信息安全(英文)Pub Date : 2023-01-01DOI: 10.4236/jis.2023.144015
Sakharkar Shreyas
{"title":"Security Model for Cloud Computing: Case Report of Organizational Vulnerability","authors":"Sakharkar Shreyas","doi":"10.4236/jis.2023.144015","DOIUrl":"https://doi.org/10.4236/jis.2023.144015","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70335400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
信息安全(英文)Pub Date : 2023-01-01DOI: 10.4236/jis.2023.141003
Zhiyong Zheng, Kun Tian, Yan Zhang, Yunfan Lu
{"title":"Learning with Errors Public Key Cryptosystem with Its Security","authors":"Zhiyong Zheng, Kun Tian, Yan Zhang, Yunfan Lu","doi":"10.4236/jis.2023.141003","DOIUrl":"https://doi.org/10.4236/jis.2023.141003","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
信息安全(英文)Pub Date : 2023-01-01DOI: 10.4236/jis.2023.143013
N. K. Samara
{"title":"Cybersecurity Requirements for Management Information Systems","authors":"N. K. Samara","doi":"10.4236/jis.2023.143013","DOIUrl":"https://doi.org/10.4236/jis.2023.143013","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70335383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
信息安全(英文)Pub Date : 2023-01-01DOI: 10.4236/jis.2023.142011
Meng Lu
{"title":"FastAttacker: Semantic Perturbation Functions via Three Classifications","authors":"Meng Lu","doi":"10.4236/jis.2023.142011","DOIUrl":"https://doi.org/10.4236/jis.2023.142011","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":"50 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70335333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
信息安全(英文)Pub Date : 2023-01-01DOI: 10.4236/jis.2023.144014
Doudou Dione, Boly Seck, I. Diop, Pierre-Louis Cayrel, Demba Faye, I. Gueye
{"title":"Hardware Security for IoT in the Quantum Era: Survey and Challenges","authors":"Doudou Dione, Boly Seck, I. Diop, Pierre-Louis Cayrel, Demba Faye, I. Gueye","doi":"10.4236/jis.2023.144014","DOIUrl":"https://doi.org/10.4236/jis.2023.144014","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70335389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
信息安全(英文)Pub Date : 2023-01-01DOI: 10.4236/jis.2023.144025
Richard Kabanda, Harihar Thapa, Luis Rivera
{"title":"Forensics: Collection of Sound Digital Evidence","authors":"Richard Kabanda, Harihar Thapa, Luis Rivera","doi":"10.4236/jis.2023.144025","DOIUrl":"https://doi.org/10.4236/jis.2023.144025","url":null,"abstract":"This summary paper will discuss the concept of forensic evidence and evidence collection methods. Emphasis will be placed on the techniques used to collect forensically sound digital evidence for the purpose of introduction to digital forensics. This discussion will thereafter result in identifying and categorizing the different types of digital forensics evidence and a clear procedure for how to collect forensically sound digital evidence. This paper will further discuss the creation of awareness and promote the idea that competent practice of computer forensics collection is important for admissibility in court.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135158177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
信息安全(英文)Pub Date : 2023-01-01DOI: 10.4236/jis.2023.141006
Alsadig Mohammed Adam Abdallah, A. M. Talib
{"title":"Classification of Big Data Security Based on Ontology Web Language","authors":"Alsadig Mohammed Adam Abdallah, A. M. Talib","doi":"10.4236/jis.2023.141006","DOIUrl":"https://doi.org/10.4236/jis.2023.141006","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":"5 2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
信息安全(英文)Pub Date : 2023-01-01DOI: 10.4236/jis.2023.141005
Tankou Tsomo Maurice Eddy, Bell Bitjoka Georges, Ngohe Ekam Paul Salomon
{"title":"Towards a New Model for the Production of Civil Status Records Using Blockchain","authors":"Tankou Tsomo Maurice Eddy, Bell Bitjoka Georges, Ngohe Ekam Paul Salomon","doi":"10.4236/jis.2023.141005","DOIUrl":"https://doi.org/10.4236/jis.2023.141005","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
信息安全(英文)Pub Date : 2023-01-01DOI: 10.4236/jis.2023.142007
Khaled M. Alnifie, Charles J. Kim
{"title":"Appraising the Manifestation of Optimism Bias and Its Impact on Human Perception of Cyber Security: A Meta Analysis","authors":"Khaled M. Alnifie, Charles J. Kim","doi":"10.4236/jis.2023.142007","DOIUrl":"https://doi.org/10.4236/jis.2023.142007","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
信息安全(英文)Pub Date : 2023-01-01DOI: 10.4236/jis.2023.142010
Mohamed Shohoud
{"title":"Study the Effectiveness of ISO 27001 to Mitigate the Cyber Security Threats in the Egyptian Downstream Oil and Gas Industry","authors":"Mohamed Shohoud","doi":"10.4236/jis.2023.142010","DOIUrl":"https://doi.org/10.4236/jis.2023.142010","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70335271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}