Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
The SMS Chaum Mix
(Articles)
Matthew Rothmeyer
,
Dale R. Thompson
,
Matthew Moccaro
Journal of Computer and Communications
Vol.2 No.4
,March 18, 2014
DOI:
10.4236/jcc.2014.24010
5,261
Downloads
6,661
Views
Citations
China’s Food Security Evaluation Based on Factor Analysis
(Articles)
Jie Zou
,
Shiqin Guo
American Journal of Industrial and Business Management
Vol.5 No.6
,June 29, 2015
DOI:
10.4236/ajibm.2015.56044
3,537
Downloads
5,097
Views
Citations
General Study of Mobile Agent Based Intrusion Detection System (IDS)
(Articles)
Chandrakant Jain
,
Aumreesh Kumar Saxena
Journal of Computer and Communications
Vol.4 No.4
,April 13, 2016
DOI:
10.4236/jcc.2016.44008
3,063
Downloads
4,969
Views
Citations
Information Availability: An Insight into the Most Important Attribute of Information Security
(Articles)
Suhail Qadir
,
S. M. K. Quadri
Journal of Information Security
Vol.7 No.3
,April 15, 2016
DOI:
10.4236/jis.2016.73014
7,829
Downloads
21,751
Views
Citations
An Immunity-Based IOT Environment Security Situation Awareness Model
(Articles)
Yuanquan Shi
,
Tao Li
,
Renfa Li
,
Xiaoning Peng
,
Pengju Tang
Journal of Computer and Communications
Vol.5 No.7
,May 25, 2017
DOI:
10.4236/jcc.2017.57016
1,711
Downloads
3,099
Views
Citations
A Systems-Theoretic Security Model for Large Scale, Complex Systems Applied to the US Air Transportation System
(Articles)
Joseph R. Laracy
Int'l J. of Communications, Network and System Sciences
Vol.10 No.5
,May 31, 2017
DOI:
10.4236/ijcns.2017.105005
1,748
Downloads
3,620
Views
Citations
SecSPS: A Secure and Privacy-Preserving Framework for Smart Parking Systems
(Articles)
Ali Alqazzaz
,
Ibrahim Alrashdi
,
Esam Aloufi
,
Mohamed Zohdy
,
Hua Ming
Journal of Information Security
Vol.9 No.4
,October 15, 2018
DOI:
10.4236/jis.2018.94020
1,649
Downloads
4,558
Views
Citations
Concepts of Safety Critical Systems Unification Approach & Security Assurance Process
(Articles)
Faisal Nabi
,
Jianming Yong
,
Xiaohui Tao
,
Muhammad Saqib Malhi
,
Umar Mahmood
,
Usman Iqbal
Journal of Information Security
Vol.11 No.4
,October 27, 2020
DOI:
10.4236/jis.2020.114018
610
Downloads
2,083
Views
Citations
Study on the Use of Artificial Intelligence for Cybersecurity in Companies: Case of Companies in Burkina Faso
(Articles)
Yanogo Kiswendsida Jean Hermann
,
Ouedraogo Tounwendyam Frederic
Engineering
Vol.15 No.12
,December 11, 2023
DOI:
10.4236/eng.2023.1512056
242
Downloads
1,498
Views
Citations
The Research on Open Sharing of Higher Education Park Based on Intelligent Security System
(Articles)
Yan Dong
Journal of Computer and Communications
Vol.12 No.3
,March 21, 2024
DOI:
10.4236/jcc.2024.123007
136
Downloads
470
Views
Citations
Development of a Conceptual Model for Ensuring Cyber-Resilience of Software Systems
(Articles)
Shafagat Mahmudova
Open Access Library Journal
Vol.11 No.7
,July 10, 2024
DOI:
10.4236/oalib.1111787
59
Downloads
423
Views
Citations
An Agent Based Model for Ransomware Detection and Mitigation in a Cloud System
(Articles)
N’golo Konate
,
Tenan Yeo
Journal of Information Security
Vol.15 No.4
,August 1, 2024
DOI:
10.4236/jis.2024.154024
176
Downloads
681
Views
Citations
This article belongs to the Special Issue on
Cybersecurity and Information Security
Modeling and Implementation of a Data Security and Protection Medium Using the Generated Key Based on Electromagnetic Wave Propagation Theories
(Articles)
Vincent Mbonigaba
,
Fulgence Nahayo
,
Octave Moutsinga
,
Dieudonné Okalas-Ossami
,
Romeo Nibitanga
,
Thérence Niyonsaba
Journal of Computer and Communications
Vol.12 No.9
,September 26, 2024
DOI:
10.4236/jcc.2024.129008
44
Downloads
273
Views
Citations
An Energy-Efficient Cross-Layer Approach for Wireless Sensor Networks Security
(Articles)
Namwinwelbere Dabiré
,
Abdoul-Hadi Konfé
,
Pegdwindé Justin Kouraogo
Journal of Sensor Technology
Vol.15 No.1
,January 26, 2025
DOI:
10.4236/jst.2025.151002
67
Downloads
315
Views
Citations
Developing and Assessing Investment Options for Economic, Energy, and Climate Security Gains in the United States
(Articles)
Pat Delaquil
,
Gary Goldstein
,
Hal Nelson
,
Thomas Peterson
,
Stephen Roe
,
Adam Rose
,
Dan Wei
,
Jeffery Wennberg
Low Carbon Economy
Vol.5 No.2
,May 16, 2014
DOI:
10.4236/lce.2014.52004
4,031
Downloads
5,941
Views
Citations
A Comparative Study of Related Technologies of Intrusion Detection & Prevention Systems
(Articles)
Indraneel Mukhopadhyay
,
Mohuya Chakraborty
,
Satyajit Chakrabarti
Journal of Information Security
Vol.2 No.1
,January 31, 2011
DOI:
10.4236/jis.2011.21003
10,274
Downloads
23,677
Views
Citations
Human Sensor Web Crowd Sourcing Security Incidents Management in Tanzania Context
(Articles)
Maduhu Mshangi
,
Edephonce Ngemera Nfuka
,
Camilius Sanga
Journal of Information Security
Vol.9 No.3
,July 10, 2018
DOI:
10.4236/jis.2018.93014
978
Downloads
2,365
Views
Citations
Integrating the Informal Social Security Arrangements into the Formal Sector in Botswana
(Articles)
Kholisani Solo
Beijing Law Review
Vol.12 No.2
,June 7, 2021
DOI:
10.4236/blr.2021.122031
352
Downloads
2,196
Views
Citations
Potential Vulnerability of Encrypted Messages: Decomposability of Discrete Logarithm Problems
(Articles)
Boris S. Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.3 No.8
,August 31, 2010
DOI:
10.4236/ijcns.2010.38086
4,704
Downloads
8,156
Views
Citations
A High-level Architecture for Intrusion Detection on Heterogeneous Wireless Sensor Networks: Hierarchical, Scalable and Dynamic Reconfigurable
(Articles)
Hossein Jadidoleslamy
Wireless Sensor Network
Vol.3 No.7
,July 28, 2011
DOI:
10.4236/wsn.2011.37026
9,520
Downloads
20,393
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top