Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Towards a Comprehensive Security Framework of Cloud Data Storage Based on Multi Agent System Architecture
(Articles)
Amir Mohamed Talib
,
Rodziah Atan
,
Rusli Abdullah
,
Masrah Azrifah Azmi Murad
Journal of Information Security
Vol.3 No.4
,October 31, 2012
DOI:
10.4236/jis.2012.34036
6,687
Downloads
11,877
Views
Citations
A Quick Method for Judging the Feasibility of Security-Constrained Unit Commitment Problems within Lagrangian Relaxation Framework
(Articles)
Sangang Guo
Energy and Power Engineering
Vol.4 No.6
,November 29, 2012
DOI:
10.4236/epe.2012.46057
5,279
Downloads
7,568
Views
Citations
Trust and Security on Semantic HIM (Health Information Management)
(Articles)
Nasim Khozouei
,
Razie Vanda
,
Peyman Khozouei
Intelligent Information Management
Vol.4 No.6
,November 30, 2012
DOI:
10.4236/iim.2012.46045
4,425
Downloads
7,269
Views
Citations
Detection of Influenza Viruses Attached to an Optical Disk
(Articles)
Takayuki Shima
,
Makoto Fujimaki
,
Akihiro Yoshida
,
Subash C. B. Gopinath
,
Masashi Kuwahara
,
Yoshimichi Ohki
,
Koichi Awazu
Journal of Biomaterials and Nanobiotechnology
Vol.4 No.2
,April 17, 2013
DOI:
10.4236/jbnb.2013.42020
4,121
Downloads
5,940
Views
Citations
Features of Virus Detection Mechanism in Microsoft Security Essentials (Microsoft Forefront Endpoint Protection)
(Articles)
Dmitry Silnov
Journal of Information Security
Vol.4 No.2
,April 23, 2013
DOI:
10.4236/jis.2013.42014
5,143
Downloads
8,487
Views
Citations
Quantitative Security Evaluation for Software System from Vulnerability Database
(Articles)
Hiroyuki Okamura
,
Masataka Tokuzane
,
Tadashi Dohi
Journal of Software Engineering and Applications
Vol.6 No.4A
,April 23, 2013
DOI:
10.4236/jsea.2013.64A003
4,396
Downloads
6,985
Views
Citations
This article belongs to the Special Issue on
Software Dependability
Research on Embedding Capacity and Efficiency of Information Hiding Based on Digital Images
(Articles)
Yanping Zhang
,
Juan Jiang
,
Yongliang Zha
,
Heng Zhang
,
Shu Zhao
International Journal of Intelligence Science
Vol.3 No.2
,April 30, 2013
DOI:
10.4236/ijis.2013.32009
8,304
Downloads
15,457
Views
Citations
Web Security and Log Management: An Application Centric Perspective
(Articles)
Andrew Mwaura Kahonge
,
William Okello-Odongo
,
Evans K. Miriti
,
Elisha Abade
Journal of Information Security
Vol.4 No.3
,July 12, 2013
DOI:
10.4236/jis.2013.43016
4,564
Downloads
8,031
Views
Citations
Network Defense Methodology: A Comparison of Defense in Depth and Defense in Breadth
(Articles)
Lance Cleghorn
Journal of Information Security
Vol.4 No.3
,July 12, 2013
DOI:
10.4236/jis.2013.43017
10,315
Downloads
19,393
Views
Citations
Engaged Learning and Change through Undergraduate Research: A Case Study of the Heart of Gold Community Empowerment Project
(Articles)
David William Robinson
,
J. Laureen Styles
,
Nichola Evernden
,
Kassandra Kirkham
Creative Education
Vol.4 No.7B
,July 18, 2013
DOI:
10.4236/ce.2013.47A2013
3,923
Downloads
5,770
Views
Citations
This article belongs to the Special Issue on
Higher Education
An Inquiry into the Effectiveness of Student Generated MCQs as a Method of Assessment to Improve Teaching and Learning
