Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Social Engineering Threat and Defense: A Literature Survey
(Articles)
Islam Abdalla Mohamed Abass
Journal of Information Security
Vol.9 No.4
,September 18, 2018
DOI:
10.4236/jis.2018.94018
4,605
Downloads
9,623
Views
Citations
A Configurable Routing Protocol for Improving Lifetime and Coverage Area in Wireless Sensor Networks
(Articles)
Abdullah Alshahrani
,
Nader M. Namazi
,
Majed Abdouli
,
Ahmed S. Alghamdi
Wireless Sensor Network
Vol.9 No.9
,September 29, 2017
DOI:
10.4236/wsn.2017.99018
1,421
Downloads
3,328
Views
Citations
Cybersecurity Attacks on Academic Data and Personal Information and the Mediating Role of Education and Employment
(Articles)
Ahmad Reda Alzighaibi
Journal of Computer and Communications
Vol.9 No.11
,November 17, 2021
DOI:
10.4236/jcc.2021.911006
294
Downloads
1,989
Views
Citations
Cognitive Software Engineering: A Research Framework and Roadmap
(Articles)
Zohair Chentouf
Journal of Software Engineering and Applications
Vol.7 No.6
,May 28, 2014
DOI:
10.4236/jsea.2014.76049
3,628
Downloads
5,597
Views
Citations
This article belongs to the Special Issue on
Software Analysis and Testing
Understanding Hidden Meanings of Quran’s Words Using Mobile/Android Application
(Articles)
Ghada Elmarhomy
Journal of Computer and Communications
Vol.8 No.9
,September 14, 2020
DOI:
10.4236/jcc.2020.89004
283
Downloads
1,005
Views
Citations
Hybrid Warehouse Model and Solutions for Climate Data Analysis
(Articles)
Hasan Hashim
Journal of Computer and Communications
Vol.8 No.10
,October 30, 2020
DOI:
10.4236/jcc.2020.810008
554
Downloads
1,700
Views
Citations
Towards Development of a Security Risk Assessment Model for Saudi Arabian Business Environment Based on the ISO/IEC 27005 ISRM Standard
(Articles)
Wael G. Alheadary
Journal of Information Security
Vol.14 No.3
,July 6, 2023
DOI:
10.4236/jis.2023.143012
169
Downloads
657
Views
Citations
Persuasive Technology for the Future of Smoking Cessation
*
(Articles)
Fatimah Dera M. Alshahrani
Advances in Internet of Things
Vol.14 No.2
,April 17, 2024
DOI:
10.4236/ait.2024.142003
57
Downloads
304
Views
Citations
Predicting Users Mobile App Privacy Preferences
(Articles)
Aziz Alshehri
,
Fayez Alotaibi
Journal of Computer and Communications
Vol.7 No.10
,October 22, 2019
DOI:
10.4236/jcc.2019.710014
470
Downloads
1,336
Views
Citations
A New Approach of Time Series Variation Based on Power Links and Field Association Words
(Articles)
Zohair S. Malki
,
El-Sayed Atlam
,
Talal H. Noor
,
Ahmad Reda Alzighaibi
,
Ghada Elmarhomy
,
Abdallah A. Mohamed
Journal of Computer and Communications
Vol.8 No.3
,March 14, 2020
DOI:
10.4236/jcc.2020.83008
365
Downloads
841
Views
Citations
Template Matching from 2-D into 1-D
(Articles)
Yasser Fouda
Journal of Signal and Information Processing
Vol.5 No.2
,May 2, 2014
DOI:
10.4236/jsip.2014.52005
7,012
Downloads
12,856
Views
Citations
Attacks on Anonymization-Based Privacy-Preserving: A Survey for Data Mining and Data Publishing
(Articles)
Abou-el-ela Abdou Hussien
,
Nermin Hamza
,
Hesham A. Hefny
Journal of Information Security
Vol.4 No.2
,April 23, 2013
DOI:
10.4236/jis.2013.42012
8,612
Downloads
14,671
Views
Citations
Utility-Based Anonymization Using Generalization Boundaries to Protect Sensitive Attributes
(Articles)
Abou-el-ela Abdou Hussien
,
Nagy Ramadan Darwish
,
Hesham A. Hefny
Journal of Information Security
Vol.6 No.3
,June 15, 2015
DOI:
10.4236/jis.2015.63019
4,753
Downloads
5,556
Views
Citations
Double Elzaki Transform Decomposition Method for Solving Non-Linear Partial Differential Equations
(Articles)
Moh A. Hassan
,
Tarig M. Elzaki
Journal of Applied Mathematics and Physics
Vol.8 No.8
,August 7, 2020
DOI:
10.4236/jamp.2020.88112
384
Downloads
1,595
Views
Citations
Real Time Vehicular Traffic Simulation for Black Hole Attack in the Greater Detroit Area
(Articles)
Abdulaziz Alshammari
,
Mohamed A Zohdy
,
Debatosh Debnath
,
George Corser
Journal of Information Security
Vol.11 No.1
,December 23, 2019
DOI:
10.4236/jis.2020.111004
779
Downloads
2,370
Views
Citations
Prediction of the Bombay Stock Exchange (BSE) Market Returns Using Artificial Neural Network and Genetic Algorithm
(Articles)
Yusuf Perwej
,
Asif Perwej
Journal of Intelligent Learning Systems and Applications
Vol.4 No.2
,May 23, 2012
DOI:
10.4236/jilsa.2012.42010
12,641
Downloads
26,745
Views
Citations
Potential of Rooftop PV Systems on Weekly Peak Load Shaving in Saudi Arabia
(Articles)
Hani Albalawi
Smart Grid and Renewable Energy
Vol.9 No.2
,February 14, 2018
DOI:
10.4236/sgre.2018.92003
1,301
Downloads
3,119
Views
Citations
FSS Based Circular Polarizer for High-Speed Wireless Communication at 75 GHz
(Articles)
Ghaffer Kiani
Open Journal of Antennas and Propagation
Vol.7 No.3
,September 6, 2019
DOI:
10.4236/ojapr.2019.73003
809
Downloads
2,090
Views
Citations
Virgo Cluster Membership Based on
K
-Means Algorithm
(Articles)
Ibrahim Mohamed Selim
,
Passent Elkafrawy
,
Walid Dabour
,
Mohamed Eassa
International Journal of Astronomy and Astrophysics
Vol.10 No.1
,February 6, 2020
DOI:
10.4236/ijaa.2020.101001
506
Downloads
1,231
Views
Citations
Achieving Mobile Cloud Computing through Heterogeneous Wireless Networks
(Articles)
Amani S. Alnezari
,
Nasser-Eddine Rikli
Int'l J. of Communications, Network and System Sciences
Vol.10 No.6
,June 13, 2017
DOI:
10.4236/ijcns.2017.106006
1,685
Downloads
3,211
Views
Citations
<
...
2
3
4
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top