信息安全学国际期刊
期刊
会议
图书
作者:M. Karaman , H. Catalkaya , C. Aybar
来源:[J].International Journal of Information Security Science, 2016, Vol.5 (1)
摘要:In the time we are living in, the nonlinear increase, usage and reliability on information communication technologies (ICT) are going to move forward. In this digital environment, people, institutions and government take necessary precautions ranging from personal to strategic le...
作者:F. Mastjik , C. Varol , A. Varol
来源:[J].International Journal of Information Security Science, 2015, Vol.4 (3)
摘要:Development in computing technology for the past decade has also given rise to threats against the users, particularly in form of malware. However, manual malware identification effort is being overwhelmed due to the sheer number of malware being created every day. Most of the ma...
作者:H. S , or , B. Genge ...
来源:[J].International Journal of Information Security Science, 2015, Vol.4 (3)
摘要:With the popularity of the Internet of Things on the rise, sensor networks have become essential parts of traditional Information and Communication Technology (ICT) infrastructures in a wide variety of applications. However, their increasing complexity, inter-connectivity, and pe...
作者:B. Genge , P. Haller , C. Enachescu
来源:[J].International Journal of Information Security Science, 2015, Vol.4 (3)
摘要:Nowadays, the increasing number of devices and services that require a direct Internet access, creates new security challenges. These challenges need to meet user feature-based requirements with the companies' restrictive security policies. Therefore, security administrators need...
作者:E. Bostanci
来源:[J].International Journal of Information Security Science, 2015, Vol.4 (2)
摘要:Crime Scene Investigation (CSI) is a carefully planned systematic process with the purpose of acquiring physical evidences to shed light upon the physical reality of the crime and eventually detect the identity of the criminal. Capturing images and videos of the crime scene is an...
作者:K. Goztepe
来源:[J].International Journal of Information Security Science, 2015, Vol.4 (2)
摘要:The nature and range of threats to security have extremely changed that caused a following reaction which is the transition in the nature of the war as well. Under the changing circumstances of operational environment and in the face of new security environment which is more...
作者:S. Sznur
来源:[J].International Journal of Information Security Science, 2015, Vol.4 (2)
摘要:Users identification by means of their keystroke pattern is an old and known technique. Several works had analysed and solved some of the most important issues in this area, but with the advances of technology, previous techniques have quickly become obsolete. Users as well as at...
作者:N.K. Shashidnar , D. Novak
来源:[J].International Journal of Information Security Science, 2015, Vol.4 (2)
摘要:Prefetch files, like any other file in a file system, can be viewed from a digital forensic perspective to further a forensic investigation. Using appropriate tools and techniques available to a digital forensic examiner, we explore and investigate the potential of prefetch files...
作者:Z. Ozleblebici , Y. Ekiz , B. Aydin
来源:[J].International Journal of Information Security Science, 2015, Vol.4 (2)
摘要:Nowadays technologies, the parties, the time, etc. are differentiated and there has been a continuous change in the operational environment. In this case, the commanders or decision makers are forced to take right, rapid and instant decisions. Thus, the needs for accurate an...
作者:M.M. Emmanuel , M.N. Ibrahim , A.E. Roger
来源:[J].International Journal of Information Security Science, 2015, Vol.4 (1)
摘要:One of the major points of interest in software engineering nowadays is how to ensure applic- ations configuration files’ security. In fact, they very often contain confidential information as database connection credentials, thereby providing a vulnerability point to these ...

我们正在为您处理中,这可能需要一些时间,请稍等。

资源合作:cnki.scholar@cnki.net, +86-10-82896619   意见反馈:scholar@cnki.net

×