(Articles)
Damien Hutchinson
,
Jason Wells
Creative Education
Vol.4 No.7B
,July 18, 2013
DOI:
10.4236/ce.2013.47A2014
6,298
Downloads
9,914
Views
Citations
This article belongs to the Special Issue on
Higher Education
Three-defense Line Coordination Strategy of the Guizhou Power Grid with the New Security Situation
(Articles)
Wencheng Zheng
,
Tao Yu
Energy and Power Engineering
Vol.5 No.3B
,July 31, 2013
DOI:
10.4236/epe.2013.53B008
4,454
Downloads
5,421
Views
Citations
Security Regulations in Mexican Renewable Energies: Case of Geothermal Projects
(Articles)
Alfonso Aragón-Aguilar
,
Georgina Izquierdo-Montalvo
,
Víctor Arellano-Gómez
Smart Grid and Renewable Energy
Vol.4 No.6A
,September 3, 2013
DOI:
10.4236/sgre.2013.46A003
31,108
Downloads
39,549
Views
Citations
This article belongs to the Special Issue on
Smart Grid Security
Computer Assisted Alerts Using Mental Model Approach for Customer Service Improvement
(Articles)
Abid Ghaffar
,
Mohamed Ridza Wahiddin
,
Asadullah Shaikh
Journal of Software Engineering and Applications
Vol.6 No.5B
,October 12, 2013
DOI:
10.4236/jsea.2013.65B005
3,676
Downloads
5,262
Views
Citations
Integrated Water Resources Management (IWRM) Impacts in South West Coastal Zone of Bangladesh and Fact-Finding on Tidal River Management (TRM)
(Articles)
Fahad Khan Khadim
,
Kanak Kanti Kar
,
Pronab Kumar Halder
,
Md. Atiqur Rahman
,
A.K.M. Mostafa Morshed
Journal of Water Resource and Protection
Vol.5 No.10
,October 21, 2013
DOI:
10.4236/jwarp.2013.510098
5,791
Downloads
12,213
Views
Citations
Study on Approach of Static Security Assessment Accounting for Electro-thermal Coupling
(Articles)
Mengxia Wang
,
Hongbin Sun
,
Jinxin Huang
,
Qiang Zhang
Energy and Power Engineering
Vol.5 No.4B
,October 31, 2013
DOI:
10.4236/epe.2013.54B136
4,390
Downloads
5,573
Views
Citations
Artificial Noise Based Security Algorithm for Multi-User MIMO System
(Articles)
Jian-hua Peng
,
Kai-zhi Huang
,
Jiang Ji
Communications and Network
Vol.5 No.3C
,November 8, 2013
DOI:
10.4236/cn.2013.53B2037
5,848
Downloads
7,610
Views
Citations
Research on Security Assessment Index System for Operating Reserve in Large Interconnected Power Grid
(Articles)
Mingsong Liu
,
Huadong Sun
,
Jian He
,
Hengxu Zhang
,
Jun Yi
,
Jian Zhang
Energy and Power Engineering
Vol.5 No.4B
,November 11, 2013
DOI:
10.4236/epe.2013.54B151
4,967
Downloads
6,193
Views
Citations
Study on the Real-Time Security Evaluation for the Train Service Status Using Safety Region Estimation
(Articles)
Guiling Liao
,
Yong Qin
,
Xiaoqing Cheng
,
Lisha Pan
,
Lin He
,
Shan Yu
,
Yuan Zhang
Journal of Intelligent Learning Systems and Applications
Vol.5 No.4
,November 12, 2013
DOI:
10.4236/jilsa.2013.54025
4,171
Downloads
5,957
Views
Citations
This article belongs to the Special Issue on
Intelligent Information Processing in Metro Train Safety-Critical System and Application
A Study on Quantitative Methodology to Assess Cyber Security Risk of Smart Grid
(Articles)
Pil Sung Woo
,
Byung-Hyun Ko
,
Dong-Joo Kang
,
Balho H. Kim
Energy and Power Engineering
Vol.5 No.4B
,November 18, 2013
DOI:
10.4236/epe.2013.54B249
5,347
Downloads
8,117
Views
Citations
<
...
24
25
26
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top