ROOT CAUSE ANALYSIS FOR INFORMATION SECURITY INCIDENTS: A PEDAGOGICAL REQUIREMENT.Published in:Journal of Information System Security, 2022, v. 18, n. 1, p. 3By:White, Garry;Shah, JaymeenPublication type:Article
COMPARATIVE STUDY OF LSB AND DWT BASED STEGANOGRAPHY COMBINED WITH ARNOLD TRANSFORMATION FOR IMAGE SECURITY.Published in:Journal of Information System Security, 2022, v. 18, n. 1, p. 63By:Gulati, Shruti;Bashir, Adil;Mir, Ajaz HussainPublication type:Article
FREE TRIAL WITH ANNOYANCE MECHANISM AS AN OPTIMAL STRATEGY IN CYBERSECURITY SOFTWARE OFFERING.Published in:Journal of Information System Security, 2022, v. 18, n. 1, p. 25By:Bin Mai;Dogan, KutsalPublication type:Article