首页 > 最新文献

信息安全(英文)最新文献

英文 中文
Security Model for Cloud Computing: Case Report of Organizational Vulnerability 云计算安全模型:组织漏洞案例报告
Pub Date : 2023-01-01 DOI: 10.4236/jis.2023.144015
Sakharkar Shreyas
{"title":"Security Model for Cloud Computing: Case Report of Organizational Vulnerability","authors":"Sakharkar Shreyas","doi":"10.4236/jis.2023.144015","DOIUrl":"https://doi.org/10.4236/jis.2023.144015","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70335400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Learning with Errors Public Key Cryptosystem with Its Security 带错误学习的公钥密码系统及其安全性
Pub Date : 2023-01-01 DOI: 10.4236/jis.2023.141003
Zhiyong Zheng, Kun Tian, Yan Zhang, Yunfan Lu
{"title":"Learning with Errors Public Key Cryptosystem with Its Security","authors":"Zhiyong Zheng, Kun Tian, Yan Zhang, Yunfan Lu","doi":"10.4236/jis.2023.141003","DOIUrl":"https://doi.org/10.4236/jis.2023.141003","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity Requirements for Management Information Systems 管理信息系统的网络安全要求
Pub Date : 2023-01-01 DOI: 10.4236/jis.2023.143013
N. K. Samara
{"title":"Cybersecurity Requirements for Management Information Systems","authors":"N. K. Samara","doi":"10.4236/jis.2023.143013","DOIUrl":"https://doi.org/10.4236/jis.2023.143013","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70335383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FastAttacker: Semantic Perturbation Functions via Three Classifications 快速攻击者:通过三种分类的语义扰动函数
Pub Date : 2023-01-01 DOI: 10.4236/jis.2023.142011
Meng Lu
{"title":"FastAttacker: Semantic Perturbation Functions via Three Classifications","authors":"Meng Lu","doi":"10.4236/jis.2023.142011","DOIUrl":"https://doi.org/10.4236/jis.2023.142011","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":"50 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70335333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hardware Security for IoT in the Quantum Era: Survey and Challenges 量子时代物联网硬件安全:调查与挑战
Pub Date : 2023-01-01 DOI: 10.4236/jis.2023.144014
Doudou Dione, Boly Seck, I. Diop, Pierre-Louis Cayrel, Demba Faye, I. Gueye
{"title":"Hardware Security for IoT in the Quantum Era: Survey and Challenges","authors":"Doudou Dione, Boly Seck, I. Diop, Pierre-Louis Cayrel, Demba Faye, I. Gueye","doi":"10.4236/jis.2023.144014","DOIUrl":"https://doi.org/10.4236/jis.2023.144014","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70335389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Forensics: Collection of Sound Digital Evidence 取证:声音数字证据的收集
Pub Date : 2023-01-01 DOI: 10.4236/jis.2023.144025
Richard Kabanda, Harihar Thapa, Luis Rivera
This summary paper will discuss the concept of forensic evidence and evidence collection methods. Emphasis will be placed on the techniques used to collect forensically sound digital evidence for the purpose of introduction to digital forensics. This discussion will thereafter result in identifying and categorizing the different types of digital forensics evidence and a clear procedure for how to collect forensically sound digital evidence. This paper will further discuss the creation of awareness and promote the idea that competent practice of computer forensics collection is important for admissibility in court.
本文将讨论司法证据的概念和证据收集方法。重点将放在用于收集法医声音数字证据的技术上,以介绍数字取证的目的。此后,本讨论将导致识别和分类不同类型的数字取证证据,以及如何收集法医可靠的数字证据的明确程序。本文将进一步讨论意识的建立,并促进计算机取证收集的有效实践对法庭可采性的重要性。
{"title":"Forensics: Collection of Sound Digital Evidence","authors":"Richard Kabanda, Harihar Thapa, Luis Rivera","doi":"10.4236/jis.2023.144025","DOIUrl":"https://doi.org/10.4236/jis.2023.144025","url":null,"abstract":"This summary paper will discuss the concept of forensic evidence and evidence collection methods. Emphasis will be placed on the techniques used to collect forensically sound digital evidence for the purpose of introduction to digital forensics. This discussion will thereafter result in identifying and categorizing the different types of digital forensics evidence and a clear procedure for how to collect forensically sound digital evidence. This paper will further discuss the creation of awareness and promote the idea that competent practice of computer forensics collection is important for admissibility in court.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135158177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classification of Big Data Security Based on Ontology Web Language 基于本体Web语言的大数据安全分类
Pub Date : 2023-01-01 DOI: 10.4236/jis.2023.141006
Alsadig Mohammed Adam Abdallah, A. M. Talib
{"title":"Classification of Big Data Security Based on Ontology Web Language","authors":"Alsadig Mohammed Adam Abdallah, A. M. Talib","doi":"10.4236/jis.2023.141006","DOIUrl":"https://doi.org/10.4236/jis.2023.141006","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":"5 2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards a New Model for the Production of Civil Status Records Using Blockchain 基于区块链的公民身份档案制作新模式探讨
Pub Date : 2023-01-01 DOI: 10.4236/jis.2023.141005
Tankou Tsomo Maurice Eddy, Bell Bitjoka Georges, Ngohe Ekam Paul Salomon
{"title":"Towards a New Model for the Production of Civil Status Records Using Blockchain","authors":"Tankou Tsomo Maurice Eddy, Bell Bitjoka Georges, Ngohe Ekam Paul Salomon","doi":"10.4236/jis.2023.141005","DOIUrl":"https://doi.org/10.4236/jis.2023.141005","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Appraising the Manifestation of Optimism Bias and Its Impact on Human Perception of Cyber Security: A Meta Analysis 评价乐观偏见的表现及其对人类网络安全感知的影响:一个元分析
Pub Date : 2023-01-01 DOI: 10.4236/jis.2023.142007
Khaled M. Alnifie, Charles J. Kim
{"title":"Appraising the Manifestation of Optimism Bias and Its Impact on Human Perception of Cyber Security: A Meta Analysis","authors":"Khaled M. Alnifie, Charles J. Kim","doi":"10.4236/jis.2023.142007","DOIUrl":"https://doi.org/10.4236/jis.2023.142007","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Study the Effectiveness of ISO 27001 to Mitigate the Cyber Security Threats in the Egyptian Downstream Oil and Gas Industry 研究ISO 27001在缓解埃及下游油气行业网络安全威胁方面的有效性
Pub Date : 2023-01-01 DOI: 10.4236/jis.2023.142010
Mohamed Shohoud
{"title":"Study the Effectiveness of ISO 27001 to Mitigate the Cyber Security Threats in the Egyptian Downstream Oil and Gas Industry","authors":"Mohamed Shohoud","doi":"10.4236/jis.2023.142010","DOIUrl":"https://doi.org/10.4236/jis.2023.142010","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70335271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
信息安全(英文)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1