Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Study on the Real-Time Security Evaluation for the Train Service Status Using Safety Region Estimation
(Articles)
Guiling Liao
,
Yong Qin
,
Xiaoqing Cheng
,
Lisha Pan
,
Lin He
,
Shan Yu
,
Yuan Zhang
Journal of Intelligent Learning Systems and Applications
Vol.5 No.4
,November 12, 2013
DOI:
10.4236/jilsa.2013.54025
4,285
Downloads
6,077
Views
Citations
This article belongs to the Special Issue on
Intelligent Information Processing in Metro Train Safety-Critical System and Application
A Study on Quantitative Methodology to Assess Cyber Security Risk of Smart Grid
(Articles)
Pil Sung Woo
,
Byung-Hyun Ko
,
Dong-Joo Kang
,
Balho H. Kim
Energy and Power Engineering
Vol.5 No.4B
,November 18, 2013
DOI:
10.4236/epe.2013.54B249
5,517
Downloads
8,467
Views
Citations
The Current and Future of Software Securities and Vulnerabilities
(Articles)
Cuixue Zhang
,
Meijiao Zhou
,
Yalian Xie
,
Xiangli Li
Journal of Software Engineering and Applications
Vol.7 No.1
,December 26, 2013
DOI:
10.4236/jsea.2014.71001
3,674
Downloads
6,951
Views
Citations
Structured Equation Model of Tuberculosis Incidence Based on Its Social Determinants and Risk Factors in Bandar Lampung, Indonesia
(Articles)
Dyah Wulan Sumekar Rengganis Wardani
,
Lutfan Lazuardi
,
Yodi Mahendradhata
,
Hari Kusnanto
Open Journal of Epidemiology
Vol.4 No.2
,April 29, 2014
DOI:
10.4236/ojepi.2014.42013
4,711
Downloads
8,000
Views
Citations
Does Reactive Adaptation Exist? Using the Ecosystem Service Governance Approach to Evaluate Post-Drought Rural Food Security in Kenya
(Articles)
Grace W. Ngaruiya
Natural Resources
Vol.5 No.8
,June 24, 2014
DOI:
10.4236/nr.2014.58037
4,063
Downloads
5,595
Views
Citations
This article belongs to the Special Issue on
Resource Security
Urgency and Necessity on Adjustment of China’s Current Agricultural Structure Based on the Stability and Developmental Trend Analyses of Pork Yield in China
(Articles)
Cangyu Jin
,
Huilong Lin
Journal of Agricultural Chemistry and Environment
Vol.3 No.3B
,July 14, 2014
DOI:
10.4236/jacen.2014.33B003
2,246
Downloads
3,242
Views
Citations
Two-Tier Hierarchical Cluster Based Topology in Wireless Sensor Networks for Contention Based Protocol Suite
(Articles)
Arif Sari
Int'l J. of Communications, Network and System Sciences
Vol.8 No.3
,March 20, 2015
DOI:
10.4236/ijcns.2015.83004
4,032
Downloads
5,733
Views
Citations
Generational Responses to Job Security, Traditional Class Division, and the American Dream
(Articles)
Yakasah Wehyee
Open Journal of Political Science
Vol.5 No.3
,April 9, 2015
DOI:
10.4236/ojps.2015.53021
3,533
Downloads
4,698
Views
Citations
A Review of Anomaly Detection Systems in Cloud Networks and Survey of Cloud Security Measures in Cloud Storage Applications
(Review)
Arif Sari
Journal of Information Security
Vol.6 No.2
,April 23, 2015
DOI:
10.4236/jis.2015.62015
10,964
Downloads
15,078
Views
Citations
Improving Knowledge Based Spam Detection Methods: The Effect of Malicious Related Features in Imbalance Data Distribution
(Articles)
Jafar Alqatawna
,
Hossam Faris
,
Khalid Jaradat
