Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Security Regulations in Mexican Renewable Energies: Case of Geothermal Projects
(Articles)
Alfonso Aragón-Aguilar
,
Georgina Izquierdo-Montalvo
,
Víctor Arellano-Gómez
Smart Grid and Renewable Energy
Vol.4 No.6A
,September 3, 2013
DOI:
10.4236/sgre.2013.46A003
31,108
Downloads
39,553
Views
Citations
This article belongs to the Special Issue on
Smart Grid Security
Computer Assisted Alerts Using Mental Model Approach for Customer Service Improvement
(Articles)
Abid Ghaffar
,
Mohamed Ridza Wahiddin
,
Asadullah Shaikh
Journal of Software Engineering and Applications
Vol.6 No.5B
,October 12, 2013
DOI:
10.4236/jsea.2013.65B005
3,681
Downloads
5,270
Views
Citations
Integrated Water Resources Management (IWRM) Impacts in South West Coastal Zone of Bangladesh and Fact-Finding on Tidal River Management (TRM)
(Articles)
Fahad Khan Khadim
,
Kanak Kanti Kar
,
Pronab Kumar Halder
,
Md. Atiqur Rahman
,
A.K.M. Mostafa Morshed
Journal of Water Resource and Protection
Vol.5 No.10
,October 21, 2013
DOI:
10.4236/jwarp.2013.510098
5,796
Downloads
12,225
Views
Citations
Study on Approach of Static Security Assessment Accounting for Electro-thermal Coupling
(Articles)
Mengxia Wang
,
Hongbin Sun
,
Jinxin Huang
,
Qiang Zhang
Energy and Power Engineering
Vol.5 No.4B
,October 31, 2013
DOI:
10.4236/epe.2013.54B136
4,395
Downloads
5,582
Views
Citations
Artificial Noise Based Security Algorithm for Multi-User MIMO System
(Articles)
Jian-hua Peng
,
Kai-zhi Huang
,
Jiang Ji
Communications and Network
Vol.5 No.3C
,November 8, 2013
DOI:
10.4236/cn.2013.53B2037
5,851
Downloads
7,613
Views
Citations
Research on Security Assessment Index System for Operating Reserve in Large Interconnected Power Grid
(Articles)
Mingsong Liu
,
Huadong Sun
,
Jian He
,
Hengxu Zhang
,
Jun Yi
,
Jian Zhang
Energy and Power Engineering
Vol.5 No.4B
,November 11, 2013
DOI:
10.4236/epe.2013.54B151
4,968
Downloads
6,194
Views
Citations
Study on the Real-Time Security Evaluation for the Train Service Status Using Safety Region Estimation
(Articles)
Guiling Liao
,
Yong Qin
,
Xiaoqing Cheng
,
Lisha Pan
,
Lin He
,
Shan Yu
,
Yuan Zhang
Journal of Intelligent Learning Systems and Applications
Vol.5 No.4
,November 12, 2013
DOI:
10.4236/jilsa.2013.54025
4,171
Downloads
5,959
Views
Citations
This article belongs to the Special Issue on
Intelligent Information Processing in Metro Train Safety-Critical System and Application
A Study on Quantitative Methodology to Assess Cyber Security Risk of Smart Grid
(Articles)
Pil Sung Woo
,
Byung-Hyun Ko
,
Dong-Joo Kang
,
Balho H. Kim
Energy and Power Engineering
Vol.5 No.4B
,November 18, 2013
DOI:
10.4236/epe.2013.54B249
5,349
Downloads
8,124
Views
Citations
Evolution of Slum Redevelopment Policy
(Articles)
Deepika Andavarapu
,
David J. Edelman
Current Urban Studies
Vol.1 No.4
,December 24, 2013
DOI:
10.4236/cus.2013.14021
7,462
Downloads
14,118
Views
Citations
The Current and Future of Software Securities and Vulnerabilities
(Articles)
Cuixue Zhang
,
Meijiao Zhou
,
Yalian Xie
,
Xiangli Li
Journal of Software Engineering and Applications
