Subjects -> HEALTH AND SAFETY (Total: 1464 journals)
    - CIVIL DEFENSE (22 journals)
    - DRUG ABUSE AND ALCOHOLISM (87 journals)
    - HEALTH AND SAFETY (686 journals)
    - HEALTH FACILITIES AND ADMINISTRATION (358 journals)
    - OCCUPATIONAL HEALTH AND SAFETY (112 journals)
    - PHYSICAL FITNESS AND HYGIENE (117 journals)
    - WOMEN'S HEALTH (82 journals)

CIVIL DEFENSE (22 journals)

Showing 1 - 18 of 18 Journals sorted alphabetically
Aggression and Violent Behavior     Hybrid Journal   (Followers: 369)
Canadian Journal of Remote Sensing     Full-text available via subscription   (Followers: 56)
Disaster Recovery Journal     Full-text available via subscription   (Followers: 4)
Disasters     Hybrid Journal   (Followers: 20)
Evolution, Medicine, and Public Health     Open Access   (Followers: 9)
Global & Regional Health Technology Assessment     Open Access   (Followers: 2)
International Journal of Critical Infrastructure Protection     Hybrid Journal   (Followers: 4)
International Journal of Emergency Management     Hybrid Journal   (Followers: 11)
International Journal of Emergency Services     Hybrid Journal   (Followers: 22)
International Journal of Forensic Engineering     Hybrid Journal   (Followers: 2)
International Journal of Intelligent Defence Support Systems     Hybrid Journal   (Followers: 4)
Journal of Applied Security Research     Hybrid Journal   (Followers: 3)
Journal of Health Care Law and Policy     Open Access   (Followers: 4)
Korean Journal of Defense Analysis     Hybrid Journal  
Prehospital and Disaster Medicine     Full-text available via subscription   (Followers: 7)
Risk, Hazards & Crisis in Public Policy     Hybrid Journal   (Followers: 5)
Strategic Analysis     Hybrid Journal   (Followers: 7)
Studies in Conflict & Terrorism     Hybrid Journal   (Followers: 377)
Similar Journals
Journal Cover
Journal of Applied Security Research
Journal Prestige (SJR): 0.142
Number of Followers: 3  
 
Hybrid Journal Hybrid journal   * Containing 1 Open Access Open Access article(s) in this issue *
ISSN (Print) 1936-1610 - ISSN (Online) 1936-1629
Published by Taylor and Francis Homepage  [2652 journals]
  • A Natural Experiment of the Prince Hypothesis on Classroom Vandalism

    • Free pre-print version: Loading...

      Authors: William A. Chernoff
      Pages: 1 - 23
      Abstract: .

      Citation: Journal of Applied Security Research
      PubDate: 2023-01-26T04:00:17Z
      DOI: 10.1080/19361610.2023.2169545
       
  • The Effects of Justice Views on Turnover Intent, Sick-Leave Views, and
           Sick-Leave Use Among Private Prison Staff

    • Free pre-print version: Loading...

      Authors: Eric G. Lambert, Nancy L. Hogan, Robert M. Worley, Monica Solinas-Saunders
      Pages: 1 - 24
      Abstract: .

      Citation: Journal of Applied Security Research
      PubDate: 2023-01-04T09:48:37Z
      DOI: 10.1080/19361610.2022.2161798
       
  • SAM: A Mechanism to Facilitate Smear-Aware Forensic Analysis of Volatile
           System Memory

    • Free pre-print version: Loading...

      Authors: Trushna Parida, Kanika Nath, Suvrojit Das
      Pages: 1 - 30
      Abstract: .

      Citation: Journal of Applied Security Research
      PubDate: 2022-12-30T04:16:29Z
      DOI: 10.1080/19361610.2022.2161972
       
  • Preventing Revictimization in Sexual Assault Investigations: Personal
           Security and Trauma-Informed Case Management*

    • Free pre-print version: Loading...

      Authors: Katalin Parti
      Pages: 1 - 12
      Abstract: .

      Citation: Journal of Applied Security Research
      PubDate: 2022-12-30T04:08:03Z
      DOI: 10.1080/19361610.2022.2161799
       
  • Enhancing Multimedia Security Using Shortest Weight First Algorithm and
           Symmetric Cryptography

    • Free pre-print version: Loading...

