You are here: Home
Personal tools

Did you not find what you were looking for? Try the Advanced Search to refine your search.

Search results 773 items matching your search terms

Subscribe to an always-updated feed of these search terms

News Item Volume 21, Number 1
This is JISSec Volume 21, Number 1 launch announcement
Folder V21
JISSec contents: Volume 21
Document V21.html
JISSec contents: Volume 21
Folder N1
JISSec Volume 21, Number 1
Document V21N1.html
JISSec Volume 21, Number 1 (2025) contents
Cart Item JISSec_V21N1_Mulgund_p51_CI
Defense-in-Depth Model of Countermeasures against Adversarial AI Attacks: Literature Review and Classification, by Pavankumar Mulgund, Raghvendra Singh, Raj ...
Cart Item JISSec_V21N1_Jennex_p29_CI
Observations and Learnings from Cybersecurity Audits of SMEs, by Murray E. Jennex, Jeffry Babb and Amjad Abdullat - Cart Item
Cart Item JISSec_V21N1_Singh_p9_CI
Secure Captcha Generation with Blockchain Integration: The Case of Historical Gurmukhi Numeral Recognition, by Harpal Singh, Simpel Rani and Gurpreet Singh ...
Record V21N1_Singh.html
File V21N1_Dhillon_p3.pdf
Cybercrime: The Ever-Persistent Problem, by Gurpreet Dhillon - Full Text
Record V21N1_Dhillon.html
File V21N1_Editorial.pdf
JISSec Volume 21, Number 1 Editorial
News Item Volume 20, Number 3
This is JISSec Volume 20, Number 3 launch announcement
Cart Item JISSec_V20N3_Joubert_p185_CI
A Synthesis of Research on Insider Threats in Cybersecurity, by Daniël Joubert and Jan Eloff - Cart Item
Record V20N3_Joubert.html
Cart Item JISSec_V20N3_Caldeira_p167_CI
The Future of Cybersecurity: The Quantum Challenge, by Mário Caldeira and João Sabino - Cart Item
Record V20N3_Caldeira.html
Cart Item JISSec_V20N3_Li_p147_CI
Media Impact on Mobile Phishing Avoidance Behavior, by Xiaoqing Li - Cart Item
File V20N3_Dhillon_p143.pdf
The Power of Empowerment, by Gurpreet Dhillon - Full Text
Record V20N3_Dhillon.html
File V20N3_Editorial.pdf
JISSec Volume 20, Number 3 Editorial
File V20N3_FrontMatter.pdf
JISSec Volume 20, Number 3 Front Matter
Document V20N3.html
JISSec Volume 20, Number 3 (2024) contents
Folder N3
JISSec Volume 20, Number 3
News Item Volume 20, Number 2
This is JISSec Volume 20, Number 2 launch announcement
Cart Item JISSec_V20N2_Majadi_p111_CI
Detecting Collusive Seller Shill Bidding Using Social Network Analysis, by Nazia Majadi and Jarrod Trevathan - Cart Item
Record V20N2_Majadi.html
Cart Item JISSec_V20N2_Tilbury_p89_CI
The Rationality of Automation Bias in Security Operation Centers, by Jack Tilbury and Stephen Flowerday - Cart Item
Record V20N2_Tilbury.html
Record V20N2_Abdelhamid.html