![]() |
Journal of Applied Security Research
Journal Prestige (SJR): 0.142 ![]() Number of Followers: 3 ![]() ![]() ISSN (Print) 1936-1610 - ISSN (Online) 1936-1629 Published by Taylor and Francis ![]() |
- A Natural Experiment of the Prince Hypothesis on Classroom Vandalism
-
Free pre-print version: Loading...Rate this result: What is this?Please help us test our new pre-print finding feature by giving the pre-print link a rating.
A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: William A. Chernoff
Pages: 1 - 23
Abstract: .
Citation: Journal of Applied Security Research
PubDate: 2023-01-26T04:00:17Z
DOI: 10.1080/19361610.2023.2169545
-
- The Effects of Justice Views on Turnover Intent, Sick-Leave Views, and
Sick-Leave Use Among Private Prison Staff-
Free pre-print version: Loading...Rate this result: What is this?Please help us test our new pre-print finding feature by giving the pre-print link a rating.
A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: Eric G. Lambert, Nancy L. Hogan, Robert M. Worley, Monica Solinas-Saunders
Pages: 1 - 24
Abstract: .
Citation: Journal of Applied Security Research
PubDate: 2023-01-04T09:48:37Z
DOI: 10.1080/19361610.2022.2161798
-
- SAM: A Mechanism to Facilitate Smear-Aware Forensic Analysis of Volatile
System Memory-
Free pre-print version: Loading...Rate this result: What is this?Please help us test our new pre-print finding feature by giving the pre-print link a rating.
A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: Trushna Parida, Kanika Nath, Suvrojit Das
Pages: 1 - 30
Abstract: .
Citation: Journal of Applied Security Research
PubDate: 2022-12-30T04:16:29Z
DOI: 10.1080/19361610.2022.2161972
-
- Preventing Revictimization in Sexual Assault Investigations: Personal
Security and Trauma-Informed Case Management*-
Free pre-print version: Loading...Rate this result: What is this?Please help us test our new pre-print finding feature by giving the pre-print link a rating.
A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: Katalin Parti
Pages: 1 - 12
Abstract: .
Citation: Journal of Applied Security Research
PubDate: 2022-12-30T04:08:03Z
DOI: 10.1080/19361610.2022.2161799
-
- Enhancing Multimedia Security Using Shortest Weight First Algorithm and
Symmetric Cryptography-
Free pre-print version: Loading...Rate this result: What is this?Please help us test our new pre-print finding feature by giving the pre-print link a rating.
A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: Karishni Mehta, Glen Dhingra, Ramchandra Mangrulkar
Pages: 1 - 24
Abstract: .
Citation: Journal of Applied Security Research
PubDate: 2022-12-19T02:54:36Z
DOI: 10.1080/19361610.2022.2157193
-
- Ontology-Based Metrics Computation for System Security Assurance
Evaluation
Open Access Article
-
Free pre-print version: Loading...Rate this result: What is this?Please help us test our new pre-print finding feature by giving the pre-print link a rating.
A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: Shao-Fang Wen, Basel Katt
Pages: 1 - 46
Abstract: .
Citation: Journal of Applied Security Research
PubDate: 2022-12-19T02:50:40Z
DOI: 10.1080/19361610.2022.2157190
-
- Modified Symmetric Image Encryption Approach Based on Mixed Column and
Substitution Box-
Free pre-print version: Loading...Rate this result: What is this?Please help us test our new pre-print finding feature by giving the pre-print link a rating.
A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: Vaishnavi Sawant, Ahmed Solkar, Ramchandra Mangrulkar
Pages: 1 - 34
Abstract: .
Citation: Journal of Applied Security Research
PubDate: 2022-11-30T10:08:35Z
DOI: 10.1080/19361610.2022.2150498
-
- DieRoll: A Unique Key Generation and Encryption Technique
-
Free pre-print version: Loading...Rate this result: What is this?Please help us test our new pre-print finding feature by giving the pre-print link a rating.
A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: Dhruv Mehta, Manish Jha, Hartik Suhagiya, Ramchandra Mangrulkar
Pages: 1 - 28
Abstract: .
Citation: Journal of Applied Security Research
PubDate: 2022-10-13T04:39:15Z
DOI: 10.1080/19361610.2022.2124589
-
- Communication in Global Jihad
-
Free pre-print version: Loading...Rate this result: What is this?Please help us test our new pre-print finding feature by giving the pre-print link a rating.
