Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Analysis of Causes and Actual Events on Electric Power Infrastructure Impacted by Cyber Attack
(Articles)
Hongxu Yin
,
Rui Xiao
,
Fenfei Lv
Journal of Power and Energy Engineering
Vol.3 No.4
,April 13, 2015
DOI:
10.4236/jpee.2015.34012
3,746
Downloads
4,715
Views
Citations
Participatory Methods in the Georgian Caucasus: Understanding Vulnerability and Response to Debrisflow Hazards
(Articles)
Valentina Spanu
,
George Gaprindashvili
,
Michael Keith McCall
International Journal of Geosciences
Vol.6 No.7
,July 22, 2015
DOI:
10.4236/ijg.2015.67054
7,229
Downloads
8,175
Views
Citations
SCADA Framework Incorporating MANET and IDP for Cyber Security of Residential Microgrid Communication Network
(Articles)
Goutham K. Chalamasetty
,
Paras Mandal
,
Tzu-Liang (Bill) Tseng
Smart Grid and Renewable Energy
Vol.7 No.3
,March 29, 2016
DOI:
10.4236/sgre.2016.73007
2,502
Downloads
3,967
Views
Citations
Research on Cyber-Physical Modeling for Smart Distribution Grid
(Articles)
Xiaohong Guo
,
Shuyi Guo
,
Gang Li
,
Yu Song
Energy and Power Engineering
Vol.9 No.4B
,April 6, 2017
DOI:
10.4236/epe.2017.94B060
2,808
Downloads
3,626
Views
Citations
The Relationship between Cyberbullying Victimization and Depression: The Moderating Effects of Gender and Age
(Articles)
Jamal Almenayes
Social Networking
Vol.6 No.3
,June 8, 2017
DOI:
10.4236/sn.2017.63014
3,401
Downloads
7,779
Views
Citations
From Mechatronic Components to Industrial Automation Things: An IoT Model for Cyber-Physical Manufacturing Systems
(Articles)
Theodoros Foradis
,
Kleanthis Thramboulidis
Journal of Software Engineering and Applications
Vol.10 No.8
,July 12, 2017
DOI:
10.4236/jsea.2017.108040
2,317
Downloads
4,439
Views
Citations
Quantitative Evaluation of Cyber-Attacks on a Hypothetical School Computer Network
(Articles)
Akinjide A. Akinola
,
Adeyemi A. Adekoya
,
Ayoade O. Kuye
,
Abiodun Ayodeji
Journal of Information Security
Vol.10 No.3
,June 17, 2019
DOI:
10.4236/jis.2019.103006
733
Downloads
2,357
Views
Citations
Forecasting the Impact of Information Security Breaches on Stock Market Returns and VaR Backtest
(Articles)
Ilaria Colivicchi
,
Riccardo Vignaroli
Journal of Mathematical Finance
Vol.9 No.3
,August 21, 2019
DOI:
10.4236/jmf.2019.93024
787
Downloads
2,146
Views
Citations
The Impact of Contemporary Communication Technology on Undergraduate Students’ Dating Violence Episodes: An Exploration of Routine Activity Theory
(Articles)
Nancy Mayoyo
,
Jackton Ogeno
,
Francis Likoye
Open Journal of Social Sciences
Vol.8 No.9
,September 17, 2020
DOI:
10.4236/jss.2020.89011
403
Downloads
1,478
Views
Citations
Public Key Infrastructure: An Enhanced Validation Framework
(Articles)
Paul Danquah
,
Henoch Kwabena-Adade
Journal of Information Security
Vol.11 No.4
,September 25, 2020
DOI:
10.4236/jis.2020.114016
907
Downloads
4,583
Views
Citations
Hacked by Bits and Pieces: What Can We Learn from an Example of Corporate Espionage?
(Articles)
Jack Schafer
,
Marvin Karlins
Journal of Information Security
Vol.12 No.3
,July 9, 2021
DOI:
10.4236/jis.2021.123012
283
Downloads
1,361
Views
Citations
Knowledge Management Strategy for Handling Cyber Attacks in E-Commerce with Computer Security Incident Response Team (CSIRT)
(Articles)
Fauziyah Fauziyah
,
Zhaosun Wang
,
Gabriel Joy
Journal of Information Security
Vol.13 No.4
,September 23, 2022
DOI:
10.4236/jis.2022.134016
365
Downloads
1,800
Views
Citations
Enhancing Police Officers’ Cybercrime Investigation Skills Using a Checklist Tool
(Articles)
Abdelkhalek Ibrahim Alastal
,
Ashraf Hassan Shaqfa
Journal of Data Analysis and Information Processing
Vol.11 No.2
,April 4, 2023
DOI:
10.4236/jdaip.2023.112008
243
Downloads
2,175
Views
Citations
The Knowledge of Cyber-Security Vulnerabilities in an Institution of Higher and University Education. A Case of ISP-Bukavu (Institut Supérieur Pédagogique de Bukavu) (TTC = Teachers’ Training College)
(Articles)
Dominique Wasso Kiseki
,
Vincent Havyarimana
,
Therence Niyonsaba
,
Désiré Lumonge Zabagunda
,
Walumbuka Ilundu Wail
,
Thabo Semong
Journal of Computer and Communications
Vol.11 No.4
,April 24, 2023
DOI:
10.4236/jcc.2023.114002
99
Downloads
451
Views
Citations
Unveiling the Unseen Wounds—A Qualitative Exploration of the Psychological Impact and Effects of Cyber Scams in Singapore
(Articles)
Johan H. M. Buse
,
Jonathan Ee
,
Shilpi Tripathi
Psychology
Vol.14 No.11
,November 30, 2023
DOI:
10.4236/psych.2023.1411101
168
Downloads
1,109
Views
Citations
Cyber Deception Using NLP
(Articles)
Igor Godefroy Kouam Kamdem
,
Marcellin Nkenlifack
Journal of Information Security
Vol.15 No.2
,April 30, 2024
DOI:
10.4236/jis.2024.152016
46
Downloads
178
Views
Citations
Administrative Procedure Laws of the People’s Republic of China and Colombia
(Articles)
Hernán Alejandro Olano García
Beijing Law Review
Vol.7 No.3
,September 7, 2016
DOI:
10.4236/blr.2016.73024
1,696
Downloads
2,774
Views
Citations
The 2012 and 2014 Olympic Doping Scandals: A Critical Analysis of the Effectiveness of Anti-Doping Mechanisms in Sports Law and the Necessity of Global Unity and Rehabilitation in Enforcing Anti-Doping Measures
(Articles)
Anthony G. A. Shaw
Beijing Law Review
Vol.10 No.4
,July 30, 2019
DOI:
10.4236/blr.2019.104038
1,171
Downloads
2,415
Views
Citations
The Philosophy of Legal Reason in Indonesian Law
(Articles)
Joseph Andy Hartanto
Beijing Law Review
Vol.11 No.1
,February 5, 2020
DOI:
10.4236/blr.2020.111008
657
Downloads
1,539
Views
Citations
A Utopia or Reality: Possibility of Using the Proper Law of Contract throughout an International Commercial Arbitration Claim
(Articles)
Karawita Arachchige Akalanka Nuwan Thilakarathna
Beijing Law Review
Vol.12 No.1
,February 2, 2021
DOI:
10.4236/blr.2021.121001
956
Downloads
2,582
Views
Citations
<
...
2
3
4
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top