Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
The Congolese Legislation Readiness against AI Development and Foreign Attacks and Perspective of International Cooperation
(Articles)
Jordy Cloud Ntsoumou Mboulou
Open Access Library Journal
Vol.11 No.5
,May 31, 2024
DOI:
10.4236/oalib.1111453
49
Downloads
685
Views
Citations
AssessITS
: Integrating Procedural Guidelines and Practical Evaluation Metrics for Organizational IT and Cybersecurity Risk Assessment
(Articles)
Mir Mehedi Rahman
,
Naresh Kshetri
,
Sayed Abu Sayeed
,
Md Masud Rana
Journal of Information Security
Vol.15 No.4
,October 29, 2024
DOI:
10.4236/jis.2024.154032
124
Downloads
706
Views
Citations
Exploring Cyber Threat Intelligence into Land Administration Systems for Enhanced Cyber Resilience
(Articles)
Pierre-François Blin
,
Trias Aditya
,
Purnama Budi Santosa
,
Christophe Claramunt
Journal of Geographic Information System
Vol.17 No.1
,February 12, 2025
DOI:
10.4236/jgis.2025.171003
64
Downloads
402
Views
Citations
On Threat Models for Information-Stealing Malware (ISM) Targeting Password Managers
(Articles)
Vedika Sunil Bang
,
Vijay Madisetti
Journal of Information Security
Vol.16 No.2
,April 17, 2025
DOI:
10.4236/jis.2025.162015
53
Downloads
465
Views
Citations
Banning Smoking in Public Places under Ethiopian Legal Framework: Some Evidences from Hawassa City
(Articles)
Edilu Shona
Beijing Law Review
Vol.8 No.4
,December 27, 2017
DOI:
10.4236/blr.2017.84029
1,620
Downloads
4,807
Views
Citations
A Case Study on Security Recommendations for a Global Organization
(Articles)
Devashi Tandon
,
Pratyush Parimal
Journal of Computer and Communications
Vol.6 No.3
,March 28, 2018
DOI:
10.4236/jcc.2018.63010
902
Downloads
5,680
Views
Citations
AI-Powered Threat Detection in Online Communities: A Multi-Modal Deep Learning Approach
(Articles)
Ravi Teja Potla
Journal of Computer and Communications
Vol.13 No.2
,February 26, 2025
DOI:
10.4236/jcc.2025.132010
96
Downloads
628
Views
Citations
Cyberspace Security Using Adversarial Learning and Conformal Prediction
(Articles)
Harry Wechsler
Intelligent Information Management
Vol.7 No.4
,July 10, 2015
DOI:
10.4236/iim.2015.74016
7,068
Downloads
8,675
Views
Citations
Information Security in the Cloud: Emerging Trends and Challenges
(Articles)
Keerthana Chitreddy
,
Andrew Mikhl Anthony
,
Chinna Manikanta Bandaru
,
Olatunde Abiona
Int'l J. of Communications, Network and System Sciences
Vol.17 No.5
,May 31, 2024
DOI:
10.4236/ijcns.2024.175005
162
Downloads
979
Views
Citations
Rethinking Healthy Aging: The Self-Perception of African American Older Adults
(Articles)
Monique Ejim
,
Crystal Neal
,
Kathryn Miller
Open Journal of Social Sciences
Vol.13 No.1
,January 23, 2025
DOI:
10.4236/jss.2025.131018
68
Downloads
552
Views
Citations
This article belongs to the Special Issue on
Social, Psychological and Behavioral Sciences
Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises
(Articles)
Meysam Tahmasebi
Journal of Information Security
Vol.15 No.2
,February 29, 2024
DOI:
10.4236/jis.2024.152008
506
Downloads
2,597
Views
Citations
This article belongs to the Special Issue on
Cybersecurity and Information Security
<
...
2
3
4
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top