A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: Frank Musmar
Pages: 1 - 2
Abstract: .
Citation: Journal of Applied Security Research
PubDate: 2022-09-28T05:39:20Z
DOI: 10.1080/19361610.2022.2125253
-
- Fraud in Online Classified Ads: Strategies, Risks, and Detection Methods:
A Survey-
Free pre-print version: Loading...Rate this result: What is this?Please help us test our new pre-print finding feature by giving the pre-print link a rating.
A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: Jamil R. Alzghoul, Emad E. Abdallah, Abdel-hafiz S. Al-khawaldeh
Pages: 1 - 25
Abstract: .
Citation: Journal of Applied Security Research
PubDate: 2022-09-22T06:41:44Z
DOI: 10.1080/19361610.2022.2124328
-
- QR Codes to Prevent Copyright Infringement: Case Study of Trusmi Batik in
Cirebon, Indonesia-
Free pre-print version: Loading...Rate this result: What is this?Please help us test our new pre-print finding feature by giving the pre-print link a rating.
A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: Enni Soerjati Priowirjanto, Eman Suparman, Muhamad Amirulloh, Ema Rahmawati
Pages: 1 - 7
Abstract: .
Citation: Journal of Applied Security Research
PubDate: 2022-09-12T03:34:41Z
DOI: 10.1080/19361610.2022.2113731
-
- IoT Security in Industry: A Threat Model of Existing and Future Network
Infrastructure-
Free pre-print version: Loading...Rate this result: What is this?Please help us test our new pre-print finding feature by giving the pre-print link a rating.
A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: Jackie McNett, Josh McNett, Xiaoli Su
Pages: 1 - 19
Abstract: .
Citation: Journal of Applied Security Research
PubDate: 2022-09-01T04:40:42Z
DOI: 10.1080/19361610.2022.2116921
-
- Privacy Enhanced Healthcare Data Management Using Associative Data Mining
Approaches-
Free pre-print version: Loading...Rate this result: What is this?Please help us test our new pre-print finding feature by giving the pre-print link a rating.
A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: N. Duraimutharasan
Pages: 1 - 18
Abstract: .
Citation: Journal of Applied Security Research
PubDate: 2022-08-29T05:33:39Z
DOI: 10.1080/19361610.2022.2099707
-
- Predicting Money Laundering Using Machine Learning and Artificial Neural
Networks Algorithms in Banks-
Free pre-print version: Loading...Rate this result: What is this?Please help us test our new pre-print finding feature by giving the pre-print link a rating.
A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: Mark E. Lokanan
Pages: 1 - 25
Abstract: .
Citation: Journal of Applied Security Research
PubDate: 2022-08-26T05:54:15Z
DOI: 10.1080/19361610.2022.2114744
-
- Stego Detection: Image Steganalysis Using a Novel Hidden Stego Visual
Geometry Group–Based CNN Classification-
Free pre-print version: Loading...Rate this result: What is this?Please help us test our new pre-print finding feature by giving the pre-print link a rating.
A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: Hemalatha Jeyaprakash, Bala Subramanian Chokkalingam, Vivek V, Sekar Mohan
Pages: 1 - 21
Abstract: .
Citation: Journal of Applied Security Research
PubDate: 2022-08-24T05:57:14Z
DOI: 10.1080/19361610.2022.2110637
-
- Adversarial Propaganda: How Enemies Target the U.S. to Fuel Division
-
Free pre-print version: Loading...Rate this result: What is this?Please help us test our new pre-print finding feature by giving the pre-print link a rating.
A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: Molly M. Dundon, Shannon C. Houck
Pages: 1 - 9
Abstract: .
Citation: Journal of Applied Security Research
PubDate: 2022-08-22T04:58:37Z
DOI: 10.1080/19361610.2022.2113730
-
- Geospatial Intelligence and Artificial Intelligence for Detecting
Potential Coca Paste Production Infrastructure in the Border Region of
Venezuela and Colombia-
Free pre-print version: Loading...Rate this result: What is this?Please help us test our new pre-print finding feature by giving the pre-print link a rating.
A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: Jairo Jesús Pinto Hidalgo, Jorge Antonio Silva Centeno
Pages: 1 - 51
Abstract: .
