Information

  • Author Services

Initiatives

You are accessing a machine-readable page. In order to be human-readable, please install an RSS reader.

All articles published by MDPI are made immediately available worldwide under an open access license. No special permission is required to reuse all or part of the article published by MDPI, including figures and tables. For articles published under an open access Creative Common CC BY license, any part of the article may be reused without permission provided that the original article is clearly cited. For more information, please refer to https://www.mdpi.com/openaccess .

Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications.

Feature papers are submitted upon individual invitation or recommendation by the scientific editors and must receive positive feedback from the reviewers.

Editor’s Choice articles are based on recommendations by the scientific editors of MDPI journals from around the world. Editors select a small number of articles recently published in the journal that they believe will be particularly interesting to readers, or important in the respective research area. The aim is to provide a snapshot of some of the most exciting work published in the various research areas of the journal.

Original Submission Date Received: .

  • Active Journals
  • Find a Journal
  • Proceedings Series
  • For Authors
  • For Reviewers
  • For Editors
  • For Librarians
  • For Publishers
  • For Societies
  • For Conference Organizers
  • Open Access Policy
  • Institutional Open Access Program
  • Special Issues Guidelines
  • Editorial Process
  • Research and Publication Ethics
  • Article Processing Charges
  • Testimonials
  • Preprints.org
  • SciProfiles
  • Encyclopedia

Data-Driven Network Anomaly Detection with Cyber Attack and Defense Visualization

Journal Description

Journal of cybersecurity and privacy.

  • Open Access — free for readers, with article processing charges (APC) paid by authors or their institutions.
  • High Visibility:  indexed within  Scopus ,  EBSCO , and  other databases .
  • Rapid Publication: manuscripts are peer-reviewed and a first decision is provided to authors approximately 32.4 days after submission; acceptance to publication is undertaken in 4.6 days (median values for papers published in this journal in the first half of 2024).
  • Journal Rank:  CiteScore - Q1 ( Computer Science (miscellaneous) )
  • Recognition of Reviewers: APC discount vouchers, optional signed peer review, and reviewer names published annually in the journal.
  • Companion journal: Sensors .

Latest Articles

international security research papers

Journal Menu

  • Aims & Scope
  • Editorial Board
  • Topical Advisory Panel
  • Instructions for Authors

Special Issues

  • Sections & Collections
  • Article Processing Charge
  • Indexing & Archiving
  • Most Cited & Viewed
  • Journal Statistics
  • Journal History
  • Editorial Office

Journal Browser

  • arrow_forward_ios Forthcoming issue arrow_forward_ios Current issue
  • Vol. 4 (2024)
  • Vol. 3 (2023)
  • Vol. 2 (2022)
  • Vol. 1 (2021)

Highly Accessed Articles

Latest books, e-mail alert.

international security research papers

Conferences

Topical collections, further information, mdpi initiatives, follow mdpi.

MDPI

Subscribe to receive issue release notifications and newsletters from MDPI journals

Cybersecurity

Cybersecurity Cover Image

Most Cited Paper

We are pleased to announce the top 5 cited papers of Cybersecurity.

This list is based on the cites received from 2018 to 2023. You can find the top five articles here .

Cybersecurity Award 2024

Call for Nomination - Deadline Extension

The Cybersecurity Award is held annually and presented to authors whose work represents outstanding and groundbreaking research in all essential aspects of cybersecurity from the previous year.

  • Most accessed

EvilPromptFuzzer: generating inappropriate content based on text-to-image models

Authors: Juntao He, Haoran Dai, Runqi Sui, Xuejing Yuan, Dun Liu, Hao Feng, Xinyue Liu, Wenchuan Yang, Baojiang Cui and Kedan Li

ProcSAGE: an efficient host threat detection method based on graph representation learning

Authors: Boyuan Xu, Yiru Gong, Xiaoyu Geng, Yun Li, Cong Dong, Song Liu, Yuling Liu, Bo Jiang and Zhigang Lu

Lightweight ring-neighbor-based user authentication and group-key agreement for internet of drones

Authors: Zhuo Zhao, Chingfang Hsu, Lein Harn, Zhe Xia, Xinyu Jiang and Liu Liu

A multi-channel spatial information feature based human pose estimation algorithm

Authors: Yinghong Xie, Yan Hao, Xiaowei Han, Qiang Gao and Biao Yin

TVRAVNF: an efficient low-cost TEE-based virtual remote attestation scheme for virtual network functions

