Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Discussion and Research on Information Security Attack and Defense Platform Construction in Universities Based on Cloud Computing and Virtualization
(Articles)
Xiancheng Ding
Journal of Information Security
Vol.7 No.5
,October 27, 2016
DOI:
10.4236/jis.2016.75025
2,425
Downloads
3,860
Views
Citations
Hybrid PINN-LSTM Model for River Temperature Prediction: A Physics-Informed Deep Learning Approach
(Articles)
Marcos Batista Figueredo
,
Mario de Jesus Ferreira
,
Roberto Luiz Souza Monteiro
,
Alexandre do Nascimento Silva
,
Thiago Barros Murari
,
Thaís de Souza Neri
Journal of Computer and Communications
Vol.13 No.6
,June 24, 2025
DOI:
10.4236/jcc.2025.136008
25
Downloads
209
Views
Citations
Unveiling Latent Dispute Causes in Construction: A Social Network Perspective
(Articles)
Lydia W. Thuo
,
Charles K. Kabubo
,
Mark O. Kenyatta
Open Journal of Civil Engineering
Vol.15 No.2
,June 30, 2025
DOI:
10.4236/ojce.2025.152012
8
Downloads
60
Views
Citations
Using the Latin Square Design Model in the Prioritzation of Network Security Threats: A Quantitative Study
(Articles)
Rodney Alexander
Journal of Information Security
Vol.11 No.2
,April 22, 2020
DOI:
10.4236/jis.2020.112006
874
Downloads
2,590
Views
Citations
Reducing Threats by Using Bayesian Networks to Prioritize and Combine Defense in Depth Security Measures
(Articles)
Rodney Alexander
Journal of Information Security
Vol.11 No.3
,June 8, 2020
DOI:
10.4236/jis.2020.113008
781
Downloads
2,414
Views
Citations
Using Linear Regression Analysis and Defense in Depth to Protect Networks during the Global Corona Pandemic
(Articles)
Rodney Alexander
Journal of Information Security
Vol.11 No.4
,October 21, 2020
DOI:
10.4236/jis.2020.114017
1,061
Downloads
6,202
Views
Citations
Prioritizing Defense in Depth Measures Using Artificial Intelligence (AI) and the Expected Utility Hypothesis
(Articles)
Rodney Alexander
Journal of Information Security
Vol.16 No.2
,March 31, 2025
DOI:
10.4236/jis.2025.162012
64
Downloads
355
Views
Citations
Task-Specific Feature Selection and Detection Algorithms for IoT-Based Networks
(Articles)
Yang Gyun Kim
,
Benito Mendoza
,
Ohbong Kwon
,
John Yoon
Journal of Computer and Communications
Vol.10 No.10
,October 27, 2022
DOI:
10.4236/jcc.2022.1010005
200
Downloads
1,069
Views
Citations
Building Smart Cities by Using Enterprise GIS in Saudi Arabia
(Articles)
Ahmad M. Almontshery
,
Faisal M. Jamalallail
Journal of Geographic Information System
Vol.11 No.6
,November 20, 2019
DOI:
10.4236/jgis.2019.116040
950
Downloads
2,932
Views
Citations
Separation of a Signal of Interest from a Seasonal Effect in Geophysical Data: I. El Niño/La Niña Phenomenon
(Articles)
David H. Douglass
International Journal of Geosciences
Vol.2 No.4
,November 30, 2011
DOI:
10.4236/ijg.2011.24045
7,660
Downloads
11,555
Views
Citations
Adsorption of Nickel in Aqueous Solution onto Natural Maghnite
(Articles)
Mohamed Amine Zenasni
,
Said Benfarhi
,
André Merlin
,
Stéphane Molina
,
Béatrice George
,
Bahia Meroufel
Materials Sciences and Applications
Vol.4 No.2
,February 28, 2013
DOI:
10.4236/msa.2013.42018
4,449
Downloads
7,287
Views
Citations
Investigations into Capacity of MIMO Ad Hoc Network Including Effects of Antenna Mutual Coupling
(Articles)
Xia LIU
,
Marek E. BIALKOWSKI
,
Feng WANG
,
Konglit HUNCHANGSITH
Wireless Sensor Network
Vol.1 No.5
,December 15, 2009
DOI:
10.4236/wsn.2009.15051
4,858
Downloads
8,589
Views
Citations
Design of Data Model for Urban Transport GIS
(Articles)
Wen Zeng
,
Xiao-Jie Chang
,
Jian-Jun Lv
Journal of Geographic Information System
Vol.2 No.2
,May 14, 2010
DOI:
10.4236/jgis.2010.22016
8,713
Downloads
16,642
Views
Citations
A Design of Incremental Granular Network for Software Data Modeling
(Articles)
Keun-Chang Kwak
Journal of Software Engineering and Applications
Vol.3 No.11
,November 29, 2010
DOI:
10.4236/jsea.2010.311120
5,445
Downloads
9,252
Views
Citations
Implementation Study of a Centralized Routing Protocol for Data Acquisition in Wireless Sensor Networks
(Articles)
Trung Hieu Pham
,
Xue Jun Li
,
Wai Yee Leong
,
Peter Han Joo Chong
Wireless Sensor Network
Vol.3 No.5
,May 6, 2011
DOI:
10.4236/wsn.2011.35019
6,447
Downloads
12,375
Views
Citations
Intergenic subset organization within a set of geographically-defined viral sequences from the 2009 H1N1 influenza A pandemic
(Articles)
William A. Thompson
,
Joel K. Weltman
American Journal of Molecular Biology
Vol.2 No.1
,December 30, 2011
DOI:
10.4236/ajmb.2012.21004
5,352
Downloads
10,307
Views
Citations
Web Acceleration by Prefetching in Extremely Large Latency Network
(Articles)
Fumiaki Nagase
,
Takefumi Hiraguri
,
Kentaro Nishimori
,
Hideo Makino
American Journal of Operations Research
Vol.2 No.3
,September 19, 2012
DOI:
10.4236/ajor.2012.23041
4,462
Downloads
7,853
Views
Citations
Reliable Multi-path Routing in Selfish Networks with Hidden Information and Actions
(Articles)
Gang Peng
,
Mingrui Zou
,
Sammy Chan
Journal of Software Engineering and Applications
Vol.5 No.12B
,January 18, 2013
DOI:
10.4236/jsea.2012.512B007
4,157
Downloads
5,722
Views
Citations
A Neural Network and Expert Systems Based Model for Measuring Business Effectiveness of Information Technology Investment
(Articles)
Mahmud Mavaahebi
,
Ken Nagasaka
American Journal of Industrial and Business Management
Vol.3 No.2
,April 25, 2013
DOI:
10.4236/ajibm.2013.32030
5,732
Downloads
9,246
Views
Citations
Network Defense Methodology: A Comparison of Defense in Depth and Defense in Breadth
(Articles)
Lance Cleghorn
Journal of Information Security
Vol.4 No.3
,July 12, 2013
DOI:
10.4236/jis.2013.43017
11,457
Downloads
18,781
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top