Published Articles with Keyword: Information Security
- Title: Development of Mathematical Algorithm for Detecting XSS Attacks on Web Applications
Authors: Komil Fikratovich Kerimov, Zarina Ildarovna Azizova
Doi: 10.37394/23209.2024.21.46
Download
| Download 
Published in WSEAS Transactions on Information Science and Applications, Volume 21, 2024
- Title: Competencies for Privacy and Security Professionals: The Discrepancy in Perspective between Employers and Employees
Authors: Reanata Mekovec, Dijana Oreški
Doi: 10.37394/23207.2024.21.172
Download
| Download 
Published in WSEAS Transactions on Business and Economics, Volume 21, 2024
- Title: The Construction of Financial Information Security Assessment Indicators based on Hierarchical Analysis Methods and Legal Regulation
Authors: Yingli Wang, Yinglong Zheng
Doi: 10.37394/232018.2024.12.29
Download
| Download 
Published in WSEAS Transactions on Computer Research, Volume 12, 2024
- Title: Penetration Testing for the Cloud-Based Web Application
Authors: Rafid Al-Khannak, Sajjan Singh Nehal
Doi: 10.37394/23205.2023.22.13
Download
| Download 
Published in WSEAS Transactions on Computers, Volume 22, 2023
- Title: Study of the Telecommunication Networks Performance and Reliability Indicators
Authors: Nugzar Chedia, Marina Chkhartishvili
Doi: 10.37394/23203.2023.18.21
Download
| Download 
Published in WSEAS Transactions on Systems and Control, Volume 18, 2023
- Title: Economic Security of the Enterprise Within the Conditions of Digital Transformation
Authors: Yuliia Samoilenko, Igor Britchenko, Iaroslava Levchenko, Peter Lošonczi, Oleksandr Bilichenko, Olena Bodnar
Doi: 10.37394/232032.2023.1.5
Download
| Download 
Published in Financial Engineering, Volume 1, 2023
- Title: Resilience Management of Critical Cyber-Physical Systems: A Multiple Case Study Analysis
Authors: Jyri Rajamäki
Doi: 10.37394/232022.2021.1.12
Download
| Download 
Published in Design, Construction, Maintenance, Volume 1, 2021
- Title: The Impact of Knowledge of the Issue of Identification and Authentication on the Information Security of Adolescents in the Virtual Space
Authors: Ljerka Luić, Draženka Švelec-Juričić, Petar Mišević
Doi: 10.37394/23203.2021.16.49
Download
| Download 
Published in WSEAS Transactions on Systems and Control, Volume 16, 2021
- Title: Problems of Ensuring Personnel Stability and Security in the Government Authorities of Countries with Economies in Transition
Authors: Svitlana V. Kapitanets, Nataliia Varenia, Olena L. Korolchuk, Tetiana Kulinich, Olena Kilnitska, Hanna Holovchak
Doi: 10.37394/23207.2021.18.77
Download
| Download 
Published in WSEAS Transactions on Business and Economics, Volume 18, 2021
- Title: IOT Supported Security Considerations for Network
Authors: K. Thamizhmaran
Doi: 10.37394/23204.2020.19.14
Download
| Download 
Published in WSEAS Transactions on Communications, Volume 19, 2020
- Title: Analysis of Fuzzy Based Provably Secure Multi-Server Authentication Remote User Authentication Scheme
Authors: Nishant Doshi
Download
| Download 
Published in WSEAS Transactions on Information Science and Applications, Volume 16, 2019
- Title: Risk Management in the context of Information Security: a Model-Driven approach
Authors: Anacleto Correia, António Gonçalves, M. Filomena Teodoro
Download
| Download 
Published in WSEAS Transactions on Information Science and Applications, Volume 14, 2017
- Title: Models and Method for the Risk Assessment of an Intellectual Resource
Authors: Maciej Kiedrowicz, Jerzy Stanik
Download
| Download 
Published in WSEAS Transactions on Communications, Volume 16, 2017
- Title: An Investigation of the Use of MJEA in Image Encryption
Authors: Jamal N. Bani Salameh
Download
| Download 
Published in WSEAS Transactions on Computers, Volume 15, 2016
- Title: Multi-Integer Somewhat Homomorphic Encryption Scheme with China Remainder Theorem
Authors: Chao Feng, Yang Xin, Yixian Yang, Hongliang Zhu
Download
| Download 
Published in WSEAS Transactions on Computers, Volume 14, 2015
- Title: Information Security Using Surrogate Object Based Encryption in Mobile Cloud Systems
Authors: S. Ravimaran, A. N. Gnana Jeevan, M. A. Maluk Mohamed
Download
| Download 
Published in WSEAS Transactions on Computers, Volume 14, 2015
- Title: A Novel Image Encryption Approach Using Matrix Reordering
Authors: T. Sivakumar, R. Venkatesan
Download
| Download 
Published in WSEAS Transactions on Computers, Volume 12, 2013