Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Governing the “Digital Shadows”: Public Policy and Information Communication Technology (ICT) Acquisition and Utilization in Africa
(Articles)
Ebenezer Olatunji Olugbenga
Open Access Library Journal
Vol.4 No.4
,April 28, 2017
DOI:
10.4236/oalib.1103564
1,576
Downloads
4,025
Views
Citations
Modeling Abstraction Hierarchy Levels of the Cyber Attacks Using Random Process
(Articles)
Gilles Durrieu
,
Emmanuel Frenod
,
Thierry Morineau
,
Thong Quoc Nguyen
Open Journal of Statistics
Vol.7 No.3
,June 28, 2017
DOI:
10.4236/ojs.2017.73035
1,277
Downloads
2,656
Views
Citations
Do ICMP Security Attacks Have Same Impact on Servers?
(Articles)
Ganesh Reddy Gunnam
,
Sanjeev Kumar
Journal of Information Security
Vol.8 No.3
,July 25, 2017
DOI:
10.4236/jis.2017.83018
1,616
Downloads
4,624
Views
Citations
A Security Architecture for SCADA Systems
(Articles)
Arun Velagapalli
,
Mahalingam Ramkumar
Journal of Information Security
Vol.9 No.1
,January 23, 2018
DOI:
10.4236/jis.2018.91009
1,441
Downloads
3,962
Views
Citations
A System Status Definition to Improve Behavior Description in Specifications Based on Constructal Law
(Articles)
Luciano Ondir Freire
,
Dr. Delvonei Alves de Andrade
,
Daniel Monterrain
Open Journal of Applied Sciences
Vol.8 No.8
,August 8, 2018
DOI:
10.4236/ojapps.2018.88024
748
Downloads
2,950
Views
Citations
Cybersecurity for Allied Future Submarines
(Articles)
Keith F. Joiner
,
Simon Reay Atkinson
,
Pete Christensen
,
Elena Sitnikova
World Journal of Engineering and Technology
Vol.6 No.4
,September 14, 2018
DOI:
10.4236/wjet.2018.64045
1,604
Downloads
3,948
Views
Citations
This article belongs to the Special Issue on
Marine Engineering
Climate Change, Environmental Threats and Cyber-Threats to Critical Infrastructures in Multi-Regulatory Sustainable Global Approach with Sweden as an Example
(Articles)
Sandra Cassotta
,
Maria Pettersson
Beijing Law Review
Vol.10 No.3
,June 27, 2019
DOI:
10.4236/blr.2019.103035
1,301
Downloads
5,054
Views
Citations
Pricing Cyber Security Insurance
(Articles)
Zhaoxin Lin
,
Travis R. A. Sapp
,
Rahul Parsa
,
Jackie Rees Ulmer
,
Chengxin Cao
Journal of Mathematical Finance
Vol.12 No.1
,January 18, 2022
DOI:
10.4236/jmf.2022.121003
490
Downloads
3,120
Views
Citations
A DoS Attacks Detection Aglorithm Based on Snort-BASE for Robotic Arm Control Systems
(Articles)
Nana Li
,
Yong Wang
,
Pengfei Shen
,
Shuangfei Li
,
Lin Zhou
Journal of Computer and Communications
Vol.10 No.4
,April 7, 2022
DOI:
10.4236/jcc.2022.104001
207
Downloads
883
Views
Citations
Identification and Validation of Social Media Socio-Technical Information Security Factors with Respect to Usable-Security Principles
(Articles)
Joe Mutebi
,
Margaret Kareyo
,
Umezuruike Chinecherem
,
Akampurira Paul
Journal of Computer and Communications
Vol.10 No.8
,August 17, 2022
DOI:
10.4236/jcc.2022.108004
259
Downloads
1,084
Views
Citations
Cyber-Security of Smart Grids: Attacks, Detection, Countermeasure Techniques, and Future Directions
(Articles)
Tala Talaei Khoei
,
Hadjar Ould Slimane
,
Naima Kaabouch
Communications and Network
Vol.14 No.4
,November 24, 2022
DOI:
10.4236/cn.2022.144009
1,063
Downloads
8,257
Views
Citations
Appraising the Manifestation of Optimism Bias and Its Impact on Human Perception of Cyber Security: A Meta Analysis
(Articles)
Khaled M. Alnifie
,
Charles Kim
Journal of Information Security
Vol.14 No.2
,February 23, 2023
DOI:
10.4236/jis.2023.142007
663
Downloads
3,146
Views
Citations
Study the Effectiveness of ISO 27001 to Mitigate the Cyber Security Threats in the Egyptian Downstream Oil and Gas Industry
(Articles)
Mohamed Shohoud
Journal of Information Security
Vol.14 No.2
,April 28, 2023
DOI:
10.4236/jis.2023.142010
582
Downloads
2,402
Views
Citations
Investigating How Parental Perceptions of Cybersecurity Influence Children’s Safety in the Cyber World: A Case Study of Saudi Arabia
(Articles)
Tariq Saeed Mian
,
Eman M. Alatawi
Intelligent Information Management
Vol.15 No.5
,September 11, 2023
DOI:
10.4236/iim.2023.155017
374
Downloads
1,815
Views
Citations
Enhancing Security in QR Code Technology Using AI: Exploration and Mitigation Strategies
(Articles)
Saranya Vaithilingam
,
Santhosh Aradhya Mohan Shankar
International Journal of Intelligence Science
Vol.14 No.2
,March 26, 2024
DOI:
10.4236/ijis.2024.142003
302
Downloads
1,982
Views
Citations
Exploring the Characteristics of Data Breaches: A Descriptive Analytic Study
(Articles)
Dominik Molitor
,
Aditya Saharia
,
Viju Raghupathi
,
Wullianallur Raghupathi
Journal of Information Security
Vol.15 No.2
,April 2, 2024
DOI:
10.4236/jis.2024.152011
371
Downloads
2,784
Views
Citations
A Study on the Challenges of Human-Centric Cyber-Security and the Guarantee of Information Quality
(Articles)
Mohammed Hussein Kurdi
,
Mohsen Denden
,
David Paul
Journal of Information Security
Vol.15 No.2
,April 24, 2024
DOI:
10.4236/jis.2024.152013
331
Downloads
1,637
Views
Citations
The Congolese Legislation Readiness against AI Development and Foreign Attacks and Perspective of International Cooperation
(Articles)
Jordy Cloud Ntsoumou Mboulou
Open Access Library Journal
Vol.11 No.5
,May 31, 2024
DOI:
10.4236/oalib.1111453
49
Downloads
658
Views
Citations
Machine Learning Models for Heterogenous Network Security Anomaly Detection
(Articles)
Mercy Diligence Ogah
,
Joe Essien
,
Martin Ogharandukun
,
Monday Abdullahi
Journal of Computer and Communications
Vol.12 No.6
,June 25, 2024
DOI:
10.4236/jcc.2024.126004
128
Downloads
711
Views
Citations
The Interplay of Social Behaviour and Demographics in Cyber Scam Susceptibility: A Singapore Study
(Articles)
Johan H. M. Buse
,
Christopher Fong
,
Shilpi Tripathi
Open Journal of Business and Management
Vol.12 No.5
,August 20, 2024
DOI:
10.4236/ojbm.2024.125151
214
Downloads
1,785
Views
Citations
<
...
3
4
5
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top