Authors: Jie Yuan, Rui Xu, Xinghai Wei, Keji Miao and Dongxiao Liu

Most recent articles RSS

View all articles

Survey of intrusion detection systems: techniques, datasets and challenges

Authors: Ansam Khraisat, Iqbal Gondal, Peter Vamplew and Joarder Kamruzzaman

Review and insight on the behavioral aspects of cybersecurity

Authors: Rachid Ait Maalem Lahcen, Bruce Caulkins, Ram Mohapatra and Manish Kumar

Fuzzing: a survey

Authors: Jun Li, Bodong Zhao and Chao Zhang

A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges

Authors: Ansam Khraisat and Ammar Alazab

Detecting telecommunication fraud by understanding the contents of a call

Authors: Qianqian Zhao, Kai Chen, Tongxin Li, Yi Yang and XiaoFeng Wang

Most accessed articles RSS

Thematic Series

2020 Data-Driven Security Edited by: Yang Liu, Xinming Ou, Xinyu Xing, Guozhu Meng

2019 Data Security and Privacy Edited by: Dan Lin, Jingqiang Lin and Bo Luo

Information Abuse Prevention Edited by: Gang Li and Jianlong Tan

2018 System Security    Edited by: Peng Liu

AI and Security    Edited by: Xiaofeng Wang

Aims and scope

This journal is aimed to systematically cover all essential aspects of cybersecurity, with a focus on reporting on cyberspace security issues, the latest research results, and real-world deployment of security technologies.  

The journal publishes research articles and reviews in the areas including, but not limited to:

• Cryptography and its applications • Network and critical infrastructure security • Hardware security • Software and system security • Cybersecurity data analytics • Data-driven security and measurement studies • Adversarial reasoning • Malware analysis • Privacy-enhancing technologies and anonymity • IoT Security • AI Security

Call for Papers

Chaos and Its Applications in Cryptography

Guest Editors:  Hairong Lin, Han Bao, Fei Yu, Sen Zhang, Jizhao Liu

Download CFP and find more

Why submit to us

• 1 st open access journal on Cybersecurity • APC fully covered by IIE, CAS • Served by a dedicated international editorial board to give thorough swift editorial response

Editor-in-Chief: MENG Dan

New Content Item (1)

Full Professor in Institute of Information Engineering (IIE), Chinese Academy of Sciences (CAS). His work focuses on network and system security, parallel distributed processing. He has lead important research projects including Dawning supercomputers, National Science and Technology Major Project, National High Technology Research and Development Program of China, and strategic priority research program of CAS. He has published over one hundred peer-reviewed papers. He is the director of IIE, after serving as the deputy director of IIE, the deputy director of the High Technology Research and Development Bureau of CAS.

Executive Editor-in-Chief: LIU Peng

New Content Item (1)

LIU Peng received his BS and MS degrees from the University of Science and Technology of China, and his PhD from George Mason University in 1999.  Dr. Liu is a Professor of Information Sciences and Technology, founding Director of the Center for Cyber-Security, Information Privacy, and Trust, and founding Director of the Cyber Security Lab at Penn State University.   His research interests are in all areas of computer and network security.  He has published a monograph and over 260 refereed technical papers.  His research has been sponsored by NSF, ARO, AFOSR, DARPA, DHS, DOE, AFRL, NSA, TTC, CISCO, and HP.  He has served as a program (co-)chair or general (co-)chair for over 10 international conferences (e.g., Asia CCS 2010) and workshops (e.g., MTD 2016). He chaired the Steering Committee of SECURECOMM during 2008-14. He has served on over 100 program committees and reviewed papers for numerous journals. He is an associate editor for IEEE TDSC. He is a recipient of the DOE Early Career Principle Investigator Award.  He has co-led the effort to make Penn State a NSA-certified National Center of Excellence in Information Assurance Education and Research.  He has advised or co-advised over 30 PhD dissertations to completion.

  • Editorial Board
  • Sign up for article alerts and news from this journal

Affiliated with

New Content Item

The Institute of Information Engineering (IIE) is a national research institute in Beijing that specializes in comprehensive research on theories and applications related to information technology.

IIE strives to be a leading global academic institution by creating first-class research platforms and attracting top researchers. It also seeks to become an important national strategic power in the field of information technology.

IIE’s mission is to promote China’s innovation and industrial competitiveness by advancing information science, standards, and technology in ways that enhance economic security and public safety as well as improve our quality of life.

