


default search action
International Journal of Systems and Software Security and Protection, Volume 13
Volume 13, Number 1, 2022
- Madhuri Gedam

, Bandu Baburao Meshram:
Proposed Secure 3-Use Case Diagram. 1-18 - Humayun Zafar:

Critical Success Factors for an Effective Security Risk Management Program. 1-26 - Festus Elleh:

Cyber Security and COVID-19: Understanding Cyber Predators and Vulnerabilities for Teenagers. 1-14 - Christophe Feltus:

Learning Algorithm Recommendation Framework for IS and CPS Security: Analysis of the RNN, LSTM, and GRU Contributions. 1-23 - Mihir Mehta, Kajal Patel

:
A Survey on IoT Authentication Security Service: Open Issues, Security Threats, and Future Solution Direction. 1-13 - Enka Blanchard:

Client-Side Hashing for Efficient Typo-Tolerant Password Checkers. 1-24 - Chaima Boulifi, Mouna Jouini

:
Towards a New Quantitative Availability Model for Computer Systems Based on Classifications of Security Requirements. 1-20 - Humayun Zafar:

Detecting and Rectifying the Non-Malicious Insider Threat in a Healthcare Setting. 1-20 - Jianping Peng, Guoying Zhang, Chun-Hung Chiu:

An Empirical Investigation on Vulnerability for Software Companies. 1-15

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