,
Malek Al-Zewairi
,
Omar Adwan
Int'l J. of Communications, Network and System Sciences
Vol.8 No.5
,April 30, 2015
DOI:
10.4236/ijcns.2015.85014
4,313
Downloads
6,076
Views
Citations
Comparison of Feature Reduction Techniques for the Binominal Classification of Network Traffic
(Articles)
Adel Ammar
Journal of Data Analysis and Information Processing
Vol.3 No.2
,May 8, 2015
DOI:
10.4236/jdaip.2015.32002
4,964
Downloads
6,116
Views
Citations
The Objective Function Value Optimization of Cloud Computing Resources Security Allocation of Artificial Firefly Algorithm
(Articles)
Xiaoxi Hu
Open Journal of Optimization
Vol.4 No.2
,May 15, 2015
DOI:
10.4236/ojop.2015.42005
3,518
Downloads
4,606
Views
Citations
A Way to Set up Security Layer over Internet
(Articles)
Xiangyi Hu
,
Guifen Zhao
,
Guanning Xu
Journal of Computer and Communications
Vol.3 No.5
,May 25, 2015
DOI:
10.4236/jcc.2015.35022
2,616
Downloads
3,279
Views
Citations
Urban Market-Gardening in Parakou (Republic of Benin): Spatial Dynamics, Food Security, Protection of the Environment and Creation of Employments
(Articles)
Abdoul-Ramane Abdoulaye
,
Aboudou Yacoubou Mama Aboudou Ramanou
Journal of Geoscience and Environment Protection
Vol.3 No.5
,July 28, 2015
DOI:
10.4236/gep.2015.35011
3,275
Downloads
4,400
Views
Citations
Resilience: The New Paradigm in Disaster Management—An Australian Perspective
(Articles)
Stephen Jenkins
,
Stephen Jenkins
World Journal of Engineering and Technology
Vol.3 No.3C
,October 22, 2015
DOI:
10.4236/wjet.2015.33C020
7,921
Downloads
10,477
Views
Citations
An Approach to Assess the Resiliency of Electric Power Grids
(Articles)
Navin Shenoy
,
R. Ramakumar
Journal of Power and Energy Engineering
Vol.3 No.11
,November 11, 2015
DOI:
10.4236/jpee.2015.311001
3,759
Downloads
4,999
Views
Citations
Perceived Trust and Payment Methods: An Empirical Study of MarkaVIP Company
(Articles)
Mahmoud Maqableh
,
Ra’ed Moh’d Taisir Masa’deh
,
Rifat O. Shannak
,
Khalid M. Nahar
Int'l J. of Communications, Network and System Sciences
Vol.8 No.11
,November 13, 2015
DOI:
10.4236/ijcns.2015.811038
9,082
Downloads
11,286
Views
Citations
Application of Inorganic and Organic Manure Fertilizers as Means of Conserving
Plectranthus esculentus
N.E.Br in Mid-Altitude Zone of Rwanda
(Articles)
Munyaneza Emmanuel
,
Hategekimana J. Damascene
,
Ruffo K. Christopher
,
Minani Vedaste
Natural Resources
Vol.7 No.1
,January 22, 2016
DOI:
10.4236/nr.2016.71005
4,296
Downloads
6,006
Views
Citations
Evaluation of Beijing Low-Income Housing Security Policy: An Analysis of the Public Policy
(Articles)
Jianfang Chen
,
Dingchang Wu
Journal of Service Science and Management
Vol.9 No.1
,February 26, 2016
DOI:
10.4236/jssm.2016.91012
2,431
Downloads
3,538
Views
Citations
Cybersecurity: A Statistical Predictive Model for the Expected Path Length
(Articles)
Pubudu Kalpani Kaluarachchi
,
Chris P. Tsokos
,
Sasith M. Rajasooriya
Journal of Information Security
Vol.7 No.3
,April 5, 2016
DOI:
10.4236/jis.2016.73008
3,396
Downloads
5,588
Views
Citations
<
...
29
30
31
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top