Journal of Applied Security Research

Title Publication Date Language Citations
Two Systems Safety Analyses Useful in Examining the Vulnerabilities of Security Systems2008/06/27English
Interview with Linda Florence2008/06/27English
Convergence and the Google Way2008/06/27English
Online Education and the Working Professional: A University's Responsibility?2008/06/27English
Policing Public Transportation: An Environmental and Procedural Evaluation of Bus Stops2008/06/27English
An Overview of U.S. Initiatives and Technologies to Secure Shipping Containers at Overseas Ports2008/06/06English
Academy of Security Educators and Trainers News2008/12/23English
The Role of Universities in Preparing the Next Generation of Security Professionals2008/12/23English
Mobile Sensors for Security and Surveillance2008/12/23English
An Approach to the Study of Transport and Dispersion of Threat Agents in a Subway Station2008/12/23English
Corporate America Needs Help with Collecting Electronically Stored Information: ASCLD/LAB International Should be Their Guide2008/12/23English
Academy of Criminal Justice Sciences Security and Crime Prevention Section News2008/12/23English
The Ideal Design of a Potentially Safe Community2008/12/23English
Rootkits: Understanding the Practical Applications of Stealth Command, Control, and Monitoring2008/12/23English
Protect New York News2008/12/23English
Developing a Pay Scale for Security Guards: 5-Point Factor Evaluation Approach2016/01/02English
Secure Data Hiding Along Randomly Selected Closed Knight's Tour2016/01/02English
Rohan Gunaratna and Aviv Oreg, The Global Jihad Movement. New York, NY: Rowman & Littlefield (2015). 417 pages of contents; plus index and 10 pages of contents and foreword, $68.01(hardcover).2017/01/02English
Caroline Kennedy-Pipe, Gordon Clubb, and Simon Mabon (Eds.), Terrorism and Political Violence. Los Angeles, CA: Sage Publications (2015). 298 pages of content; plus index and 10 pages of contents, contributors and foreword, $50.00 (paperback).2017/01/02English
The Rise of the Mega Breach and What Can Be Done About It2017/07/03English
Issues with E-Waste: Applying the Tenets of the New Environmental Governance2016/06/07English
Role of Artificial Intelligence in the Prevention of Online Child Sexual Abuse: A Systematic Review of Literature2024/04/01English
A Digital Forensics Model for the Examination of QR Code and Android App to Investigate Aadhaar Card Identity Fraud2023/11/22English
Young Adults’ Perceptions of Store Environment: Evaluation of the Perceived Effectiveness of CPTED-Based Techniques in Preventing Shoplifting2024/01/18English
CSIMH: Design of an Efficient Security-Aware Customized Sidechaining Model via Iterative Meta-Heuristics2023/10/10English
Attack Model for Generic Intelligent Systems2023/11/20English
Cybersecurity Students’ Interest in Government Careers: Impact of Demographic Characteristics and Job Dynamics2023/11/20English
QoS-Based Secure Data Communication for Software-Defined Autonomous Vehicles Using Blockchain2024/01/23English
The Rise of #Cartels: Exploring the Organizational Operations and Messaging of Public Perception on Twitter2024/04/15English
Analysis of Criminal Landscape by Utilizing Statistical Analysis and Deep Learning Techniques2024/02/19English