Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
A Novel Attack Graph Posterior Inference Model Based on Bayesian Network
(Articles)
Shaojun Zhang
,
Shanshan Song
Journal of Information Security
Vol.2 No.1
,January 31, 2011
DOI:
10.4236/jis.2011.21002
6,610
Downloads
12,091
Views
Citations
SCADA Framework Incorporating MANET and IDP for Cyber Security of Residential Microgrid Communication Network
(Articles)
Goutham K. Chalamasetty
,
Paras Mandal
,
Tzu-Liang (Bill) Tseng
Smart Grid and Renewable Energy
Vol.7 No.3
,March 29, 2016
DOI:
10.4236/sgre.2016.73007
2,505
Downloads
3,974
Views
Citations
General Study of Mobile Agent Based Intrusion Detection System (IDS)
(Articles)
Chandrakant Jain
,
Aumreesh Kumar Saxena
Journal of Computer and Communications
Vol.4 No.4
,April 13, 2016
DOI:
10.4236/jcc.2016.44008
2,972
Downloads
4,669
Views
Citations
Discussion and Research on Information Security Attack and Defense Platform Construction in Universities Based on Cloud Computing and Virtualization
(Articles)
Xiancheng Ding
Journal of Information Security
Vol.7 No.5
,October 27, 2016
DOI:
10.4236/jis.2016.75025
2,332
Downloads
3,575
Views
Citations
Associated Risks in Mobile Applications Permissions
(Articles)
Mohammed Al Jutail
,
Mousa Al-Akhras
,
Abdulaziz Albesher
Journal of Information Security
Vol.10 No.2
,March 26, 2019
DOI:
10.4236/jis.2019.102004
1,702
Downloads
5,702
Views
Citations
Study on the Use of Artificial Intelligence for Cybersecurity in Companies: Case of Companies in Burkina Faso
(Articles)
Yanogo Kiswendsida Jean Hermann
,
Ouedraogo Tounwendyam Frederic
Engineering
Vol.15 No.12
,December 11, 2023
DOI:
10.4236/eng.2023.1512056
109
Downloads
687
Views
Citations
Design Considerations on a Flexible Membrane Tsunami Flood Barrier
(Articles)
Roelof Marissen
,
Julio Suarez Mulder
,
Dietrich Wienke
,
Otto Bergsma
Materials Sciences and Applications
Vol.4 No.12
,December 31, 2013
DOI:
10.4236/msa.2013.412108
5,391
Downloads
6,985
Views
Citations
Government and Community Involvement in Environmental Protection and Flood Risk Management: Lessons from Keko Machungwa, Dar es Salaam, Tanzania
(Articles)
Tumpale Sakijege
,
Junun Sartohadi
,
Muh Aris Marfai
,
Gabriel Kassenga
,
Samson Kasala
Journal of Environmental Protection
Vol.5 No.9
,June 19, 2014
DOI:
10.4236/jep.2014.59078
4,098
Downloads
6,258
Views
Citations
This article belongs to the Special Issue on
Environmental Policy
Weighing the Pros and Cons: Transformation of Angle of View for Three Gorges Dam
(Articles)
Wei Zhang
Natural Resources
Vol.5 No.16
,December 31, 2014
DOI:
10.4236/nr.2014.516088
12,445
Downloads
15,028
Views
Citations
This article belongs to the Special Issue on
Exploitation and Sustainable Development of Natural Resources
Taxonomy for Privacy Policies of Social Networks Sites
(Articles)
Sergio Donizetti Zorzo
,
Rodrigo Pereira Botelho
,
Paulo Muniz de Ávila
Social Networking
Vol.2 No.4
,October 30, 2013
DOI:
10.4236/sn.2013.24015
5,336
Downloads
9,717
Views
Citations
Study on the Legalization of Minor Internet Security
(Articles)
Pengfei Ji
Beijing Law Review
Vol.6 No.1
,March 10, 2015
DOI:
10.4236/blr.2015.61007
4,330
Downloads
4,959
Views
Citations
Breach Notification in the General Data Protection Regulation
(Articles)
M’Bia Hortense De-Yolande
,
Théo Doh-Djanhoundji
,
Gabo Yves Constant
Voice of the Publisher
Vol.9 No.4
,December 26, 2023
DOI:
10.4236/vp.2023.94026
60
Downloads
278
Views
Citations
The Role of AI in Cyber Security: Safeguarding Digital Identity
(Articles)
Mohammad Binhammad
,
Shaikha Alqaydi
,
Azzam Othman
,
Laila Hatim Abuljadayel
Journal of Information Security
Vol.15 No.2
,April 30, 2024
DOI:
10.4236/jis.2024.152015
95
Downloads
738
Views
Citations
Protection Model of Security Systems Based on Neyman-Person Criterion
(Articles)
Haitao Lv
,
Ruimin Hu
,
Jun Chen
,
Zheng He
Communications and Network
Vol.5 No.3C
,October 7, 2013
DOI:
10.4236/cn.2013.53B2104
2,824
Downloads
4,462
Views
Citations
Performance Comparison and Simulink Model of Firewall Free BSD and Linux
(Articles)
Fontaine Rafamantanantsoa
,
Haja Louis Rabetafika
Communications and Network
Vol.10 No.4
,November 5, 2018
DOI:
10.4236/cn.2018.104015
957
Downloads
2,024
Views
Citations
This article belongs to the Special Issue on
Network Design and Performance Evaluation
SOAP-Based Security Interaction of Web Service inHeterogeneous Platforms
(Articles)
Tao Xu
,
Chunxiao Yi
Journal of Information Security
Vol.2 No.1
,February 17, 2011
DOI:
10.4236/jis.2011.21001
5,207
Downloads
9,775
Views
Citations
Delineation of Well Head Protection Areas for the Public Wells in the Ferizaj Region (Kosovo) with Limited Data Availability
(Articles)
Argjend Hajra
,
Mario Roidt
,
Stephanie Isabel Lobensteiner
,
Randolf Rausch
Journal of Environmental Protection
Vol.13 No.2
,February 11, 2022
DOI:
10.4236/jep.2022.132013
228
Downloads
958
Views
Citations
Determinants of Students’ Observance of Library Regulations in Federal Polytechnic Nekede, Owerri, Imo State, Nigeria
(Articles)
Adaora J. Udo-Anyanwu
,
Matilda C. Oduagwu
,
Nkechi O. Okorie1
Open Access Library Journal
Vol.2 No.4
,April 16, 2015
DOI:
10.4236/oalib.1101353
1,110
Downloads
2,939
Views
Citations
Cyber-Security of Smart Grids: Attacks, Detection, Countermeasure Techniques, and Future Directions
(Articles)
Tala Talaei Khoei
,
Hadjar Ould Slimane
,
Naima Kaabouch
Communications and Network
Vol.14 No.4
,November 24, 2022
DOI:
10.4236/cn.2022.144009
727
Downloads
5,730
Views
Citations
Integrated Model for Security and Protection of Critical Infrastructure
(Articles)
Kiril Stoichev
Open Access Library Journal
Vol.1 No.9
,December 18, 2014
DOI:
10.4236/oalib.1101124
854
Downloads
1,848
Views
Citations
<
...
2
3
4
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top