      Authors: Karishni Mehta, Glen Dhingra, Ramchandra Mangrulkar
      Pages: 1 - 24
      Abstract: .

      Citation: Journal of Applied Security Research
      PubDate: 2022-12-19T02:54:36Z
      DOI: 10.1080/19361610.2022.2157193
       
  • Ontology-Based Metrics Computation for System Security Assurance
           Evaluation

         This is an Open Access Article Open Access Article

    • Free pre-print version: Loading...

      Authors: Shao-Fang Wen, Basel Katt
      Pages: 1 - 46
      Abstract: .

      Citation: Journal of Applied Security Research
      PubDate: 2022-12-19T02:50:40Z
      DOI: 10.1080/19361610.2022.2157190
       
  • Modified Symmetric Image Encryption Approach Based on Mixed Column and
           Substitution Box

    • Free pre-print version: Loading...

      Authors: Vaishnavi Sawant, Ahmed Solkar, Ramchandra Mangrulkar
      Pages: 1 - 34
      Abstract: .

      Citation: Journal of Applied Security Research
      PubDate: 2022-11-30T10:08:35Z
      DOI: 10.1080/19361610.2022.2150498
       
  • DieRoll: A Unique Key Generation and Encryption Technique

    • Free pre-print version: Loading...

      Authors: Dhruv Mehta, Manish Jha, Hartik Suhagiya, Ramchandra Mangrulkar
      Pages: 1 - 28
      Abstract: .

      Citation: Journal of Applied Security Research
      PubDate: 2022-10-13T04:39:15Z
      DOI: 10.1080/19361610.2022.2124589
       
  • Communication in Global Jihad

    • Free pre-print version: Loading...

      Authors: Frank Musmar
      Pages: 1 - 2
      Abstract: .

      Citation: Journal of Applied Security Research
      PubDate: 2022-09-28T05:39:20Z
      DOI: 10.1080/19361610.2022.2125253
       
  • Fraud in Online Classified Ads: Strategies, Risks, and Detection Methods:
           A Survey

    • Free pre-print version: Loading...

      Authors: Jamil R. Alzghoul, Emad E. Abdallah, Abdel-hafiz S. Al-khawaldeh
      Pages: 1 - 25
      Abstract: .

      Citation: Journal of Applied Security Research
      PubDate: 2022-09-22T06:41:44Z
      DOI: 10.1080/19361610.2022.2124328
       
  • QR Codes to Prevent Copyright Infringement: Case Study of Trusmi Batik in
           Cirebon, Indonesia

    • Free pre-print version: Loading...

      Authors: Enni Soerjati Priowirjanto, Eman Suparman, Muhamad Amirulloh, Ema Rahmawati
      Pages: 1 - 7
      Abstract: .

      Citation: Journal of Applied Security Research
      PubDate: 2022-09-12T03:34:41Z
      DOI: 10.1080/19361610.2022.2113731
       
  • IoT Security in Industry: A Threat Model of Existing and Future Network
           Infrastructure

    • Free pre-print version: Loading...

      Authors: Jackie McNett, Josh McNett, Xiaoli Su
      Pages: 1 - 19
      Abstract: .

      Citation: Journal of Applied Security Research
      PubDate: 2022-09-01T04:40:42Z
      DOI: 10.1080/19361610.2022.2116921
       
  • Privacy Enhanced Healthcare Data Management Using Associative Data Mining
           Approaches

    • Free pre-print version: Loading...

      Authors: N. Duraimutharasan
      Pages: 1 - 18
      Abstract: .

      Citation: Journal of Applied Security Research
      PubDate: 2022-08-29T05:33:39Z
      DOI: 10.1080/19361610.2022.2099707
       
  • Predicting Money Laundering Using Machine Learning and Artificial Neural
           Networks Algorithms in Banks

    • Free pre-print version: Loading...

      Authors: Mark E. Lokanan
      Pages: 1 - 25
      Abstract: .

