Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Enhancing Cybersecurity through Cloud Computing Solutions in the United States
(Articles)
Omolola F. Hassan
,
Folorunsho O. Fatai
,
Oluwadare Aderibigbe
,
Abdullah Oladoyin Akinde
,
Tolulope Onasanya
,
Mariam Adetoun Sanusi
,
Oduwunmi Odukoya
Intelligent Information Management
Vol.16 No.4
,July 12, 2024
DOI:
10.4236/iim.2024.164011
344
Downloads
2,239
Views
Citations
Futureproofing Blockchain & Cryptocurrencies against Growing Vulnerabilities & Q-Day Threat with Quantum-Safe Ledger Technology (QLT)
(Articles)
Fazal Raheman
Journal of Computer and Communications
Vol.12 No.7
,July 26, 2024
DOI:
10.4236/jcc.2024.127005
116
Downloads
791
Views
Citations
Exploring the Latest Trends in AI Technologies: A Study on Current State, Application and Individual Impacts
(Articles)
Md Ahsan Ullah Imran
,
Mustakim Bin Aziz
,
Anamika Tiwari
,
Sanchita Saha
,
Ashok Ghimire
Journal of Computer and Communications
Vol.12 No.8
,August 13, 2024
DOI:
10.4236/jcc.2024.128002
169
Downloads
1,306
Views
Citations
A Review of Artificial Intelligence Applications in Contemporary Computer Network Technologies
(Articles)
Ackim Lutepo
,
Kai Zhang
Communications and Network
Vol.16 No.3
,August 20, 2024
DOI:
10.4236/cn.2024.163005
227
Downloads
1,406
Views
Citations
Cybersecurity Framework for Kenyan Universities in Conformity with ISO/IEC 27001:2022 Standard
(Articles)
Patrick Macharia Gichubi
,
Bernard Maake
,
Ruth Chweya
Open Access Library Journal
Vol.11 No.8
,August 30, 2024
DOI:
10.4236/oalib.1110810
99
Downloads
647
Views
Citations
Deep Learning-Based Two-Step Approach for Intrusion Detection in Networks
(Articles)
Kamagaté Beman Hamidja
,
Kanga Koffi
,
Kouassi Adless
,
Olivier Asseu
,
Souleymane Oumtanaga
International Journal of Internet and Distributed Systems
Vol.6 No.2
,November 22, 2024
DOI:
10.4236/ijids.2024.62002
108
Downloads
626
Views
Citations
The Innovations and Trends of Information Technology with AI: Weapons to Reassemble the Future World
(Articles)
Nur Vanu
,
Md. Omar Farouk
,
Md. Samiun
,
Sadia Sharmin
,
Misha Billah
,
Saddam Hossain
Journal of Computer and Communications
Vol.12 No.12
,December 18, 2024
DOI:
10.4236/jcc.2024.1212003
85
Downloads
628
Views
Citations
Unveiling Insider Threats: Examining Vulnerabilities in an Organizational Structure: A Case Study of NamPost
(Articles)
Iyaloo N. Waiganjo
,
Linekela S. Nandjenda
Open Access Library Journal
Vol.12 No.1
,January 8, 2025
DOI:
10.4236/oalib.1112797
47
Downloads
395
Views
Citations
A Comparative Analysis of Machine Learning Models for Real-Time IoT Threat Detection with Focus on Mirai Botnet
(Articles)
Muhammad Mamman Kontagora
,
Steve A. Adeshina
,
Habiba Musa
Open Access Library Journal
Vol.12 No.2
,February 21, 2025
DOI:
10.4236/oalib.1112855
60
Downloads
453
Views
Citations
Use of Machine Learning and Deep Learning in Intrusion Detection for IoT
(Articles)
Muhannad Almohaimeed
,
Rasha Alyoubi
,
Afnan Aljohani
,
Mashael Alhaidari
,
Faisal Albalwy
,
Fahad Ghabban
,
Ibrahim Alfadli
,
Omair Ameerbakhsh
Advances in Internet of Things
Vol.15 No.2
,April 1, 2025
DOI:
10.4236/ait.2025.152002
130
Downloads
685
Views
Citations
Evolving Cybersecurity Policy: Addressing Modern Threats and Enhancing Resilience in a Digital Age
(Articles)
Nick Rahimi
,
Mehdi Barati
,
Sarah Lee
Journal of Information Security
Vol.16 No.2
,April 25, 2025
DOI:
10.4236/jis.2025.162017
54
Downloads
385
Views
Citations
A Comparative Study of Ensemble Learning Techniques and Classification Models to Identify Phishing Websites
(Articles)
Alvina T. Budoen
,
Mingwu Zhang
,
Laban Zephaniah Edwards Jr.
