Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Evaluation of Operating Domains in Power Systems
(Articles)
M. A. El-Kady
,
Y. A. Alturki
,
M. S. Al-Saud
Energy and Power Engineering
Vol.4 No.4
,June 25, 2012
DOI:
10.4236/epe.2012.44037
4,762
Downloads
7,151
Views
Citations
Probabilistic Assessment of Power System Performance Quality
(Articles)
B. M. Alshammari
,
M. A. El-Kady
Energy and Power Engineering
Vol.4 No.5
,September 26, 2012
DOI:
10.4236/epe.2012.45049
4,581
Downloads
7,118
Views
Citations
A Multi-Leveled Approach to Intrusion Detection and the Insider Threat
(Articles)
Rita M. Barrios
Journal of Information Security
Vol.4 No.1
,January 30, 2013
DOI:
10.4236/jis.2013.41007
6,900
Downloads
11,260
Views
Citations
Does Reactive Adaptation Exist? Using the Ecosystem Service Governance Approach to Evaluate Post-Drought Rural Food Security in Kenya
(Articles)
Grace W. Ngaruiya
Natural Resources
Vol.5 No.8
,June 24, 2014
DOI:
10.4236/nr.2014.58037
4,061
Downloads
5,586
Views
Citations
This article belongs to the Special Issue on
Resource Security
The Digital Fingerprinting Method for Static Images Based on Weighted Hamming Metric and on Weighted Container Model
(Articles)
Sergey Bezzateev
,
Natalia Voloshina
Journal of Computer and Communications
Vol.2 No.9
,July 11, 2014
DOI:
10.4236/jcc.2014.29016
4,033
Downloads
5,214
Views
Citations
Apple’s Lion vs Microsoft’s Windows 7: Comparing Built-In Protection against ICMP Flood Attacks
(Articles)
Rodolfo Baez Junior
,
Sanjeev Kumar
Journal of Information Security
Vol.5 No.3
,July 24, 2014
DOI:
10.4236/jis.2014.53012
5,373
Downloads
7,254
Views
Citations
A Note on the Precision of Stratified Systematic Sampling
(Articles)
Akeem O. Kareem
,
Isaac O. Oshungade
,
Gafar M. Oyeyemi
Open Journal of Statistics
Vol.5 No.2
,April 13, 2015
DOI:
10.4236/ojs.2015.52013
4,896
Downloads
7,260
Views
Citations
Approach Development Accelerate of Process Special Traffic Filtering
(Articles)
Karimov Madjit Malikovich
,
Gulomov Sherzod Rajaboevich
,
Yusupov Bakhodir Karomatovich
Journal of Computer and Communications
Vol.3 No.9
,September 21, 2015
DOI:
10.4236/jcc.2015.39008
2,172
Downloads
2,867
Views
Citations
Cybersecurity Investment Guidance: Extensions of the Gordon and Loeb Model
(Articles)
Scott Farrow
,
Jules Szanton
Journal of Information Security
Vol.7 No.2
,March 16, 2016
DOI:
10.4236/jis.2016.72002
3,138
Downloads
5,039
Views
Citations
This article belongs to the Special Issue on
Cybersecurity Investments
Assessment of the Sensitivity of Streamflow Simulations to Changes in Patch Resolution Using GIS Based Hydro-Ecologic Model
(Articles)
Samson G. Mengistu
,
Melkamu A. Ali
,
Fuad A. Yassin
Open Journal of Modern Hydrology
Vol.6 No.2
,April 6, 2016
DOI:
10.4236/ojmh.2016.62007
2,850
Downloads
4,082
Views
Citations
The Middle Class Is Synonymous with Corruption in Sub-Sahara Africa
(Articles)
Ishmael D. Norman
,
Mark A. Aviisah
,
Blandina M. Awiah
,
Margaret Kweku
,
Fred N. Binka
Advances in Applied Sociology
Vol.6 No.4
,April 28, 2016
DOI:
10.4236/aasoci.2016.64016
2,302
Downloads
3,800
Views
Citations
A Fast FPGA Implementation for Triple DES Encryption Scheme
(Articles)
Edni Del Rosal
,
Sanjeev Kumar
Circuits and Systems
Vol.8 No.9
,September 25, 2017
DOI:
10.4236/cs.2017.89016
2,219
Downloads
5,523
Views
Citations
Classification of the Juturnaíba Dam: Potential Risk and Damage
(Articles)
Monica de Aquino Galeano da Hora Rocha
,
Manoel Isidro de Miranda Neto
Journal of Water Resource and Protection
Vol.10 No.1
,January 25, 2018
DOI:
10.4236/jwarp.2018.101001
1,043
Downloads
2,371
Views
Citations
Stylized Facts and Review of the Relation between Contraceptive Use, Delinquency and Age Structure in Nigeria, and It’s Implications for Demographic Dividend
(Articles)
Ayodeji Ajibola
,
Oluwole Adeyemi Jacob
,
Ebenezer Omotosho
Open Access Library Journal
Vol.5 No.3
,March 15, 2018
DOI:
10.4236/oalib.1104321
731
Downloads
1,632
Views
Citations
An Overview of the Nigerian Defense Policy and the Challenges against Terrorism
(Articles)
David Oluwafemi Bodunde
,
Noah Opeyemi Balogun
Open Journal of Political Science
Vol.9 No.3
,June 21, 2019
DOI:
10.4236/ojps.2019.93030
1,888
Downloads
16,732
Views
Citations
Oil Pollution and Bio-Diversity Conservation in Nigeria: An Assessment of Legal Framework
(Articles)
Adesina Temitayo Bello
,
Joseph Amadi
Journal of Geoscience and Environment Protection
Vol.7 No.8
,August 29, 2019
DOI:
10.4236/gep.2019.78024
823
Downloads
3,521
Views
Citations
Can Routers Provide Sufficient Protection against Cyber Security Attacks?
(Articles)
David Leal
,
Sanjeev Kumar
Journal of Information Security
Vol.10 No.4
,October 31, 2019
DOI:
10.4236/jis.2019.104017
744
Downloads
2,684
Views
Citations
How Secure Having IoT Devices in Our Homes?
(Articles)
Debora Estrada
,
Lo’ai Tawalbeh
,
Robert Vinaja
Journal of Information Security
Vol.11 No.2
,March 19, 2020
DOI:
10.4236/jis.2020.112005
1,261
Downloads
3,831
Views
Citations
The Causality of a Political Fragility on Transitional Post-Conflict States in Africa’s Democratization Perspectives
(Articles)
Miyar Ezekiel De’Nyok
Open Journal of Political Science
Vol.13 No.3
,July 17, 2023
DOI:
10.4236/ojps.2023.133020
216
Downloads
963
Views
Citations
Kali Pi—A Miniature Ultra-Portable Penetration Testing Device
(Articles)
Ahmed Bin Ali
Journal of Information Security
Vol.16 No.1
,December 30, 2024
DOI:
10.4236/jis.2025.161005
262
Downloads
887
Views
Citations
<
...
10
11
12
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top