Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Living Status/Shelter of Street Families of Kolkata: Prospects and Challenges
(Articles)
Harasankar Adhikari
Open Access Library Journal
Vol.1 No.6
,September 25, 2014
DOI:
10.4236/oalib.1100571
1,377
Downloads
2,233
Views
Citations
The Vulnerability Analysis of Some Typical Hash-Based RFID Authentication Protocols
(Articles)
Zhicai Shi
,
Shitao Ren
,
Fei Wu
,
Changzhi Wang
Journal of Computer and Communications
Vol.4 No.8
,June 17, 2016
DOI:
10.4236/jcc.2016.48001
2,020
Downloads
3,132
Views
Citations
A Review of Gaps between Usability and Security/Privacy
(Articles)
Majed Alshamari
Int'l J. of Communications, Network and System Sciences
Vol.9 No.10
,October 25, 2016
DOI:
10.4236/ijcns.2016.910034
2,222
Downloads
6,097
Views
Citations
Internet of Things Behavioral-Economic Security Design, Actors & Cyber War
(Articles)
Robert L. Shuler
,
Billy G. Smith
Advances in Internet of Things
Vol.7 No.2
,April 30, 2017
DOI:
10.4236/ait.2017.72003
2,180
Downloads
4,180
Views
Citations
End-to-End Encryption in Messaging Services and National Security—Case of WhatsApp Messenger
(Articles)
Robert E. Endeley
Journal of Information Security
Vol.9 No.1
,January 23, 2018
DOI:
10.4236/jis.2018.91008
10,879
Downloads
23,682
Views
Citations
Phishing Techniques in Mobile Devices
(Articles)
Belal Amro
Journal of Computer and Communications
Vol.6 No.2
,February 13, 2018
DOI:
10.4236/jcc.2018.62003
1,984
Downloads
5,349
Views
Citations
Associated Risks in Mobile Applications Permissions
(Articles)
Mohammed Al Jutail
,
Mousa Al-Akhras
,
Abdulaziz Albesher
Journal of Information Security
Vol.10 No.2
,March 26, 2019
DOI:
10.4236/jis.2019.102004
1,688
Downloads
5,891
Views
Citations
Modeling Secure Home Area Network Based on IoT for Resource Constraints Environment
(Articles)
Minsu Park
,
Mwawi Kayuni
,
Tiwonge Manda
,
Hyunsung Kim
Journal of Computer and Communications
Vol.8 No.1
,January 10, 2020
DOI:
10.4236/jcc.2020.81004
632
Downloads
1,600
Views
Citations
Security and Privacy Concerns over IoT Devices Attacks in Smart Cities (2022)
(Articles)
Azizi Majid
Journal of Computer and Communications
Vol.11 No.1
,January 20, 2023
DOI:
10.4236/jcc.2023.111003
240
Downloads
2,359
Views
Citations
Ratings of Driving Factors for the Adoption and Implementation of Artificial Intelligence in the Public Sector
(Articles)
Samuel Narh Dorhetso
,
Bismark Dzahene Quarshie
Open Access Library Journal
Vol.10 No.5
,May 30, 2023
DOI:
10.4236/oalib.1109982
96
Downloads
772
Views
Citations
A 5G Perspective of an SDN-Based Privacy-Preserving Scheme for IoT Networks
(Articles)
Isaac Appiah
,
Xiaoming Jiang
,
Edward Kwadwo Boahen
,
Ebenezer Owusu
Int'l J. of Communications, Network and System Sciences
Vol.16 No.8
,August 17, 2023
DOI:
10.4236/ijcns.2023.168012
120
Downloads
616
Views
Citations
A Comprehensive 21st Century Child Development through Scientific Process in Early Science
(Articles)
Rohani Husaini
,
Zanaton Ikhsan
,
Hasnah Toran
Creative Education
Vol.10 No.12
,November 28, 2019
DOI:
10.4236/ce.2019.1012205
791
Downloads
2,089
Views
Citations
This article belongs to the Special Issue on
Teaching and Learning
How to Raise Teachers’ Motivation through “Nudges” and Attribution Theory
(Articles)
Kevin Brinkmann
Open Journal of Social Sciences
Vol.5 No.11
,November 7, 2017
DOI:
10.4236/jss.2017.511002
1,253
Downloads
3,681
Views
Citations
Automatic Identification for Laparoscopic Surgical Procedure for Ligation and Online Distinction of Abnormal Manipulation for Thread Knotting
(Articles)
Chiharu Ishii
,
Takanori Sato
,
Kaito Murano
,
Hideki Kawamura
International Journal of Clinical Medicine
Vol.6 No.12
,December 8, 2015
DOI:
10.4236/ijcm.2015.612116
2,625
Downloads
3,320
Views
Citations
This article belongs to the Special Issue on
Laparoscopic Surgery
Drivers’ Reaction of Warning Messages in Work Zone Termination Areas with Left Turn
(Articles)
Boya You
,
Fengxiang Qiao
,
Lei Yu
Journal of Transportation Technologies
Vol.6 No.3
,April 18, 2016
DOI:
10.4236/jtts.2016.63013
2,488
Downloads
3,381
Views
Citations
Detection of Spatial, Temporal and Trend of Meteorological Drought Using Standardized Precipitation Index (SPI) and Effective Drought Index (EDI) in the Upper Tana River Basin, Kenya
(Articles)
Raphael M. Wambua
,
Benedict M. Mutua
,
James M. Raude
Open Journal of Modern Hydrology
Vol.8 No.3
,July 17, 2018
DOI:
10.4236/ojmh.2018.83007
1,521
Downloads
4,415
Views
Citations
Assessment of Socio-Economic Impacts of the December 2011 Flood Event in Dar es Salaam, Tanzania
(Articles)
Doreen M. Anande
,
Philbert M. Luhunga
Atmospheric and Climate Sciences
Vol.9 No.3
,July 23, 2019
DOI:
10.4236/acs.2019.93029
1,867
Downloads
4,320
Views
Citations
Evaluation of the Relation between Cognitive Science and Embodied Cognition
(Articles)
Elham Shirvani
,
Masoud Shirvani
World Journal of Neuroscience
Vol.13 No.4
,November 14, 2023
DOI:
10.4236/wjns.2023.134014
92
Downloads
497
Views
Citations
Knowledge Management Strategy for Handling Cyber Attacks in E-Commerce with Computer Security Incident Response Team (CSIRT)
(Articles)
Fauziyah Fauziyah
,
Zhaosun Wang
,
Gabriel Joy
Journal of Information Security
Vol.13 No.4
,September 23, 2022
DOI:
10.4236/jis.2022.134016
351
Downloads
1,938
Views
Citations
An Intelligent Model for Online Recruitment Fraud Detection
(Articles)
Bandar Alghamdi
,
Fahad Alharby
Journal of Information Security
Vol.10 No.3
,July 11, 2019
DOI:
10.4236/jis.2019.103009
2,943
Downloads
9,361
Views
Citations
<
...
5
6
7
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top