Read more..

The journal is indexed by

  • EI Compendex
  • Emerging Sources Citation Index
  • EBSCO Discovery Service
  • Institute of Scientific and Technical Information of China
  • Google Scholar
  • Norwegian Register for Scientific Journals and Series
  • OCLC WorldCat Discovery Service
  • ProQuest-ExLibris Primo
  • ProQuest-ExLibris Summon
  • TD Net Discovery Service
  • UGC-CARE List (India)

Annual Journal Metrics

Citation Impact 2023 Journal Impact Factor: 3.9 5-year Journal Impact Factor: 4.9 Source Normalized Impact per Paper (SNIP): 1.587 SCImago Journal Rank (SJR): 1.136

Speed 2023 Submission to first editorial decision (median days): 8 Submission to acceptance (median days): 95

Usage 2023 Downloads: 408,523 Altmetric mentions: 15

  • ISSN: 2523-3246 (electronic)

U.S. flag

An official website of the United States government

Here’s how you know

Official websites use .gov A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS A lock ( Lock A locked padlock ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

https://www.nist.gov/publications/safeguarding-international-science-research-security-framework

Safeguarding International Science: Research Security Framework

Download paper, additional citation formats.

  • Google Scholar

If you have any questions about this publication or are having problems accessing it, please contact [email protected] .

international security research papers

Academia.edu no longer supports Internet Explorer.

To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to  upgrade your browser .

  •  We're Hiring!
  •  Help Center

International Security

  • Most Cited Papers
  • Most Downloaded Papers
  • Newest Papers
  • Last »
  • Security Studies Follow Following
  • International Relations Theory Follow Following
  • International Relations Follow Following
  • Foreign Policy Analysis Follow Following
  • International Studies Follow Following
  • Critical Security Studies Follow Following
  • Russian Foreign Policy Follow Following
  • Strategic Studies Follow Following
  • Peace and Conflict Studies Follow Following
  • Security Follow Following

Enter the email address you signed up with and we'll email you a reset link.

  • Academia.edu Journals
  •   We're Hiring!
  •   Help Center
  • Find new research papers in:
  • Health Sciences
  • Earth Sciences
  • Cognitive Science
  • Mathematics
  • Computer Science
  • Academia ©2024

Programs submenu

Regions submenu, topics submenu, weapons in space: a virtual book talk with dr. aaron bateman, u.s.-australia-japan trilateral cooperation on strategic stability in the taiwan strait report launch, bolstering data center growth, resilience, and security.

  • Abshire-Inamori Leadership Academy
  • Aerospace Security Project
  • Africa Program
  • Americas Program
  • Arleigh A. Burke Chair in Strategy
  • Asia Maritime Transparency Initiative
  • Asia Program
  • Australia Chair
  • Brzezinski Chair in Global Security and Geostrategy
  • Brzezinski Institute on Geostrategy
  • Chair in U.S.-India Policy Studies
  • China Power Project
  • Chinese Business and Economics
  • Defending Democratic Institutions
  • Defense-Industrial Initiatives Group
  • Defense 360
  • Defense Budget Analysis
  • Diversity and Leadership in International Affairs Project
  • Economics Program
  • Emeritus Chair in Strategy
  • Energy Security and Climate Change Program
  • Europe, Russia, and Eurasia Program
  • Freeman Chair in China Studies
  • Futures Lab
  • Geoeconomic Council of Advisers
  • Global Food and Water Security Program
  • Global Health Policy Center
  • Hess Center for New Frontiers
  • Human Rights Initiative
  • Humanitarian Agenda
  • Intelligence, National Security, and Technology Program
  • International Security Program
  • Japan Chair
  • Kissinger Chair
  • Korea Chair
  • Langone Chair in American Leadership
  • Middle East Program
  • Missile Defense Project
  • Project on Critical Minerals Security
  • Project on Fragility and Mobility
  • Project on Nuclear Issues
  • Project on Prosperity and Development
  • Project on Trade and Technology
  • Renewing American Innovation
  • Scholl Chair in International Business
  • Smart Women, Smart Power
  • Southeast Asia Program
  • Stephenson Ocean Security Project
  • Strategic Technologies Program
  • Sustainable Development and Resilience Initiative
  • Wadhwani Center for AI and Advanced Technologies
  • Warfare, Irregular Threats, and Terrorism Program
  • All Regions
  • Australia, New Zealand & Pacific
  • Middle East
  • Russia and Eurasia

American Innovation

Civic education, climate change, cybersecurity, defense budget and acquisition, defense and security, energy and sustainability, food security, gender and international security, geopolitics, global health, human rights, humanitarian assistance, intelligence, international development, maritime issues and oceans, missile defense, nuclear issues, transnational threats, water security.

