Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Integrated Model for Security and Protection of Critical Infrastructure
(Articles)
Kiril Stoichev
Open Access Library Journal
Vol.1 No.9
,December 18, 2014
DOI:
10.4236/oalib.1101124
801
Downloads
1,495
Views
Citations
Development of an Analytical Model of the Process of Cybersecurity Protection of Distributed Information Systems of Critical Infrastructure
(Articles)
Ramaz R. Shamugia
Int'l J. of Communications, Network and System Sciences
Vol.13 No.10
,October 31, 2020
DOI:
10.4236/ijcns.2020.1310010
92
Downloads
254
Views
Citations
Case Study on the Lean Six Sigma Management for Information Technology Service Management Project of G Commercial Bank
(Articles)
Yongmei Xu
,
Fan Zhang
,
Xiaowen Ye
Technology and Investment
Vol.4 No.2
,May 24, 2013
DOI:
10.4236/ti.2013.42009
7,255
Downloads
11,188
Views
Citations
Analysis of Causes and Actual Events on Electric Power Infrastructure Impacted by Cyber Attack
(Articles)
Hongxu Yin
,
Rui Xiao
,
Fenfei Lv
Journal of Power and Energy Engineering
Vol.3 No.4
,April 13, 2015
DOI:
10.4236/jpee.2015.34012
3,295
Downloads
3,983
Views
Citations
Public Infrastructure Asset Assessment with Limited Data
(Articles)
Frederick Bloetscher
,
Lloyd Wander
,
Greg Smith
,
Nihat Dogon
Open Journal of Civil Engineering
Vol.7 No.3
,September 26, 2017
DOI:
10.4236/ojce.2017.73032
971
Downloads
2,027
Views
Citations
Awareness of the Potential Threat of Cyberterrorism to the National Security
(Articles)
Abdulrahman Alqahtani
Journal of Information Security
Vol.5 No.4
,September 19, 2014
DOI:
10.4236/jis.2014.54013
5,379
Downloads
7,014
Views
Citations
Strategic Coordination for Sustainable Investment in Critical Infrastructure
(Articles)
Jeremiah Mutamba
,
Ola Busari
Journal of Geoscience and Environment Protection
Vol.2 No.5
,December 18, 2014
DOI:
10.4236/gep.2014.25011
4,441
Downloads
4,892
Views
Citations
Numerical Calculation of Geoelectric Fields That Affect Critical Infrastructure
(Articles)
David H. Boteler
,
Risto J. Pirjola
International Journal of Geosciences
Vol.10 No.10
,October 29, 2019
DOI:
10.4236/ijg.2019.1010053
179
Downloads
373
Views
Citations
Analysis on the Protection of Genetic Resources from the Perspective of Intellectual Property
(Articles)
Xuanyu Chen
Advances in Applied Sociology
Vol.9 No.6
,June 13, 2019
DOI:
10.4236/aasoci.2019.96014
413
Downloads
742
Views
Citations
Critical Energy Infrastructure: Cyberterrorism Threats and Means of Protection
(Articles)
V. A. Vasenin
Journal of Software Engineering and Applications
Vol.6 No.9A
,September 25, 2013
DOI:
10.4236/jsea.2013.69A003
5,950
Downloads
7,533
Views
Citations
This article belongs to the Special Issue on
Software Engineering for Safety-Critical Systems and Medical Devices
A Security Architecture for SCADA Systems
(Articles)
Arun Velagapalli
,
Mahalingam Ramkumar
Journal of Information Security
Vol.9 No.1
,January 23, 2018
DOI:
10.4236/jis.2018.91009
809
Downloads
1,956
Views
Citations
Climate Change, Environmental Threats and Cyber-Threats to Critical Infrastructures in Multi-Regulatory Sustainable Global Approach with Sweden as an Example
(Articles)
Sandra Cassotta
,
Maria Pettersson
Beijing Law Review
Vol.10 No.3
,June 27, 2019
DOI:
10.4236/blr.2019.103035
630
Downloads
1,613
Views
Citations
Scope and Application of the FIFRA Treated Articles Exemption
(Articles)
Lawrence S. Ebner
,
David A. Webb
Journal of Transportation Technologies
Vol.10 No.1
,December 12, 2019
DOI:
10.4236/jtts.2020.101002
426
Downloads
557
Views
Citations
A Study of Service Desk Setup in Implementing IT Service Management in Enterprises
(Articles)
Xiaojun Tang
,
Yuki Todo
Technology and Investment
Vol.4 No.3
,August 6, 2013
DOI:
10.4236/ti.2013.43022
13,718
Downloads
19,067
Views
Citations
A New Method for Improving Robustness of Registered Fingerprint Data Using the Fractional Fourier Transform
(Articles)
Reiko Iwai
,
Hiroyuki Yoshimura
Int'l J. of Communications, Network and System Sciences
Vol.3 No.9
,September 30, 2010
DOI:
10.4236/ijcns.2010.39096
5,430
Downloads
8,875
Views
Citations
Matching Accuracy Analysis of Fingerprint Templates Generated by Data Processing Method Using the Fractional Fourier Transform
(Articles)
Reiko Iwai
,
Hiroyuki Yoshimura
Int'l J. of Communications, Network and System Sciences
Vol.4 No.1
,January 28, 2011
DOI:
10.4236/ijcns.2011.41003
6,109
Downloads
10,015
Views
Citations
Improved Authentication Accuracy by Individually Set Orders of the Fractional Fourier Transform and Effects of Damage of Fingerprint Image on Authentication Accuracy
(Articles)
Reiko Iwai
,
Hiroyuki Yoshimura
Int'l J. of Communications, Network and System Sciences
Vol.4 No.12A
,December 22, 2011
DOI:
10.4236/ijcns.2011.432095
4,911
Downloads
7,556
Views
Citations
This article belongs to the Special Issue on
Cloud Computing
Accuracy Analysis in Fingerprint Authentication Using the Fractional Fourier Transform without Misalignment Correction of Scanned Images
(Articles)
Reiko Iwai
,
Hiroyuki Yoshimura
Int'l J. of Communications, Network and System Sciences
Vol.5 No.3
,March 21, 2012
DOI:
10.4236/ijcns.2012.53022
4,629
Downloads
7,015
Views
Citations
Method of Designing Generators of Pseudorandom Sequences for Information Protection Based on Shift Register with Non-Linear Feedback Function
(Articles)
Saleh Al-Omar
Journal of Information Security
Vol.5 No.4
,October 29, 2014
DOI:
10.4236/jis.2014.54020
5,144
Downloads
5,716
Views
Citations
Mechanisms for Cross-Scaling, Flexibility and Social Learning in Building Resilience to Sea Level Rise: Case Study of Hampton Roads, Virginia
(Articles)
Carol Considine
,
Michelle Covi
,
Juita-Elena (Wie) Yusuf
American Journal of Climate Change
Vol.6 No.2
,June 28, 2017
DOI:
10.4236/ajcc.2017.62020
920
Downloads
1,521
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2023 Scientific Research Publishing Inc. All Rights Reserved.
Top