Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Computational Modeling of Government Policy to Attain Long-Term Higher Voter Turnout for Sustainable Democracy
(Articles)
Mizan Rahman
American Journal of Computational Mathematics
Vol.3 No.2
,June 24, 2013
DOI:
10.4236/ajcm.2013.32016
4,609
Downloads
7,731
Views
Citations
Configuration for Predicting Travel-Time Using Wavelet Packets and Support Vector Regression
(Articles)
Adeel Yusuf
,
Vijay K. Madisetti
Journal of Transportation Technologies
Vol.3 No.3
,July 11, 2013
DOI:
10.4236/jtts.2013.33023
4,601
Downloads
6,931
Views
Citations
Evaluation of Guardrail Posts Installed in Asphalt Mow Strips by Static Finite Element Simulation
(Articles)
Esmaeel Bakhtiary
,
Seo-Hun Lee
,
David W. Scott
,
Lauren K. Stewart
,
Donald W. White
Open Journal of Civil Engineering
Vol.7 No.1
,March 30, 2017
DOI:
10.4236/ojce.2017.71009
3,756
Downloads
6,077
Views
Citations
ERAD: Enhanced Ransomware Attack Defense System for Healthcare Organizations
(Articles)
Xinyue Li
,
Vijay K. Madisetti
Journal of Software Engineering and Applications
Vol.17 No.5
,May 28, 2024
DOI:
10.4236/jsea.2024.175016
25
Downloads
106
Views
Citations
Effect of Growth Morphology on the Electronic Structure of Epitaxial Graphene on SiC
(Articles)
Michael D. Williams
,
Dennis W. Hess
Graphene
Vol.2 No.1
,January 24, 2013
DOI:
10.4236/graphene.2013.21008
5,069
Downloads
8,202
Views
Citations
Effect of Sub-Grains and Crystal Defects on Monolike Si Solar Cell Performance
(Articles)
Chris Yang
,
Hao Wu
,
Ian Cooper
Materials Sciences and Applications
Vol.4 No.2
,February 25, 2013
DOI:
10.4236/msa.2013.42011
4,601
Downloads
7,120
Views
Citations
Object Detection Meets LLMs: Model Fusion for Safety and Security
(Articles)
Zeba Mohsin Wase
,
Vijay K. Madisetti
,
Arshdeep Bahga
Journal of Software Engineering and Applications
Vol.16 No.12
,December 27, 2023
DOI:
10.4236/jsea.2023.1612034
130
Downloads
611
Views
Citations
Systems biology provides new tools for addressing Parkinson’s disease
(Editorial)
Zhen Qi
,
Eberhard O. Voit
Advances in Parkinson's Disease
Vol.2 No.3
,July 19, 2013
DOI:
10.4236/apd.2013.23013
3,044
Downloads
5,032
Views
Citations
Optimality Theoretic Representation of Stress in Cairene Arabic
(Articles)
Rajaa Aquil
Open Journal of Modern Linguistics
Vol.2 No.3
,September 25, 2012
DOI:
10.4236/ojml.2012.23011
3,700
Downloads
6,693
Views
Citations
Cairne Arabic Syllable Structure though Different Phonological Theories
(Articles)
Rajaa Aquil
Open Journal of Modern Linguistics
Vol.3 No.3
,August 22, 2013
DOI:
10.4236/ojml.2013.33034
5,108
Downloads
8,874
Views
Citations
Modeling Walking with an Inverted Pendulum Not Constrained to the Sagittal Plane. Numerical Simulations and Asymptotic Expansions
(Articles)
Guillermo H. Goldsztein
Applied Mathematics
Vol.8 No.1
,January 24, 2017
DOI:
10.4236/am.2017.81006
1,600
Downloads
4,132
Views
Citations
Enhanced Memory-Safe Linux Security Modules (eLSMs) for Improving Security of Docker Containers for Data Centers
(Articles)
Juan Martinez Delbugio
,
Vijay K. Madisetti
Journal of Software Engineering and Applications
Vol.17 No.5
,May 28, 2024
DOI:
10.4236/jsea.2024.175015
28
Downloads
104
Views
Citations
Sher: A Secure Broker for DevSecOps and CI/CD Workflows
(Articles)
Pranau Kumar
,
Vijay K. Madisetti
Journal of Software Engineering and Applications
Vol.17 No.5
,May 29, 2024
DOI:
10.4236/jsea.2024.175018
28
Downloads
124
Views
Citations
A Comparative Analysis of Cybersecurity Threat Taxonomies for Healthcare Organizations
(Articles)
Mahima Jaikanth
,
Vijay K. Madisetti
Journal of Software Engineering and Applications
Vol.17 No.5
,May 30, 2024
DOI:
10.4236/jsea.2024.175020
17
Downloads
59
Views
Citations
Ad Blockers & Online Privacy: A Comparative Analysis of Privacy Enhancing Technologies (PET)
(Articles)
Siddharth M. Madikeri
,
Vijay K. Madisetti
Journal of Software Engineering and Applications
Vol.17 No.5
,May 30, 2024
DOI:
10.4236/jsea.2024.175021
40
Downloads
145
Views
Citations
A Framework for Cybersecurity Alert Distribution and Response Network (ADRIAN)
(Articles)
Akarshita Shankar
,
Vijay Madisetti
Journal of Software Engineering and Applications
Vol.17 No.5
,May 31, 2024
DOI:
10.4236/jsea.2024.175022
9
Downloads
55
Views
Citations
Design & Test of an Advanced Web Security Analysis Tool (AWSAT)
(Articles)
Meenakshi S. P. Manikandaswamy
,
Vijay Madisetti
Journal of Software Engineering and Applications
Vol.17 No.5
,May 31, 2024
DOI:
10.4236/jsea.2024.175024
11
Downloads
44
Views
Citations
User Profile & Attitude Analysis Based on Unstructured Social Media and Online Activity
(Articles)
Yuting Tan
,
Vijay K. Madisetti
Journal of Software Engineering and Applications
Vol.17 No.6
,June 7, 2024
DOI:
10.4236/jsea.2024.176025
3
Downloads
16
Views
Citations
Certis: Cloud Asset Management & Threat Evaluation Using Behavioral Fingerprinting at Application Layer
(Articles)
Kumardwij Bhatnagar
,
Vijay K. Madisetti
Journal of Software Engineering and Applications
Vol.17 No.6
,June 7, 2024
DOI:
10.4236/jsea.2024.176026
6
Downloads
31
Views
Citations
Cybersecurity Risk Management through Behavior-Based Contextual Analysis of Online Logs
(Articles)
Irawati Edlabadkar
,
Vijay K. Madisetti
Journal of Software Engineering and Applications
Vol.17 No.6
,June 7, 2024
DOI:
10.4236/jsea.2024.176027
5
Downloads
28
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top