The Center for Strategic & International Studies (CSIS) examines research topics surrounding global studies, international relations, & foreign policy issues.

Photo: Adobe Stock

Role of UN in Maintenance of International Peace & Security

12 Pages Posted: 24 Oct 2011

Abhishek Agrawal

affiliation not provided to SSRN

Date Written: October 23, 2011

The United Nations (UN) is an international organization whose stated aims are facilitating cooperation in international law, international security, economic development, social progress, human rights, and achievement of world peace. The UN was founded in 1945 after World War II to replace the League of Nations, to stop wars between countries, and to provide a platform for dialogue. It contains multiple subsidiary organizations to carry out its missions. There are currently 193 member states, including every internationally recognized sovereign state in the world but the Vatican City. From its offices around the world, the UN and its specialized agencies decide on substantive and administrative issues in regular meetings held throughout the year. The organization has six principal organs: the General Assembly (the main deliberative assembly); the Security Council (for deciding certain resolutions for peace and security); the Economic and Social Council (for assisting in promoting international economic and social cooperation and development); the Secretariat (for providing studies, information, and facilities needed by the UN); the International Court of Justice (the primary judicial organ); and the United Nations Trusteeship Council (which is currently inactive). Other prominent UN System agencies include the World Health Organization (WHO), the World Food Program (WFP) and United Nations Children's Fund (UNICEF). One of the primary purposes of the United Nations is the maintenance of international peace and security. Since its creation, the UN has often been called upon to prevent disputes from escalating into war, to persuade opposing parties to use the conference table rather than force of arms, or to help restore peace when armed conflict does break out. Over the decades, the UN has helped to end numerous conflicts, often through actions of the Security Council — the primary organ for dealing with issues of international peace and security. The Security Council, the General Assembly and the Secretary-General all play major, complementary roles in fostering peace and security. . United Nations activities cover the principal areas of conflict prevention, peacemaking, peacekeeping, enforcement and peace building.

Suggested Citation: Suggested Citation

Abhishek Agrawal (Contact Author)

Affiliation not provided to ssrn ( email ), do you have a job opening that you would like to promote on ssrn, paper statistics, related ejournals, public international law: organizations ejournal.

Subscribe to this fee journal for more curated articles on this topic

International Institutions: Politics of International Institutions & Global Governance eJournal

international security research papers

International Journal of Information Security

  • Presents important technical work in information security, whether theoretical, applicable, or related to implementation
  • Covers system security, network security, content protection, applications
  • Contents include privacy, access control, authentication, identification, applied cryptography, and formal methods in information security

This is a transformative journal , you may have access to funding.

  • Sokratis Katsikas

international security research papers

Latest issue

Volume 23, Issue 4

Latest articles

Guiding the implementation of data privacy with microservices.

  • Pedro Antunes
  • Nuno Guimarães

international security research papers

Securing 5G virtual networks: a critical analysis of SDN, NFV, and network slicing security

  • Abdulrahman K. Alnaim

international security research papers

Bluetooth security analysis of general and intimate health IoT devices and apps: the case of FemTech

  • Stephen Cook
  • Maryam Mehrnezhad
  • Ehsan Toreini

international security research papers

A distributed and cooperative signature-based intrusion detection system framework for multi-channel man-in-the-middle attacks against protected Wi-Fi networks

  • Manesh Thankappan
  • Helena Rifà-Pous
  • Carles Garrigues

international security research papers

Defect-scanner: a comparative empirical study on language model and deep learning approach for software vulnerability detection

  • Van-Hau Pham
  • Do Thi Thu Hien
  • Phan The Duy

international security research papers

Journal updates

Past special issues.

Before submitting a special issue proposal, please check that there are no past special issues on the same topic.

