Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
The SMS Chaum Mix
(Articles)
Matthew Rothmeyer
,
Dale R. Thompson
,
Matthew Moccaro
Journal of Computer and Communications
Vol.2 No.4
,March 18, 2014
DOI:
10.4236/jcc.2014.24010
5,267
Downloads
6,679
Views
Citations
China’s Food Security Evaluation Based on Factor Analysis
(Articles)
Jie Zou
,
Shiqin Guo
American Journal of Industrial and Business Management
Vol.5 No.6
,June 29, 2015
DOI:
10.4236/ajibm.2015.56044
3,546
Downloads
5,125
Views
Citations
General Study of Mobile Agent Based Intrusion Detection System (IDS)
(Articles)
Chandrakant Jain
,
Aumreesh Kumar Saxena
Journal of Computer and Communications
Vol.4 No.4
,April 13, 2016
DOI:
10.4236/jcc.2016.44008
3,070
Downloads
5,005
Views
Citations
Information Availability: An Insight into the Most Important Attribute of Information Security
(Articles)
Suhail Qadir
,
S. M. K. Quadri
Journal of Information Security
Vol.7 No.3
,April 15, 2016
DOI:
10.4236/jis.2016.73014
7,855
Downloads
21,852
Views
Citations
An Immunity-Based IOT Environment Security Situation Awareness Model
(Articles)
Yuanquan Shi
,
Tao Li
,
Renfa Li
,
Xiaoning Peng
,
Pengju Tang
Journal of Computer and Communications
Vol.5 No.7
,May 25, 2017
DOI:
10.4236/jcc.2017.57016
1,717
Downloads
3,122
Views
Citations
A Systems-Theoretic Security Model for Large Scale, Complex Systems Applied to the US Air Transportation System
(Articles)
Joseph R. Laracy
Int'l J. of Communications, Network and System Sciences
Vol.10 No.5
,May 31, 2017
DOI:
10.4236/ijcns.2017.105005
1,750
Downloads
3,673
Views
Citations
SecSPS: A Secure and Privacy-Preserving Framework for Smart Parking Systems
(Articles)
Ali Alqazzaz
,
Ibrahim Alrashdi
,
Esam Aloufi
,
Mohamed Zohdy
,
Hua Ming
Journal of Information Security
Vol.9 No.4
,October 15, 2018
DOI:
10.4236/jis.2018.94020
1,656
Downloads
4,625
Views
Citations
Concepts of Safety Critical Systems Unification Approach & Security Assurance Process
(Articles)
Faisal Nabi
,
Jianming Yong
,
Xiaohui Tao
,
Muhammad Saqib Malhi
,
Umar Mahmood
,
Usman Iqbal
Journal of Information Security
Vol.11 No.4
,October 27, 2020
DOI:
10.4236/jis.2020.114018
615
Downloads
2,116
Views
Citations
Study on the Use of Artificial Intelligence for Cybersecurity in Companies: Case of Companies in Burkina Faso
(Articles)
Yanogo Kiswendsida Jean Hermann
,
Ouedraogo Tounwendyam Frederic
Engineering
Vol.15 No.12
,December 11, 2023
DOI:
10.4236/eng.2023.1512056
254
Downloads
1,563
Views
Citations
The Research on Open Sharing of Higher Education Park Based on Intelligent Security System
(Articles)
Yan Dong
Journal of Computer and Communications
Vol.12 No.3
,March 21, 2024
DOI:
10.4236/jcc.2024.123007
141
Downloads
490
Views
Citations
Development of a Conceptual Model for Ensuring Cyber-Resilience of Software Systems
(Articles)
Shafagat Mahmudova
Open Access Library Journal
Vol.11 No.7
,July 10, 2024
DOI:
10.4236/oalib.1111787
59
Downloads
444
Views
Citations
An Agent Based Model for Ransomware Detection and Mitigation in a Cloud System
(Articles)
N’golo Konate
,
Tenan Yeo
Journal of Information Security
Vol.15 No.4
,August 1, 2024
DOI:
10.4236/jis.2024.154024
185
Downloads
736
Views
Citations
This article belongs to the Special Issue on
Cybersecurity and Information Security
Modeling and Implementation of a Data Security and Protection Medium Using the Generated Key Based on Electromagnetic Wave Propagation Theories
(Articles)
Vincent Mbonigaba
,
Fulgence Nahayo
,
Octave Moutsinga
,
Dieudonné Okalas-Ossami
,
Romeo Nibitanga
,
Thérence Niyonsaba
Journal of Computer and Communications
Vol.12 No.9
,September 26, 2024
DOI:
10.4236/jcc.2024.129008
49
Downloads
299
Views
Citations
An Energy-Efficient Cross-Layer Approach for Wireless Sensor Networks Security
(Articles)
Namwinwelbere Dabiré
,
Abdoul-Hadi Konfé
,
Pegdwindé Justin Kouraogo
Journal of Sensor Technology
Vol.15 No.1
,January 26, 2025
DOI:
10.4236/jst.2025.151002
79
Downloads
367
Views
Citations
Developing and Assessing Investment Options for Economic, Energy, and Climate Security Gains in the United States
(Articles)
Pat Delaquil
,
Gary Goldstein
,
Hal Nelson
,
Thomas Peterson
,
Stephen Roe
,
Adam Rose
,
Dan Wei
,
Jeffery Wennberg
Low Carbon Economy
Vol.5 No.2
,May 16, 2014
DOI:
10.4236/lce.2014.52004
4,032
Downloads
5,958
Views
Citations
A Comparative Study of Related Technologies of Intrusion Detection & Prevention Systems
(Articles)
Indraneel Mukhopadhyay
,
Mohuya Chakraborty
,
Satyajit Chakrabarti
Journal of Information Security
Vol.2 No.1
,January 31, 2011
DOI:
10.4236/jis.2011.21003
10,289
Downloads
23,738
Views
Citations
Human Sensor Web Crowd Sourcing Security Incidents Management in Tanzania Context
(Articles)
Maduhu Mshangi
,
Edephonce Ngemera Nfuka
,
Camilius Sanga
Journal of Information Security
Vol.9 No.3
,July 10, 2018
DOI:
10.4236/jis.2018.93014
978
Downloads
2,383
Views
Citations
Integrating the Informal Social Security Arrangements into the Formal Sector in Botswana
(Articles)
Kholisani Solo
Beijing Law Review
Vol.12 No.2
,June 7, 2021
DOI:
10.4236/blr.2021.122031
360
Downloads
2,229
Views
Citations
Potential Vulnerability of Encrypted Messages: Decomposability of Discrete Logarithm Problems
(Articles)
Boris S. Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.3 No.8
,August 31, 2010
DOI:
10.4236/ijcns.2010.38086
4,723
Downloads
8,195
Views
Citations
A High-level Architecture for Intrusion Detection on Heterogeneous Wireless Sensor Networks: Hierarchical, Scalable and Dynamic Reconfigurable
(Articles)
Hossein Jadidoleslamy
Wireless Sensor Network
Vol.3 No.7
,July 28, 2011
DOI:
10.4236/wsn.2011.37026
9,536
Downloads
20,438
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top