Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Domestic Cyberterrorism & Strategic Communications: Literature Review
(Articles)
Robb Shawe
,
Ian R. McAndrew
Journal of Information Security
Vol.14 No.4
,October 27, 2023
DOI:
10.4236/jis.2023.144027
166
Downloads
1,039
Views
Citations
Cybersecurity and Privacy Protection in Vehicular Networks (VANETs)
(Articles)
Bruno Macena
,
Celio Albuquerque
,
Raphael Machado
Advances in Internet of Things
Vol.13 No.4
,October 30, 2023
DOI:
10.4236/ait.2023.134006
162
Downloads
865
Views
Citations
GUARDIAN: A Multi-Tiered Defense Architecture for Thwarting Prompt Injection Attacks on LLMs
(Articles)
Parijat Rai
,
Saumil Sood
,
Vijay K. Madisetti
,
Arshdeep Bahga
Journal of Software Engineering and Applications
Vol.17 No.1
,January 23, 2024
DOI:
10.4236/jsea.2024.171003
271
Downloads
1,179
Views
Citations
The Evolution of Integrated Advance Persistent Threat and Its Defense Solutions: A Literature Review
(Articles)
Jun Zhang
,
Dan Tenney
Open Journal of Business and Management
Vol.12 No.1
,January 26, 2024
DOI:
10.4236/ojbm.2024.121021
140
Downloads
525
Views
Citations
ERAD: Enhanced Ransomware Attack Defense System for Healthcare Organizations
(Articles)
Xinyue Li
,
Vijay K. Madisetti
Journal of Software Engineering and Applications
Vol.17 No.5
,May 28, 2024
DOI:
10.4236/jsea.2024.175016
27
Downloads
125
Views
Citations
Task-Specific Feature Selection and Detection Algorithms for IoT-Based Networks
(Articles)
Yang Gyun Kim
,
Benito Mendoza
,
Ohbong Kwon
,
John Yoon
Journal of Computer and Communications
Vol.10 No.10
,October 27, 2022
DOI:
10.4236/jcc.2022.1010005
137
Downloads
688
Views
Citations
User Profile & Attitude Analysis Based on Unstructured Social Media and Online Activity
(Articles)
Yuting Tan
,
Vijay K. Madisetti
Journal of Software Engineering and Applications
Vol.17 No.6
,June 7, 2024
DOI:
10.4236/jsea.2024.176025
11
Downloads
49
Views
Citations
Sustainable Finance in Sustainable Health Care System
(Articles)
Anastasios Sepetis
Open Journal of Business and Management
Vol.8 No.1
,December 31, 2019
DOI:
10.4236/ojbm.2020.81016
2,944
Downloads
6,205
Views
Citations
This article belongs to the Special Issue on
Insurance and Finance
Accelerating Quantum Computing Readiness: Risk Management and Strategies for Sectors
(Articles)
Abdullah Ibrahim Salman Alsalman
Journal of Quantum Information Science
Vol.13 No.2
,June 13, 2023
DOI:
10.4236/jqis.2023.132003
495
Downloads
1,524
Views
Citations
The Investment Strategy and the Growth Policy of Greek Shipowners Revealed, 1946-2020
(Articles)
Alexandros M. Goulielmos
Modern Economy
Vol.11 No.11
,November 24, 2020
DOI:
10.4236/me.2020.1111125
457
Downloads
1,003
Views
Citations
Navigating the Quantum Threat Landscape: Addressing Classical Cybersecurity Challenges
(Articles)
Sabina Sokol
Journal of Quantum Information Science
Vol.13 No.2
,June 30, 2023
DOI:
10.4236/jqis.2023.132005
146
Downloads
659
Views
Citations
The History, Trend, Types, and Mitigation of Distributed Denial of Service Attacks
(Articles)
Richard Kabanda
,
Bertrand Byera
,
Henrietta Emeka
,
Khaja Taiyab Mohiuddin
Journal of Information Security
Vol.14 No.4
,October 27, 2023
DOI:
10.4236/jis.2023.144026
154
Downloads
889
Views
Citations
Cyber Resilience through Real-Time Threat Analysis in Information Security
(Articles)
Aparna Gadhi
,
Ragha Madhavi Gondu
,
Hitendra Chaudhary
,
Olatunde Abiona
Int'l J. of Communications, Network and System Sciences
Vol.17 No.4
,April 30, 2024
DOI:
10.4236/ijcns.2024.174004
44
Downloads
136
Views
Citations
Cyberattack Ramifications, The Hidden Cost of a Security Breach
(Articles)
Meysam Tahmasebi
Journal of Information Security
Vol.15 No.2
,February 29, 2024
DOI:
10.4236/jis.2024.152007
93
Downloads
466
Views
Citations
This article belongs to the Special Issue on
Cybersecurity and Information Security
<
...
3
4
5
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top