Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Multi-level Evaluation of Load Supply Adequacy for Transmission Network
(Articles)
Zheng-lin Yang
,
Jian-guo Yao
,
Jian Geng
Energy and Power Engineering
Vol.5 No.4B
,November 7, 2013
DOI:
10.4236/epe.2013.54B141
4,642
Downloads
5,653
Views
Citations
Automated Protection Performance Assessment and Enhancement
(Articles)
J. Jaeger
,
X.-P. Liang
,
R. Krebs
,
T. Bopp
Journal of Power and Energy Engineering
Vol.2 No.4
,April 22, 2014
DOI:
10.4236/jpee.2014.24071
5,395
Downloads
6,547
Views
Citations
Empirical Investigation of Threats to Loyalty Programs by Using Models Inspired by the Gordon-Loeb Formulation of Security Investment
(Articles)
Shiori Shinoda
,
Kanta Matsuura
Journal of Information Security
Vol.7 No.2
,March 17, 2016
DOI:
10.4236/jis.2016.72003
2,417
Downloads
3,748
Views
Citations
This article belongs to the Special Issue on
Cybersecurity Investments
A Novel Information Security Scheme for E-Learning Infrastructure Success Based on TRI Model
(Articles)
Yassine Khlifi
,
Adel Bessadok
Open Access Library Journal
Vol.2 No.4
,April 23, 2015
DOI:
10.4236/oalib.1101424
1,110
Downloads
2,318
Views
Citations
Data Security of Mobile Cloud Computing on Cloud Server
(Articles)
Mohammad Waseem
,
Abdullah Lakhan
,
Irfan Ali Jamali
Open Access Library Journal
Vol.3 No.4
,April 28, 2016
DOI:
10.4236/oalib.1102377
1,859
Downloads
8,641
Views
Citations
The Evolution of the Concept of International Peace and Security in light of UN Security Council Practice (End of the Cold War-Until Now)
(Articles)
Rasool Soltani
,
Maryam Moradi
Open Journal of Political Science
Vol.7 No.1
,January 3, 2017
DOI:
10.4236/ojps.2017.71010
3,404
Downloads
16,291
Views
Citations
HiMAC: Hierarchical Message Authentication Code for Secure Data Dissemination in Mobile Ad Hoc Networks
(Articles)
Khaleel Mershad
,
Ali Hamie
,
Mohamad Hamze
Int'l J. of Communications, Network and System Sciences
Vol.10 No.12
,December 15, 2017
DOI:
10.4236/ijcns.2017.1012018
1,099
Downloads
2,347
Views
Citations
Google Maps Security Concerns
(Articles)
Aqil Burney
,
Muhammad Asif
,
Zain Abbas
,
Shamaila Burney
Journal of Computer and Communications
Vol.6 No.1
,January 8, 2018
DOI:
10.4236/jcc.2018.61027
3,393
Downloads
14,376
Views
Citations
A Security Architecture for SCADA Systems
(Articles)
Arun Velagapalli
,
Mahalingam Ramkumar
Journal of Information Security
Vol.9 No.1
,January 23, 2018
DOI:
10.4236/jis.2018.91009
1,443
Downloads
3,977
Views
Citations
Application of Traditional Ecological Knowledge in Food and Water Security in the Semi-Arid Turkana County, Kenya
(Articles)
Cecilia Mwango Ratemo
,
George Morara Ogendi
,
Guangwei Huang
,
Rhoda N. Ondieki
Open Journal of Ecology
Vol.10 No.6
,June 1, 2020
DOI:
10.4236/oje.2020.106020
806
Downloads
2,993
Views
Citations
Secure Web Application Technologies Implementation through Hardening Security Headers Using Automated Threat Modelling Techniques
(Articles)
Maduhu Mshangi Mlyatu
,
Camilius Sanga
Journal of Information Security
Vol.14 No.1
,November 30, 2022
DOI:
10.4236/jis.2023.141001
319
Downloads
1,681
Views
Citations
Research on the Construction of China’s Strategic Communication System in Global Security Governance
(Articles)
Lina Jing
,
Nana Jing
Open Journal of Political Science
Vol.13 No.3
,June 12, 2023
DOI:
10.4236/ojps.2023.133017
183
Downloads
992
Views
Citations
Enhancing Security in QR Code Technology Using AI: Exploration and Mitigation Strategies
(Articles)
Saranya Vaithilingam
,
Santhosh Aradhya Mohan Shankar
International Journal of Intelligence Science
Vol.14 No.2
,March 26, 2024
DOI:
10.4236/ijis.2024.142003
305
Downloads
2,044
Views
Citations
Exploring the Characteristics of Data Breaches: A Descriptive Analytic Study
(Articles)
Dominik Molitor
,
Aditya Saharia
,
Viju Raghupathi
,
Wullianallur Raghupathi
Journal of Information Security
Vol.15 No.2
,April 2, 2024
DOI:
10.4236/jis.2024.152011
375
Downloads
2,849
Views
Citations
Analysis of Database Security
(Articles)
Xueying Pan
,
Anthony Obahiaghon
,
Brendan Makar
,
Samuel Wilson
,
Christian Beard
Open Access Library Journal
Vol.11 No.4
,April 15, 2024
DOI:
10.4236/oalib.1111366
184
Downloads
1,441
Views
Citations
The Role of AI in Cyber Security: Safeguarding Digital Identity
(Articles)
Mohammad Binhammad
,
Shaikha Alqaydi
,
Azzam Othman
,
Laila Hatim Abuljadayel
Journal of Information Security
Vol.15 No.2
,April 30, 2024
DOI:
10.4236/jis.2024.152015
1,088
Downloads
8,338
Views
Citations
Security Challenges around the Student Representative Council’s e-Voting System at Public-Funded University in the Western Cape
(Articles)
Joel Chigada
,
Dion Steven Tawanda Mazhawidza
Open Access Library Journal
Vol.11 No.9
,September 25, 2024
DOI:
10.4236/oalib.1112166
51
Downloads
923
Views
Citations
Informal Cross-Border Trade and Security Concerns in the IGAD Region: An Interrogation of the Policy Framework
(Articles)
Michael Omondi Owiso
,
Odhiambo Alphonce Kasera
Open Journal of Social Sciences
Vol.13 No.1
,January 7, 2025
DOI:
10.4236/jss.2025.131002
73
Downloads
424
Views
Citations
Research on the Convergence of Foreign Investment Security Review Legal Systems in Europe and the United States
(Articles)
Hu Chen
Beijing Law Review
Vol.16 No.2
,May 26, 2025
DOI:
10.4236/blr.2025.162036
47
Downloads
174
Views
Citations
Cultural Dimensions of Cybersecurity: A Cyberpsychology Analysis of Multinational Corporate Security
(Articles)
Troy C. Troublefield
Journal of Information Security
Vol.16 No.3
,July 4, 2025
DOI:
10.4236/jis.2025.163019
36
Downloads
188
Views
Citations
<
...
32
33
34
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top