Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Cyber Resilience through Real-Time Threat Analysis in Information Security
(Articles)
Aparna Gadhi
,
Ragha Madhavi Gondu
,
Hitendra Chaudhary
,
Olatunde Abiona
Int'l J. of Communications, Network and System Sciences
Vol.17 No.4
,April 30, 2024
DOI:
10.4236/ijcns.2024.174004
52
Downloads
163
Views
Citations
A New Construction Scheme for Information Security Lab
(Articles)
Li Zhu
,
Huaqing Mao
,
Zhiwen Hu
Creative Education
Vol.3 No.4
,August 13, 2012
DOI:
10.4236/ce.2012.34064
5,020
Downloads
7,199
Views
Citations
Keyboard Dependency of Personal Identification Performance by Keystroke Dynamics in Free Text Typing
(Articles)
Yoshitomo Matsubara
,
Toshiharu Samura
,
Haruhiko Nishimura
Journal of Information Security
Vol.6 No.3
,July 14, 2015
DOI:
10.4236/jis.2015.63023
5,049
Downloads
7,435
Views
Citations
Camera and Voice Control Based Location Services and Information Security on Android
(Articles)
Jitendra G. Chouhan
,
Nikhil Kumar Singh
,
Prashant S. Modi
,
Keyurbhai A. Jani
,
Bhavin N. Joshi
Journal of Information Security
Vol.7 No.3
,April 15, 2016
DOI:
10.4236/jis.2016.73015
3,648
Downloads
5,076
Views
Citations
Improving the Cybersecurity Framework for Future Consumer Networks
(Articles)
Tyler Welker
,
Olatunde Abiona
Int'l J. of Communications, Network and System Sciences
Vol.14 No.4
,April 30, 2021
DOI:
10.4236/ijcns.2021.144004
652
Downloads
1,685
Views
Citations
Strengthening the Security of Supervised Networks by Automating Hardening Mechanisms
(Articles)
Patrick Dany Bavoua Kenfack
,
Alphonse Binele Abana
,
Emmanuel Tonye
,
Genevieve Elvira Ndjana Leka
Journal of Computer and Communications
Vol.11 No.5
,May 26, 2023
DOI:
10.4236/jcc.2023.115009
75
Downloads
462
Views
Citations
Is Public Co-Ordination of Investment in Information Security Desirable?
(Articles)
Christos Ioannidis
,
David Pym
,
Julian Williams
Journal of Information Security
Vol.7 No.2
,March 30, 2016
DOI:
10.4236/jis.2016.72005
2,988
Downloads
3,878
Views
Citations
This article belongs to the Special Issue on
Cybersecurity Investments
Information Availability: An Insight into the Most Important Attribute of Information Security
(Articles)
Suhail Qadir
,
S. M. K. Quadri
Journal of Information Security
Vol.7 No.3
,April 15, 2016
DOI:
10.4236/jis.2016.73014
7,162
Downloads
19,778
Views
Citations
The Impact of Accountants Participation in Development for Computerized Accounting Information Systems on the Success of these Systems’ Performance
(Articles)
Tarek Abdelhafid Elsharif
Open Access Library Journal
Vol.5 No.11
,November 14, 2018
DOI:
10.4236/oalib.1104995
1,248
Downloads
4,939
Views
Citations
Analysis of the Problems of Ensuring Information Security in the Terms of the Contemporary Society
(Articles)
Dmitrii S. Brazevich
,
Zhanna S. Safronova
,
Tatyana N. Kosheleva
,
Alla V. Biryukova
Open Journal of Social Sciences
Vol.8 No.2
,February 28, 2020
DOI:
10.4236/jss.2020.82018
783
Downloads
2,370
Views
Citations
Identification and Validation of Social Media Socio-Technical Information Security Factors with Respect to Usable-Security Principles
(Articles)
Joe Mutebi
,
Margaret Kareyo
,
Umezuruike Chinecherem
,
Akampurira Paul
Journal of Computer and Communications
Vol.10 No.8
,August 17, 2022
DOI:
10.4236/jcc.2022.108004
185
Downloads
812
Views
Citations
Classification of Big Data Security Based on Ontology Web Language
(Articles)
Alsadig Mohammed Adam Abdallah
,
Amir Mohamed Talib
Journal of Information Security
Vol.14 No.1
,January 31, 2023
DOI:
10.4236/jis.2023.141006
164
Downloads
708
Views
Citations
Intelligent Multi-Agent Based Information Management Methods to Direct Complex Industrial Systems
(Articles)
Danilo Avola
,
Luigi Cinque
,
Giuseppe Placidi
Intelligent Information Management
Vol.4 No.6
,November 28, 2012
DOI:
10.4236/iim.2012.46038
5,345
Downloads
8,716
Views
Citations
Information System/Information Technology Strategic Planning in Order Information Technology Development Strategy Using TOGAF (The Open Group Architecture Framework) Methodology in Achieving World Class University in Satya Wacana Christian University
(Articles)
Augie David Manuputty
,
Agustinus Fritz Wijaya
Intelligent Information Management
Vol.5 No.6
,November 28, 2013
DOI:
10.4236/iim.2013.56019
5,661
Downloads
8,621
Views
Citations
High Immunization Coverage but Delayed Immunization Reflects Gaps in Health Management Information System (HMIS) in District Kangra, Himachal Pradesh, India—An Immunization Evaluation
(Articles)
Rajesh Kumar Sood
,
Anjali Sood
,
Omesh Kumar Bharti
,
Vidya Ramachandran
,
Archana Phull
World Journal of Vaccines
Vol.5 No.2
,April 16, 2015
DOI:
10.4236/wjv.2015.52009
6,267
Downloads
7,450
Views
Citations
Supply Chain for Regional Centralized Purchasing: An Application Model
(Articles)
Alessandro Pepino
,
Marcella Rovani
,
Adriano Torri
,
Mario Sansone
Intelligent Information Management
Vol.4 No.5A
,October 30, 2012
DOI:
10.4236/iim.2012.425038
6,709
Downloads
9,504
Views
Citations
This article belongs to the Special Issue on
Information System and Management
Applying Information Technology to Financial Statement Analysis for Market Capitalization Prediction
(Articles)
Hayden Wimmer
,
Roy Rada
Open Journal of Accounting
Vol.2 No.1
,January 29, 2013
DOI:
10.4236/ojacct.2013.21001
7,152
Downloads
13,468
Views
Citations
Global River Basin Modeling and Contaminant Transport
(Articles)
Rakesh Bahadur
,
Christopher Ziemniak
,
David E. Amstutz
,
William B. Samuels
American Journal of Climate Change
Vol.2 No.2
,June 24, 2013
DOI:
10.4236/ajcc.2013.22014
5,461
Downloads
8,330
Views
Citations
Use of Video Clips in a Virtual Learning Environment of Accounting Information Systems Class—A Case Study
(Articles)
Baozhou Lu
,
Liang Song
Open Journal of Accounting
Vol.2 No.4
,October 21, 2013
DOI:
10.4236/ojacct.2013.24015
7,477
Downloads
10,651
Views
Citations
Airport Information Systems—Airside Management Information Systems
(Articles)
Adam Marks
,
Kees Rietsema
Intelligent Information Management
Vol.6 No.3
,May 29, 2014
DOI:
10.4236/iim.2014.63016
14,301
Downloads
17,521
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top