      Citation: Journal of Applied Security Research
      PubDate: 2022-08-26T05:54:15Z
      DOI: 10.1080/19361610.2022.2114744
       
  • Stego Detection: Image Steganalysis Using a Novel Hidden Stego Visual
           Geometry Group–Based CNN Classification

    • Free pre-print version: Loading...

      Authors: Hemalatha Jeyaprakash, Bala Subramanian Chokkalingam, Vivek V, Sekar Mohan
      Pages: 1 - 21
      Abstract: .

      Citation: Journal of Applied Security Research
      PubDate: 2022-08-24T05:57:14Z
      DOI: 10.1080/19361610.2022.2110637
       
  • Adversarial Propaganda: How Enemies Target the U.S. to Fuel Division

    • Free pre-print version: Loading...

      Authors: Molly M. Dundon, Shannon C. Houck
      Pages: 1 - 9
      Abstract: .

      Citation: Journal of Applied Security Research
      PubDate: 2022-08-22T04:58:37Z
      DOI: 10.1080/19361610.2022.2113730
       
  • Geospatial Intelligence and Artificial Intelligence for Detecting
           Potential Coca Paste Production Infrastructure in the Border Region of
           Venezuela and Colombia

    • Free pre-print version: Loading...

      Authors: Jairo Jesús Pinto Hidalgo, Jorge Antonio Silva Centeno
      Pages: 1 - 51
      Abstract: .

      Citation: Journal of Applied Security Research
      PubDate: 2022-08-19T06:44:14Z
      DOI: 10.1080/19361610.2022.2111184
       
  • Dimensional Reduction With Fast ICA for IoT Botnet Detection

    • Free pre-print version: Loading...

      Authors: Susanto  , Deris Stiawan, Dian Palupi Rini, M. Agus Syamsul Arifin, Mohd Yazid Idris, Nizar Alsharif, Rahmat Budiarto
      Pages: 1 - 24
      Abstract: .

      Citation: Journal of Applied Security Research
      PubDate: 2022-08-13T06:55:37Z
      DOI: 10.1080/19361610.2022.2079906
       
  • Searchable Encryption Taxonomy: Survey

    • Free pre-print version: Loading...

      Authors: M. H. Noorallahzadeh, R. Alimoradi, A. Gholami
      Pages: 1 - 45
      Abstract: .

      Citation: Journal of Applied Security Research
      PubDate: 2022-08-11T09:54:38Z
      DOI: 10.1080/19361610.2022.2103364
       
  • Brazil Method of Anti-Malware Evaluation and Cyber Defense Impacts

    • Free pre-print version: Loading...

      Authors: Rodrigo Ruiz, Rogério Winter, Ferrucio de Franco Rosa, Pancham Shukla, Hassan Kazemian
      Pages: 1 - 17
      Abstract: .

      Citation: Journal of Applied Security Research
      PubDate: 2022-08-02T03:21:47Z
      DOI: 10.1080/19361610.2022.2104104
       
  • In Search for the Best Police Oversight Mechanism for Zimbabwe: The
           Imperative for an Independent Police Complaints Board

    • Free pre-print version: Loading...

      Authors: Ishmael Mugari, Adewale A. Olutola
      Pages: 1 - 18
      Abstract: .

      Citation: Journal of Applied Security Research
      PubDate: 2022-08-01T05:39:07Z
      DOI: 10.1080/19361610.2022.2105283
       
  • A Real-Time Hardware Intrusion Detection System and a Classifying Features
           Algorithm

    • Free pre-print version: Loading...

      Authors: Tarek Salah Sobh
      Pages: 1 - 35
      Abstract: .

      Citation: Journal of Applied Security Research
      PubDate: 2022-07-28T05:59:58Z
      DOI: 10.1080/19361610.2022.2103363
       
  • An Improved KNN Classifier for 3D Face Recognition Based on SURF
           Descriptors

    • Free pre-print version: Loading...

      Authors: Ahmed Yassine Boumedine, Samia Bentaieb, Abdelaziz Ouamri
      Pages: 1 - 19
      Abstract: .

