Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
The Relationship between Cyberbullying Victimization and Depression: The Moderating Effects of Gender and Age
(Articles)
Jamal Almenayes
Social Networking
Vol.6 No.3
,June 8, 2017
DOI:
10.4236/sn.2017.63014
3,397
Downloads
8,648
Views
Citations
Quantitative Evaluation of Cyber-Attacks on a Hypothetical School Computer Network
(Articles)
Akinjide A. Akinola
,
Adeyemi A. Adekoya
,
Ayoade O. Kuye
,
Abiodun Ayodeji
Journal of Information Security
Vol.10 No.3
,June 17, 2019
DOI:
10.4236/jis.2019.103006
734
Downloads
2,378
Views
Citations
Forecasting the Impact of Information Security Breaches on Stock Market Returns and VaR Backtest
(Articles)
Ilaria Colivicchi
,
Riccardo Vignaroli
Journal of Mathematical Finance
Vol.9 No.3
,August 21, 2019
DOI:
10.4236/jmf.2019.93024
783
Downloads
2,357
Views
Citations
The Impact of Contemporary Communication Technology on Undergraduate Students’ Dating Violence Episodes: An Exploration of Routine Activity Theory
(Articles)
Nancy Mayoyo
,
Jackton Ogeno
,
Francis Likoye
Open Journal of Social Sciences
Vol.8 No.9
,September 17, 2020
DOI:
10.4236/jss.2020.89011
398
Downloads
1,528
Views
Citations
Public Key Infrastructure: An Enhanced Validation Framework
(Articles)
Paul Danquah
,
Henoch Kwabena-Adade
Journal of Information Security
Vol.11 No.4
,September 25, 2020
DOI:
10.4236/jis.2020.114016
895
Downloads
4,976
Views
Citations
Cyberattack and the Use of Force in International Law
(Articles)
Joseph N. Madubuike-Ekwe
Beijing Law Review
Vol.12 No.2
,June 22, 2021
DOI:
10.4236/blr.2021.122034
1,033
Downloads
11,695
Views
Citations
Hacked by Bits and Pieces: What Can We Learn from an Example of Corporate Espionage?
(Articles)
Jack Schafer
,
Marvin Karlins
Journal of Information Security
Vol.12 No.3
,July 9, 2021
DOI:
10.4236/jis.2021.123012
280
Downloads
1,480
Views
Citations
Knowledge Management Strategy for Handling Cyber Attacks in E-Commerce with Computer Security Incident Response Team (CSIRT)
(Articles)
Fauziyah Fauziyah
,
Zhaosun Wang
,
Gabriel Joy
Journal of Information Security
Vol.13 No.4
,September 23, 2022
DOI:
10.4236/jis.2022.134016
361
Downloads
1,990
Views
Citations
Enhancing Police Officers’ Cybercrime Investigation Skills Using a Checklist Tool
(Articles)
Abdelkhalek Ibrahim Alastal
,
Ashraf Hassan Shaqfa
Journal of Data Analysis and Information Processing
Vol.11 No.2
,April 4, 2023
DOI:
10.4236/jdaip.2023.112008
239
Downloads
2,263
Views
Citations
The Knowledge of Cyber-Security Vulnerabilities in an Institution of Higher and University Education. A Case of ISP-Bukavu (Institut Supérieur Pédagogique de Bukavu) (TTC = Teachers’ Training College)
(Articles)
Dominique Wasso Kiseki
,
Vincent Havyarimana
,
Therence Niyonsaba
,
Désiré Lumonge Zabagunda
,
Walumbuka Ilundu Wail
,
Thabo Semong
Journal of Computer and Communications
Vol.11 No.4
,April 24, 2023
DOI:
10.4236/jcc.2023.114002
98
Downloads
511
Views
Citations
Unveiling the Unseen Wounds—A Qualitative Exploration of the Psychological Impact and Effects of Cyber Scams in Singapore
(Articles)
Johan H. M. Buse
,
Jonathan Ee
,
Shilpi Tripathi
Psychology
Vol.14 No.11
,November 30, 2023
DOI:
10.4236/psych.2023.1411101
167
Downloads
1,194
Views
Citations
Cyber Deception Using NLP
(Articles)
Igor Godefroy Kouam Kamdem
,
Marcellin Nkenlifack
Journal of Information Security
Vol.15 No.2
,April 30, 2024
DOI:
10.4236/jis.2024.152016
34
Downloads
162
Views
Citations
Systems Biology: The take, input, vision, concerns and hopes
(Articles)
Graeme Tucker
Journal of Biomedical Science and Engineering
Vol.2 No.2
,April 2, 2009
DOI:
10.4236/jbise.2009.22014
4,741
Downloads
8,907
Views
Citations
Near-Infrared Transit Photometry of Extra-Solar Planet HAT-P-54b
(Articles)
Haruka Tabata
,
Yoichi Itoh
International Journal of Astronomy and Astrophysics
Vol.10 No.2
,May 11, 2020
DOI:
10.4236/ijaa.2020.102007
542
Downloads
1,247
Views
Citations
Digital Forensics and Cyber Crime Datamining
(Articles)
K. K. Sindhu
,
B. B. Meshram
Journal of Information Security
Vol.3 No.3
,July 25, 2012
DOI:
10.4236/jis.2012.33024
24,760
Downloads
44,279
Views
Citations
Network Intrusion Detection and Visualization Using Aggregations in a Cyber Security Data Warehouse
(Articles)
Bogdan Denny Czejdo
,
Erik M. Ferragut
,
John R. Goodall
,
Jason Laska
Int'l J. of Communications, Network and System Sciences
Vol.5 No.9A
,September 18, 2012
DOI:
10.4236/ijcns.2012.529069
4,769
Downloads
8,574
Views
Citations
This article belongs to the Special Issue on
Models and Algorithms for Applications
A Study on Quantitative Methodology to Assess Cyber Security Risk of Smart Grid
(Articles)
Pil Sung Woo
,
Byung-Hyun Ko
,
Dong-Joo Kang
,
Balho H. Kim
Energy and Power Engineering
Vol.5 No.4B
,November 18, 2013
DOI:
10.4236/epe.2013.54B249
5,358
Downloads
8,150
Views
Citations
Evaluation of Microsoft Windows Servers 2008 & 2003 against Cyber Attacks
(Articles)
Sanjeev Kumar
,
Senior Member
,
Raja Sekhar Reddy Gade
Journal of Information Security
Vol.6 No.2
,April 28, 2015
DOI:
10.4236/jis.2015.62016
5,337
Downloads
6,645
Views
Citations
A Systematic Approach for Cyber Security in Vehicular Networks
(Articles)
Farhan Ahmad
,
Asma Adnane
,
Virginia N. L. Franqueira
Journal of Computer and Communications
Vol.4 No.16
,December 29, 2016
DOI:
10.4236/jcc.2016.416004
2,127
Downloads
5,886
Views
Citations
This article belongs to the Special Issue on
Vehicular Communications and Networks
Governing the “Digital Shadows”: Public Policy and Information Communication Technology (ICT) Acquisition and Utilization in Africa
(Articles)
Ebenezer Olatunji Olugbenga
Open Access Library Journal
Vol.4 No.4
,April 28, 2017
DOI:
10.4236/oalib.1103564
1,493
Downloads
3,753
Views
Citations
<
...
2
3
4
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top