##plugins.themes.bootstrap3.accessible_menu.label##
##plugins.themes.bootstrap3.accessible_menu.main_navigation##
##plugins.themes.bootstrap3.accessible_menu.main_content##
##plugins.themes.bootstrap3.accessible_menu.sidebar##
English
العربية
Register
Login
NAUSS
Home
About us
Editorial Team
About the Journal
Aim and Scope
Authors Guidelines
Contact Us
Articles & Issues
Current
Ahead of print
Archives
Indexing/Abstracting
Policies
Principles of Publishing Ethics
Privacy Statement
Publication Frequency
Process Charges
Conflicts of Interest
Crossmark Policy
Open Access and Copyright
Peer Review Process
Malpractice and Ethics Statement
Archiving Policy
Announcements
Search
English
العربية
Register
Login
Vol. 5 No. 2 (2022)
Home
Archives
Vol. 5 No. 2 (2022)
Volume 5 Issue (2) December 2022
DOI:
https://doi.org/10.26735/CECW8179
Original Research articles
Pivot Attack Classification for Cyber Threat Intelligence
Rafael Salema Marques, Haider al-Khateeb, Gregory Epiphaniou, Carsten Maple
PDF
Cyberthreats Facing High School Students and Methods of Addressing them
Abdulrahman Abdullah Alghamdi
PDF
Trusted Microservices: A Security Framework for Users' Interaction with Microservices Applications
Mohamed Ibrahim Elkholy, Marwa A. Marzok
PDF
The Effect of Applying Information Security Awareness Concept of MOH Employees on Cybersecurity Department – Ministry of Health-Riyadh
Mohammed Masaad ALotibi, Abdulrahman Abdullah Alghamdi
Pdf
Review Article
Investigating the Factors Influencing the Use of Cloud Computing
Hussain Alshahrani, Amnah Alshahrani, Mohamed Ahmed Elfaki, Saeed alshahrani, Mofadal alymani, Yazeed alkhurayyif
PDF
Cybercrimes and Virtual Worlds: A Systematic Literature Review
Curcio Matteo
PDF