      Citation: Journal of Applied Security Research
      PubDate: 2022-07-27T04:59:46Z
      DOI: 10.1080/19361610.2022.2099688
       
  • Criminological and Victimological Support of World and National Security
           during Quarantine Measures Related to the Spread of Acute Respiratory
           Disease COVID-19 Caused by Coronavirus Sars-Cov-2

    • Free pre-print version: Loading...

      Authors: Roman Veresha, Alexander Dzhuzha, Dmitry Tychyna, Anastasiya Dzhuzha
      Pages: 1 - 19
      Abstract: .

      Citation: Journal of Applied Security Research
      PubDate: 2022-07-26T09:56:10Z
      DOI: 10.1080/19361610.2022.2104106
       
  • BCPIS: Blockchain-based Counterfeit Product Identification System

    • Free pre-print version: Loading...

      Authors: Mrunal Mhatre, Harshvivek Kashid, Tanisha Jain, Pallavi Chavan
      Pages: 1 - 26
      Abstract: .

      Citation: Journal of Applied Security Research
      PubDate: 2022-07-13T06:55:46Z
      DOI: 10.1080/19361610.2022.2086784
       
  • Enhancing Burp Suite with Machine Learning Extension for Vulnerability
           Assessment of Web Applications

    • Free pre-print version: Loading...

      Authors: Rrezearta Thaqi, Kamer Vishi, Blerim Rexha
      Pages: 1 - 19
      Abstract: .

      Citation: Journal of Applied Security Research
      PubDate: 2022-07-10T04:23:13Z
      DOI: 10.1080/19361610.2022.2096387
       
  • One-Chance Transit Crime and Commuters’ Victimization Experiences in
           Ibadan City, Nigeria

    • Free pre-print version: Loading...

      Authors: Olusegun I. Olaniyan, Usman A. Ojedokun, Adeyinka A. Aderinto
      Pages: 1 - 15
      Abstract: .

      Citation: Journal of Applied Security Research
      PubDate: 2022-07-07T10:48:16Z
      DOI: 10.1080/19361610.2022.2094209
       
  • Public-Private Partnerships: Exploring Perceptions and Efficacy of
           Community Security Patrols

    • Free pre-print version: Loading...

      Authors: Stephen T. Holmes, Ross Wolf, Thomas Baker
      Pages: 1 - 22
      Abstract: .

      Citation: Journal of Applied Security Research
      PubDate: 2022-06-16T07:21:02Z
      DOI: 10.1080/19361610.2022.2086782
       
  • Security Enhancement of Third Parties Is Needed in Global Supply Chain
           Management

    • Free pre-print version: Loading...

      Authors: Yoshiyasu Takefuji
      Pages: 1 - 8
      Abstract: .

      Citation: Journal of Applied Security Research
      PubDate: 2022-06-15T06:32:33Z
      DOI: 10.1080/19361610.2022.2086785
       
  • Modified Deterministic Approach for Size Invariant Visual Secret Sharing
           with Improved Quality of Recovered Secret

    • Free pre-print version: Loading...

      Authors: Ratnesh N. Chaturvedi, Sudeep D. Thepade, Swati N. Ahirrao
      Pages: 1 - 18
      Abstract: .

      Citation: Journal of Applied Security Research
      PubDate: 2022-06-02T09:17:46Z
      DOI: 10.1080/19361610.2022.2080470
       
  • Application and Criminalization of the Artificial Intelligence in
           Business: Recommendation to Counter the Regulatory Challenges

    • Free pre-print version: Loading...

      Authors: Arif Mahmud
      Pages: 1 - 11
      Abstract: .

      Citation: Journal of Applied Security Research
      PubDate: 2022-05-27T07:21:49Z
      DOI: 10.1080/19361610.2022.2079939
       
  • Understanding the Users’ Intention to Use the Three-Factor
           Authentication for Preserving the Privacy of Patient Data

    • Free pre-print version: Loading...

      Authors: Niranjan Gandhi, Kanchan Patil
      Pages: 1 - 30
      Abstract: .

      Citation: Journal of Applied Security Research
      PubDate: 2022-05-03T06:34:54Z
      DOI: 10.1080/19361610.2022.2060025
       
  • Improving Classification Performance for Malware Detection Using Genetic
           Programming Feature Selection Techniques

    • Free pre-print version: Loading...

