Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
A Method of Auxiliary Planning for Intelligent Substation Access System Based on Security Region
(Articles)
Gao Yi
,
Songtao Zhang
,
Chao Qin
,
Yuan Zeng
,
Yang Yang
,
Yingying Liu
,
Shengwei Li
Energy and Power Engineering
Vol.9 No.4B
,April 6, 2017
DOI:
10.4236/epe.2017.94B073
2,774
Downloads
3,377
Views
Citations
Internet of Things Behavioral-Economic Security Design, Actors & Cyber War
(Articles)
Robert L. Shuler
,
Billy G. Smith
Advances in Internet of Things
Vol.7 No.2
,April 30, 2017
DOI:
10.4236/ait.2017.72003
2,197
Downloads
3,958
Views
Citations
An Immunity-Based IOT Environment Security Situation Awareness Model
(Articles)
Yuanquan Shi
,
Tao Li
,
Renfa Li
,
Xiaoning Peng
,
Pengju Tang
Journal of Computer and Communications
Vol.5 No.7
,May 25, 2017
DOI:
10.4236/jcc.2017.57016
1,624
Downloads
2,833
Views
Citations
Prediction and Diversion Mechanisms for Crowd Management Based on Risk Rating
(Articles)
Meihua Zhang
,
Yuan Yao
,
Kefan Xie
Engineering
Vol.9 No.5
,May 27, 2017
DOI:
10.4236/eng.2017.95021
1,417
Downloads
3,003
Views
Citations
A Systems-Theoretic Security Model for Large Scale, Complex Systems Applied to the US Air Transportation System
(Articles)
Joseph R. Laracy
Int'l J. of Communications, Network and System Sciences
Vol.10 No.5
,May 31, 2017
DOI:
10.4236/ijcns.2017.105005
1,626
Downloads
3,134
Views
Citations
A SWOT Analysis of Maritime Transportation and Security in the Gulf of Guinea
(Articles)
Nana Raymond Lawrence Ofosu-Boateng
Open Journal of Social Sciences
Vol.5 No.8
,August 3, 2017
DOI:
10.4236/jss.2017.58002
2,747
Downloads
8,803
Views
Citations
Benefit Model of Knowledge Sharing Behavior
(Articles)
Jianying Zhang
Open Journal of Social Sciences
Vol.5 No.8
,August 14, 2017
DOI:
10.4236/jss.2017.58013
1,319
Downloads
4,028
Views
Citations
Evaluating China’s Oil Security and Overseas Oil Investment
(Articles)
Yuhua Zheng
American Journal of Industrial and Business Management
Vol.7 No.8
,August 17, 2017
DOI:
10.4236/ajibm.2017.78069
1,288
Downloads
2,977
Views
Citations
Investigation of Climate and Land Use Policy Change Impacts on Food Security in Eastern Sudan, Gadarif State
(Articles)
Yousif Elnour Yagoub
,
Zhongqin Li
,
Omer Said Musa
,
Muhammad Naveed Anjum
,
Feiteng Wang
,
Zhang Bo
Journal of Geographic Information System
Vol.9 No.5
,September 13, 2017
DOI:
10.4236/jgis.2017.95034
1,183
Downloads
2,406
Views
Citations
Investigation of Fear of Crime in City Centers through the Example of Beşiktaş Sinanpaşa Neighborhood
(Articles)
Elif Köklü
,
Funda Yirmibeşoğlu
Current Urban Studies
Vol.5 No.3
,September 19, 2017
DOI:
10.4236/cus.2017.53020
1,132
Downloads
3,064
Views
Citations
Strategic Risk Factors for Indian Stock Markets
(Articles)
Aman Srivastava
,
Prashant Gupta
,
Rakesh Gupta
Theoretical Economics Letters
Vol.7 No.6
,September 30, 2017
DOI:
10.4236/tel.2017.76114
1,125
Downloads
3,037
Views
Citations
Design of Secure and Traceable Requirement Engineering Process for Security-Sensitive Projects
(Articles)
Abdul Ahad
,
Luqman Tariq
,
Saba Niaz
,
Muhammad Inam
Journal of Software Engineering and Applications
Vol.10 No.12
,November 13, 2017
DOI:
10.4236/jsea.2017.1012049
1,829
Downloads
3,149
Views
Citations
Practical Approaches to Securing an IT Environment
(Articles)
Emmanuel S. Kolawole
,
Warsame H. Ali
,
Cofie Penrose
,
John C. Fuller
Communications and Network
Vol.9 No.4
,November 30, 2017
DOI:
10.4236/cn.2017.94019
1,884
Downloads
5,327
Views
Citations
Towards the Development of Best Data Security for Big Data
(Articles)
Yuan Tian
Communications and Network
Vol.9 No.4
,November 30, 2017
DOI:
10.4236/cn.2017.94020
1,801
Downloads
4,900
Views
Citations
The Study of Secure Congestion Control for TCP in Ad Hoc Networks
(Articles)
Weinan Zhang
,
Li Lin
,
Li Du
Journal of Information Security
Vol.9 No.1
,December 5, 2017
DOI:
10.4236/jis.2018.91003
972
Downloads
2,223
Views
Citations
Does Fishing Restructuring Provide Reliability to Food Security? The European Union-Morocco Case
(Articles)
Amada Hidalgo Gallardo
,
Ruth Leticia Hidalgo Gallardo
,
Adrian González Romo
,
Sofía Elizabeth Ávila Hidalgo
Journal of Human Resource and Sustainability Studies
Vol.5 No.4
,December 12, 2017
DOI:
10.4236/jhrss.2017.54020
874
Downloads
1,581
Views
Citations
Oil, Risk Analysis Techniques, Maritime Security and Safe Passage in Pirate Infested Gulf of Guinea Waters
(Articles)
Nana Raymond Lawrence Ofosu-Boateng
Open Journal of Social Sciences
Vol.5 No.12
,December 14, 2017
DOI:
10.4236/jss.2017.512008
1,114
Downloads
1,993
Views
Citations
Competiveness of Maize Value Chains for Smallholders in West Africa: Case of Benin, Ghana and Cote D’Ivoire
(Articles)
Mahamadou Nassirou Ba
Agricultural Sciences
Vol.8 No.12
,December 29, 2017
DOI:
10.4236/as.2017.812099
1,488
Downloads
4,846
Views
Citations
Security Analysis of Subspace Network Coding
(Articles)
Yantao Liu
,
Yasser Morgan
Journal of Information Security
Vol.9 No.1
,January 23, 2018
DOI:
10.4236/jis.2018.91007
981
Downloads
2,138
Views
Citations
End-to-End Encryption in Messaging Services and National Security—Case of WhatsApp Messenger
(Articles)
Robert E. Endeley
Journal of Information Security
Vol.9 No.1
,January 23, 2018
DOI:
10.4236/jis.2018.91008
10,957
Downloads
17,879
Views
Citations
<
...
27
28
29
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top