信息安全学国际期刊
期刊
会议
图书
作者:M. Karaman , H. Catalkaya , C. Aybar
来源:[J].International Journal of Information Security Science, 2016, Vol.5 (1)IJISS
摘要:In the time we are living in, the nonlinear increase, usage and reliability on information communication technologies (ICT) are going to move forward. In this digital environment, people, institutions and government take necessary precautions ranging from personal to strategic le...
作者:W. Al-Ahmad , B. Mohammad
来源:[J].International Journal of Information Security Science, 2013, Vol.2 (2)IJISS
摘要:Modern society depends on information technology in nearly every facet of human activity including, finance, transportation, education, government, and defense. Organizations are exposed to various kinds of risks, including information technology risks. Several standards, best pr...
作者:H. S , or , B. Genge ...
来源:[J].International Journal of Information Security Science, 2015, Vol.4 (3)IJISS
摘要:With the popularity of the Internet of Things on the rise, sensor networks have become essential parts of traditional Information and Communication Technology (ICT) infrastructures in a wide variety of applications. However, their increasing complexity, inter-connectivity, and pe...
作者:E.N. Nfuka , C. Sunga , M. Mshangi
来源:[J].International Journal of Information Security Science, 2014, Vol.3 (2)IJISS
摘要:The main objective of this study was to determine whether the rapid growth of cybercrimes affecting information systems in the global: is a myth or reality in Tanzania. The study was undertaken using a mixed research (quantitative and qualitative) methods. The research findi...
作者:M.M. Emmanuel , M.N. Ibrahim , A.E. Roger
来源:[J].International Journal of Information Security Science, 2015, Vol.4 (1)IJISS
摘要:One of the major points of interest in software engineering nowadays is how to ensure applic- ations configuration files’ security. In fact, they very often contain confidential information as database connection credentials, thereby providing a vulnerability point to these ...
作者:N.K. Shashidnar , D. Novak
来源:[J].International Journal of Information Security Science, 2015, Vol.4 (2)IJISS
摘要:Prefetch files, like any other file in a file system, can be viewed from a digital forensic perspective to further a forensic investigation. Using appropriate tools and techniques available to a digital forensic examiner, we explore and investigate the potential of prefetch files...
作者:L.L. Ray
来源:[J].International Journal of Information Security Science, 2013, Vol.2 (4)IJISS
摘要:Firewalls are core elements in network security, the effectiveness of firewall security is dependent on configuring the firewall policy correctly. A firewall policy describes the access that will be permitted or denied from the trusted network. In a corporate network several fire...
作者:S. Sznur
来源:[J].International Journal of Information Security Science, 2015, Vol.4 (2)IJISS
摘要:Users identification by means of their keystroke pattern is an old and known technique. Several works had analysed and solved some of the most important issues in this area, but with the advances of technology, previous techniques have quickly become obsolete. Users as well as at...
作者:D.R. Georgiev
来源:[J].International Journal of Information Security Science, 2014, Vol.3 (3)IJISS
摘要:Content or string matching is the core process of deep package inspection and pattern recognition used by the Network Intrusion Detection and Prevention Systems (NIDPS). Although there are many sophisticated algorithms in software it is an exhaustive process and still beneath the...
作者:T.J. Ogundele , AO. Adetunmei
来源:[J].International Journal of Information Security Science, 2014, Vol.3 (4)IJISS
摘要:This paper proposes and evaluates a multi-level system of steganography (MLSS) which is a combination of steganography, cryptography and compression. Data encryption standard is the encryption algorithm used while the compression algorithm is Lempel-Ziv. Our approach scans throug...

我们正在为您处理中,这可能需要一些时间,请稍等。

资源合作:cnki.scholar@cnki.net, +86-10-82896619   意见反馈:scholar@cnki.net

×