      Authors: Heba Harahsheh, Mohammad Alshraideh, Saleh Al-Sharaeh, Rizik Al-Sayyed
      Pages: 1 - 21
      Abstract: .

      Citation: Journal of Applied Security Research
      PubDate: 2022-05-01T03:54:03Z
      DOI: 10.1080/19361610.2022.2067459
       
  • New Signature Scheme Based on Elliptic Curve and Factoring Problems Using
           Chaotic Map

    • Free pre-print version: Loading...

      Authors: Nedal Tahat, Safaa Shatnawi
      Pages: 1 - 9
      Abstract: .

      Citation: Journal of Applied Security Research
      PubDate: 2022-03-02T09:14:10Z
      DOI: 10.1080/19361610.2022.2041157
       
  • Statement of Retraction: A Survey on Malware Detection and Classification

    • Free pre-print version: Loading...

      Pages: 1 - 1
      Abstract: .

      Citation: Journal of Applied Security Research
      PubDate: 2022-02-22T03:07:16Z
      DOI: 10.1080/19361610.2022.2039530
       
  • Comprehensive Comparison of Security Measurement Models

    • Free pre-print version: Loading...

      Authors: Mahmoud Khaleghi, Mohammad Reza Aref, Mehdi Rasti
      Pages: 1 - 69
      Abstract: .

      Citation: Journal of Applied Security Research
      PubDate: 2022-02-10T07:40:25Z
      DOI: 10.1080/19361610.2021.1981089
       
  • Queen of Cuba

    • Free pre-print version: Loading...

      Authors: Alfredo Ribeiro Pereira
      Pages: 1 - 12
      Abstract: .

      Citation: Journal of Applied Security Research
      PubDate: 2022-02-09T11:16:14Z
      DOI: 10.1080/19361610.2022.2034476
       
  • Internet-of-Things Security and Vulnerabilities: Case Study

    • Free pre-print version: Loading...

      Authors: Ghaida Alqarawi, Bashayer Alkhalifah, Najla Alharbi, Salim El Khediri
      Pages: 1 - 17
      Abstract: .

      Citation: Journal of Applied Security Research
      PubDate: 2022-02-04T02:49:08Z
      DOI: 10.1080/19361610.2022.2031841
       
  • Reverse Social Engineering to Counter Social Engineering in Mobile Money
           Theft: A Tanzanian Context

    • Free pre-print version: Loading...

      Authors: Hassan Kilavo, Leonard J. Mselle, Ramadhani I. Rais, Salehe I. Mrutu
      Pages: 1 - 13
      Abstract: .

      Citation: Journal of Applied Security Research
      PubDate: 2022-01-31T10:28:11Z
      DOI: 10.1080/19361610.2022.2031702
       
  • Performance Analysis of Channel Estimation for Massive MIMO Communication
           Using DL-Based Fully Connected Neural Network (DL-FCNN) Architecture

    • Free pre-print version: Loading...

      Authors: Swapna Tangelapalli, Pokkunuri PardhaSaradhi, Rahul Jashvantbhai Pandya, Sridhar Iyer
      Pages: 1 - 13
      Abstract: .

      Citation: Journal of Applied Security Research
      PubDate: 2022-01-11T12:10:47Z
      DOI: 10.1080/19361610.2021.2024050
       
  • Investigation of Card Skimming Cases: An Indian Perspective

    • Free pre-print version: Loading...

      Authors: Anoop A. Shetty, K. Venkatesh Murthy
      Pages: 1 - 14
      Abstract: .

      Citation: Journal of Applied Security Research
      PubDate: 2022-01-11T12:10:35Z
      DOI: 10.1080/19361610.2021.2024049
       
  • Addressing the Threat of a bioterrorist Attack by Means of an Unmanned
           Drone

    • Free pre-print version: Loading...

      Authors: Katalin Pethő-Kiss
      Pages: 1 - 24
      Abstract: .

      Citation: Journal of Applied Security Research
      PubDate: 2022-01-05T09:07:34Z
      DOI: 10.1080/19361610.2021.2018923
       
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
 


Your IP address: 44.212.99.248
 
Home (Search)
API
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-