Citation: Journal of Applied Security Research
PubDate: 2022-08-19T06:44:14Z
DOI: 10.1080/19361610.2022.2111184
-
- Dimensional Reduction With Fast ICA for IoT Botnet Detection
-
Free pre-print version: Loading...Rate this result: What is this?Please help us test our new pre-print finding feature by giving the pre-print link a rating.
A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: Susanto , Deris Stiawan, Dian Palupi Rini, M. Agus Syamsul Arifin, Mohd Yazid Idris, Nizar Alsharif, Rahmat Budiarto
Pages: 1 - 24
Abstract: .
Citation: Journal of Applied Security Research
PubDate: 2022-08-13T06:55:37Z
DOI: 10.1080/19361610.2022.2079906
-
- Searchable Encryption Taxonomy: Survey
-
Free pre-print version: Loading...Rate this result: What is this?Please help us test our new pre-print finding feature by giving the pre-print link a rating.
A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: M. H. Noorallahzadeh, R. Alimoradi, A. Gholami
Pages: 1 - 45
Abstract: .
Citation: Journal of Applied Security Research
PubDate: 2022-08-11T09:54:38Z
DOI: 10.1080/19361610.2022.2103364
-
- Brazil Method of Anti-Malware Evaluation and Cyber Defense Impacts
-
Free pre-print version: Loading...Rate this result: What is this?Please help us test our new pre-print finding feature by giving the pre-print link a rating.
A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: Rodrigo Ruiz, Rogério Winter, Ferrucio de Franco Rosa, Pancham Shukla, Hassan Kazemian
Pages: 1 - 17
Abstract: .
Citation: Journal of Applied Security Research
PubDate: 2022-08-02T03:21:47Z
DOI: 10.1080/19361610.2022.2104104
-
- In Search for the Best Police Oversight Mechanism for Zimbabwe: The
Imperative for an Independent Police Complaints Board-
Free pre-print version: Loading...Rate this result: What is this?Please help us test our new pre-print finding feature by giving the pre-print link a rating.
A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: Ishmael Mugari, Adewale A. Olutola
Pages: 1 - 18
Abstract: .
Citation: Journal of Applied Security Research
PubDate: 2022-08-01T05:39:07Z
DOI: 10.1080/19361610.2022.2105283
-
- A Real-Time Hardware Intrusion Detection System and a Classifying Features
Algorithm-
Free pre-print version: Loading...Rate this result: What is this?Please help us test our new pre-print finding feature by giving the pre-print link a rating.
A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: Tarek Salah Sobh
Pages: 1 - 35
Abstract: .
Citation: Journal of Applied Security Research
PubDate: 2022-07-28T05:59:58Z
DOI: 10.1080/19361610.2022.2103363
-
- An Improved KNN Classifier for 3D Face Recognition Based on SURF
Descriptors-
Free pre-print version: Loading...Rate this result: What is this?Please help us test our new pre-print finding feature by giving the pre-print link a rating.
A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: Ahmed Yassine Boumedine, Samia Bentaieb, Abdelaziz Ouamri
Pages: 1 - 19
Abstract: .
Citation: Journal of Applied Security Research
PubDate: 2022-07-27T04:59:46Z
DOI: 10.1080/19361610.2022.2099688
-
- Criminological and Victimological Support of World and National Security
during Quarantine Measures Related to the Spread of Acute Respiratory
Disease COVID-19 Caused by Coronavirus Sars-Cov-2-
Free pre-print version: Loading...Rate this result: What is this?Please help us test our new pre-print finding feature by giving the pre-print link a rating.
A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: Roman Veresha, Alexander Dzhuzha, Dmitry Tychyna, Anastasiya Dzhuzha
Pages: 1 - 19
Abstract: .
Citation: Journal of Applied Security Research
PubDate: 2022-07-26T09:56:10Z
DOI: 10.1080/19361610.2022.2104106
-
- BCPIS: Blockchain-based Counterfeit Product Identification System
-
Free pre-print version: Loading...Rate this result: What is this?Please help us test our new pre-print finding feature by giving the pre-print link a rating.
A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: Mrunal Mhatre, Harshvivek Kashid, Tanisha Jain, Pallavi Chavan
Pages: 1 - 26
Abstract: .
