Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Cutting Edge Trends in Deception Based Intrusion Detection Systems—A Survey
(Articles)
Onyekware U. Oluoha
,
Terungwa S. Yange
,
George E. Okereke
,
Francis S. Bakpo
Journal of Information Security
Vol.12 No.4
,September 30, 2021
DOI:
10.4236/jis.2021.124014
687
Downloads
3,246
Views
Citations
The Role of AI in Cyber Security: Safeguarding Digital Identity
(Articles)
Mohammad Binhammad
,
Shaikha Alqaydi
,
Azzam Othman
,
Laila Hatim Abuljadayel
Journal of Information Security
Vol.15 No.2
,April 30, 2024
DOI:
10.4236/jis.2024.152015
1,057
Downloads
8,070
Views
Citations
Frequent Breaches in Irrigation Canals in Sindh Pakistan
(Articles)
Riaz Bhanbhro
,
Nadhir Al-Ansari
,
Sven Knutsson
Journal of Water Resource and Protection
Vol.6 No.4
,March 20, 2014
DOI:
10.4236/jwarp.2014.64027
8,479
Downloads
11,708
Views
Citations
Analytical Methods in the Quality Control of Scientific Publications Part III: Publishers’ Ethics and Editors’ Complicity
(Articles)
Ilia Brondz
Int'l J. of Analytical Mass Spectrometry and Chromatography
Vol.2 No.3
,September 25, 2014
DOI:
10.4236/ijamsc.2014.23008
3,350
Downloads
4,591
Views
Citations
How Psychological Contract Breach Influences Organizational Identification and Organizational Citizenship Behavior: The Mediating Role of Psychological Capital
(Articles)
Wanjun Yang
,
Lin Chao
American Journal of Industrial and Business Management
Vol.6 No.8
,August 31, 2016
DOI:
10.4236/ajibm.2016.68089
2,653
Downloads
5,685
Views
Citations
Does the Employee’s Work Attitude and Work Behavior Have the Same Stability? —A Empirical Study Based on Psychological Contract Breach
(Articles)
Biaobin Yan
,
Xiaoling Huang
,
Xueying Chen
Open Journal of Social Sciences
Vol.6 No.10
,October 30, 2018
DOI:
10.4236/jss.2018.610014
1,056
Downloads
2,821
Views
Citations
Information Assurance Technique for Mitigation of Data Breaches in the Human Service Sector
(Articles)
Chevroen Washington
,
Phillip Yarbrough
,
Shavon Parker
,
Rafia Islam
,
Vishnu Vardhan Patamsetti
,
Olatunde Abiona
Int'l J. of Communications, Network and System Sciences
Vol.15 No.2
,February 17, 2022
DOI:
10.4236/ijcns.2022.152002
366
Downloads
2,121
Views
Citations
Identification of the Breach of Short-Term Rental Regulations in Irish Rent Pressure Zones
(Articles)
Guowen Liu
,
Inmaculada Arnedillo-Sánchez
,
Zhenshuo Chen
Journal of Computer and Communications
Vol.11 No.2
,February 20, 2023
DOI:
10.4236/jcc.2023.112002
139
Downloads
713
Views
Citations
This article belongs to the Special Issue on
Image Processing and Machine Learning
Sequential Tests for the Detection of Voice Activity and the Recognition of Cyber Exploits
(Articles)
Ehab Etellisi
,
P. Papantoni-Kazakos
Communications and Network
Vol.3 No.4
,November 16, 2011
DOI:
10.4236/cn.2011.34022
4,141
Downloads
7,561
Views
Citations
The Application of Mixed Method in Developing a Cyber Terrorism Framework
(Articles)
Rabiah Ahmad
,
Zahri Yunos
Journal of Information Security
Vol.3 No.3
,July 25, 2012
DOI:
10.4236/jis.2012.33026
7,960
Downloads
14,034
Views
Citations
Analysis of Causes and Actual Events on Electric Power Infrastructure Impacted by Cyber Attack
(Articles)
Hongxu Yin
,
Rui Xiao
,
Fenfei Lv
Journal of Power and Energy Engineering
Vol.3 No.4
,April 13, 2015
DOI:
10.4236/jpee.2015.34012
3,908
Downloads
5,035
Views
Citations
Participatory Methods in the Georgian Caucasus: Understanding Vulnerability and Response to Debrisflow Hazards
(Articles)
Valentina Spanu
,
George Gaprindashvili
,
Michael Keith McCall
International Journal of Geosciences
Vol.6 No.7
,July 22, 2015
DOI:
10.4236/ijg.2015.67054
7,330
Downloads
8,471
Views
Citations
Cyber Warfare: A New Hullaballoo under International Humanitarian Law
(Articles)
Yohannes Eneyew Ayalew
Beijing Law Review
Vol.6 No.4
,October 15, 2015
DOI:
10.4236/blr.2015.64021
5,002
Downloads
6,788
Views
Citations
SCADA Framework Incorporating MANET and IDP for Cyber Security of Residential Microgrid Communication Network
(Articles)
Goutham K. Chalamasetty
,
Paras Mandal
,
Tzu-Liang (Bill) Tseng
Smart Grid and Renewable Energy
Vol.7 No.3
,March 29, 2016
DOI:
10.4236/sgre.2016.73007
2,589
Downloads
4,232
Views
Citations
Research on Cyber-Physical Modeling for Smart Distribution Grid
(Articles)
Xiaohong Guo
,
Shuyi Guo
,
Gang Li
,
Yu Song
Energy and Power Engineering
Vol.9 No.4B
,April 6, 2017
DOI:
10.4236/epe.2017.94B060
2,902
Downloads
3,882
Views
Citations
The Relationship between Cyberbullying Victimization and Depression: The Moderating Effects of Gender and Age
(Articles)
Jamal Almenayes
Social Networking
Vol.6 No.3
,June 8, 2017
DOI:
10.4236/sn.2017.63014
3,617
Downloads
8,662
Views
Citations
From Mechatronic Components to Industrial Automation Things: An IoT Model for Cyber-Physical Manufacturing Systems
(Articles)
Theodoros Foradis
,
Kleanthis Thramboulidis
Journal of Software Engineering and Applications
Vol.10 No.8
,July 12, 2017
DOI:
10.4236/jsea.2017.108040
2,386
Downloads
4,835
Views
Citations
Quantitative Evaluation of Cyber-Attacks on a Hypothetical School Computer Network
(Articles)
Akinjide A. Akinola
,
Adeyemi A. Adekoya
,
Ayoade O. Kuye
,
Abiodun Ayodeji
Journal of Information Security
Vol.10 No.3
,June 17, 2019
DOI:
10.4236/jis.2019.103006
818
Downloads
2,780
Views
Citations
Forecasting the Impact of Information Security Breaches on Stock Market Returns and VaR Backtest
(Articles)
Ilaria Colivicchi
,
Riccardo Vignaroli
Journal of Mathematical Finance
Vol.9 No.3
,August 21, 2019
DOI:
10.4236/jmf.2019.93024
881
Downloads
2,556
Views
Citations
The Impact of Contemporary Communication Technology on Undergraduate Students’ Dating Violence Episodes: An Exploration of Routine Activity Theory
(Articles)
Nancy Mayoyo
,
Jackton Ogeno
,
Francis Likoye
Open Journal of Social Sciences
Vol.8 No.9
,September 17, 2020
DOI:
10.4236/jss.2020.89011
540
Downloads
1,893
Views
Citations
<
...
2
3
4
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top