Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Development of an Analytical Model of the Process of Cybersecurity Protection of Distributed Information Systems of Critical Infrastructure
(Articles)
Ramaz R. Shamugia
Int'l J. of Communications, Network and System Sciences
Vol.13 No.10
,October 31, 2020
DOI:
10.4236/ijcns.2020.1310010
765
Downloads
1,695
Views
Citations
Factors Influencing Employees on Compliance with Cybersecurity Policies and Their Implications for Protection of Information and Technology Assets in Saudi Arabia
(Articles)
Sami Saad Alsemairi
Intelligent Information Management
Vol.15 No.4
,July 20, 2023
DOI:
10.4236/iim.2023.154013
213
Downloads
1,123
Views
Citations
Development of a Platform to Explore Network Intrusion Detection System (NIDS) for Cybersecurity
(Articles)
Chee Keong Chan
,
Alexander Weil Tine Yeoh
Journal of Computer and Communications
Vol.6 No.1
,December 29, 2017
DOI:
10.4236/jcc.2018.61001
1,560
Downloads
4,998
Views
Citations
Competencies in Computer Security and Resolution of Technological Problems in Higher Education Students
(Articles)
Esteban Pérez Flores
,
Alejandra Aldrette Malacara
,
Sandra R. Murillo Cano
,
Vittorio Zanella Palacios
Journal of Computer and Communications
Vol.12 No.4
,April 24, 2024
DOI:
10.4236/jcc.2024.124013
85
Downloads
484
Views
Citations
Resilience at the Core: Critical Infrastructure Protection Challenges, Priorities and Cybersecurity Assessment Strategies
(Articles)
Maryam Roshanaei
Journal of Computer and Communications
Vol.9 No.8
,August 26, 2021
DOI:
10.4236/jcc.2021.98006
1,244
Downloads
6,209
Views
Citations
A Smart Strategy for Blocking the Distance Protection Function during VT Fuse Failure
(Articles)
Ali M. Eltamaly
,
Amer Nasr A. Elghaffar
Intelligent Control and Automation
Vol.13 No.3
,November 30, 2022
DOI:
10.4236/ica.2022.133003
175
Downloads
1,516
Views
Citations
Study on the Use of Artificial Intelligence for Cybersecurity in Companies: Case of Companies in Burkina Faso
(Articles)
Yanogo Kiswendsida Jean Hermann
,
Ouedraogo Tounwendyam Frederic
Engineering
Vol.15 No.12
,December 11, 2023
DOI:
10.4236/eng.2023.1512056
227
Downloads
1,408
Views
Citations
Cybersecurity and Privacy Protection in Vehicular Networks (VANETs)
(Articles)
Bruno Macena
,
Celio Albuquerque
,
Raphael Machado
Advances in Internet of Things
Vol.13 No.4
,October 30, 2023
DOI:
10.4236/ait.2023.134006
282
Downloads
1,467
Views
Citations
PhishGuard: Integrating Fine-Tuned Large Language Models (LLMs) into Password Management
(Articles)
Smith Patel
,
Vijay K. Madisetti
Journal of Information Security
Vol.15 No.4
,October 10, 2024
DOI:
10.4236/jis.2024.154027
62
Downloads
402
Views
Citations
Hardware/Compiler Memory Protection in Sensor Nodes
(Articles)
Lanfranco LOPRIORE
Int'l J. of Communications, Network and System Sciences
Vol.1 No.3
,October 9, 2008
DOI:
10.4236/ijcns.2008.13028
6,357
Downloads
10,455
Views
Citations
Cultural Heritage and Flood Need of Interdisciplinarity
(Articles)
Klára Nedvědová
Journal of Water Resource and Protection
Vol.5 No.4A
,April 29, 2013
DOI:
10.4236/jwarp.2013.54A004
3,309
Downloads
5,764
Views
Citations
This article belongs to the Special Issue on
Water: Unite and Divide
Considerations for Planning a Multi-Platform Energy Utility System
(Articles)
Yahav Biran
,
Joel Dubow
,
Sudeep Pasricha
,
George Collins
,
John M. Borky
Energy and Power Engineering
Vol.9 No.12
,November 9, 2017
DOI:
10.4236/epe.2017.912046
967
Downloads
1,932
Views
Citations
This article belongs to the Special Issue on
Power System Protection
Overview of Analysis on State Evaluation of Relaying Protection System
(Articles)
Wanqing Li
,
Pinduan Hu
Journal of Power and Energy Engineering
Vol.7 No.5
,May 21, 2019
DOI:
10.4236/jpee.2019.75001
699
Downloads
1,254
Views
Citations
Monitor System for Protection Device Based on Embedded RTOS
(Articles)
Yang WANG
,
Xianggen YIN
,
Zhe ZHANG
Journal of Electromagnetic Analysis and Applications
Vol.1 No.4
,December 31, 2009
DOI:
10.4236/jemaa.2009.14037
6,180
Downloads
10,296
Views
Citations
Multi-agent Based Protection on Highly Dominated Distributed Energy Resources
(Articles)
Stephanus A. Ananda
,
Jyh-Cherng Gu
Energy and Power Engineering
Vol.5 No.4B
,November 12, 2013
DOI:
10.4236/epe.2013.54B177
4,649
Downloads
6,220
Views
Citations
Protection Model of Security Systems Based on Neyman-Person Criterion
(Articles)
Haitao Lv
,
Ruimin Hu
,
Jun Chen
,
Zheng He
Communications and Network
Vol.5 No.3C
,October 7, 2013
DOI:
10.4236/cn.2013.53B2104
2,919
Downloads
4,682
Views
Citations
Feasibility of Protection Zones for Water Resources in Arid Areas: Case Study; Duyuk Nueimah Shosa Springs, Jericho, Palestine
(Articles)
Marwan Ghanem
,
Mahmoud Hammad
Journal of Environmental Protection
Vol.6 No.2
,February 11, 2015
DOI:
10.4236/jep.2015.62013
3,860
Downloads
4,823
Views
Citations
Effect of Spacecraft Aerodynamics and Heat Shield Characteristics on Optimal Aeroassisted Transfer
(Articles)
Antonio Mazzaracchio
,
Mario Marchetti
Engineering
Vol.4 No.6
,June 19, 2012
DOI:
10.4236/eng.2012.46040
6,780
Downloads
10,016
Views
Citations
Cathodic Protection Remote Monitoring Based on Wireless Sensor Network
(Articles)
Mohammed Zeki Al-Faiz
,
Liqaa Saadi Mezher
Wireless Sensor Network
Vol.4 No.9
,September 20, 2012
DOI:
10.4236/wsn.2012.49033
7,550
Downloads
12,082
Views
Citations
Study of Lightning Safety Distance Using Rolling Sphere Method
(Articles)
Nor Zaihar Yahaya
,
Mohd Akhmal Daud
Energy and Power Engineering
Vol.5 No.3
,May 14, 2013
DOI:
10.4236/epe.2013.53026
14,613
Downloads
19,533
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top