- Info
Search results
—
773 items matching your search terms
Subscribe to an always-updated feed of these search terms
-
Volume 21, Number 1
-
This is JISSec Volume 21, Number 1 launch announcement
-
V21
-
JISSec contents: Volume 21
-
V21.html
-
JISSec contents: Volume 21
-
N1
-
JISSec Volume 21, Number 1
-
V21N1.html
-
JISSec Volume 21, Number 1 (2025) contents
-
JISSec_V21N1_Mulgund_p51_CI
-
Defense-in-Depth Model of Countermeasures against Adversarial AI Attacks: Literature Review and Classification, by Pavankumar Mulgund, Raghvendra Singh, Raj ...
-
JISSec_V21N1_Jennex_p29_CI
-
Observations and Learnings from Cybersecurity Audits of SMEs, by Murray E. Jennex, Jeffry Babb and
Amjad Abdullat - Cart Item
-
JISSec_V21N1_Singh_p9_CI
-
Secure Captcha Generation with Blockchain Integration: The Case of Historical Gurmukhi Numeral Recognition, by Harpal Singh, Simpel Rani and Gurpreet Singh ...
-
V21N1_Singh.html
-
-
V21N1_Dhillon_p3.pdf
-
Cybercrime: The Ever-Persistent Problem, by Gurpreet Dhillon - Full Text
-
V21N1_Dhillon.html
-
-
V21N1_Editorial.pdf
-
JISSec Volume 21, Number 1 Editorial
-
Volume 20, Number 3
-
This is JISSec Volume 20, Number 3 launch announcement
-
JISSec_V20N3_Joubert_p185_CI
-
A Synthesis of Research on Insider Threats in Cybersecurity, by Daniël Joubert and Jan Eloff - Cart Item
-
V20N3_Joubert.html
-
-
JISSec_V20N3_Caldeira_p167_CI
-
The Future of Cybersecurity: The Quantum Challenge, by Mário Caldeira and João Sabino - Cart Item
-
V20N3_Caldeira.html
-
-
JISSec_V20N3_Li_p147_CI
-
Media Impact on Mobile Phishing Avoidance Behavior, by Xiaoqing Li - Cart Item
-
V20N3_Dhillon_p143.pdf
-
The Power of Empowerment, by Gurpreet Dhillon - Full Text
-
V20N3_Dhillon.html
-
-
V20N3_Editorial.pdf
-
JISSec Volume 20, Number 3 Editorial
-
V20N3_FrontMatter.pdf
-
JISSec Volume 20, Number 3 Front Matter
-
V20N3.html
-
JISSec Volume 20, Number 3 (2024) contents
-
N3
-
JISSec Volume 20, Number 3
-
Volume 20, Number 2
-
This is JISSec Volume 20, Number 2 launch announcement
-
JISSec_V20N2_Majadi_p111_CI
-
Detecting Collusive Seller Shill Bidding Using Social Network Analysis, by Nazia Majadi and Jarrod Trevathan - Cart Item
-
V20N2_Majadi.html
-
-
JISSec_V20N2_Tilbury_p89_CI
-
The Rationality of Automation Bias in Security Operation Centers, by
Jack Tilbury and Stephen Flowerday - Cart Item
-
V20N2_Tilbury.html
-
-
V20N2_Abdelhamid.html
-