Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Tensor-Centric Warfare V: Topology of Systems Confrontation
(Articles)
Vladimir Ivancevic
,
Peyam Pourbeik
,
Darryn Reid
Intelligent Control and Automation
Vol.10 No.1
,February 28, 2019
DOI:
10.4236/ica.2019.101002
727
Downloads
1,531
Views
Citations
Review and Analysis: Successful Use of Soil Tunnels in Medieval and Modern Warfare and Smuggling
(Articles)
Kenneth R. Olson
,
David R. Speidel
Open Journal of Soil Science
Vol.10 No.5
,May 18, 2020
DOI:
10.4236/ojss.2020.105010
1,381
Downloads
4,806
Views
Citations
Review: The In-Line Biosensors as Detectors for Chromatography
(Articles)
Ilia Brondz
Voice of the Publisher
Vol.8 No.2
,May 31, 2022
DOI:
10.4236/vp.2022.82004
91
Downloads
369
Views
Citations
Digital Forensics and Cyber Crime Datamining
(Articles)
K. K. Sindhu
,
B. B. Meshram
Journal of Information Security
Vol.3 No.3
,July 25, 2012
DOI:
10.4236/jis.2012.33024
24,810
Downloads
40,874
Views
Citations
Network Intrusion Detection and Visualization Using Aggregations in a Cyber Security Data Warehouse
(Articles)
Bogdan Denny Czejdo
,
Erik M. Ferragut
,
John R. Goodall
,
Jason Laska
Int'l J. of Communications, Network and System Sciences
Vol.5 No.9A
,September 18, 2012
DOI:
10.4236/ijcns.2012.529069
4,777
Downloads
8,395
Views
Citations
This article belongs to the Special Issue on
Models and Algorithms for Applications
A Study on Quantitative Methodology to Assess Cyber Security Risk of Smart Grid
(Articles)
Pil Sung Woo
,
Byung-Hyun Ko
,
Dong-Joo Kang
,
Balho H. Kim
Energy and Power Engineering
Vol.5 No.4B
,November 18, 2013
DOI:
10.4236/epe.2013.54B249
5,366
Downloads
8,032
Views
Citations
A Systematic Approach for Cyber Security in Vehicular Networks
(Articles)
Farhan Ahmad
,
Asma Adnane
,
Virginia N. L. Franqueira
Journal of Computer and Communications
Vol.4 No.16
,December 29, 2016
DOI:
10.4236/jcc.2016.416004
2,134
Downloads
5,750
Views
Citations
This article belongs to the Special Issue on
Vehicular Communications and Networks
Big Data Analysis in Smart Manufacturing: A Review
(Articles)
Kevin Nagorny
,
Pedro Lima-Monteiro
,
Jose Barata
,
Armando Walter Colombo
Int'l J. of Communications, Network and System Sciences
Vol.10 No.3
,March 31, 2017
DOI:
10.4236/ijcns.2017.103003
4,506
Downloads
15,585
Views
Citations
Governing the “Digital Shadows”: Public Policy and Information Communication Technology (ICT) Acquisition and Utilization in Africa
(Articles)
Ebenezer Olatunji Olugbenga
Open Access Library Journal
Vol.4 No.4
,April 28, 2017
DOI:
10.4236/oalib.1103564
1,496
Downloads
3,518
Views
Citations
Modeling Abstraction Hierarchy Levels of the Cyber Attacks Using Random Process
(Articles)
Gilles Durrieu
,
Emmanuel Frenod
,
Thierry Morineau
,
Thong Quoc Nguyen
Open Journal of Statistics
Vol.7 No.3
,June 28, 2017
DOI:
10.4236/ojs.2017.73035
1,209
Downloads
2,408
Views
Citations
Do ICMP Security Attacks Have Same Impact on Servers?
(Articles)
Ganesh Reddy Gunnam
,
Sanjeev Kumar
Journal of Information Security
Vol.8 No.3
,July 25, 2017
DOI:
10.4236/jis.2017.83018
1,525
Downloads
4,280
Views
Citations
A Security Architecture for SCADA Systems
(Articles)
Arun Velagapalli
,
Mahalingam Ramkumar
Journal of Information Security
Vol.9 No.1
,January 23, 2018
DOI:
10.4236/jis.2018.91009
1,331
Downloads
3,546
Views
Citations
A System Status Definition to Improve Behavior Description in Specifications Based on Constructal Law
(Articles)
Luciano Ondir Freire
,
Dr. Delvonei Alves de Andrade
,
Daniel Monterrain
Open Journal of Applied Sciences
Vol.8 No.8
,August 8, 2018
DOI:
10.4236/ojapps.2018.88024
680
Downloads
2,523
Views
Citations
Cybersecurity for Allied Future Submarines
(Articles)
Keith F. Joiner
,
Simon Reay Atkinson
,
Pete Christensen
,
Elena Sitnikova
World Journal of Engineering and Technology
Vol.6 No.4
,September 14, 2018
DOI:
10.4236/wjet.2018.64045
1,495
Downloads
3,371
Views
Citations
This article belongs to the Special Issue on
Marine Engineering
Climate Change, Environmental Threats and Cyber-Threats to Critical Infrastructures in Multi-Regulatory Sustainable Global Approach with Sweden as an Example
(Articles)
Sandra Cassotta
,
Maria Pettersson
Beijing Law Review
Vol.10 No.3
,June 27, 2019
DOI:
10.4236/blr.2019.103035
1,200
Downloads
4,194
Views
Citations
Improving General Undergraduate Cyber Security Education: A Responsibility for All Universities?
(Articles)
Stephanie M. Redman
,
Kate J. Yaxley
,
Keith F. Joiner
Creative Education
Vol.11 No.12
,December 9, 2020
DOI:
10.4236/ce.2020.1112187
611
Downloads
1,549
Views
Citations
Pricing Cyber Security Insurance
(Articles)
Zhaoxin Lin
,
Travis R. A. Sapp
,
Rahul Parsa
,
Jackie Rees Ulmer
,
Chengxin Cao
Journal of Mathematical Finance
Vol.12 No.1
,January 18, 2022
DOI:
10.4236/jmf.2022.121003
360
Downloads
2,301
Views
Citations
A DoS Attacks Detection Aglorithm Based on Snort-BASE for Robotic Arm Control Systems
(Articles)
Nana Li
,
Yong Wang
,
Pengfei Shen
,
Shuangfei Li
,
Lin Zhou
Journal of Computer and Communications
Vol.10 No.4
,April 7, 2022
DOI:
10.4236/jcc.2022.104001
136
Downloads
556
Views
Citations
Identification and Validation of Social Media Socio-Technical Information Security Factors with Respect to Usable-Security Principles
(Articles)
Joe Mutebi
,
Margaret Kareyo
,
Umezuruike Chinecherem
,
Akampurira Paul
Journal of Computer and Communications
Vol.10 No.8
,August 17, 2022
DOI:
10.4236/jcc.2022.108004
178
Downloads
788
Views
Citations
Cyber-Security of Smart Grids: Attacks, Detection, Countermeasure Techniques, and Future Directions
(Articles)
Tala Talaei Khoei
,
Hadjar Ould Slimane
,
Naima Kaabouch
Communications and Network
Vol.14 No.4
,November 24, 2022
DOI:
10.4236/cn.2022.144009
719
Downloads
5,674
Views
Citations
<
...
3
4
5
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top