Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Blue Screen of Death Observed for Microsoft Windows Server 2012 R2 under DDoS Security Attack
(Articles)
Koushicaa Sundar
,
Sanjeev Kumar
Journal of Information Security
Vol.7 No.4
,July 7, 2016
DOI:
10.4236/jis.2016.74018
2,959
Downloads
5,916
Views
Citations
A Novel Information Security Scheme for E-Learning Infrastructure Success Based on TRI Model
(Articles)
Yassine Khlifi
,
Adel Bessadok
Open Access Library Journal
Vol.2 No.4
,April 23, 2015
DOI:
10.4236/oalib.1101424
1,110
Downloads
2,320
Views
Citations
Data Security of Mobile Cloud Computing on Cloud Server
(Articles)
Mohammad Waseem
,
Abdullah Lakhan
,
Irfan Ali Jamali
Open Access Library Journal
Vol.3 No.4
,April 28, 2016
DOI:
10.4236/oalib.1102377
1,859
Downloads
8,646
Views
Citations
The Evolution of the Concept of International Peace and Security in light of UN Security Council Practice (End of the Cold War-Until Now)
(Articles)
Rasool Soltani
,
Maryam Moradi
Open Journal of Political Science
Vol.7 No.1
,January 3, 2017
DOI:
10.4236/ojps.2017.71010
3,405
Downloads
16,297
Views
Citations
HiMAC: Hierarchical Message Authentication Code for Secure Data Dissemination in Mobile Ad Hoc Networks
(Articles)
Khaleel Mershad
,
Ali Hamie
,
Mohamad Hamze
Int'l J. of Communications, Network and System Sciences
Vol.10 No.12
,December 15, 2017
DOI:
10.4236/ijcns.2017.1012018
1,099
Downloads
2,349
Views
Citations
Google Maps Security Concerns
(Articles)
Aqil Burney
,
Muhammad Asif
,
Zain Abbas
,
Shamaila Burney
Journal of Computer and Communications
Vol.6 No.1
,January 8, 2018
DOI:
10.4236/jcc.2018.61027
3,393
Downloads
14,379
Views
Citations
A Security Architecture for SCADA Systems
(Articles)
Arun Velagapalli
,
Mahalingam Ramkumar
Journal of Information Security
Vol.9 No.1
,January 23, 2018
DOI:
10.4236/jis.2018.91009
1,444
Downloads
3,983
Views
Citations
Application of Traditional Ecological Knowledge in Food and Water Security in the Semi-Arid Turkana County, Kenya
(Articles)
Cecilia Mwango Ratemo
,
George Morara Ogendi
,
Guangwei Huang
,
Rhoda N. Ondieki
Open Journal of Ecology
Vol.10 No.6
,June 1, 2020
DOI:
10.4236/oje.2020.106020
806
Downloads
2,997
Views
Citations
Secure Web Application Technologies Implementation through Hardening Security Headers Using Automated Threat Modelling Techniques
(Articles)
Maduhu Mshangi Mlyatu
,
Camilius Sanga
Journal of Information Security
Vol.14 No.1
,November 30, 2022
DOI:
10.4236/jis.2023.141001
319
Downloads
1,684
Views
Citations
Research on the Construction of China’s Strategic Communication System in Global Security Governance
(Articles)
Lina Jing
,
Nana Jing
Open Journal of Political Science
Vol.13 No.3
,June 12, 2023
DOI:
10.4236/ojps.2023.133017
186
Downloads
999
Views
Citations
Enhancing Security in QR Code Technology Using AI: Exploration and Mitigation Strategies
(Articles)
Saranya Vaithilingam
,
Santhosh Aradhya Mohan Shankar
International Journal of Intelligence Science
Vol.14 No.2
,March 26, 2024
DOI:
10.4236/ijis.2024.142003
306
Downloads
2,056
Views
Citations
Exploring the Characteristics of Data Breaches: A Descriptive Analytic Study
(Articles)
Dominik Molitor
,
Aditya Saharia
,
Viju Raghupathi
,
Wullianallur Raghupathi
Journal of Information Security
Vol.15 No.2
,April 2, 2024
DOI:
10.4236/jis.2024.152011
377
Downloads
2,857
Views
Citations
Analysis of Database Security
(Articles)
Xueying Pan
,
Anthony Obahiaghon
,
Brendan Makar
,
Samuel Wilson
,
Christian Beard
Open Access Library Journal
Vol.11 No.4
,April 15, 2024
DOI:
10.4236/oalib.1111366
184
Downloads
1,444
Views
Citations
The Role of AI in Cyber Security: Safeguarding Digital Identity
(Articles)
Mohammad Binhammad
,
Shaikha Alqaydi
,
Azzam Othman
,
Laila Hatim Abuljadayel
Journal of Information Security
Vol.15 No.2
,April 30, 2024
DOI:
10.4236/jis.2024.152015
1,091
Downloads
8,380
Views
Citations
Security Challenges around the Student Representative Council’s e-Voting System at Public-Funded University in the Western Cape
(Articles)
Joel Chigada
,
Dion Steven Tawanda Mazhawidza
Open Access Library Journal
Vol.11 No.9
,September 25, 2024
DOI:
10.4236/oalib.1112166
55
Downloads
939
Views
Citations
Informal Cross-Border Trade and Security Concerns in the IGAD Region: An Interrogation of the Policy Framework
(Articles)
Michael Omondi Owiso
,
Odhiambo Alphonce Kasera
Open Journal of Social Sciences
Vol.13 No.1
,January 7, 2025
DOI:
10.4236/jss.2025.131002
73
Downloads
427
Views
Citations
Weighted Voting Ensemble Model Integrated with IoT for Detecting Security Threats in Satellite Systems and Aerial Vehicles
(Articles)
Raed Alharthi
Journal of Computer and Communications
Vol.13 No.2
,February 28, 2025
DOI:
10.4236/jcc.2025.132016
64
Downloads
361
Views
Citations
Research on the Convergence of Foreign Investment Security Review Legal Systems in Europe and the United States
(Articles)
Hu Chen
Beijing Law Review
Vol.16 No.2
,May 26, 2025
DOI:
10.4236/blr.2025.162036
50
Downloads
182
Views
Citations
Cultural Dimensions of Cybersecurity: A Cyberpsychology Analysis of Multinational Corporate Security
(Articles)
Troy C. Troublefield
Journal of Information Security
Vol.16 No.3
,July 4, 2025
DOI:
10.4236/jis.2025.163019
38
Downloads
206
Views
Citations
Optimum Load Shedding in Power System Strategies with Voltage Stability Indicators
(Articles)
P.V. RAJ
,
M. SUDHAKARAN
Engineering
Vol.2 No.1
,January 27, 2010
DOI:
10.4236/eng.2010.21002
8,681
Downloads
17,744
Views
Citations
<
...
24
25
26
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top