Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Systematizing IT Risks
(Articles)
Georg Disterer
Journal of Information Security
Vol.10 No.4
,October 14, 2019
DOI:
10.4236/jis.2019.104013
1,114
Downloads
2,659
Views
Citations
Threat Perceptions, Avoidance Motivation and Security Behaviors Correlations
(Articles)
Fabrice Djatsa
Journal of Information Security
Vol.11 No.1
,December 10, 2019
DOI:
10.4236/jis.2020.111002
1,251
Downloads
3,547
Views
Citations
The Guidelines to Adopt an Applicable SIEM Solution
(Articles)
Hassan Mokalled
,
Rosario Catelli
,
Valentina Casola
,
Daniele Debertol
,
Ermete Meda
,
Rodolfo Zunino
Journal of Information Security
Vol.11 No.1
,December 13, 2019
DOI:
10.4236/jis.2020.111003
2,109
Downloads
5,467
Views
Citations
Modeling Secure Home Area Network Based on IoT for Resource Constraints Environment
(Articles)
Minsu Park
,
Mwawi Kayuni
,
Tiwonge Manda
,
Hyunsung Kim
Journal of Computer and Communications
Vol.8 No.1
,January 10, 2020
DOI:
10.4236/jcc.2020.81004
765
Downloads
1,893
Views
Citations
Physico-Chemical Soil Properties and Their Correlations with Maize and Cassava Production in Ebonyi, Nigeria
(Articles)
Fidelis Chinazor Okorie
,
John Didacus Njoku
,
Emmanuel Uzoma Onweremadu
,
Martin Chidinma Iwuji
American Journal of Climate Change
Vol.9 No.1
,March 12, 2020
DOI:
10.4236/ajcc.2020.91004
666
Downloads
2,278
Views
Citations
An Analysis of Cybersecurity Attacks against Internet of Things and Security Solutions
(Articles)
Mohammad Rafsun Islam
,
K. M. Aktheruzzaman
Journal of Computer and Communications
Vol.8 No.4
,April 2, 2020
DOI:
10.4236/jcc.2020.84002
2,465
Downloads
9,948
Views
Citations
VANET Security through Group Broadcast Encryption
(Articles)
Eric Eduardo Bunese
,
Eduardo Todt
,
Luiz Carlos Pessoa Albini
Journal of Computer and Communications
Vol.8 No.8
,August 11, 2020
DOI:
10.4236/jcc.2020.88003
511
Downloads
1,815
Views
Citations
“The Extent of the Link between the Hegemony of the Major Powers Scientifically and Economically and Novel Coronavirus Spread”—A Study within the Framework of the Public International Law
(Articles)
Essam El-Din Mohamed Ibrahim
,
Moamr Rateeb Mohamed Abd-Elhafez
Open Access Library Journal
Vol.7 No.8
,August 18, 2020
DOI:
10.4236/oalib.1106588
264
Downloads
969
Views
Citations
Safety Protection Design of Virtual Machine Drift Flow in Cloud Data Center Based on VXLAN Technology
(Articles)
Heping Pu
,
Yijun Wang
,
Xinke An
Journal of Computer and Communications
Vol.8 No.8
,August 28, 2020
DOI:
10.4236/jcc.2020.88005
601
Downloads
1,695
Views
Citations
E-Fraud in Nigerian Banks: Why and How?
(Articles)
Babatunde Moses Ololade
,
Mary Kehinde Salawu
,
Aderemi Daniel Adekanmi
Journal of Financial Risk Management
Vol.9 No.3
,September 10, 2020
DOI:
10.4236/jfrm.2020.93012
1,228
Downloads
9,178
Views
Citations
Security Operations Center: A Framework for Automated Triage, Containment and Escalation
(Articles)
Paul Danquah
Journal of Information Security
Vol.11 No.4
,September 25, 2020
DOI:
10.4236/jis.2020.114015
1,347
Downloads
6,057
Views
Citations
Concepts of Safety Critical Systems Unification Approach & Security Assurance Process
(Articles)
Faisal Nabi
,
Jianming Yong
,
Xiaohui Tao
,
Muhammad Saqib Malhi
,
Umar Mahmood
,
Usman Iqbal
Journal of Information Security
Vol.11 No.4
,October 27, 2020
DOI:
10.4236/jis.2020.114018
612
Downloads
2,096
Views
Citations
Certain Aspects of Nutritional Security of People with Gluten-Related Disorders
(Articles)
Rodica Siminiuc
,
Dinu Țurcanu
Food and Nutrition Sciences
Vol.11 No.11
,November 27, 2020
DOI:
10.4236/fns.2020.1111072
753
Downloads
1,864
Views
Citations
The Overview of Database Security Threats’ Solutions: Traditional and Machine Learning
(Articles)
Yong Wang
,
Jinsong Xi
,
Tong Cheng
Journal of Information Security
Vol.12 No.1
,January 11, 2021
DOI:
10.4236/jis.2021.121002
3,383
Downloads
11,869
Views
Citations
Optimum Spending on Cybersecurity Measures: Part II
(Articles)
Sherita Tara Kissoon
Journal of Information Security
Vol.12 No.1
,January 21, 2021
DOI:
10.4236/jis.2021.121007
1,574
Downloads
3,309
Views
Citations
A Hybrid Intrusion Detection System for Smart Home Security Based on Machine Learning and User Behavior
(Articles)
Faisal Alghayadh
,
Debatosh Debnath
Advances in Internet of Things
Vol.11 No.1
,January 28, 2021
DOI:
10.4236/ait.2021.111002
1,546
Downloads
6,664
Views
Citations
Feasibility and Challenges of 5G Network Deployment in Least Developed Countries (LDC)
(Articles)
Ashikur Rahman
,
Salsabil Arabi
,
Raqeebir Rab
Wireless Sensor Network
Vol.13 No.1
,January 29, 2021
DOI:
10.4236/wsn.2021.131001
1,333
Downloads
8,303
Views
Citations
Improvements to Female Autonomy and Household Decision-Making Power from an Intervention Targeting Improved Food Security: A Gender-Based Analysis of the Rajasthan Nutrition Project
(Articles)
Lindsay M. Belvedere
,
Siena F. Davis
,
Bobbi L. Gray
,
Benjamin T. Crookston
Health
Vol.13 No.2
,February 26, 2021
DOI:
10.4236/health.2021.132017
722
Downloads
2,074
Views
Citations
Security Considerations on Three-Factor Anonymous Authentication Scheme for WSNs
(Articles)
Hyunsung Kim
,
Beaton Ofesi Denice Kapito
Journal of Computer and Communications
Vol.9 No.3
,March 1, 2021
DOI:
10.4236/jcc.2021.93001
611
Downloads
1,479
Views
Citations
Do Sell-Side Security Analysts Act as Prophets?
(Articles)
Dewundara Liyanage Prasath Manjula Rathnasingha
,
Nayomi Weerasinghe
Journal of Financial Risk Management
Vol.10 No.1
,March 19, 2021
DOI:
10.4236/jfrm.2021.101002
428
Downloads
1,047
Views
Citations
<
...
23
24
25
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top