《Journal of Information Security》

作品数:354被引量:184H指数:6
导出分析报告
《Journal of Information Security》
主办单位:美国科研出版社
最新期次:2025年1期更多>>
发文主题:SECURITYCYBERSECURITYCYBERATTACKPRIVACY更多>>
发文领域:自动化与计算机技术医药卫生理学电子电信更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-10
视图:
排序:
Information Security, Ethics, and Integrity in LLM Agent Interaction
《Journal of Information Security》2025年第1期184-196,共13页Ying-Jung Chen Vijay K. Madisetti 
This study addresses security and ethical challenges in LLM-based Multi-Agent Systems, as exemplified in a blockchain fraud detection case study. Leveraging blockchain’s secure architecture, the framework involves sp...
关键词:Multi LLM Agents Systems Blockchain Cooperative Interactions Fraud Detection Ethics and Safety 
Robust Detection and Analysis of Smart Contract Vulnerabilities with Large Language Model Agents
《Journal of Information Security》2025年第1期197-226,共30页Nishank P. Kuppa Vijay K. Madisetti 
Smart contracts on the Ethereum blockchain continue to revolutionize decentralized applications (dApps) by allowing for self-executing agreements. However, bad actors have continuously found ways to exploit smart cont...
关键词:Blockchain Ethereum Smart Contracts Security Decentralized Applications WEB3 Cryptocurrency Large Language Models 
Cybersecurity Guide for SMEs: Protecting Small and Medium-Sized Enterprises in the Digital Era
《Journal of Information Security》2025年第1期1-43,共43页Anastasios Papathanasiou George Liontos Athanasios Katsouras Vasiliki Liagkou Euripides Glavas 
Small and Medium-sized Enterprises (SMEs) are considered the backbone of global economy, but they often face cyberthreats which threaten their financial stability and operational continuity. This work aims to offer a ...
关键词:CYBERSECURITY CYBERCRIME SMEs (Small and Medium-Sized Enterprises) Risk Management Ransomware PHISHING Social Engineering MALWARE 
Designing a Comprehensive Data Governance Maturity Model for Kenya Ministry of Defence
《Journal of Information Security》2025年第1期44-69,共26页Gilly Gitahi Gathogo Simon Maina Karume Josphat Karani 
The study aimed to develop a customized Data Governance Maturity Model (DGMM) for the Ministry of Defence (MoD) in Kenya to address data governance challenges in military settings. Current frameworks lack specific req...
关键词:Data Governance Maturity Model Maturity Index Kenya Ministry of Defence Key Performance Indicators Data Security Regulations 
The Risks of the U.S. Cyber Crisis
《Journal of Information Security》2025年第1期70-77,共8页Theo Lim 
In today’s interconnected world, the ubiquitous influence of digital technology emphasizes the critical need to confront the growing menace of cybercrime. The unrelenting rise of cyber-attacks in the United States po...
关键词:CYBERSECURITY Digital Literacy Education Cybercrime Awareness 
Multi-Factor Authentication for Keyless Entry Systems: An Innovative Approach to Automotive Security
《Journal of Information Security》2025年第1期78-100,共23页Danilo Brito Shakour Abuzneid 
Car manufacturers aim to enhance the use of two-factor authentication (2FA) to protect keyless entry systems in contemporary cars. Despite providing significant ease for users, keyless entry systems have become more s...
关键词:MFA Keyless Entry Systems Automotive Security Biometric Authentication 
Kali Pi—A Miniature Ultra-Portable Penetration Testing Device
《Journal of Information Security》2025年第1期101-113,共13页Ahmed Bin Ali 
Penetration testing plays a critical role in ensuring security in an increasingly interconnected world. Despite advancements in technology leading to smaller, more portable devices, penetration testing remains reliant...
关键词:Penetration Testing Portable Device CYBERSECURITY Raspberry Pi 
A Review of Human Vulnerabilities in Cyber Security: Challenges and Solutions for Microfinance Institutions
《Journal of Information Security》2025年第1期114-130,共17页Evaline Waweru Simon Maina Karume Alex Kibet 
This review examines human vulnerabilities in cybersecurity within Microfinance Institutions, analyzing their impact on organizational resilience. Focusing on social engineering, inadequate security training, and weak...
关键词:Human Vulnerabilities CYBERSECURITY Microfinance Institutions Cyber Threats Cybersecurity Awareness Risk Mitigation 
Cybersecurity Challenges and Technological Integration in Military Supply Chain 4.0
《Journal of Information Security》2025年第1期131-148,共18页Nathalie Essi Afefa Takpah Victor Nosakhare Oriakhi 
The concept of Supply Chain 4.0 represents a transformative phase in supply chain management through advanced digital technologies like IoT, AI, blockchain, and cyber-physical systems. While these innovations deliver ...
关键词:CYBERSECURITY Supply Chain IOT BlockChain Artificial Intelligence 
Architecture to Secure Electrical Control System in Cyber-Physical System
《Journal of Information Security》2025年第1期149-157,共9页Depeng Li 
It’s possible for malicious operators to seize hold of electrical control systems, for instance, the engine control unit of driverless vehicles, from various vectors, e.g. autonomic control system, remote vehicle acc...
关键词:ARCHITECTURE Control System FRAMEWORK 
检索报告 对象比较 聚类工具 使用帮助 返回顶部