Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Cyber Warfare: A New Hullaballoo under International Humanitarian Law
(Articles)
Yohannes Eneyew Ayalew
Beijing Law Review
Vol.6 No.4
,October 15, 2015
DOI:
10.4236/blr.2015.64021
4,563
Downloads
5,754
Views
Citations
Evaluation of Microsoft Windows Servers 2008 & 2003 against Cyber Attacks
(Articles)
Sanjeev Kumar
,
Senior Member
,
Raja Sekhar Reddy Gade
Journal of Information Security
Vol.6 No.2
,April 28, 2015
DOI:
10.4236/jis.2015.62016
4,916
Downloads
5,749
Views
Citations
Tensor-Centric Warfare VI: A Global Warfare Model
(Articles)
Vladimir Ivancevic
,
Darryn Reid
,
Peyam Pourbeik
,
Michael Pilling
Intelligent Control and Automation
Vol.10 No.1
,February 28, 2019
DOI:
10.4236/ica.2019.101003
564
Downloads
974
Views
Citations
Relevance of Cybersecurity Education at Pedagogy Levels in Schools
(Articles)
Eric Amankwa
Journal of Information Security
Vol.12 No.4
,September 9, 2021
DOI:
10.4236/jis.2021.124013
218
Downloads
2,096
Views
Citations
An Institutional Theory Perspective on Developing a Cyber Security Legal Framework: A Case of Saudi Arabia
(Articles)
H. P. Singh
,
Tareq S. Alshammari
Beijing Law Review
Vol.11 No.3
,July 9, 2020
DOI:
10.4236/blr.2020.113039
477
Downloads
1,479
Views
Citations
Development of the Software Application with Graphical User Interface for One Model Cyber Security
(Articles)
Ramaz R. Shamugia
Int'l J. of Communications, Network and System Sciences
Vol.12 No.12
,December 13, 2019
DOI:
10.4236/ijcns.2019.1212014
490
Downloads
1,046
Views
Citations
44 Victimization of Sulfur Mustard in Qiqihar: Case Reports
(Articles)
Jinghai Sun
,
Wei Zheng
International Journal of Clinical Medicine
Vol.3 No.7
,January 2, 2013
DOI:
10.4236/ijcm.2012.37122
3,119
Downloads
4,384
Views
Citations
The Ethical Morality of Christianity Requires an Assiduous Pursuit of the Great Commandment
(Articles)
Mark Malmin
Open Journal of Social Sciences
Vol.10 No.1
,January 10, 2022
DOI:
10.4236/jss.2022.101004
46
Downloads
302
Views
Citations
Tensor-Centric Warfare II: Entropic Uncertainty Modeling
(Articles)
Vladimir Ivancevic
,
Darryn Reid
,
Peyam Pourbeik
Intelligent Control and Automation
Vol.9 No.2
,May 30, 2018
DOI:
10.4236/ica.2018.92003
764
Downloads
1,463
Views
Citations
Ontology-Based Cyber Security Policy Implementation in Saudi Arabia
(Articles)
Amir Mohamed Talib
,
Fahad Omar Alomary
,
Hanan Fouad Alwadi
,
Rawan Rashed Albusayli
Journal of Information Security
Vol.9 No.4
,October 26, 2018
DOI:
10.4236/jis.2018.94021
1,113
Downloads
2,246
Views
Citations
E-Fraud in Nigerian Banks: Why and How?
(Articles)
Babatunde Moses Ololade
,
Mary Kehinde Salawu
,
Aderemi Daniel Adekanmi
Journal of Financial Risk Management
Vol.9 No.3
,September 10, 2020
DOI:
10.4236/jfrm.2020.93012
470
Downloads
2,842
Views
Citations
Case Study of a Cyber-Physical Attack Affecting Port and Ship Operational Safety
(Articles)
Kimberly Tam
,
Rory Hopcraft
,
Kemedi Moara-Nkwe
,
Juan Palbar Misas
,
Wesley Andrews
,
Avanthika Vineetha Harish
,
Pablo Giménez
,
Tom Crichton
,
Kevin Jones
Journal of Transportation Technologies
Vol.12 No.1
,December 6, 2021
DOI:
10.4236/jtts.2022.121001
155
Downloads
1,396
Views
Citations
Cybersecurity: Integrating Information into the Microeconomics of the Consumer and the Firm
(Articles)
Scott Farrow
Journal of Information Security
Vol.7 No.5
,August 30, 2016
DOI:
10.4236/jis.2016.75023
1,966
Downloads
3,074
Views
Citations
Improvements to the Fluoride Reactivation Method by Simple Organic Extraction for Retrospective Detection of Exposure to the Organophosphorus Nerve Agents in Human Plasma
(Articles)
Jin Young Lee
,
Yong Han Lee
Int'l J. of Analytical Mass Spectrometry and Chromatography
Vol.2 No.3
,September 25, 2014
DOI:
10.4236/ijamsc.2014.23007
4,009
Downloads
4,831
Views
Citations
Tensor-Centric Warfare III: Combat Dynamics with Delta-Strikes
(Articles)
Vladimir Ivancevic
,
Peyam Pourbeik
,
Darryn Reid
Intelligent Control and Automation
Vol.9 No.4
,November 5, 2018
DOI:
10.4236/ica.2018.94009
551
Downloads
1,004
Views
Citations
“The Extent of the Link between the Hegemony of the Major Powers Scientifically and Economically and Novel Coronavirus Spread”—A Study within the Framework of the Public International Law
(Articles)
Essam El-Din Mohamed Ibrahim
,
Moamr Rateeb Mohamed Abd-Elhafez
Open Access Library Journal
Vol.7 No.8
,August 18, 2020
DOI:
10.4236/oalib.1106588
136
Downloads
448
Views
Citations
Roman Manipular Warfare as a Mega-Weapon of Antiquity
(Articles)
Andrey Krakovsky
Voice of the Publisher
Vol.7 No.4
,December 17, 2021
DOI:
10.4236/vp.2021.74012
58
Downloads
596
Views
Citations
Cyber-Physical-Social Based Security Architecture for Future Internet of Things
(Articles)
Huansheng Ning
,
Hong Liu
Advances in Internet of Things
Vol.2 No.1
,January 14, 2012
DOI:
10.4236/ait.2012.21001
12,957
Downloads
29,886
Views
Citations
Perception on Cyber Terrorism: A Focus Group Discussion Approach
(Articles)
Rabiah Ahmad
,
Zahri Yunos
,
Shahrin Sahib
,
Mariana Yusoff
Journal of Information Security
Vol.3 No.3
,July 25, 2012
DOI:
10.4236/jis.2012.33029
7,492
Downloads
13,239
Views
Citations
Externalities and the Magnitude of Cyber Security Underinvestment by Private Sector Firms: A Modification of the Gordon-Loeb Model
(Articles)
Lawrence A. Gordon
,
Martin P. Loeb
,
William Lucyshyn
,
Lei Zhou
Journal of Information Security
Vol.6 No.1
,January 7, 2015
DOI:
10.4236/jis.2015.61003
6,393
Downloads
8,427
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2022 Scientific Research Publishing Inc. All Rights Reserved.
Top