Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
A Resource Allocation Algorithm of Physical-Layer Security for OFDMA System under Non-ideal Condition
(Articles)
Xiao-min Ran
,
You-quan Mo
,
Yu-lei Chen
Communications and Network
Vol.5 No.3C
,November 8, 2013
DOI:
10.4236/cn.2013.53B2039
5,672
Downloads
6,948
Views
Citations
Influences of ±800 kV Yunnan-Guangdong HVDC System on Security and Stability of China Southern Power Grid
(Articles)
Baorong Zhou
,
Xiaoming Jin
,
Chao Hong
,
Pei Zhang
,
Zhigang Wu
Energy and Power Engineering
Vol.5 No.4B
,November 18, 2013
DOI:
10.4236/epe.2013.54B233
6,112
Downloads
7,668
Views
Citations
The SMS Chaum Mix
(Articles)
Matthew Rothmeyer
,
Dale R. Thompson
,
Matthew Moccaro
Journal of Computer and Communications
Vol.2 No.4
,March 18, 2014
DOI:
10.4236/jcc.2014.24010
5,149
Downloads
6,646
Views
Citations
China’s Food Security Evaluation Based on Factor Analysis
(Articles)
Jie Zou
,
Shiqin Guo
American Journal of Industrial and Business Management
Vol.5 No.6
,June 29, 2015
DOI:
10.4236/ajibm.2015.56044
3,366
Downloads
4,940
Views
Citations
General Study of Mobile Agent Based Intrusion Detection System (IDS)
(Articles)
Chandrakant Jain
,
Aumreesh Kumar Saxena
Journal of Computer and Communications
Vol.4 No.4
,April 13, 2016
DOI:
10.4236/jcc.2016.44008
2,970
Downloads
4,824
Views
Citations
Information Availability: An Insight into the Most Important Attribute of Information Security
(Articles)
Suhail Qadir
,
S. M. K. Quadri
Journal of Information Security
Vol.7 No.3
,April 15, 2016
DOI:
10.4236/jis.2016.73014
7,114
Downloads
20,427
Views
Citations
An Immunity-Based IOT Environment Security Situation Awareness Model
(Articles)
Yuanquan Shi
,
Tao Li
,
Renfa Li
,
Xiaoning Peng
,
Pengju Tang
Journal of Computer and Communications
Vol.5 No.7
,May 25, 2017
DOI:
10.4236/jcc.2017.57016
1,618
Downloads
2,953
Views
Citations
A Systems-Theoretic Security Model for Large Scale, Complex Systems Applied to the US Air Transportation System
(Articles)
Joseph R. Laracy
Int'l J. of Communications, Network and System Sciences
Vol.10 No.5
,May 31, 2017
DOI:
10.4236/ijcns.2017.105005
1,618
Downloads
3,280
Views
Citations
SecSPS: A Secure and Privacy-Preserving Framework for Smart Parking Systems
(Articles)
Ali Alqazzaz
,
Ibrahim Alrashdi
,
Esam Aloufi
,
Mohamed Zohdy
,
Hua Ming
Journal of Information Security
Vol.9 No.4
,October 15, 2018
DOI:
10.4236/jis.2018.94020
1,507
Downloads
4,056
Views
Citations
Concepts of Safety Critical Systems Unification Approach & Security Assurance Process
(Articles)
Faisal Nabi
,
Jianming Yong
,
Xiaohui Tao
,
Muhammad Saqib Malhi
,
Umar Mahmood
,
Usman Iqbal
Journal of Information Security
Vol.11 No.4
,October 27, 2020
DOI:
10.4236/jis.2020.114018
500
Downloads
1,951
Views
Citations
Study on the Use of Artificial Intelligence for Cybersecurity in Companies: Case of Companies in Burkina Faso
(Articles)
Yanogo Kiswendsida Jean Hermann
,
Ouedraogo Tounwendyam Frederic
Engineering
Vol.15 No.12
,December 11, 2023
DOI:
10.4236/eng.2023.1512056
99
Downloads
664
Views
Citations
The Research on Open Sharing of Higher Education Park Based on Intelligent Security System
(Articles)
Yan Dong
Journal of Computer and Communications
Vol.12 No.3
,March 21, 2024
DOI:
10.4236/jcc.2024.123007
37
Downloads
126
Views
Citations
Developing and Assessing Investment Options for Economic, Energy, and Climate Security Gains in the United States
(Articles)
Pat Delaquil
,
Gary Goldstein
,
Hal Nelson
,
Thomas Peterson
,
Stephen Roe
,
Adam Rose
,
Dan Wei
,
Jeffery Wennberg
Low Carbon Economy
Vol.5 No.2
,May 16, 2014
DOI:
10.4236/lce.2014.52004
3,951
Downloads
5,758
Views
Citations
Theorizing about Performance Evaluation of Health Systems from the Perspective of Civil Society
(Articles)
Leonardo Carnut
Open Journal of Social Sciences
Vol.8 No.6
,June 22, 2020
DOI:
10.4236/jss.2020.86030
501
Downloads
1,509
Views
Citations
Social Alienation and Its Repercussions on the Palestinian Social System: An Analytical Reading of the Dimension of the Palestinian Identity
(Articles)
Hasan Barmil
Open Journal of Social Sciences
Vol.11 No.10
,October 23, 2023
DOI:
10.4236/jss.2023.1110017
70
Downloads
373
Views
Citations
A Comparative Study of Related Technologies of Intrusion Detection & Prevention Systems
(Articles)
Indraneel Mukhopadhyay
,
Mohuya Chakraborty
,
Satyajit Chakrabarti
Journal of Information Security
Vol.2 No.1
,January 31, 2011
DOI:
10.4236/jis.2011.21003
10,012
Downloads
23,854
Views
Citations
Human Sensor Web Crowd Sourcing Security Incidents Management in Tanzania Context
(Articles)
Maduhu Mshangi
,
Edephonce Ngemera Nfuka
,
Camilius Sanga
Journal of Information Security
Vol.9 No.3
,July 10, 2018
DOI:
10.4236/jis.2018.93014
907
Downloads
2,197
Views
Citations
Structured Equation Model of Tuberculosis Incidence Based on Its Social Determinants and Risk Factors in Bandar Lampung, Indonesia
(Articles)
Dyah Wulan Sumekar Rengganis Wardani
,
Lutfan Lazuardi
,
Yodi Mahendradhata
,
Hari Kusnanto
Open Journal of Epidemiology
Vol.4 No.2
,April 29, 2014
DOI:
10.4236/ojepi.2014.42013
4,497
Downloads
7,670
Views
Citations
Does Reactive Adaptation Exist? Using the Ecosystem Service Governance Approach to Evaluate Post-Drought Rural Food Security in Kenya
(Articles)
Grace W. Ngaruiya
Natural Resources
Vol.5 No.8
,June 24, 2014
DOI:
10.4236/nr.2014.58037
3,915
Downloads
5,619
Views
Citations
This article belongs to the Special Issue on
Resource Security
Research on Financial Support Capacity of China’s Social Endowment Insurance by the Central and Local Governments—Analysis on the Statistic from 2009 to 2014
(Articles)
Tongbo Deng
Open Journal of Business and Management
Vol.4 No.4
,September 9, 2016
DOI:
10.4236/ojbm.2016.44067
1,985
Downloads
2,912
Views
Citations
<
...
2
3
4
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top