About
Technology
Issues
FAQ
Search
Scientometrics
Impact Factor
Discipline Ranks
h
-index
g
-index
Articles
Citations
Article Citations
Citation Distribution
Overviews
Top Institutions
Top Schools
Top Authors
Prolific Authors
Top Articles
Citing Bodies
Top Citing Authors
Top Citing Institutions
Top Citing Schools
Top Citing Journals
Top Citing Disciplines
exaly
›
Journals
›
Journal of Security Engineering
›
top-articles
Journal of Security Engineering
0.0
(top 100%)
impact factor
202
(top 50%)
papers
108
(top 100%)
citations
5
(top 50%)
h
-index
0.0
(top 100%)
impact factor
231
all documents
114
doc citations
7
(top 100%)
g
-index
Top Articles
#
Title
Journal
Year
Citations
1
An Analysis of Information Security Management System and Certification Standard for Information Security
Journal of Security Engineering
2014
9
2
E-learning Privacy and Security Requirements: Review
Journal of Security Engineering
2013
8
3
Survey of Security Threats and Contermeasures on Android Environment
Journal of Security Engineering
2014
7
4
A Study on the Security Technology for the Internet of Things
Journal of Security Engineering
2014
6
5
A Design of Secure E-health Data Management System
Journal of Security Engineering
2015
5
6
A Review on the Role Expansion of German Federal Office for Information Security(Bundesamt für Sicherheit in der Informationstechnik, BSI) in 2017
Journal of Security Engineering
2018
5
7
Improvement of Personal Information Protection Level in the Military Using the Measurement of Disclosure Risk
Journal of Security Engineering
2015
3
8
Method of Detecting SmiShing using SVM
Journal of Security Engineering
2013
3
9
Towards on blockchain standardization including blockchain as a service
Journal of Security Engineering
2017
2
10
The Improvement Plan of a Customized Cyber-Training Structure for enhancing the Capability of Cyber Security
Journal of Security Engineering
2015
2
11
Design and Implementation of Fail Recovery Proces on Highly-Reliable Embeded Linux System
Journal of Security Engineering
2014
2
12
Developing Warfare System SW Development Security Clasification System Using KJ method
Journal of Security Engineering
2014
2
13
Secure Coding Rule Selection Optimized on the Army Fire Control Computer
Journal of Security Engineering
2014
2
14
A Study on the Improvement and Supervisory Status for Personal Fiduciary Services in Financial Institutions
Journal of Security Engineering
2014
2
15
Countermeasures against Anti-forensics by Analyzing Anti-forensics Techniques
Journal of Security Engineering
2014
2
16
A Suggestion for Information Security Awareness of Finance Firms
Journal of Security Engineering
2014
2
17
Remote User Authentication Scheme with Key Agreement Providing Forward Secrecy
Journal of Security Engineering
2015
2
18
Development of Information System Operational Audit Checklist for Personal Information Protection in Public Organizations
Journal of Security Engineering
2015
2
19
A Case Study of Employee Privacy leaks and Fraud during B2B transaction -Focused on Man in the Middle Attack Case-
Journal of Security Engineering
2015
2
20
An Efficient and Secure Physical Security Method of Data Center
Journal of Security Engineering
2015
2
21
Cyber Profesionals Certification Evaluation Model for Reinforcing Cyberwar Power
Journal of Security Engineering
2014
1
22
A Proposal of Smart Phone App for Preventing Smishing Attack
Journal of Security Engineering
2015
1
23
Certificateless-based Authenticated Key Agreement(AKA) Protocol Without Pairings
Journal of Security Engineering
2016
1
24
Strengthening of Token Authentication Using Time-based Randomization
Journal of Security Engineering
2017
1
25
Security Model of Secure Cloud Computing Services
Journal of Security Engineering
2017
1
26
Two-Factor Authentication Scheme based on Mobile Mesenger with Improved Usability
Journal of Security Engineering
2013
1
27
Security Requirements of Order Communication System in Hospitals for Compliance with Personal Information Protection Act
Journal of Security Engineering
2013
1
28
E-learning Ongoing Sesion Authentication Security
Journal of Security Engineering
2013
1
29
A Study of Security Technique on Cloud based Healthcare System
Journal of Security Engineering
2013
1
30
An Analysis of Security Vulnerability on Document Management Service by Cloud Computing
Journal of Security Engineering
2013
1
31
The Customized Scheme Structure for Prevent Cyber Threats on the Critical Information and Communication Infrastructure
Journal of Security Engineering
2013
1
32
Research on Factors Efecting Online Service Loyalty : Mediating Efect of Perceived Personal Information Protection
Journal of Security Engineering
2013
1
33
A Study on the Protection Plan of Digital Contents
Journal of Security Engineering
2013
1
34
A Study on Ninja Gateway Routing Using Backdor Method
Journal of Security Engineering
2014
1
35
A Framework for Personal Information Handler in Smart Device Environment
Journal of Security Engineering
2014
1
36
On Conditions to Satisfy White-Box Cryptography
Journal of Security Engineering
2014
1
37
Investigation on NFC-based Security System for Smart Work
Journal of Security Engineering
2014
1
38
Development of Service Verification Methodology Based on Cloud Computing Interoperability
Journal of Security Engineering
2014
1
39
Hybrid Key Management Using Self-Extended Certification and Hardware Security Module
Journal of Security Engineering
2014
1
40
Limitation of Armed Response to Cyber Armed Conflict
Journal of Security Engineering
2014
1
41
A Survey and Analysis of Security Vulnerability in Xen and KVM
Journal of Security Engineering
2014
1
42
A Design of ETDTP(Energy Theft Detection and Traceback Protocol) for AMI(Advanced Metering Infrastructure) of Smart Grid
Journal of Security Engineering
2014
1
43
A Study on Train Plan For Copyright Infringement Forensics Professional in the Cyberspace
Journal of Security Engineering
2014
1
44
Proposal of Security Requirements for Storage Virtualization System against Cloud Computing Security Threats
Journal of Security Engineering
2014
1
45
Secure Coding Rule Selecting Evaluation for Air Warfare System Considering Military Air Worthiness
Journal of Security Engineering
2014
1
46
Management Plan of Cyber Reserve Forces for Cyber Warfare
Journal of Security Engineering
2015
1
47
A Congestion Avoidance Policy to extend lifetime of Sensor Networks
Journal of Security Engineering
2015
1
48
Remarks on Smart Watch Security Vulnerability and Solution
Journal of Security Engineering
2015
1
49
IPv6 Address Configuration for Privacy Protection in the IoT
Journal of Security Engineering
2015
1
50
Propagation Modeling of Multiple Internet Worm Variants
Journal of Security Engineering
2015
1
site/software ©
exaly
; All materials licenced under
CC by-SA
.