Call for Papers: Security and Privacy for IoT and Smart Cities: Recent Advances and Challenges

Guest Editors:  Weizhi Meng, Steven Furnell, Guo Song

Submission Deadline:  31 October 2024

Call for Papers: Interdisciplinary Perspectives for SocioTechnical Cybersecurity Threats

Guest Editors:  Kovila Coopamootoo, Shujun Li, Michael Sirivianos, Pavlos Efraimidis Democritus, George Drosatos, Marios Anagnostopoulos

Deadline:  31 August 2024

Call For Papers: Cyber Physical Systems and Industry 4.0: Security and Privacy Challenges and Solutions

Guest Editors: Weizhi Meng, Alvaro A. Cardenas, Jianying Zhou

Deadline: May 30, 2022

Journal information

  • ACM Digital Library
  • Australian Business Deans Council (ABDC) Journal Quality List
  • Current Contents/Engineering, Computing and Technology
  • EI Compendex
  • Google Scholar
  • Japanese Science and Technology Agency (JST)
  • OCLC WorldCat Discovery Service
  • Science Citation Index Expanded (SCIE)
  • TD Net Discovery Service
  • UGC-CARE List (India)

Rights and permissions

Editorial policies

© Springer-Verlag GmbH Germany, part of Springer Nature

  • Find a journal
  • Publish with us
  • Track your research

IEEE Account

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

Journal of national Security Law and Policy

Journal of National Security Law & Policy

Counterterrorism & Countering Violent Extremism

  • Capitol Insurrection 2021
  • International Security
  • Religious Extremism
  • Terrorism & Counterterrorism

Geopolitical

  • Climate Change
  • International Law
  • Nuclear Weapons
  • Refugees and Immigration
  • Human Rights
  • Human Rights in Cyberspace
  • Laws of War
  • Public Health
  • Law and Security in Space
  • Remote Targeting/Targeted Killing

National Security & Homeland Security

  • The Constitution
  • Defense Policy
  • Foreign Policy
  • Intelligence
  • Military Law
  • Military Veterans
  • Surveillance
  • Teaching National Security Law

Technology & Cybersecurity

  • Cyberespionage
  • Cybersecurity Law & Policy
  • Emerging Technology

Book Reviews

IMAGES

  1. (PDF) Cyber Security Issues and Challenges

    international security research papers

  2. (PDF) The Right to Defence in Criminal Proceedings: International Law

    international security research papers

  3. (PDF) A Study on Information Security and Cryptography

    international security research papers

  4. (PDF) Global security

    international security research papers

  5. (PDF) Cloud Computing Security Issues and Its Challenges: A

    international security research papers

  6. (PDF) an original research paper to be submitted for publication to

    international security research papers

COMMENTS

  1. International Security

    International Security, the #2 journal in International Relations based on 2021 impact factor, publishes lucid, well-documented essays on the full range of contemporary security issues.Its articles address traditional topics of war and peace, as well as more recent dimensions of security, including environmental, demographic, and humanitarian issues, transnational networks, and emerging ...

  2. Geopolitics and International Security: Research & Analysis

    Since the end of the Cold War, the definition of international security has evolved immensely. CSIS is constantly working to engage with diverse actors and issues that present security threats in the twenty-first century. This research is led by the International Security Program, the Arleigh A. Burke Chair in Strategy, and the Zbigniew Brzezinski Chair in Global Security and Geostrategy and ...

  3. International Security

    International Security publishes lucid, well-documented essays on all aspects of the control and use of force, from all political viewpoints. Its articles cover contemporary policy issues, and probe historical and theoretical questions behind them. Essays in International Security have defined the debate on American national security policy and have set the agenda for scholarship on ...

  4. CSIS

    The Center for Strategic and International Studies (CSIS) is a bipartisan, nonprofit policy research organization & think tank analyzing global issues & policy.

  5. Journal of Global Security Studies

    Launched in 2022, the JoGSS Best Article Award honours outstanding rigorous, original and significant contributions to the field of global security studies. All research articles published in the previous volume year are eligible and automatically considered for the award. Enjoy free access to the winning articles for a limited time.

  6. Journal of Cybersecurity and Privacy

    However, there appears to be limited awareness among practitioners of academic contributions in this domain, creating a significant gap between industry and academia's contributions to EH tools. This research paper aims to survey the current state of EH academic research, primarily focusing on research-informed security tools.

  7. Research paper A comprehensive review study of cyber-attacks and cyber

    The cyber-security policy is accepted by the regulatory framework and is officially applied lonely to the relevant areas of the regulator. Security policy components vary according to the policy spectrum (Cheng et al., 2020). The national cyber-security policy, for example, includes all citizens and perhaps foreign businessmen working in its ...

  8. The Oxford Handbook of International Security

    Abstract. Future-oriented questions are woven through the study and practice of international security. The 48 essays collected in this Handbook use such questions to provide a tour of the most innovative and exciting new areas of research as well as major developments in established lines of inquiry. The results of their efforts are: the ...

