Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Do ICMP Security Attacks Have Same Impact on Servers?
(Articles)
Ganesh Reddy Gunnam
,
Sanjeev Kumar
Journal of Information Security
Vol.8 No.3
,July 25, 2017
DOI:
10.4236/jis.2017.83018
1,513
Downloads
4,297
Views
Citations
A Security Architecture for SCADA Systems
(Articles)
Arun Velagapalli
,
Mahalingam Ramkumar
Journal of Information Security
Vol.9 No.1
,January 23, 2018
DOI:
10.4236/jis.2018.91009
1,325
Downloads
3,779
Views
Citations
A System Status Definition to Improve Behavior Description in Specifications Based on Constructal Law
(Articles)
Luciano Ondir Freire
,
Dr. Delvonei Alves de Andrade
,
Daniel Monterrain
Open Journal of Applied Sciences
Vol.8 No.8
,August 8, 2018
DOI:
10.4236/ojapps.2018.88024
672
Downloads
2,543
Views
Citations
Cybersecurity for Allied Future Submarines
(Articles)
Keith F. Joiner
,
Simon Reay Atkinson
,
Pete Christensen
,
Elena Sitnikova
World Journal of Engineering and Technology
Vol.6 No.4
,September 14, 2018
DOI:
10.4236/wjet.2018.64045
1,482
Downloads
3,496
Views
Citations
This article belongs to the Special Issue on
Marine Engineering
Climate Change, Environmental Threats and Cyber-Threats to Critical Infrastructures in Multi-Regulatory Sustainable Global Approach with Sweden as an Example
(Articles)
Sandra Cassotta
,
Maria Pettersson
Beijing Law Review
Vol.10 No.3
,June 27, 2019
DOI:
10.4236/blr.2019.103035
1,191
Downloads
4,447
Views
Citations
Improving General Undergraduate Cyber Security Education: A Responsibility for All Universities?
(Articles)
Stephanie M. Redman
,
Kate J. Yaxley
,
Keith F. Joiner
Creative Education
Vol.11 No.12
,December 9, 2020
DOI:
10.4236/ce.2020.1112187
595
Downloads
1,742
Views
Citations
A DoS Attacks Detection Aglorithm Based on Snort-BASE for Robotic Arm Control Systems
(Articles)
Nana Li
,
Yong Wang
,
Pengfei Shen
,
Shuangfei Li
,
Lin Zhou
Journal of Computer and Communications
Vol.10 No.4
,April 7, 2022
DOI:
10.4236/jcc.2022.104001
135
Downloads
598
Views
Citations
Identification and Validation of Social Media Socio-Technical Information Security Factors with Respect to Usable-Security Principles
(Articles)
Joe Mutebi
,
Margaret Kareyo
,
Umezuruike Chinecherem
,
Akampurira Paul
Journal of Computer and Communications
Vol.10 No.8
,August 17, 2022
DOI:
10.4236/jcc.2022.108004
173
Downloads
824
Views
Citations
Cyber-Security of Smart Grids: Attacks, Detection, Countermeasure Techniques, and Future Directions
(Articles)
Tala Talaei Khoei
,
Hadjar Ould Slimane
,
Naima Kaabouch
Communications and Network
Vol.14 No.4
,November 24, 2022
DOI:
10.4236/cn.2022.144009
688
Downloads
5,892
Views
Citations
Study the Effectiveness of ISO 27001 to Mitigate the Cyber Security Threats in the Egyptian Downstream Oil and Gas Industry
(Articles)
Mohamed Shohoud
Journal of Information Security
Vol.14 No.2
,April 28, 2023
DOI:
10.4236/jis.2023.142010
255
Downloads
1,414
Views
Citations
Investigating How Parental Perceptions of Cybersecurity Influence Children’s Safety in the Cyber World: A Case Study of Saudi Arabia
(Articles)
Tariq Saeed Mian
,
Eman M. Alatawi
Intelligent Information Management
Vol.15 No.5
,September 11, 2023
DOI:
10.4236/iim.2023.155017
118
Downloads
767
Views
Citations
Enhancing Security in QR Code Technology Using AI: Exploration and Mitigation Strategies
(Articles)
Saranya Vaithilingam
,
Santhosh Aradhya Mohan Shankar
International Journal of Intelligence Science
Vol.14 No.2
,March 26, 2024
DOI:
10.4236/ijis.2024.142003
42
Downloads
264
Views
Citations
Exploring the Characteristics of Data Breaches: A Descriptive Analytic Study
(Articles)
Dominik Molitor
,
Aditya Saharia
,
Viju Raghupathi
,
Wullianallur Raghupathi
Journal of Information Security
Vol.15 No.2
,April 2, 2024
DOI:
10.4236/jis.2024.152011
74
Downloads
439
Views
Citations
A Study on the Challenges of Human-Centric Cyber-Security and the Guarantee of Information Quality
(Articles)
Mohammed Hussein Kurdi
,
Mohsen Denden
,
David Paul
Journal of Information Security
Vol.15 No.2
,April 24, 2024
DOI:
10.4236/jis.2024.152013
117
Downloads
758
Views
Citations
Relationships among Risk Assessment, Risk Perception and Acceptance Model of the Residents near Nuclear Power Plants in Japan
(Articles)
Yuichi Otsuka
Open Journal of Safety Science and Technology
Vol.5 No.2
,June 4, 2015
DOI:
10.4236/ojsst.2015.52005
6,423
Downloads
7,602
Views
Citations
Risk Management Instruments, Strategies and Impacts in the Complex Organizations
(Articles)
Federico De Andreis
,
Marco Florio
American Journal of Industrial and Business Management
Vol.9 No.5
,May 20, 2019
DOI:
10.4236/ajibm.2019.95078
1,308
Downloads
3,383
Views
Citations
Developing Guideline for Risk Management of Tunnel Construction in Ethiopia
(Articles)
Nigussie Hailemariam Gebremeskel
,
Henok Fikre Gebregziabher
Open Journal of Safety Science and Technology
Vol.11 No.4
,December 23, 2021
DOI:
10.4236/ojsst.2021.114012
330
Downloads
1,465
Views
Citations
Pathologic Q Waves and Prolonged QTc Time in Preoperative ECG Are Predictive for Perioperative Cardiovascular Events
(Articles)
Thomas Wolters
,
Michael Weber
,
Thomas Neumann
,
Hans-Georg Strauß
,
Andreas Luchner
,
Manfred Seeberger
,
Christian Mueller
,
Christoph Liebetrau
,
Svetlana Apostolovic
,
Radmilo Jankovic
,
Dragic Bankovic
,
Marina Jovic
,
Vesselin Mitrovic
,
Holger Nef
,
Helge Mollmann
,
Karl Werdan
,
Christian W. Hamm
,
Axel Schlitt
World Journal of Cardiovascular Diseases
Vol.4 No.10
,September 16, 2014
DOI:
10.4236/wjcd.2014.410060
3,652
Downloads
4,922
Views
Citations
The Importance of Preserving Birds and Their Habitats at Hanford Site and Oak Ridge Reservation: Information and Communication Tools for Governments, Local and Diverse Communities and Others
(Articles)
Joanna Burger
,
Michael Gochfeld
,
David S. Kosson
,
Kevin G. Brown
,
Monica Cortes
,
Kelly Ng
Natural Science
Vol.14 No.7
,July 29, 2022
DOI:
10.4236/ns.2022.147027
128
Downloads
701
Views
Citations
International Telecommunication Union Standardization for Trust Provisioning in Information, Communication and Technology Infrastructure toward Achieving United Nation’s Sustainable Development Goals
(Articles)
Maryam Roshanaei
,
Qiang Duan
Journal of Computer and Communications
Vol.9 No.10
,October 13, 2021
DOI:
10.4236/jcc.2021.910004
206
Downloads
1,164
Views
Citations
<
...
3
4
5
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top