Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Defense against Membership Inference Attack Applying Domain Adaptation with Addictive Noise
(Articles)
Hongwei Huang
Journal of Computer and Communications
Vol.9 No.5
,May 28, 2021
DOI:
10.4236/jcc.2021.95007
361
Downloads
2,065
Views
Citations
A Dual Detection Method for Siemens Inverter Motor Modbus RTU Attack
(Articles)
Yong Wang
,
Xiunan Feng
,
Yixuan Chen
,
Lin Zhou
,
Yiwen Zhu
,
Jinyuan Wu
Journal of Computer and Communications
Vol.9 No.7
,July 30, 2021
DOI:
10.4236/jcc.2021.97008
212
Downloads
896
Views
Citations
Cybersecurity Attacks on Academic Data and Personal Information and the Mediating Role of Education and Employment
(Articles)
Ahmad Reda Alzighaibi
Journal of Computer and Communications
Vol.9 No.11
,November 17, 2021
DOI:
10.4236/jcc.2021.911006
271
Downloads
2,005
Views
Citations
AES RSA-SM2 Algorithm against Man-in-the-Middle Attack in IEC 60870-5-104 Protocol
(Articles)
Shan Shi
,
Yong Wang
,
Cunming Zou
,
Yingjie Tian
Journal of Computer and Communications
Vol.10 No.1
,January 13, 2022
DOI:
10.4236/jcc.2022.101002
222
Downloads
1,751
Views
Citations
Bio-Efficacy of Plant-Derived Pesticides against Fall Armyworm (
Spodoptera frugiperda
) and Their Interactive Effects on Maize Agronomic Performance under Field Conditions
(Articles)
Junias Sogra
,
Lux Jimmy
,
Kenndy Kamik
,
Alex Galus
Agricultural Sciences
Vol.14 No.11
,November 10, 2023
DOI:
10.4236/as.2023.1411099
124
Downloads
747
Views
Citations
Black Box Adversarial Defense Based on Image Denoising and Pix2Pix
(Articles)
Zhenyong Rui
,
Xiugang Gong
Journal of Computer and Communications
Vol.11 No.12
,December 19, 2023
DOI:
10.4236/jcc.2023.1112002
95
Downloads
275
Views
Citations
GUARDIAN: A Multi-Tiered Defense Architecture for Thwarting Prompt Injection Attacks on LLMs
(Articles)
Parijat Rai
,
Saumil Sood
,
Vijay K. Madisetti
,
Arshdeep Bahga
Journal of Software Engineering and Applications
Vol.17 No.1
,January 23, 2024
DOI:
10.4236/jsea.2024.171003
220
Downloads
1,086
Views
Citations
Strawberry (
Fragaria
spp.): Cultivation, Production, Consumption, and Marketing in Cameroon
(Articles)
Djeuani Astride Carole
,
Moutamal Djem Rose Theophine Derricka
,
Mbouobda Hermann Désiré
,
Abdoulaye Souaibou
,
Meliga Essimi Célestine
,
Bouopda Nono Joël
,
Anafack Donasson Dioril
,
Messouang Bernard Didier
,
Ndongo III Boris Charlen
,
Kaffo Emmanuel
,
Kamga Fossouo Anselme Xavier
,
Tiki Antoine Marie Kevin
,
Nyimiebolo Bengono Audrey Maguy
,
Manuela Diobe Motassy
,
Adounga Samuel Brice
,
Amama Amama Benjamin
,
Nshanji Jones
,
Panguepko Fendju Christophe
,
Nzie Oussena
,
Nguetrapouna Issofa
,
Mpon Ikoyin Linda
,
NKouéya Christelle Ladone
,
Amang Amang A. Ziem
,
Niemenak Nicolas
Agricultural Sciences
Vol.15 No.4
,April 30, 2024
DOI:
10.4236/as.2024.154027
14
Downloads
67
Views
Citations
This article belongs to the Special Issue on
Research on Agronomy
The Role of AI in Cyber Security: Safeguarding Digital Identity
(Articles)
Mohammad Binhammad
,
Shaikha Alqaydi
,
Azzam Othman
,
Laila Hatim Abuljadayel
Journal of Information Security
Vol.15 No.2
,April 30, 2024
DOI:
10.4236/jis.2024.152015
29
Downloads
251
Views
Citations
The wonders of earthworms & its vermicompost in farm production: Charles Darwin’s ‘friends of farmers’, with potential to replace destructive chemical fertilizers
(Articles)
Rajiv K. Sinha
,
Sunita Agarwal
,
Krunal Chauhan
,
Dalsukh Valani
Agricultural Sciences
Vol.1 No.2
,September 2, 2010
DOI:
10.4236/as.2010.12011
17,127
Downloads
41,124
Views
Citations
Cryptanalysis of the Double-Moduli Cryptosystem
(Articles)
Sonia Mihaela Bogos
,
Serge Vaudenay
Int'l J. of Communications, Network and System Sciences
Vol.5 No.12
,December 20, 2012
DOI:
10.4236/ijcns.2012.512088
4,652
Downloads
6,859
Views
Citations
Non-Homogeneous Stochastic Model for Cyber Security Predictions
(Articles)
Pubudu Kalpani Kaluarachchi
,
Chris P. Tsokos
,
Sasith M. Rajasooriya
Journal of Information Security
Vol.9 No.1
,November 30, 2017
DOI:
10.4236/jis.2018.91002
901
Downloads
2,054
Views
Citations
Process of Security Assurance Technique for Application Functional Logic in E-Commerce Systems
(Articles)
Faisal Nabi
,
Jianming Yong
,
Xiaohui Tao
,
Muhammad Saqib Malhi
,
Muhammad Farhan
,
Umar Mahmood
Journal of Information Security
Vol.12 No.3
,May 14, 2021
DOI:
10.4236/jis.2021.123010
364
Downloads
1,868
Views
Citations
Dry Mix Slag—High-Calcium Fly Ash Binder. Part Two: Durability
(Articles)
Alexey Brykov
,
Mikhail Voronkov
Materials Sciences and Applications
Vol.15 No.3
,March 28, 2024
DOI:
10.4236/msa.2024.153004
38
Downloads
147
Views
Citations
Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises
(Articles)
Meysam Tahmasebi
Journal of Information Security
Vol.15 No.2
,February 29, 2024
DOI:
10.4236/jis.2024.152008
77
Downloads
358
Views
Citations
This article belongs to the Special Issue on
Cybersecurity and Information Security
The History, Trend, Types, and Mitigation of Distributed Denial of Service Attacks
(Articles)
Richard Kabanda
,
Bertrand Byera
,
Henrietta Emeka
,
Khaja Taiyab Mohiuddin
Journal of Information Security
Vol.14 No.4
,October 27, 2023
DOI:
10.4236/jis.2023.144026
143
Downloads
877
Views
Citations
<
...
4
5
6
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top