  9. COSE

    The International Source of Innovation for the Information Security and IT Audit Professional. Computers & Security is one of the most respected journals in IT security, being recognized worldwide as THE primary source of reference for IT security research and applications expertise.. Computers & Security provides the IT security community with a unique blend of leading edge research and sound ...

  10. Home

    The journal publishes research articles and reviews in the areas including, but not limited to: • Cryptography and its applications. • Network and critical infrastructure security. • Hardware security. • Software and system security. • Cybersecurity data analytics. • Data-driven security and measurement studies. • Adversarial ...

  11. Safeguarding International Science: Research Security Framework

    This Framework is designed to enable organizations to implement a mission-focused, integrated, risk-balanced program through the application of research security principles and best practices that fosters the safeguarding of international science while mitigating risks to the integrity of the open collaborative environment.

  12. Conflict, Peace and Security: An International Relations Perspective

    Conflict, peace and security are some of the enduring concerns of the Peace Research Movement of the 1950s and 1960s. They have become integrated in the dominant disciplines of international relations and political science and now are also part of most of the social science disciplines, such as economics, sociology, public policy, gender studies, international law and so on.

  13. Cyber security: State of the art, challenges and future directions

    In this paper, we discuss the challenges of cyber security, and future research direction including AI, machine learning, and other states of the art techniques used to combat cyber security challenges. ... international collaboration, and innovation landscapes. To improve cyber security and safeguard people's privacy, industries, governments ...

  14. International Security Research Papers

    Securitizing Youth offers new insights on young people's engagement in a wide range of contexts related to the peace and security field. It presents empirical findings on the challenges and opportunities faced by young women and men in... more. View International Security Research Papers on Academia.edu for free.

  15. Topics on International Relations & Foreign Policy

    Chief Communications Officer. 202.775.3242. [email protected]. Samuel Cestari. Media Relations Coordinator, External Relations. 202.775.7317. [email protected]. The Center for Strategic & International Studies (CSIS) examines research topics surrounding global studies, international relations, & foreign policy issues.

  16. Journal of Cybersecurity

    About the journal. Journal of Cybersecurity publishes accessible articles describing original research in the inherently interdisciplinary world of computer, systems, and information security …. Find out more. The health belief model and phishing: determinants of preventative security behaviors. Narrow windows of opportunity: the limited ...

  17. Role of UN in Maintenance of International Peace & Security

    The United Nations (UN) is an international organization whose stated aims are facilitating cooperation in international law, international security, economic development, social progress, human rights, and achievement of world peace. The UN was founded in 1945 after World War II to replace the League of Nations, to stop wars between countries ...

  18. (PDF) ADVANCES IN NETWORK SECURITY: A COMPREHENSIVE ...

    security research issues in this paper to help researchers. ... International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). IEEE, pp. 156-163, 2019. ...

  19. Artificial intelligence for cybersecurity: Literature review and future

    1. Introduction. The term cybersecurity refers to a set of technologies, processes and practices to protect and defend networks, devices, software and data from attack, damage or unauthorized access [1].Cybersecurity is becoming complex because of the exponential growth of interconnected devices, systems and networks.

  20. Home

    The International Journal of Information Security is a comprehensive resource for critical advancements in the field of information security. Presents important technical work in information security, whether theoretical, applicable, or related to implementation. Covers system security, network security, content protection, applications.

  21. A Systematic Literature Review on Cloud Computing Security: Threats and

    This SLR examined the research studies published between 2010 and 2020 within the popular digital libraries. We selected 80 papers after a meticulous screening of published works to answer the proposed research questions. The outcomes of this SLR reported seven major security threats to cloud computing services.

  22. Topics

    POPULAR POSTS. Under the Radar: NSA's Efforts to Secure Private-Sector Telecommunications Infrastructure 7.3k views; Free Speech Aboard the Leaky Ship of State: Calibrating First Amendment Protections for Leakers of Classified Information 6.5k views; Military-Intelligence Convergence and the Law of the Title 10/Title 50 Debate 6.1k views; The Implications of Trying National Security Cases in ...

  23. GUIDANCE AND COUNSELLING SERVICES, NATIONAL SECURITY CONCERN

    conference: paper presented at the 47th international conference of the counselling association of nigeria (casson) kano 2023 21 - 25th august, 2023 theme: counselling for national safety and ...