Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Reviewing Stability Criteria for Positive Homogeneous Systems and Adding One for Discrete-Time Cases with Degree Less Than One
(Articles)
Nguyen Quang Tuan
Circuits and Systems
Vol.15 No.1
,January 15, 2024
DOI:
10.4236/cs.2024.151001
188
Downloads
931
Views
Citations
The Analysis and Amendment of Security System in 3G
(Articles)
Min ZHAO
,
Ling SHI
Intelligent Information Management
Vol.1 No.1
,July 31, 2009
DOI:
10.4236/iim.2009.11001
7,672
Downloads
11,746
Views
Citations
Investigations on Simultaneously Secure IBE Scheme and Security Proofs under RO and Non-RO Model
(Articles)
Zhengtao JIANG
,
Yongbin WANG
,
Yong WANG
,
Yumin WANG
Intelligent Information Management
Vol.1 No.1
,July 31, 2009
DOI:
10.4236/iim.2009.11002
4,755
Downloads
8,296
Views
Citations
A Conceptual Framework for Threat Assessment Based on Organization’s Information Security Policy
(Articles)
Joseph Elias Mbowe
,
Irina Zlotnikova
,
Simon S. Msanjila
,
George S. Oreku
Journal of Information Security
Vol.5 No.4
,September 29, 2014
DOI:
10.4236/jis.2014.54016
6,701
Downloads
9,994
Views
Citations
Reactive Data Security Approach and Review of Data Security Techniques in Wireless Networks
(Articles)
Arif Sari
,
Mehmet Karay
Int'l J. of Communications, Network and System Sciences
Vol.8 No.13
,December 30, 2015
DOI:
10.4236/ijcns.2015.813051
3,947
Downloads
4,902
Views
Citations
Identification and Validation of Social Media Socio-Technical Information Security Factors with Respect to Usable-Security Principles
(Articles)
Joe Mutebi
,
Margaret Kareyo
,
Umezuruike Chinecherem
,
Akampurira Paul
Journal of Computer and Communications
Vol.10 No.8
,August 17, 2022
DOI:
10.4236/jcc.2022.108004
185
Downloads
808
Views
Citations
Classification of Big Data Security Based on Ontology Web Language
(Articles)
Alsadig Mohammed Adam Abdallah
,
Amir Mohamed Talib
Journal of Information Security
Vol.14 No.1
,January 31, 2023
DOI:
10.4236/jis.2023.141006
164
Downloads
703
Views
Citations
Comparative Balancing of Non-Redox and Redox Electrolytic Systems and Its Consequences
(Articles)
Anna Maria Michałowska-Kaczmarczyk
,
Tadeusz Michałowski
American Journal of Analytical Chemistry
Vol.4 No.10A
,October 25, 2013
DOI:
10.4236/ajac.2013.410A1006
3,425
Downloads
5,811
Views
Citations
This article belongs to the Special Issue on
Redox Reaction
An Approach for Personalized Social Matching Systems by Using Ant Colony
(Articles)
Luziane Ferreira de Mendonça
Social Networking
Vol.3 No.2
,February 27, 2014
DOI:
10.4236/sn.2014.32013
6,585
Downloads
8,137
Views
Citations
Investigative Report for Economists; “Prediction of Stock Market” and Functional “Invisible Hand” and “Law of Supply and Demand”
(Articles)
Deoksoo Cha
Theoretical Economics Letters
Vol.6 No.6
,December 12, 2016
DOI:
10.4236/tel.2016.66120
1,274
Downloads
2,004
Views
Citations
The Evolving Structure of Multi-Hospital Systems in the US: Focus on California
(Articles)
Glenn Melnick
,
June F. O’Leary
Health
Vol.13 No.7
,July 20, 2021
DOI:
10.4236/health.2021.137058
253
Downloads
1,436
Views
Citations
Self-repairing material systems―a dream or a reality?
(Articles)
Hartmut Fischer
Natural Science
Vol.2 No.8
,August 25, 2010
DOI:
10.4236/ns.2010.28110
12,084
Downloads
27,348
Views
Citations
Editorial Intelligent Learning Systems in Banking and Finance
(Articles)
Vincenzo Pacelli
Journal of Intelligent Learning Systems and Applications
Vol.3 No.2
,April 8, 2011
DOI:
10.4236/jilsa.2011.32007
5,039
Downloads
9,757
Views
Citations
This article belongs to the Special Issue on
Intelligent Learning Systems in Banking and Finance
Healthcare intelligence risk detection systems
(Articles)
Reza Safdari
,
Jebraeil Farzi
,
Marjan Ghazisaeidi
,
Mahboobeh Mirzaee
,
Azadeh Goodini
Open Journal of Preventive Medicine
Vol.3 No.8
,November 5, 2013
DOI:
10.4236/ojpm.2013.38062
3,477
Downloads
5,398
Views
Citations
Gedanken Experiment for Looking at δg
tt
for Initial Expansion of the Universe and Influence on HUP via Dynamical Systems, with Positive Pre-Planckian Acceleration
(Articles)
Andrew Walcott Beckwith
Journal of High Energy Physics, Gravitation and Cosmology
Vol.2 No.4
,August 25, 2016
DOI:
10.4236/jhepgc.2016.24046
1,308
Downloads
1,925
Views
Citations
Nanotechnology in Diagnosis: A Review
(Articles)
Tenderwealth Clement Jackson
,
Bernard Opatimidi Patani
,
Daniel Effiong Ekpa
Advances in Nanoparticles
Vol.6 No.3
,August 3, 2017
DOI:
10.4236/anp.2017.63008
4,070
Downloads
17,676
Views
Citations
The Intelligent Software Systems: The Practical Implementation of Software Security Vulnerabilities Detection Modeling
(Articles)
Musoni Wilson
,
Umutesi Liliane
,
Mbanzabugabo Jean Baptiste
Open Access Library Journal
Vol.7 No.11
,November 16, 2020
DOI:
10.4236/oalib.1106831
174
Downloads
809
Views
Citations
LDAP Injection Techniques
(Articles)
Jose Maria ALONSO
,
Antonio GUZMAN
,
Marta BELTRAN
,
Rodolfo BORDON
Wireless Sensor Network
Vol.1 No.4
,November 20, 2009
DOI:
10.4236/wsn.2009.14030
11,035
Downloads
17,798
Views
Citations
A Privacy Enabled Fast Dynamic Authentication and Authorization for B3G/4G Mobility
(Articles)
Zhikui CHEN
,
Song YANG
Communications and Network
Vol.1 No.2
,December 1, 2009
DOI:
10.4236/cn.2009.12012
6,561
Downloads
10,292
Views
Citations
Research on the Security Monitoring of the Amusement Ride of Tourist Sites Based on RFID
(Articles)
Jian SHANGGUAN
,
Yingchun LV
,
Mu ZHANG
Wireless Sensor Network
Vol.2 No.1
,January 13, 2010
DOI:
10.4236/wsn.2010.21012
6,804
Downloads
10,998
Views
Citations
<
...
5
6
7
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top