Vol.7 No.1
,December 26, 2013
DOI:
10.4236/jsea.2014.71001
3,551
Downloads
6,781
Views
Citations
Structured Equation Model of Tuberculosis Incidence Based on Its Social Determinants and Risk Factors in Bandar Lampung, Indonesia
(Articles)
Dyah Wulan Sumekar Rengganis Wardani
,
Lutfan Lazuardi
,
Yodi Mahendradhata
,
Hari Kusnanto
Open Journal of Epidemiology
Vol.4 No.2
,April 29, 2014
DOI:
10.4236/ojepi.2014.42013
4,490
Downloads
7,650
Views
Citations
Does Reactive Adaptation Exist? Using the Ecosystem Service Governance Approach to Evaluate Post-Drought Rural Food Security in Kenya
(Articles)
Grace W. Ngaruiya
Natural Resources
Vol.5 No.8
,June 24, 2014
DOI:
10.4236/nr.2014.58037
3,911
Downloads
5,603
Views
Citations
This article belongs to the Special Issue on
Resource Security
Urgency and Necessity on Adjustment of China’s Current Agricultural Structure Based on the Stability and Developmental Trend Analyses of Pork Yield in China
(Articles)
Cangyu Jin
,
Huilong Lin
Journal of Agricultural Chemistry and Environment
Vol.3 No.3B
,July 14, 2014
DOI:
10.4236/jacen.2014.33B003
2,170
Downloads
3,031
Views
Citations
Two-Tier Hierarchical Cluster Based Topology in Wireless Sensor Networks for Contention Based Protocol Suite
(Articles)
Arif Sari
Int'l J. of Communications, Network and System Sciences
Vol.8 No.3
,March 20, 2015
DOI:
10.4236/ijcns.2015.83004
3,930
Downloads
5,820
Views
Citations
Generational Responses to Job Security, Traditional Class Division, and the American Dream
(Articles)
Yakasah Wehyee
Open Journal of Political Science
Vol.5 No.3
,April 9, 2015
DOI:
10.4236/ojps.2015.53021
3,404
Downloads
4,453
Views
Citations
A Review of Anomaly Detection Systems in Cloud Networks and Survey of Cloud Security Measures in Cloud Storage Applications
(Review)
Arif Sari
Journal of Information Security
Vol.6 No.2
,April 23, 2015
DOI:
10.4236/jis.2015.62015
10,662
Downloads
16,018
Views
Citations
Improving Knowledge Based Spam Detection Methods: The Effect of Malicious Related Features in Imbalance Data Distribution
(Articles)
Jafar Alqatawna
,
Hossam Faris
,
Khalid Jaradat
,
Malek Al-Zewairi
,
Omar Adwan
Int'l J. of Communications, Network and System Sciences
Vol.8 No.5
,April 30, 2015
DOI:
10.4236/ijcns.2015.85014
4,143
Downloads
5,797
Views
Citations
Comparison of Feature Reduction Techniques for the Binominal Classification of Network Traffic
(Articles)
Adel Ammar
Journal of Data Analysis and Information Processing
Vol.3 No.2
,May 8, 2015
DOI:
10.4236/jdaip.2015.32002
4,858
Downloads
5,912
Views
Citations
The Objective Function Value Optimization of Cloud Computing Resources Security Allocation of Artificial Firefly Algorithm
(Articles)
Xiaoxi Hu
Open Journal of Optimization
Vol.4 No.2
,May 15, 2015
DOI:
10.4236/ojop.2015.42005
3,419
Downloads
4,381
Views
Citations
A Way to Set up Security Layer over Internet
(Articles)
Xiangyi Hu
,
Guifen Zhao
,
Guanning Xu
Journal of Computer and Communications
Vol.3 No.5
,May 25, 2015
DOI:
10.4236/jcc.2015.35022
2,518
Downloads
3,082
Views
Citations
<
...
27
28
29
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top