Open Access Library Journal
Vol.12 No.6
,June 5, 2025
DOI:
10.4236/oalib.1113566
40
Downloads
231
Views
Citations
Empirical Evidence for a Descriptive Model of Principles of Information Security Course
(Articles)
Adeyemi A. Adekoya
,
Aurelia M. Donald
,
Somasheker Akkaladevi
,
Akinjide A. Akinola
Journal of Information Security
Vol.11 No.4
,August 21, 2020
DOI:
10.4236/jis.2020.114012
674
Downloads
1,728
Views
Citations
Group Counselling Techniques and Risk Behaviour Management among Secondary School Students: From a Curriculum Implementation Viewpoint
(Articles)
Kibinkiri Eric Len
Open Journal of Social Sciences
Vol.6 No.3
,March 30, 2018
DOI:
10.4236/jss.2018.63019
1,325
Downloads
4,713
Views
Citations
Analysis of Determinants of Entrepreneurial Intentions among Construction Workers
(Articles)
R. Raghunath Reddy
,
Muddu Vinay
,
P. Venkateswarlu
Theoretical Economics Letters
Vol.9 No.2
,February 25, 2019
DOI:
10.4236/tel.2019.92022
962
Downloads
2,212
Views
Citations
This article belongs to the Special Issue on
Consumer Behavior Research
How to Support Innovative Behaviour?The Role of LMX and Satisfaction with HR Practices
(Articles)
Karin Sanders
,
Matthijs Moorkamp
,
Nicole Torka
,
Sandra Groeneveld
,
Claudia Groeneveld
Technology and Investment
Vol.1 No.1
,March 1, 2010
DOI:
10.4236/ti.2010.11007
12,812
Downloads
22,907
Views
Citations
An Approach to Human Adaptability towards its Built Environment: A Review
(Articles)
Richa Tiwari
,
Mukesh Pandey
,
Anupama Sharma
Energy and Power Engineering
Vol.2 No.2
,May 28, 2010
DOI:
10.4236/epe.2010.22013
6,764
Downloads
12,247
Views
Citations
People with Metabolic Syndrome Disorders Give Lower Offers in Ultimatum Game
(Articles)
Anuja Joshi
,
Sumedha Kondekar
,
Prajakta Belsare
,
Saroj Ghaskadbi
,
Milind Watve
,
Maithili Jog
Psychology
Vol.1 No.2
,June 30, 2010
DOI:
10.4236/psych.2010.12017
4,525
Downloads
8,915
Views
Citations
Isotropic Elastoplasticity Fully Coupled with Non-Local Damage
(Articles)
M. Almansba
,
K. Saanouni
,
N. E. Hannachi
Engineering
Vol.2 No.6
,July 1, 2010
DOI:
10.4236/eng.2010.26055
5,969
Downloads
10,638
Views
Citations
Psyche from within: Three Case Studies
(Articles)
Semyon Ioffe
,
Sergey Yesin
Psychology
Vol.1 No.4
,November 18, 2010
DOI:
10.4236/psych.2010.14037
5,979
Downloads
10,800
Views
Citations
<
...
5
6
7
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top