144014
Doudou Dione, Boly Seck, I. Diop, Pierre-Louis Cayrel, Demba Faye, I. Gueye
{"title":"Hardware Security for IoT in the Quantum Era: Survey and Challenges","authors":"Doudou Dione, Boly Seck, I. Diop, Pierre-Louis Cayrel, Demba Faye, I. Gueye","doi":"10.4236/jis.2023.144014","DOIUrl":"https://doi.org/10.4236/jis.2023.144014","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70335389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Forensics: Collection of Sound Digital Evidence 取证:声音数字证据的收集
信息安全(英文) Pub Date : 2023-01-01 DOI: 10.4236/jis.2023.144025
Richard Kabanda, Harihar Thapa, Luis Rivera
{"title":"Forensics: Collection of Sound Digital Evidence","authors":"Richard Kabanda, Harihar Thapa, Luis Rivera","doi":"10.4236/jis.2023.144025","DOIUrl":"https://doi.org/10.4236/jis.2023.144025","url":null,"abstract":"This summary paper will discuss the concept of forensic evidence and evidence collection methods. Emphasis will be placed on the techniques used to collect forensically sound digital evidence for the purpose of introduction to digital forensics. This discussion will thereafter result in identifying and categorizing the different types of digital forensics evidence and a clear procedure for how to collect forensically sound digital evidence. This paper will further discuss the creation of awareness and promote the idea that competent practice of computer forensics collection is important for admissibility in court.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135158177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classification of Big Data Security Based on Ontology Web Language 基于本体Web语言的大数据安全分类
信息安全(英文) Pub Date : 2023-01-01 DOI: 10.4236/jis.2023.141006
Alsadig Mohammed Adam Abdallah, A. M. Talib
{"title":"Classification of Big Data Security Based on Ontology Web Language","authors":"Alsadig Mohammed Adam Abdallah, A. M. Talib","doi":"10.4236/jis.2023.141006","DOIUrl":"https://doi.org/10.4236/jis.2023.141006","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards a New Model for the Production of Civil Status Records Using Blockchain 基于区块链的公民身份档案制作新模式探讨
信息安全(英文) Pub Date : 2023-01-01 DOI: 10.4236/jis.2023.141005
Tankou Tsomo Maurice Eddy, Bell Bitjoka Georges, Ngohe Ekam Paul Salomon
{"title":"Towards a New Model for the Production of Civil Status Records Using Blockchain","authors":"Tankou Tsomo Maurice Eddy, Bell Bitjoka Georges, Ngohe Ekam Paul Salomon","doi":"10.4236/jis.2023.141005","DOIUrl":"https://doi.org/10.4236/jis.2023.141005","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Appraising the Manifestation of Optimism Bias and Its Impact on Human Perception of Cyber Security: A Meta Analysis 评价乐观偏见的表现及其对人类网络安全感知的影响:一个元分析
信息安全(英文) Pub Date : 2023-01-01 DOI: 10.4236/jis.2023.142007
Khaled M. Alnifie, Charles J. Kim
{"title":"Appraising the Manifestation of Optimism Bias and Its Impact on Human Perception of Cyber Security: A Meta Analysis","authors":"Khaled M. Alnifie, Charles J. Kim","doi":"10.4236/jis.2023.142007","DOIUrl":"https://doi.org/10.4236/jis.2023.142007","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Study the Effectiveness of ISO 27001 to Mitigate the Cyber Security Threats in the Egyptian Downstream Oil and Gas Industry 研究ISO 27001在缓解埃及下游油气行业网络安全威胁方面的有效性
信息安全(英文) Pub Date : 2023-01-01 DOI: 10.4236/jis.2023.142010
Mohamed Shohoud
{"title":"Study the Effectiveness of ISO 27001 to Mitigate the Cyber Security Threats in the Egyptian Downstream Oil and Gas Industry","authors":"Mohamed Shohoud","doi":"10.4236/jis.2023.142010","DOIUrl":"https://doi.org/10.4236/jis.2023.142010","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70335271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信