03 - مستودع الأصول الرقمية لمجلات الجامعة
2014 © جميع الحقوق محفوظة لجامعة نايف العربية للعلوم الامنية.
تعبر الآراء الواردة في المجلات عن أصحابها وليس بالضرورة عن رأي جامعة نايف العربية للعلوم الامنية.
مجتمعات فرعية ضمن هذا المجتمع
-
01 .المجلة العربية للدراسات الأمنية [756]
Arab Journal for Security Studies -
02 .المجلة العربية لعلوم الأدلة الجنائية والطب الشرعي [228]
Arab Journal of Forensic Sciences & Forensic Medicine -
03. مجلة بحوث أمن المعلومات والجرائم السيبرانية [41]
Journal of Information Security and Cybercrimes Research -
04 . مجلة الأمن والحياة [4788]
إعلامية أمنية ثقافية تصدر شهريا عن جامعة نايف العربية للعلوم الامنية ISSN: 1268-1319
الحاويات في هذا القسم
تقديمات حديثة
-
Cybercrimes and Virtual Worlds: A Systematic Literature Review
(جامعة نايف العربية للعلوم الأمنية, 2022-12-05)With the evolutions of the gaming industry and the increasing number of virtual worlds (e.g., Metaverse), these applications can be an excellent vector to commit cybercrimes. Since this argument is rarely discussed ... -
Investigating the Factors Influencing the Use of Cloud Computing
(جامعة نايف العربية للعلوم الأمنية, 2022-12-12)Cloud computing technology is a new computing paradigm phenomenon that has recently received a signif-icant attention by several research studies. However, the previous works have concentrated on the adoption of this ... -
The Effect of Applying Information Security Awareness Concept of MOH Employees on Cybersecurity Department – Ministry of Health-Riyadh
(جامعة نايف العربية للعلوم الأمنية, 2022-10-15)The proposed study focuses on the effect of applying the concept of information security awareness of MOH employees on the cybersecurity department at the Ministry of Health in Riyadh. The researcher used the de-scriptive ... -
Trusted Microservices: A Security Framework for Users' Interaction with Microservices Applications
(جامعة نايف العربية للعلوم الأمنية, 2022-12-28)Microservices architecture emerges as a promising software design approach that provides large scale soft-ware systems with flexibility, scalability and fault tolerance. Moreover, it is considered a suitable design to be ... -
Cyberthreats Facing High School Students and Methods of Addressing them
(جامعة نايف العربية للعلوم الأمنية, 2022-10-28)In this work, we provide an overview of the most common risks and threats related to information technol-ogy faced by high school students in Saudi Arabia. In this context, this work starts from the concept that using ... -
Pivot Attack Classification for Cyber Threat Intelligence
(جامعة نايف العربية للعلوم الأمنية, 2022-10-03)The initial access achieved by cyber adversaries conducting a systematic attack against a targeted network is unlikely to be an asset of interest. Therefore, it is necessary to use lateral movement techniques to expand ... -
A Security System for Detecting Denial of Service (DDoS) and Masquerade Attacks on Social Networks
(جامعة نايف العربية للعلوم الأمنية, 2022-06-01)This study on a security system for detecting denial of service (DDoS) and masquerade attacks on social networks specifically describes how a Convolutional Neural Network (CNN) algorithm was employed. The dataset used for ... -
Analysis of Crypto-Ransomware Using Network Traffic
(جامعة نايف العربية للعلوم الأمنية, 2022-06-26)Ransomware is a form of malware attack that makes use of encryption to make information inaccessible for the motive of gathering a specified amount of payment. Many victims of this attack who couldn’t recover their information ... -
An Efficient Deep Learning Classification Model for Predicting Credit Card Fraud on Skewed Data
(جامعة نايف العربية للعلوم الأمنية, 2022-06-22)Due to fast-evolving technology, the world is moving to the use of credit cards rather than money in their daily lives, giving rise to many new opportunities for fraudsters to use credit cards maliciously. Based on the ... -
The Factors Influencing the Use of Password Managers
(جامعة نايف العربية للعلوم الأمنية, 2022-06-25)This paper investigates the factors that influence the actual use of password managers. In this paper, we have integrated some factors from the Technology Acceptance Model (perceived ease of use, perceived usefulness, and ...