Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Analysis of the 2007-2008 Writer’s Guild Strike with Game Theory
(Articles)
William P. Fox
Applied Mathematics
Vol.6 No.12
,November 30, 2015
DOI:
10.4236/am.2015.612187
2,804
Downloads
3,745
Views
Citations
This article belongs to the Special Issue on
Game Theory
Enhancing Multi-Factor Authentication in Modern Computing
(Articles)
Ekwonwune Emmanuel Nwabueze
,
Iwuoha Obioha
,
Oju Onuoha
Communications and Network
Vol.9 No.3
,August 9, 2017
DOI:
10.4236/cn.2017.93012
2,382
Downloads
5,430
Views
Citations
Climate Change, Environmental Threats and Cyber-Threats to Critical Infrastructures in Multi-Regulatory Sustainable Global Approach with Sweden as an Example
(Articles)
Sandra Cassotta
,
Maria Pettersson
Beijing Law Review
Vol.10 No.3
,June 27, 2019
DOI:
10.4236/blr.2019.103035
1,299
Downloads
5,037
Views
Citations
Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies
(Articles)
Sina Ahmadi
Journal of Information Security
Vol.15 No.2
,March 27, 2024
DOI:
10.4236/jis.2024.152010
510
Downloads
4,060
Views
Citations
The Role of AI in Cyber Security: Safeguarding Digital Identity
(Articles)
Mohammad Binhammad
,
Shaikha Alqaydi
,
Azzam Othman
,
Laila Hatim Abuljadayel
Journal of Information Security
Vol.15 No.2
,April 30, 2024
DOI:
10.4236/jis.2024.152015
1,038
Downloads
7,883
Views
Citations
Tackling the Existential Threats from Quantum Computers and AI
(Articles)
Fazal Raheman
Intelligent Information Management
Vol.16 No.3
,May 31, 2024
DOI:
10.4236/iim.2024.163008
286
Downloads
1,621
Views
Citations
The Congolese Legislation Readiness against AI Development and Foreign Attacks and Perspective of International Cooperation
(Articles)
Jordy Cloud Ntsoumou Mboulou
Open Access Library Journal
Vol.11 No.5
,May 31, 2024
DOI:
10.4236/oalib.1111453
45
Downloads
635
Views
Citations
AssessITS
: Integrating Procedural Guidelines and Practical Evaluation Metrics for Organizational IT and Cybersecurity Risk Assessment
(Articles)
Mir Mehedi Rahman
,
Naresh Kshetri
,
Sayed Abu Sayeed
,
Md Masud Rana
Journal of Information Security
Vol.15 No.4
,October 29, 2024
DOI:
10.4236/jis.2024.154032
120
Downloads
662
Views
Citations
Exploring Cyber Threat Intelligence into Land Administration Systems for Enhanced Cyber Resilience
(Articles)
Pierre-François Blin
,
Trias Aditya
,
Purnama Budi Santosa
,
Christophe Claramunt
Journal of Geographic Information System
Vol.17 No.1
,February 12, 2025
DOI:
10.4236/jgis.2025.171003
56
Downloads
358
Views
Citations
On Threat Models for Information-Stealing Malware (ISM) Targeting Password Managers
(Articles)
Vedika Sunil Bang
,
Vijay Madisetti
Journal of Information Security
Vol.16 No.2
,April 17, 2025
DOI:
10.4236/jis.2025.162015
47
Downloads
381
Views
Citations
Banning Smoking in Public Places under Ethiopian Legal Framework: Some Evidences from Hawassa City
(Articles)
Edilu Shona
Beijing Law Review
Vol.8 No.4
,December 27, 2017
DOI:
10.4236/blr.2017.84029
1,603
Downloads
4,758
Views
Citations
A Case Study on Security Recommendations for a Global Organization
(Articles)
Devashi Tandon
,
Pratyush Parimal
Journal of Computer and Communications
Vol.6 No.3
,March 28, 2018
DOI:
10.4236/jcc.2018.63010
899
Downloads
5,666
Views
Citations
AI-Powered Threat Detection in Online Communities: A Multi-Modal Deep Learning Approach
(Articles)
Ravi Teja Potla
Journal of Computer and Communications
Vol.13 No.2
,February 26, 2025
DOI:
10.4236/jcc.2025.132010
85
Downloads
549
Views
Citations
Information Security in the Cloud: Emerging Trends and Challenges
(Articles)
Keerthana Chitreddy
,
Andrew Mikhl Anthony
,
Chinna Manikanta Bandaru
,
Olatunde Abiona
Int'l J. of Communications, Network and System Sciences
Vol.17 No.5
,May 31, 2024
DOI:
10.4236/ijcns.2024.175005
159
Downloads
935
Views
Citations
Rethinking Healthy Aging: The Self-Perception of African American Older Adults
(Articles)
Monique Ejim
,
Crystal Neal
,
Kathryn Miller
Open Journal of Social Sciences
Vol.13 No.1
,January 23, 2025
DOI:
10.4236/jss.2025.131018
63
Downloads
504
Views
Citations
This article belongs to the Special Issue on
Social, Psychological and Behavioral Sciences
Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises
(Articles)
Meysam Tahmasebi
Journal of Information Security
Vol.15 No.2
,February 29, 2024
DOI:
10.4236/jis.2024.152008
477
Downloads
2,465
Views
Citations
This article belongs to the Special Issue on
Cybersecurity and Information Security
<
1
2
3
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top