Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Cyber-Physical-Social Based Security Architecture for Future Internet of Things
(Articles)
Huansheng Ning
,
Hong Liu
Advances in Internet of Things
Vol.2 No.1
,January 14, 2012
DOI:
10.4236/ait.2012.21001
14,103
Downloads
31,545
Views
Citations
The Analysis of the Structure and Security of Home Control Subnet
(Articles)
Chengyi WANG
,
Yun ZHANG
Wireless Sensor Network
Vol.1 No.1
,April 10, 2009
DOI:
10.4236/wsn.2009.11009
6,164
Downloads
10,983
Views
Citations
QoS-Guaranteed Secure Multicast Routing Protocol for Satellite IP Networks Using Hierarchical Architecture
(Articles)
Zhizhong Yin
,
Long Zhang
,
Xianwei Zhou
,
Peng Xu
,
Yu Deng
Int'l J. of Communications, Network and System Sciences
Vol.3 No.4
,April 30, 2010
DOI:
10.4236/ijcns.2010.34045
5,695
Downloads
11,000
Views
Citations
An Analysis of Cybersecurity Attacks against Internet of Things and Security Solutions
(Articles)
Mohammad Rafsun Islam
,
K. M. Aktheruzzaman
Journal of Computer and Communications
Vol.8 No.4
,April 2, 2020
DOI:
10.4236/jcc.2020.84002
2,408
Downloads
9,793
Views
Citations
Secure Web Application Technologies Implementation through Hardening Security Headers Using Automated Threat Modelling Techniques
(Articles)
Maduhu Mshangi Mlyatu
,
Camilius Sanga
Journal of Information Security
Vol.14 No.1
,November 30, 2022
DOI:
10.4236/jis.2023.141001
303
Downloads
1,557
Views
Citations
Network Defense Methodology: A Comparison of Defense in Depth and Defense in Breadth
(Articles)
Lance Cleghorn
Journal of Information Security
Vol.4 No.3
,July 12, 2013
DOI:
10.4236/jis.2013.43017
11,366
Downloads
18,626
Views
Citations
A Study on Quantitative Methodology to Assess Cyber Security Risk of Smart Grid
(Articles)
Pil Sung Woo
,
Byung-Hyun Ko
,
Dong-Joo Kang
,
Balho H. Kim
Energy and Power Engineering
Vol.5 No.4B
,November 18, 2013
DOI:
10.4236/epe.2013.54B249
5,501
Downloads
8,383
Views
Citations
On a Generic Security Game Model
(Articles)
Vivek Shandilya
,
Sajjan Shiva
Int'l J. of Communications, Network and System Sciences
Vol.10 No.7
,July 28, 2017
DOI:
10.4236/ijcns.2017.107008
914
Downloads
1,910
Views
Citations
Human Sensor Web Crowd Sourcing Security Incidents Management in Tanzania Context
(Articles)
Maduhu Mshangi
,
Edephonce Ngemera Nfuka
,
Camilius Sanga
Journal of Information Security
Vol.9 No.3
,July 10, 2018
DOI:
10.4236/jis.2018.93014
973
Downloads
2,333
Views
Citations
Cyber-Security of Smart Grids: Attacks, Detection, Countermeasure Techniques, and Future Directions
(Articles)
Tala Talaei Khoei
,
Hadjar Ould Slimane
,
Naima Kaabouch
Communications and Network
Vol.14 No.4
,November 24, 2022
DOI:
10.4236/cn.2022.144009
1,039
Downloads
7,978
Views
Citations
A Secure Communication Framework for Drone Swarms in Autonomous Surveillance Operations
(Articles)
Ahad Alotaibi
,
Chris Chatwin
,
Phil Birch
Journal of Computer and Communications
Vol.12 No.11
,October 31, 2024
DOI:
10.4236/jcc.2024.1211001
116
Downloads
713
Views
Citations
Software Defined Networks: Strengths, Weaknesses, and Resilience to Failures
(Articles)
Wendnéso Aïda Ouedraogo Rakissaga
,
Hamidou Harouna Omar
,
Pegdwindé Justin Kouraogo
Engineering
Vol.17 No.1
,January 17, 2025
DOI:
10.4236/eng.2025.171002
59
Downloads
305
Views
Citations
Securing Stock Transactions Using Blockchain Technology: Architecture for Identifying and Reducing Vulnerabilities Linked to the Web Applications Used (MAHV-BC)
(Articles)
Kpinna Tiekoura Coulibaly
,
Abdou Maïga
,
Jerome Diako
,
Moustapha Diaby
Open Journal of Applied Sciences
Vol.13 No.11
,November 28, 2023
DOI:
10.4236/ojapps.2023.1311163
125
Downloads
568
Views
Citations
Cyber Resilience through Real-Time Threat Analysis in Information Security
(Articles)
Aparna Gadhi
,
Ragha Madhavi Gondu
,
Hitendra Chaudhary
,
Olatunde Abiona
Int'l J. of Communications, Network and System Sciences
Vol.17 No.4
,April 30, 2024
DOI:
10.4236/ijcns.2024.174004
202
Downloads
823
Views
Citations
Establishing Payment Hubs—Unwind the Spaghetti?
(Articles)
Christoph Markert
American Journal of Industrial and Business Management
Vol.4 No.4
,April 4, 2014
DOI:
10.4236/ajibm.2014.44024
5,395
Downloads
7,533
Views
Citations
The Effects of Tourism Architecture on Island Ecosystems
(Articles)
Lourdes Ruiz
Journal of Building Construction and Planning Research
Vol.3 No.4
,December 2, 2015
DOI:
10.4236/jbcpr.2015.34016
5,288
Downloads
6,956
Views
Citations
Architecture to Secure Electrical Control System in Cyber-Physical System
(Articles)
Depeng Li
Journal of Information Security
Vol.16 No.1
,January 3, 2025
DOI:
10.4236/jis.2025.161008
38
Downloads
199
Views
Citations
Proactive Security Mechanism and Design for Firewall
(Articles)
Saleem-Ullah Lar
,
Xiaofeng Liao
,
Aqeel ur Rehman
,
MA Qinglu
Journal of Information Security
Vol.2 No.3
,July 29, 2011
DOI:
10.4236/jis.2011.23012
7,201
Downloads
13,090
Views
Citations
Gender Differences in Information Security Management
(Articles)
Fayez Alotaibi
,
Aziz Alshehri
Journal of Computer and Communications
Vol.8 No.3
,March 9, 2020
DOI:
10.4236/jcc.2020.83006
1,174
Downloads
3,704
Views
Citations
This article belongs to the Special Issue on
Information, Network & Computer Security
Undergraduate Architecture Education Driven by International Engineering Accreditation and Architecture Evaluation
(Articles)
Shiqian Cai
,
Yongzhong Lou
,
Xi Zhao
Creative Education
Vol.13 No.7
,July 26, 2022
DOI:
10.4236/ce.2022.137146
137
Downloads
654
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top