Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
A Tree Model for Identification of Threats as the First Stage of Risk Assessment in HIS
(Articles)
Ahmad Bakhtiyari Shahri
,
Zuraini Ismail
Journal of Information Security
Vol.3 No.2
,April 26, 2012
DOI:
10.4236/jis.2012.32020
8,288
Downloads
13,105
Views
Citations
User-Based Discrete-Time Queuing Analysis for Opportunistic Spectrum Access in Cognitive Radio Networks
(Articles)
Lei Zhang
,
Shanzhi Mou
,
Yu Wang
Advances in Pure Mathematics
Vol.9 No.1
,January 10, 2019
DOI:
10.4236/apm.2019.91001
663
Downloads
1,302
Views
Citations
The Redistribution Effect of Social Security System under Birth Control
(Articles)
Xueqin Duan
Open Journal of Social Sciences
Vol.6 No.3
,March 29, 2018
DOI:
10.4236/jss.2018.63014
621
Downloads
1,195
Views
Citations
Access Control for Manufacturing Process in Networked Manufacturing Environment
(Articles)
Ke Zhou
,
Min Lv
,
Gang Wang
,
Bingyin Ren
Journal of Service Science and Management
Vol.2 No.2
,June 17, 2009
DOI:
10.4236/jssm.2009.22014
5,343
Downloads
9,576
Views
Citations
A Survey on Real-Time MAC Protocols in Wireless Sensor Networks
(Articles)
Zheng Teng
,
Ki-Il Kim
Communications and Network
Vol.2 No.2
,May 31, 2010
DOI:
10.4236/cn.2010.22017
10,658
Downloads
22,387
Views
Citations
Design and Implementation of Multilevel Access Control in Synchronized Audio to Audio Steganography Using Symmetric Polynomial Scheme
(Articles)
Jeddy Nafeesa Begum
,
Krishnan Kumar
,
Vembu Sumathy
Journal of Information Security
Vol.1 No.1
,July 30, 2010
DOI:
10.4236/jis.2010.11004
4,768
Downloads
9,459
Views
Citations
Evaluation of Different Electronic Product Code Discovery Service Models
(Articles)
Su Mon Kywe
,
Jie Shi
,
Yingjiu Li
,
Raghuwanshi Kailash
Advances in Internet of Things
Vol.2 No.2
,April 24, 2012
DOI:
10.4236/ait.2012.22005
6,340
Downloads
14,147
Views
Citations
Performance Analysis of Unified Failure Model for Emerging WiMAX Networks
(Articles)
Rajesh Anbazhagan
,
Nakkeeran Rangaswamy
Wireless Engineering and Technology
Vol.3 No.2
,April 28, 2012
DOI:
10.4236/wet.2012.32011
6,096
Downloads
9,520
Views
Citations
Text Independent Automatic Speaker Recognition System Using Mel-Frequency Cepstrum Coefficient and Gaussian Mixture Models
(Articles)
Alfredo Maesa
,
Fabio Garzia
,
Michele Scarpiniti
,
Roberto Cusani
Journal of Information Security
Vol.3 No.4
,October 31, 2012
DOI:
10.4236/jis.2012.34041
7,478
Downloads
15,048
Views
Citations
Trust Management for Mobile Media Distribution
(Articles)
Raimund K. Ege
Engineering
Vol.5 No.12
,November 26, 2013
DOI:
10.4236/eng.2013.512112
3,749
Downloads
6,998
Views
Citations
Privacy Preserving Risk Mitigation Approach for Healthcare Domain
(Articles)
Shaden S. Al Aqeeli
,
Mznah A. Al-Rodhaan
,
Yuan Tian
,
Abdullah M. Al-Dhelaan
E-Health Telecommunication Systems and Networks
Vol.7 No.1
,March 29, 2018
DOI:
10.4236/etsn.2018.71001
1,059
Downloads
2,253
Views
Citations
Design of Assignment Based on Flipping Classroom—Taking the Access Control List of “Network Devices Configuration and Management” Course as an Example
(Articles)
Fang Hu
,
Shijun Che
Open Access Library Journal
Vol.6 No.8
,August 23, 2019
DOI:
10.4236/oalib.1105684
361
Downloads
1,160
Views
Citations
Cloud-Based Access Control to Preserve Privacy in Academic Web Application
(Articles)
Aljwhrh Almtrf
,
Mohamed Zohdy
Journal of Computer and Communications
Vol.7 No.12
,December 16, 2019
DOI:
10.4236/jcc.2019.712005
623
Downloads
1,620
Views
Citations
The Effective Enhancement of Power System Security by Flexible Transmission Line Impedance with Minimal Rescheduling of Generators
(Articles)
Karuppasamy Muthulakshmi
,
R.M. Sasiraja
,
Selvarajan Mukesh Muthu
Circuits and Systems
Vol.7 No.4
,April 28, 2016
DOI:
10.4236/cs.2016.74033
1,675
Downloads
2,371
Views
Citations
XML Attacks towards Different Targeted Operating Systems
(Articles)
Xueying Pan
,
Sharon Martin
Open Access Library Journal
Vol.11 No.3
,March 29, 2024
DOI:
10.4236/oalib.1111367
16
Downloads
176
Views
Citations
Immigrants’ Satisfaction from the National Health System in Greece: In the Quest of the Contributing Factors
(Articles)
Athanassios Vozikis
,
Maria Siganou
Health
Vol.7 No.11
,November 11, 2015
DOI:
10.4236/health.2015.711157
3,265
Downloads
4,453
Views
Citations
PAPR Influence Analysis in 8QAM-OFDM Optical Access Systems
(Articles)
Wenzhe Ma
,
Yufeng Shao
,
Zhifeng Wang
,
Changxiang Li
,
Yue Zhou
,
Junyi Zhou
Optics and Photonics Journal
Vol.6 No.8B
,August 25, 2016
DOI:
10.4236/opj.2016.68B021
1,304
Downloads
2,176
Views
Citations
Artificial Intelligence and Future Legal System: The Right to Access Electrical Energy of Artificial Intelligence
(Articles)
Hu Ren
Open Journal of Social Sciences
Vol.10 No.12
,November 23, 2022
DOI:
10.4236/jss.2022.1012030
91
Downloads
464
Views
Citations
Self Umpiring System for Security in Wireless Mobile Ad Hoc Network
(Articles)
Ayyaswamy Kathirvel
,
Rengaramanujam Srinivasan
Wireless Sensor Network
Vol.2 No.3
,April 12, 2010
DOI:
10.4236/wsn.2010.23036
5,085
Downloads
9,381
Views
Citations
A Personnel Detection Algorithm for an Intermodal Maritime Application of ITS Technology for Security at Port Facilities
(Articles)
Mouhammad K. Al Akkoumi
,
Robert C. Huck
,
James J. Sluss
Journal of Transportation Technologies
Vol.1 No.4
,October 24, 2011
DOI:
10.4236/jtts.2011.14016
4,882
Downloads
8,301
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top