信息安全学国际期刊
期刊
会议
图书
作者:M. Karaman , H. Catalkaya , C. Aybar
来源:[J].International Journal of Information Security Science, 2016, Vol.5 (1)IJISS
摘要:In the time we are living in, the nonlinear increase, usage and reliability on information communication technologies (ICT) are going to move forward. In this digital environment, people, institutions and government take necessary precautions ranging from personal to strategic le...
作者:H. S , or , B. Genge ...
来源:[J].International Journal of Information Security Science, 2015, Vol.4 (3)IJISS
摘要:With the popularity of the Internet of Things on the rise, sensor networks have become essential parts of traditional Information and Communication Technology (ICT) infrastructures in a wide variety of applications. However, their increasing complexity, inter-connectivity, and pe...
作者:F. Mastjik , C. Varol , A. Varol
来源:[J].International Journal of Information Security Science, 2015, Vol.4 (3)IJISS
摘要:Development in computing technology for the past decade has also given rise to threats against the users, particularly in form of malware. However, manual malware identification effort is being overwhelmed due to the sheer number of malware being created every day. Most of the ma...
作者:B. Genge , P. Haller , C. Enachescu
来源:[J].International Journal of Information Security Science, 2015, Vol.4 (3)IJISS
摘要:Nowadays, the increasing number of devices and services that require a direct Internet access, creates new security challenges. These challenges need to meet user feature-based requirements with the companies' restrictive security policies. Therefore, security administrators need...
作者:N.K. Shashidnar , D. Novak
来源:[J].International Journal of Information Security Science, 2015, Vol.4 (2)IJISS
摘要:Prefetch files, like any other file in a file system, can be viewed from a digital forensic perspective to further a forensic investigation. Using appropriate tools and techniques available to a digital forensic examiner, we explore and investigate the potential of prefetch files...
作者:S. Sznur
来源:[J].International Journal of Information Security Science, 2015, Vol.4 (2)IJISS
摘要:Users identification by means of their keystroke pattern is an old and known technique. Several works had analysed and solved some of the most important issues in this area, but with the advances of technology, previous techniques have quickly become obsolete. Users as well as at...
作者:K. Goztepe
来源:[J].International Journal of Information Security Science, 2015, Vol.4 (2)IJISS
摘要:The nature and range of threats to security have extremely changed that caused a following reaction which is the transition in the nature of the war as well. Under the changing circumstances of operational environment and in the face of new security environment which is more...
作者:E. Bostanci
来源:[J].International Journal of Information Security Science, 2015, Vol.4 (2)IJISS
摘要:Crime Scene Investigation (CSI) is a carefully planned systematic process with the purpose of acquiring physical evidences to shed light upon the physical reality of the crime and eventually detect the identity of the criminal. Capturing images and videos of the crime scene is an...
作者:Z. Ozleblebici , Y. Ekiz , B. Aydin
来源:[J].International Journal of Information Security Science, 2015, Vol.4 (2)IJISS
摘要:Nowadays technologies, the parties, the time, etc. are differentiated and there has been a continuous change in the operational environment. In this case, the commanders or decision makers are forced to take right, rapid and instant decisions. Thus, the needs for accurate an...
作者:M.M. Emmanuel , M.N. Ibrahim , A.E. Roger
来源:[J].International Journal of Information Security Science, 2015, Vol.4 (1)IJISS
摘要:One of the major points of interest in software engineering nowadays is how to ensure applic- ations configuration files’ security. In fact, they very often contain confidential information as database connection credentials, thereby providing a vulnerability point to these ...

我们正在为您处理中,这可能需要一些时间,请稍等。

资源合作:cnki.scholar@cnki.net, +86-10-82896619   意见反馈:scholar@cnki.net

×