Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
A Systems-Theoretic Security Model for Large Scale, Complex Systems Applied to the US Air Transportation System
(Articles)
Joseph R. Laracy
Int'l J. of Communications, Network and System Sciences
Vol.10 No.5
,May 31, 2017
DOI:
10.4236/ijcns.2017.105005
1,749
Downloads
3,652
Views
Citations
A SWOT Analysis of Maritime Transportation and Security in the Gulf of Guinea
(Articles)
Nana Raymond Lawrence Ofosu-Boateng
Open Journal of Social Sciences
Vol.5 No.8
,August 3, 2017
DOI:
10.4236/jss.2017.58002
2,865
Downloads
9,537
Views
Citations
Benefit Model of Knowledge Sharing Behavior
(Articles)
Jianying Zhang
Open Journal of Social Sciences
Vol.5 No.8
,August 14, 2017
DOI:
10.4236/jss.2017.58013
1,415
Downloads
4,445
Views
Citations
Evaluating China’s Oil Security and Overseas Oil Investment
(Articles)
Yuhua Zheng
American Journal of Industrial and Business Management
Vol.7 No.8
,August 17, 2017
DOI:
10.4236/ajibm.2017.78069
1,382
Downloads
3,319
Views
Citations
Investigation of Climate and Land Use Policy Change Impacts on Food Security in Eastern Sudan, Gadarif State
(Articles)
Yousif Elnour Yagoub
,
Zhongqin Li
,
Omer Said Musa
,
Muhammad Naveed Anjum
,
Feiteng Wang
,
Zhang Bo
Journal of Geographic Information System
Vol.9 No.5
,September 13, 2017
DOI:
10.4236/jgis.2017.95034
1,302
Downloads
2,784
Views
Citations
Investigation of Fear of Crime in City Centers through the Example of Beşiktaş Sinanpaşa Neighborhood
(Articles)
Elif Köklü
,
Funda Yirmibeşoğlu
Current Urban Studies
Vol.5 No.3
,September 19, 2017
DOI:
10.4236/cus.2017.53020
1,251
Downloads
3,536
Views
Citations
Strategic Risk Factors for Indian Stock Markets
(Articles)
Aman Srivastava
,
Prashant Gupta
,
Rakesh Gupta
Theoretical Economics Letters
Vol.7 No.6
,September 30, 2017
DOI:
10.4236/tel.2017.76114
1,204
Downloads
3,433
Views
Citations
Design of Secure and Traceable Requirement Engineering Process for Security-Sensitive Projects
(Articles)
Abdul Ahad
,
Luqman Tariq
,
Saba Niaz
,
Muhammad Inam
Journal of Software Engineering and Applications
Vol.10 No.12
,November 13, 2017
DOI:
10.4236/jsea.2017.1012049
1,904
Downloads
3,372
Views
Citations
Practical Approaches to Securing an IT Environment
(Articles)
Emmanuel S. Kolawole
,
Warsame H. Ali
,
Cofie Penrose
,
John C. Fuller
Communications and Network
Vol.9 No.4
,November 30, 2017
DOI:
10.4236/cn.2017.94019
2,004
Downloads
7,050
Views
Citations
Towards the Development of Best Data Security for Big Data
(Articles)
Yuan Tian
Communications and Network
Vol.9 No.4
,November 30, 2017
DOI:
10.4236/cn.2017.94020
1,885
Downloads
5,280
Views
Citations
The Study of Secure Congestion Control for TCP in Ad Hoc Networks
(Articles)
Weinan Zhang
,
Li Lin
,
Li Du
Journal of Information Security
Vol.9 No.1
,December 5, 2017
DOI:
10.4236/jis.2018.91003
1,044
Downloads
2,500
Views
Citations
Does Fishing Restructuring Provide Reliability to Food Security? The European Union-Morocco Case
(Articles)
Amada Hidalgo Gallardo
,
Ruth Leticia Hidalgo Gallardo
,
Adrian González Romo
,
Sofía Elizabeth Ávila Hidalgo
Journal of Human Resource and Sustainability Studies
Vol.5 No.4
,December 12, 2017
DOI:
10.4236/jhrss.2017.54020
927
Downloads
1,773
Views
Citations
Oil, Risk Analysis Techniques, Maritime Security and Safe Passage in Pirate Infested Gulf of Guinea Waters
(Articles)
Nana Raymond Lawrence Ofosu-Boateng
Open Journal of Social Sciences
Vol.5 No.12
,December 14, 2017
DOI:
10.4236/jss.2017.512008
1,168
Downloads
2,265
Views
Citations
Competiveness of Maize Value Chains for Smallholders in West Africa: Case of Benin, Ghana and Cote D’Ivoire
(Articles)
Mahamadou Nassirou Ba
Agricultural Sciences
Vol.8 No.12
,December 29, 2017
DOI:
10.4236/as.2017.812099
1,594
Downloads
5,449
Views
Citations
Security Analysis of Subspace Network Coding
(Articles)
Yantao Liu
,
Yasser Morgan
Journal of Information Security
Vol.9 No.1
,January 23, 2018
DOI:
10.4236/jis.2018.91007
1,077
Downloads
2,396
Views
Citations
End-to-End Encryption in Messaging Services and National Security—Case of WhatsApp Messenger
(Articles)
Robert E. Endeley
Journal of Information Security
Vol.9 No.1
,January 23, 2018
DOI:
10.4236/jis.2018.91008
11,454
Downloads
20,247
Views
Citations
Phishing Techniques in Mobile Devices
(Articles)
Belal Amro
Journal of Computer and Communications
Vol.6 No.2
,February 13, 2018
DOI:
10.4236/jcc.2018.62003
2,126
Downloads
6,249
Views
Citations
Distance Control and Positive Security for Intrinsic Equipment Working in Explosive Potential Atmospheres
(Articles)
Emil Pop
,
Gabriel-Ioan Ilcea
,
Ionut-Alin Popa
Engineering
Vol.10 No.3
,March 16, 2018
DOI:
10.4236/eng.2018.103006
1,148
Downloads
2,219
Views
Citations
This article belongs to the Special Issue on
Safety System Engineering
Food Security in the Face of Climate Change: Potential Roles of Underutilised Plant Species around Some Rural Homesteads in the Niger Delta
(Articles)
Elsie I. Hamadina
,
Mohammed K. Hamadina
,
Tamunobelema B. Solomon
Natural Resources
Vol.9 No.3
,March 22, 2018
DOI:
10.4236/nr.2018.93005
1,129
Downloads
2,805
Views
Citations
This article belongs to the Special Issue on
Natural Resource Management
A Modified and Secured RSA Public Key Cryptosystem Based on “n” Prime Numbers
(Articles)
Muhammad Ariful Islam
,
Md. Ashraful Islam
,
Nazrul Islam
,
Boishakhi Shabnam
Journal of Computer and Communications
Vol.6 No.3
,March 23, 2018
DOI:
10.4236/jcc.2018.63006
3,322
Downloads
8,669
Views
Citations
<
...
21
22
23
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top