Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Analysis of the Distribution of
Tulipa fosteriana
and
Tulipa ingens
. The Importance of Protecting Wild Plants, in Particular Tulips All over the World
(Articles)
Shukrullozoda Roza Shukrullo Qizi
,
Dekhkonov Davron Burxonovich
,
Khaydarov Khislat Kudratovich
,
Umurzakova Zebuniso Iskandarovna
,
Olimjonova Sadoqat Gùlomjon Qizi
,
Norimova Guljakhon Komiljon Qizi
American Journal of Plant Sciences
Vol.14 No.5
,May 31, 2023
DOI:
10.4236/ajps.2023.145041
97
Downloads
321
Views
Citations
This article belongs to the Special Issue on
Plant Biotechnology
Business Email Compromise Challenges to Medium and Large-Scale Firms in USA: An Analysis
(Articles)
Okechukwu Ogwo-Ude
Open Journal of Applied Sciences
Vol.13 No.6
,June 9, 2023
DOI:
10.4236/ojapps.2023.136064
137
Downloads
941
Views
Citations
SME Strategic Management Practices during the COVID-19 Pandemic in Developing Countries: An Empirical Test of the Threat Rigidity Hypothesis
(Articles)
Belinda Miyanda Muyuni
,
Jackson Phiri
Open Journal of Business and Management
Vol.12 No.1
,January 31, 2024
DOI:
10.4236/ojbm.2024.121033
71
Downloads
260
Views
Citations
Harvesting, Tokenizing, and Sharing the Influence of Planetary Abundance to Mitigate the Global Debt Catastrophe
(Articles)
Fazal Raheman
Theoretical Economics Letters
Vol.14 No.1
,February 27, 2024
DOI:
10.4236/tel.2024.141008
55
Downloads
211
Views
Citations
Monthly Forecast of Indian Southwest Monsoon Rainfall Based on NCEP’s Coupled Forecast System
(Articles)
Dushmanta R. Pattanaik
,
Biswajit Mukhopadhyay
,
Arun Kumar
Atmospheric and Climate Sciences
Vol.2 No.4
,November 2, 2012
DOI:
10.4236/acs.2012.24042
5,291
Downloads
9,064
Views
Citations
Threat Status of Commercially Exploited Trees in the Nigerian Rainforest
(Articles)
Francis E. Bisong
,
Peter Buckley
Open Journal of Forestry
Vol.4 No.5
,October 21, 2014
DOI:
10.4236/ojf.2014.45058
3,679
Downloads
4,732
Views
Citations
Analysis of the 2007-2008 Writer’s Guild Strike with Game Theory
(Articles)
William P. Fox
Applied Mathematics
Vol.6 No.12
,November 30, 2015
DOI:
10.4236/am.2015.612187
2,695
Downloads
3,477
Views
Citations
This article belongs to the Special Issue on
Game Theory
Enhancing Multi-Factor Authentication in Modern Computing
(Articles)
Ekwonwune Emmanuel Nwabueze
,
Iwuoha Obioha
,
Oju Onuoha
Communications and Network
Vol.9 No.3
,August 9, 2017
DOI:
10.4236/cn.2017.93012
1,923
Downloads
4,595
Views
Citations
Climate Change, Environmental Threats and Cyber-Threats to Critical Infrastructures in Multi-Regulatory Sustainable Global Approach with Sweden as an Example
(Articles)
Sandra Cassotta
,
Maria Pettersson
Beijing Law Review
Vol.10 No.3
,June 27, 2019
DOI:
10.4236/blr.2019.103035
1,200
Downloads
4,191
Views
Citations
Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies
(Articles)
Sina Ahmadi
Journal of Information Security
Vol.15 No.2
,March 27, 2024
DOI:
10.4236/jis.2024.152010
67
Downloads
643
Views
Citations
The Role of AI in Cyber Security: Safeguarding Digital Identity
(Articles)
Mohammad Binhammad
,
Shaikha Alqaydi
,
Azzam Othman
,
Laila Hatim Abuljadayel
Journal of Information Security
Vol.15 No.2
,April 30, 2024
DOI:
10.4236/jis.2024.152015
80
Downloads
645
Views
Citations
Banning Smoking in Public Places under Ethiopian Legal Framework: Some Evidences from Hawassa City
(Articles)
Edilu Shona
Beijing Law Review
Vol.8 No.4
,December 27, 2017
DOI:
10.4236/blr.2017.84029
1,504
Downloads
4,416
Views
Citations
A Case Study on Security Recommendations for a Global Organization
(Articles)
Devashi Tandon
,
Pratyush Parimal
Journal of Computer and Communications
Vol.6 No.3
,March 28, 2018
DOI:
10.4236/jcc.2018.63010
826
Downloads
5,187
Views
Citations
Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises
(Articles)
Meysam Tahmasebi
Journal of Information Security
Vol.15 No.2
,February 29, 2024
DOI:
10.4236/jis.2024.152008
126
Downloads
503
Views
Citations
This article belongs to the Special Issue on
Cybersecurity and Information Security
<
1
2
3
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top