Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Have You Considered Eating Your Weeds?
(Articles)
Willem Sternberg Jansen van Rensburg
,
Michele Cloete
,
Abe Shegro Gerrano
,
Patrick Olusanmi Adebola
American Journal of Plant Sciences
Vol.5 No.8
,March 26, 2014
DOI:
10.4236/ajps.2014.58123
5,590
Downloads
8,539
Views
Citations
This article belongs to the Special Issue on
Weed Research
A Survey of SQL Injection Attack Detection and Prevention
(Articles)
Khaled Elshazly
,
Yasser Fouad
,
Mohamed Saleh
,
Adel Sewisy
Journal of Computer and Communications
Vol.2 No.8
,June 4, 2014
DOI:
10.4236/jcc.2014.28001
7,203
Downloads
13,242
Views
Citations
Encrypted CDMA Audio Network
(Articles)
Alfredo A. Ortega
,
Víctor A. Bettachini
,
Pablo I. Fierens
,
José Ignacio Alvarez-Hamelin
Journal of Information Security
Vol.5 No.3
,June 25, 2014
DOI:
10.4236/jis.2014.53008
3,032
Downloads
4,458
Views
Citations
The Rise of Emerging Markets and Its Impact on Global Energy Security
(Articles)
José María Martín-Moreno
Modern Economy
Vol.5 No.9
,August 15, 2014
DOI:
10.4236/me.2014.59089
4,295
Downloads
5,335
Views
Citations
An Overview of Mobile Malware and Solutions
(Review)
Fan Wu
,
Hira Narang
,
Dwayne Clarke
Journal of Computer and Communications
Vol.2 No.12
,October 22, 2014
DOI:
10.4236/jcc.2014.212002
5,335
Downloads
8,658
Views
Citations
Application of High Carbon:Nitrogen Material Enhanced the Formation of the Soil A Horizon and Nitrogen Fixation in a Tropical Agricultural Field
(Articles)
Masato Oda
,
Kenji Tamura
,
Hiroko Nakatsuka
,
Miki Nakata
,
Yukimi Hayashi
Agricultural Sciences
Vol.5 No.12
,October 29, 2014
DOI:
10.4236/as.2014.512127
5,407
Downloads
7,478
Views
Citations
A Proposed Layered Architecture to Maintain Privacy Issues in Electronic Medical Records
(Articles)
Ameur Bensefia
,
Anis Zarrad
E-Health Telecommunication Systems and Networks
Vol.3 No.4
,November 7, 2014
DOI:
10.4236/etsn.2014.34006
3,836
Downloads
5,216
Views
Citations
Climate Change Adaptation and Vulnerability: A Case of Rain Dependent Small-Holder Farmers in Selected Districts in Zambia
(Articles)
Cuthbert Casey Makondo
,
Kenneth Chola
,
Blesswell Moonga
American Journal of Climate Change
Vol.3 No.4
,December 11, 2014
DOI:
10.4236/ajcc.2014.34034
7,109
Downloads
9,887
Views
Citations
Competence of Security Officers in the Management of National Examinations in Secondary Schools in Eastern Province, Kenya
(Articles)
George M. George M. Muthaa
,
Peter K. Muriungi
,
Eunice Kagendo Njue
Open Journal of Social Sciences
Vol.2 No.12
,December 22, 2014
DOI:
10.4236/jss.2014.212010
3,544
Downloads
4,829
Views
Citations
Cloud Security: Services, Risks, and a Case Study on Amazon Cloud Services
(Articles)
Patrick Mosca
,
Yanping Zhang
,
Zhifeng Xiao
,
Yun Wang
Int'l J. of Communications, Network and System Sciences
Vol.7 No.12
,December 24, 2014
DOI:
10.4236/ijcns.2014.712053
10,117
Downloads
18,645
Views
Citations
Conventional and Improved Digital Signature Scheme: A Comparative Study
(Articles)
Alaa D. Alrehily
,
Asmaa F. Alotaibi
,
Suzan B. Almutairy
,
Mashael S. Alqhtani
,
Jayaprakash Kar
Journal of Information Security
Vol.6 No.1
,January 22, 2015
DOI:
10.4236/jis.2015.61007
6,041
Downloads
8,523
Views
Citations
The Mutuality of Challenges Facing Human Rights and Human Security: A New Framework of Analysis
(Articles)
Emmanuel Ome
,
Ani Casimir
Open Journal of Political Science
Vol.5 No.2
,February 5, 2015
DOI:
10.4236/ojps.2015.52007
3,372
Downloads
5,174
Views
Citations
This article belongs to the Special Issue on
Special Issue on Emerging Africa - Need for a Paradigm Shift
Study on the Legalization of Minor Internet Security
(Articles)
Pengfei Ji
Beijing Law Review
Vol.6 No.1
,March 10, 2015
DOI:
10.4236/blr.2015.61007
4,328
Downloads
4,999
Views
Citations
Igbo Traditional Morality as a Panacea to Nigerian Security Crises
(Articles)
Anthony Chukwudi Areji
,
Michael Chugozie Anyaehie
Open Journal of Political Science
Vol.5 No.2
,March 18, 2015
DOI:
10.4236/ojps.2015.52012
3,642
Downloads
4,682
Views
Citations
This article belongs to the Special Issue on
Special Issue on Emerging Africa - Need for a Paradigm Shift
Security & Privacy Implications in the Placement of Biometric-Based ID Card for Rwanda Universities
(Articles)
Eugen Harinda
,
Etienne Ntagwirumugara
Journal of Information Security
Vol.6 No.2
,March 31, 2015
DOI:
10.4236/jis.2015.62010
6,516
Downloads
8,807
Views
Citations
An Algorithm for Optimal Firewall Placement in IEC61850 Substations
(Articles)
Hermes Eslava
,
Luis Alejandro Rojas
,
Danny Pineda
Journal of Power and Energy Engineering
Vol.3 No.4
,April 13, 2015
DOI:
10.4236/jpee.2015.34003
4,493
Downloads
5,152
Views
Citations
Security Assessment of Distribution System with Distributed Photovoltaic
(Articles)
Weiping Zhu
,
Zhicheng Wang
,
Xiaodong Yuan
,
Ruonan Fan
Journal of Power and Energy Engineering
Vol.3 No.4
,April 14, 2015
DOI:
10.4236/jpee.2015.34034
4,025
Downloads
5,009
Views
Citations
The Importance of Health Records
(Articles)
Milena Marinič
Health
Vol.7 No.5
,May 20, 2015
DOI:
10.4236/health.2015.75073
36,660
Downloads
54,410
Views
Citations
Keyboard Dependency of Personal Identification Performance by Keystroke Dynamics in Free Text Typing
(Articles)
Yoshitomo Matsubara
,
Toshiharu Samura
,
Haruhiko Nishimura
Journal of Information Security
Vol.6 No.3
,July 14, 2015
DOI:
10.4236/jis.2015.63023
5,042
Downloads
7,554
Views
Citations
Role Expansion: Implications of the Security Role Expanding into the EHS Function
(Articles)
Wanda D. Minnick
,
Jonathan D. Cunkelman
Open Journal of Safety Science and Technology
Vol.5 No.3
,August 20, 2015
DOI:
10.4236/ojsst.2015.53010
8,492
Downloads
9,378
Views
Citations
<
...
9
10
11
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top