Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
A Case Study of Adopting Security Guidelines in Undergraduate Software Engineering Education
(Articles)
Yen-Hung Hu
,
Charles Scott
Journal of Computer and Communications
Vol.2 No.14
,December 12, 2014
DOI:
10.4236/jcc.2014.214003
4,122
Downloads
6,340
Views
Citations
Security Framework for Managing Data Security within Point of Care Tests
(Articles)
Sivanesan Tulasidas
,
Ruth Mackay
,
Chris Hudson
,
Wamadeva Balachandran
Journal of Software Engineering and Applications
Vol.10 No.2
,February 24, 2017
DOI:
10.4236/jsea.2017.102011
1,794
Downloads
3,397
Views
Citations
Design and Evaluation of a Distributed Security Framework for the Internet of Things
(Articles)
Kelechi G. Eze
,
Cajetan M. Akujuobi
Journal of Signal and Information Processing
Vol.13 No.1
,February 28, 2022
DOI:
10.4236/jsip.2022.131001
341
Downloads
1,422
Views
Citations
Design and Implementation of Secure Subnet Inside of Data Sensitive Network
(Articles)
Haiwei Xue
,
Yunliang Zhang
,
Zhien Guo
,
Yiqi Dai
Journal of Software Engineering and Applications
Vol.6 No.3B
,April 11, 2013
DOI:
10.4236/jsea.2013.63B012
3,004
Downloads
4,579
Views
Citations
Empirical Investigation of Threats to Loyalty Programs by Using Models Inspired by the Gordon-Loeb Formulation of Security Investment
(Articles)
Shiori Shinoda
,
Kanta Matsuura
Journal of Information Security
Vol.7 No.2
,March 17, 2016
DOI:
10.4236/jis.2016.72003
2,327
Downloads
3,494
Views
Citations
This article belongs to the Special Issue on
Cybersecurity Investments
A Novel Information Security Scheme for E-Learning Infrastructure Success Based on TRI Model
(Articles)
Yassine Khlifi
,
Adel Bessadok
Open Access Library Journal
Vol.2 No.4
,April 23, 2015
DOI:
10.4236/oalib.1101424
1,014
Downloads
2,116
Views
Citations
Efficient DPA Attacks on AES Hardware Implementations
(Articles)
Yu HAN
,
Xuecheng ZOU
,
Zhenglin LIU
,
Yicheng CHEN
Int'l J. of Communications, Network and System Sciences
Vol.1 No.1
,June 6, 2008
DOI:
10.4236/ijcns.2008.11010
7,767
Downloads
16,701
Views
Citations
A Secure and Energy-Balanced Routing Scheme for Mobile Wireless Sensor Network
(Articles)
Bei Liu
,
Yuanming Wu
Wireless Sensor Network
Vol.7 No.11
,November 11, 2015
DOI:
10.4236/wsn.2015.711012
7,946
Downloads
10,484
Views
Citations
Integrated Model for Security and Protection of Critical Infrastructure
(Articles)
Kiril Stoichev
Open Access Library Journal
Vol.1 No.9
,December 18, 2014
DOI:
10.4236/oalib.1101124
853
Downloads
1,853
Views
Citations
Empirical Study under the Encouraging Model to Managerial Fees of Social Security Fund Investment
(Articles)
Jing Yi
,
Dong Lu
,
Yajun Deng
American Journal of Industrial and Business Management
Vol.6 No.5
,May 31, 2016
DOI:
10.4236/ajibm.2016.65060
1,658
Downloads
2,376
Views
Citations
The Content Security Mechanism of Smart TV Broadcasting Operating System
(Articles)
Xin Wang
Open Access Library Journal
Vol.2 No.11
,November 25, 2015
DOI:
10.4236/oalib.1102030
931
Downloads
1,711
Views
Citations
Towards the Development of Best Data Security for Big Data
(Articles)
Yuan Tian
Communications and Network
Vol.9 No.4
,November 30, 2017
DOI:
10.4236/cn.2017.94020
1,781
Downloads
5,104
Views
Citations
The Influence of China Demographic Structure on Social Security Expenditure—Based on Panel Data Model
(Articles)
Shichang Shen
,
Ying Wu
Open Journal of Statistics
Vol.8 No.3
,June 15, 2018
DOI:
10.4236/ojs.2018.83036
771
Downloads
1,723
Views
Citations
Analysis of Rural Households Food Security in Western Ethiopia
(Articles)
Seid Sani
,
Biruk Kemaw
Food and Nutrition Sciences
Vol.10 No.3
,March 5, 2019
DOI:
10.4236/fns.2019.103019
1,911
Downloads
5,094
Views
Citations
This article belongs to the Special Issue on
Food Analysis
Effects of Regional Trade Agreements on Strategic Agricultural Trade in Africa and Its Implications to Food Security: Evidence from Gravity Model Estimation
(Articles)
Fredu Nega Tegebu
,
Edris Hussein Seid
Theoretical Economics Letters
Vol.9 No.4
,March 18, 2019
DOI:
10.4236/tel.2019.94037
764
Downloads
2,418
Views
Citations
A Model “Critical Decision-Making Model”, Case-Study of Ghana, West Africa
(Articles)
Ishmael Norman
Advances in Applied Sociology
Vol.13 No.4
,April 27, 2023
DOI:
10.4236/aasoci.2023.134020
79
Downloads
544
Views
Citations
Developing Dependability Requirements Engineering for Secure and Safe Information Systems with Knowledge Acquisition for Automated Specification
(Articles)
Mohammed Abu Lamddi
Journal of Software Engineering and Applications
Vol.10 No.2
,February 28, 2017
DOI:
10.4236/jsea.2017.102013
1,605
Downloads
3,026
Views
Citations
A Novel Approach to Improve the Security of P2P File-Sharing Systems
(Articles)
Cuihua ZUO
,
Ruixuan LI
,
Zhengding LU
Int'l J. of Communications, Network and System Sciences
Vol.2 No.3
,June 21, 2009
DOI:
10.4236/ijcns.2009.23025
5,082
Downloads
9,189
Views
Citations
Research on Beta Trust Model of Wireless Sensor Networks Based on Energy Load Balancing
(Articles)
Danwei Chen
,
Xizhou Yu
,
Xianghui Dong
Wireless Sensor Network
Vol.2 No.5
,May 27, 2010
DOI:
10.4236/wsn.2010.24049
5,505
Downloads
9,852
Views
Citations
TUP: A New eCK-Secure AKE Protocol under the CDH Assumption
(Articles)
Qinglei Zhou
,
Zengfu Yang
Int'l J. of Communications, Network and System Sciences
Vol.5 No.6
,June 12, 2012
DOI:
10.4236/ijcns.2012.56043
3,429
Downloads
5,984
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top