Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Plane Symmetric Solutions to the Nonlinear Spinor Field Equations in General Relativity Theory
(Articles)
A. Adomou
,
Jonas Edou
,
Siaka Massou
Journal of Modern Physics
Vol.10 No.10
,September 18, 2019
DOI:
10.4236/jmp.2019.1010081
435
Downloads
1,182
Views
Citations
Relativistic Quantitative Determination of the “Mysterious” Differences in the Hubble Constant
(Articles)
Ernst Karl Kunst
Natural Science
Vol.13 No.1
,January 21, 2021
DOI:
10.4236/ns.2021.131001
465
Downloads
1,263
Views
Citations
Utilization of Logistical Regression to the Modified Sine-Gordon Model in the MST Experiment
(Articles)
Nizar J. Alkhateeb
,
Hameed K. Ebraheem
,
Eman M. Al-Otaibi
Open Journal of Modelling and Simulation
Vol.12 No.2
,April 19, 2024
DOI:
10.4236/ojmsi.2024.122003
92
Downloads
316
Views
Citations
Safety Aspects in the Distance Learning Systems
(Articles)
Sergii Kavun
,
Yousef Daradkeh
,
Alexander Zyma
Creative Education
Vol.3 No.1
,February 22, 2012
DOI:
10.4236/ce.2012.31014
5,486
Downloads
9,460
Views
Citations
Design and Implementation of Secure Subnet Inside of Data Sensitive Network
(Articles)
Haiwei Xue
,
Yunliang Zhang
,
Zhien Guo
,
Yiqi Dai
Journal of Software Engineering and Applications
Vol.6 No.3B
,April 11, 2013
DOI:
10.4236/jsea.2013.63B012
3,130
Downloads
4,802
Views
Citations
Protection Model of Security Systems Based on Neyman-Person Criterion
(Articles)
Haitao Lv
,
Ruimin Hu
,
Jun Chen
,
Zheng He
Communications and Network
Vol.5 No.3C
,October 7, 2013
DOI:
10.4236/cn.2013.53B2104
2,919
Downloads
4,683
Views
Citations
Multi-level Evaluation of Load Supply Adequacy for Transmission Network
(Articles)
Zheng-lin Yang
,
Jian-guo Yao
,
Jian Geng
Energy and Power Engineering
Vol.5 No.4B
,November 7, 2013
DOI:
10.4236/epe.2013.54B141
4,638
Downloads
5,625
Views
Citations
Automated Protection Performance Assessment and Enhancement
(Articles)
J. Jaeger
,
X.-P. Liang
,
R. Krebs
,
T. Bopp
Journal of Power and Energy Engineering
Vol.2 No.4
,April 22, 2014
DOI:
10.4236/jpee.2014.24071
5,376
Downloads
6,497
Views
Citations
Empirical Investigation of Threats to Loyalty Programs by Using Models Inspired by the Gordon-Loeb Formulation of Security Investment
(Articles)
Shiori Shinoda
,
Kanta Matsuura
Journal of Information Security
Vol.7 No.2
,March 17, 2016
DOI:
10.4236/jis.2016.72003
2,407
Downloads
3,679
Views
Citations
This article belongs to the Special Issue on
Cybersecurity Investments
Blue Screen of Death Observed for Microsoft Windows Server 2012 R2 under DDoS Security Attack
(Articles)
Koushicaa Sundar
,
Sanjeev Kumar
Journal of Information Security
Vol.7 No.4
,July 7, 2016
DOI:
10.4236/jis.2016.74018
2,933
Downloads
5,841
Views
Citations
The Evolution of the Concept of International Peace and Security in light of UN Security Council Practice (End of the Cold War-Until Now)
(Articles)
Rasool Soltani
,
Maryam Moradi
Open Journal of Political Science
Vol.7 No.1
,January 3, 2017
DOI:
10.4236/ojps.2017.71010
3,347
Downloads
16,018
Views
Citations
Google Maps Security Concerns
(Articles)
Aqil Burney
,
Muhammad Asif
,
Zain Abbas
,
Shamaila Burney
Journal of Computer and Communications
Vol.6 No.1
,January 8, 2018
DOI:
10.4236/jcc.2018.61027
3,370
Downloads
14,217
Views
Citations
A Security Architecture for SCADA Systems
(Articles)
Arun Velagapalli
,
Mahalingam Ramkumar
Journal of Information Security
Vol.9 No.1
,January 23, 2018
DOI:
10.4236/jis.2018.91009
1,431
Downloads
3,906
Views
Citations
Application of Traditional Ecological Knowledge in Food and Water Security in the Semi-Arid Turkana County, Kenya
(Articles)
Cecilia Mwango Ratemo
,
George Morara Ogendi
,
Guangwei Huang
,
Rhoda N. Ondieki
Open Journal of Ecology
Vol.10 No.6
,June 1, 2020
DOI:
10.4236/oje.2020.106020
789
Downloads
2,898
Views
Citations
Secure Web Application Technologies Implementation through Hardening Security Headers Using Automated Threat Modelling Techniques
(Articles)
Maduhu Mshangi Mlyatu
,
Camilius Sanga
Journal of Information Security
Vol.14 No.1
,November 30, 2022
DOI:
10.4236/jis.2023.141001
303
Downloads
1,563
Views
Citations
Research on the Construction of China’s Strategic Communication System in Global Security Governance
(Articles)
Lina Jing
,
Nana Jing
Open Journal of Political Science
Vol.13 No.3
,June 12, 2023
DOI:
10.4236/ojps.2023.133017
181
Downloads
950
Views
Citations
Enhancing Security in QR Code Technology Using AI: Exploration and Mitigation Strategies
(Articles)
Saranya Vaithilingam
,
Santhosh Aradhya Mohan Shankar
International Journal of Intelligence Science
Vol.14 No.2
,March 26, 2024
DOI:
10.4236/ijis.2024.142003
268
Downloads
1,777
Views
Citations
Exploring the Characteristics of Data Breaches: A Descriptive Analytic Study
(Articles)
Dominik Molitor
,
Aditya Saharia
,
Viju Raghupathi
,
Wullianallur Raghupathi
Journal of Information Security
Vol.15 No.2
,April 2, 2024
DOI:
10.4236/jis.2024.152011
346
Downloads
2,556
Views
Citations
Analysis of Database Security
(Articles)
Xueying Pan
,
Anthony Obahiaghon
,
Brendan Makar
,
Samuel Wilson
,
Christian Beard
Open Access Library Journal
Vol.11 No.4
,April 15, 2024
DOI:
10.4236/oalib.1111366
167
Downloads
1,280
Views
Citations
The Role of AI in Cyber Security: Safeguarding Digital Identity
(Articles)
Mohammad Binhammad
,
Shaikha Alqaydi
,
Azzam Othman
,
Laila Hatim Abuljadayel
Journal of Information Security
Vol.15 No.2
,April 30, 2024
DOI:
10.4236/jis.2024.152015
971
Downloads
7,325
Views
Citations
<
...
25
26
27
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top