Citation: Journal of Applied Security Research
PubDate: 2022-07-13T06:55:46Z
DOI: 10.1080/19361610.2022.2086784
-
- Enhancing Burp Suite with Machine Learning Extension for Vulnerability
Assessment of Web Applications-
Free pre-print version: Loading...Rate this result: What is this?Please help us test our new pre-print finding feature by giving the pre-print link a rating.
A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: Rrezearta Thaqi, Kamer Vishi, Blerim Rexha
Pages: 1 - 19
Abstract: .
Citation: Journal of Applied Security Research
PubDate: 2022-07-10T04:23:13Z
DOI: 10.1080/19361610.2022.2096387
-
- One-Chance Transit Crime and Commuters’ Victimization Experiences in
Ibadan City, Nigeria-
Free pre-print version: Loading...Rate this result: What is this?Please help us test our new pre-print finding feature by giving the pre-print link a rating.
A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: Olusegun I. Olaniyan, Usman A. Ojedokun, Adeyinka A. Aderinto
Pages: 1 - 15
Abstract: .
Citation: Journal of Applied Security Research
PubDate: 2022-07-07T10:48:16Z
DOI: 10.1080/19361610.2022.2094209
-
- Public-Private Partnerships: Exploring Perceptions and Efficacy of
Community Security Patrols-
Free pre-print version: Loading...Rate this result: What is this?Please help us test our new pre-print finding feature by giving the pre-print link a rating.
A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: Stephen T. Holmes, Ross Wolf, Thomas Baker
Pages: 1 - 22
Abstract: .
Citation: Journal of Applied Security Research
PubDate: 2022-06-16T07:21:02Z
DOI: 10.1080/19361610.2022.2086782
-
- Security Enhancement of Third Parties Is Needed in Global Supply Chain
Management-
Free pre-print version: Loading...Rate this result: What is this?Please help us test our new pre-print finding feature by giving the pre-print link a rating.
A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: Yoshiyasu Takefuji
Pages: 1 - 8
Abstract: .
Citation: Journal of Applied Security Research
PubDate: 2022-06-15T06:32:33Z
DOI: 10.1080/19361610.2022.2086785
-
- Modified Deterministic Approach for Size Invariant Visual Secret Sharing
with Improved Quality of Recovered Secret-
Free pre-print version: Loading...Rate this result: What is this?Please help us test our new pre-print finding feature by giving the pre-print link a rating.
A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: Ratnesh N. Chaturvedi, Sudeep D. Thepade, Swati N. Ahirrao
Pages: 1 - 18
Abstract: .
Citation: Journal of Applied Security Research
PubDate: 2022-06-02T09:17:46Z
DOI: 10.1080/19361610.2022.2080470
-
- Application and Criminalization of the Artificial Intelligence in
Business: Recommendation to Counter the Regulatory Challenges-
Free pre-print version: Loading...Rate this result: What is this?Please help us test our new pre-print finding feature by giving the pre-print link a rating.
A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: Arif Mahmud
Pages: 1 - 11
Abstract: .
Citation: Journal of Applied Security Research
PubDate: 2022-05-27T07:21:49Z
DOI: 10.1080/19361610.2022.2079939
-
- Understanding the Users’ Intention to Use the Three-Factor
Authentication for Preserving the Privacy of Patient Data-
Free pre-print version: Loading...Rate this result: What is this?Please help us test our new pre-print finding feature by giving the pre-print link a rating.
A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: Niranjan Gandhi, Kanchan Patil
Pages: 1 - 30
Abstract: .
Citation: Journal of Applied Security Research
PubDate: 2022-05-03T06:34:54Z
DOI: 10.1080/19361610.2022.2060025
-
- Improving Classification Performance for Malware Detection Using Genetic
Programming Feature Selection Techniques-
Free pre-print version: Loading...Rate this result: What is this?Please help us test our new pre-print finding feature by giving the pre-print link a rating.
A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: Heba Harahsheh, Mohammad Alshraideh, Saleh Al-Sharaeh, Rizik Al-Sayyed
Pages: 1 - 21
Abstract: .
Citation: Journal of Applied Security Research
PubDate: 2022-05-01T03:54:03Z
DOI: 10.1080/19361610.2022.2067459
-
- New Signature Scheme Based on Elliptic Curve and Factoring Problems Using
Chaotic Map-
Free pre-print version: Loading...Rate this result: What is this?Please help us test our new pre-print finding feature by giving the pre-print link a rating.
