What the Editors-in-Chief say about the review process in our Journals: Our Editors-in-Chief declare, confirm, certify and sign the substantial, important, line by line peer review process and our high-rejection rates.
Published Articles with Keyword: Information security
- Title: Development of Mathematical Algorithm for Detecting XSS Attacks on Web Applications
Authors: Komil Fikratovich Kerimov, Zarina Ildarovna Azizova
Doi: 10.37394/23209.2024.21.46
Download | Download
Published in WSEAS Transactions on Information Science and Applications, Volume 21, 2024 - Title: Competencies for Privacy and Security Professionals: The Discrepancy in Perspective between Employers and Employees
Authors: Reanata Mekovec, Dijana Oreški
Doi: 10.37394/23207.2024.21.172
Download | Download
Published in WSEAS Transactions on Business and Economics, Volume 21, 2024 - Title: The Construction of Financial Information Security Assessment Indicators based on Hierarchical Analysis Methods and Legal Regulation
Authors: Yingli Wang, Yinglong Zheng
Doi: 10.37394/232018.2024.12.29
Download | Download
Published in WSEAS Transactions on Computer Research, Volume 12, 2024 - Title: Penetration Testing for the Cloud-Based Web Application
Authors: Rafid Al-Khannak, Sajjan Singh Nehal
Doi: 10.37394/23205.2023.22.13
Download | Download
Published in WSEAS Transactions on Computers, Volume 22, 2023 - Title: Study of the Telecommunication Networks Performance and Reliability Indicators
Authors: Nugzar Chedia, Marina Chkhartishvili
Doi: 10.37394/23203.2023.18.21
Download | Download
Published in WSEAS Transactions on Systems and Control, Volume 18, 2023 - Title: Economic Security of the Enterprise Within the Conditions of Digital Transformation
Authors: Yuliia Samoilenko, Igor Britchenko, Iaroslava Levchenko, Peter Lošonczi, Oleksandr Bilichenko, Olena Bodnar
Doi: 10.37394/232032.2023.1.5
Download | Download
Published in Financial Engineering, Volume 1, 2023 - Title: Resilience Management of Critical Cyber-Physical Systems: A Multiple Case Study Analysis
Authors: Jyri Rajamäki
Doi: 10.37394/232022.2021.1.12
Download | Download
Published in Design, Construction, Maintenance, Volume 1, 2021 - Title: The Impact of Knowledge of the Issue of Identification and Authentication on the Information Security of Adolescents in the Virtual Space
Authors: Ljerka Luić, Draženka Švelec-Juričić, Petar Mišević
Doi: 10.37394/23203.2021.16.49
Download | Download
Published in WSEAS Transactions on Systems and Control, Volume 16, 2021 - Title: Problems of Ensuring Personnel Stability and Security in the Government Authorities of Countries with Economies in Transition
Authors: Svitlana V. Kapitanets, Nataliia Varenia, Olena L. Korolchuk, Tetiana Kulinich, Olena Kilnitska, Hanna Holovchak
Doi: 10.37394/23207.2021.18.77
Download | Download
Published in WSEAS Transactions on Business and Economics, Volume 18, 2021 - Title: IOT Supported Security Considerations for Network
Authors: K. Thamizhmaran
Doi: 10.37394/23204.2020.19.14
Download | Download
Published in WSEAS Transactions on Communications, Volume 19, 2020 - Title: Analysis of Fuzzy Based Provably Secure Multi-Server Authentication Remote User Authentication Scheme
Authors: Nishant Doshi
Download | Download
Published in WSEAS Transactions on Information Science and Applications, Volume 16, 2019 - Title: Risk Management in the context of Information Security: a Model-Driven approach
Authors: Anacleto Correia, António Gonçalves, M. Filomena Teodoro
Download | Download
Published in WSEAS Transactions on Information Science and Applications, Volume 14, 2017 - Title: Models and Method for the Risk Assessment of an Intellectual Resource
Authors: Maciej Kiedrowicz, Jerzy Stanik
Download | Download
Published in WSEAS Transactions on Communications, Volume 16, 2017 - Title: An Investigation of the Use of MJEA in Image Encryption
Authors: Jamal N. Bani Salameh
Download | Download
Published in WSEAS Transactions on Computers, Volume 15, 2016 - Title: Multi-Integer Somewhat Homomorphic Encryption Scheme with China Remainder Theorem
Authors: Chao Feng, Yang Xin, Yixian Yang, Hongliang Zhu
Download | Download
Published in WSEAS Transactions on Computers, Volume 14, 2015 - Title: Information Security Using Surrogate Object Based Encryption in Mobile Cloud Systems
Authors: S. Ravimaran, A. N. Gnana Jeevan, M. A. Maluk Mohamed
Download | Download
Published in WSEAS Transactions on Computers, Volume 14, 2015 - Title: A Novel Image Encryption Approach Using Matrix Reordering
Authors: T. Sivakumar, R. Venkatesan
Download | Download
Published in WSEAS Transactions on Computers, Volume 12, 2013