A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: Nedal Tahat, Safaa Shatnawi
Pages: 1 - 9
Abstract: .
Citation: Journal of Applied Security Research
PubDate: 2022-03-02T09:14:10Z
DOI: 10.1080/19361610.2022.2041157
-
- Statement of Retraction: A Survey on Malware Detection and Classification
-
Free pre-print version: Loading...Rate this result: What is this?Please help us test our new pre-print finding feature by giving the pre-print link a rating.
A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Pages: 1 - 1
Abstract: .
Citation: Journal of Applied Security Research
PubDate: 2022-02-22T03:07:16Z
DOI: 10.1080/19361610.2022.2039530
-
- Comprehensive Comparison of Security Measurement Models
-
Free pre-print version: Loading...Rate this result: What is this?Please help us test our new pre-print finding feature by giving the pre-print link a rating.
A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: Mahmoud Khaleghi, Mohammad Reza Aref, Mehdi Rasti
Pages: 1 - 69
Abstract: .
Citation: Journal of Applied Security Research
PubDate: 2022-02-10T07:40:25Z
DOI: 10.1080/19361610.2021.1981089
-
- Queen of Cuba
-
Free pre-print version: Loading...Rate this result: What is this?Please help us test our new pre-print finding feature by giving the pre-print link a rating.
A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: Alfredo Ribeiro Pereira
Pages: 1 - 12
Abstract: .
Citation: Journal of Applied Security Research
PubDate: 2022-02-09T11:16:14Z
DOI: 10.1080/19361610.2022.2034476
-
- Internet-of-Things Security and Vulnerabilities: Case Study
-
Free pre-print version: Loading...Rate this result: What is this?Please help us test our new pre-print finding feature by giving the pre-print link a rating.
A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: Ghaida Alqarawi, Bashayer Alkhalifah, Najla Alharbi, Salim El Khediri
Pages: 1 - 17
Abstract: .
Citation: Journal of Applied Security Research
PubDate: 2022-02-04T02:49:08Z
DOI: 10.1080/19361610.2022.2031841
-
- Reverse Social Engineering to Counter Social Engineering in Mobile Money
Theft: A Tanzanian Context-
Free pre-print version: Loading...Rate this result: What is this?Please help us test our new pre-print finding feature by giving the pre-print link a rating.
A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: Hassan Kilavo, Leonard J. Mselle, Ramadhani I. Rais, Salehe I. Mrutu
Pages: 1 - 13
Abstract: .
Citation: Journal of Applied Security Research
PubDate: 2022-01-31T10:28:11Z
DOI: 10.1080/19361610.2022.2031702
-
- Performance Analysis of Channel Estimation for Massive MIMO Communication
Using DL-Based Fully Connected Neural Network (DL-FCNN) Architecture-
Free pre-print version: Loading...Rate this result: What is this?Please help us test our new pre-print finding feature by giving the pre-print link a rating.
A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: Swapna Tangelapalli, Pokkunuri PardhaSaradhi, Rahul Jashvantbhai Pandya, Sridhar Iyer
Pages: 1 - 13
Abstract: .
Citation: Journal of Applied Security Research
PubDate: 2022-01-11T12:10:47Z
DOI: 10.1080/19361610.2021.2024050
-
- Investigation of Card Skimming Cases: An Indian Perspective
-
Free pre-print version: Loading...Rate this result: What is this?Please help us test our new pre-print finding feature by giving the pre-print link a rating.
A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: Anoop A. Shetty, K. Venkatesh Murthy
Pages: 1 - 14
Abstract: .
Citation: Journal of Applied Security Research
PubDate: 2022-01-11T12:10:35Z
DOI: 10.1080/19361610.2021.2024049
-
- Addressing the Threat of a bioterrorist Attack by Means of an Unmanned
Drone-
Free pre-print version: Loading...Rate this result: What is this?Please help us test our new pre-print finding feature by giving the pre-print link a rating.
A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors: Katalin Pethő-Kiss
Pages: 1 - 24
Abstract: .
Citation: Journal of Applied Security Research
PubDate: 2022-01-05T09:07:34Z
DOI: 10.1080/19361610.2021.2018923
-