Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Automated Protection Performance Assessment and Enhancement
(Articles)
J. Jaeger
,
X.-P. Liang
,
R. Krebs
,
T. Bopp
Journal of Power and Energy Engineering
Vol.2 No.4
,April 22, 2014
DOI:
10.4236/jpee.2014.24071
5,225
Downloads
6,259
Views
Citations
Taxonomy for Privacy Policies of Social Networks Sites
(Articles)
Sergio Donizetti Zorzo
,
Rodrigo Pereira Botelho
,
Paulo Muniz de Ávila
Social Networking
Vol.2 No.4
,October 30, 2013
DOI:
10.4236/sn.2013.24015
5,317
Downloads
9,958
Views
Citations
Study on the Legalization of Minor Internet Security
(Articles)
Pengfei Ji
Beijing Law Review
Vol.6 No.1
,March 10, 2015
DOI:
10.4236/blr.2015.61007
4,323
Downloads
4,984
Views
Citations
Breach Notification in the General Data Protection Regulation
(Articles)
M’Bia Hortense De-Yolande
,
Théo Doh-Djanhoundji
,
Gabo Yves Constant
Voice of the Publisher
Vol.9 No.4
,December 26, 2023
DOI:
10.4236/vp.2023.94026
53
Downloads
244
Views
Citations
Protection Model of Security Systems Based on Neyman-Person Criterion
(Articles)
Haitao Lv
,
Ruimin Hu
,
Jun Chen
,
Zheng He
Communications and Network
Vol.5 No.3C
,October 7, 2013
DOI:
10.4236/cn.2013.53B2104
2,816
Downloads
4,514
Views
Citations
Integrated Model for Security and Protection of Critical Infrastructure
(Articles)
Kiril Stoichev
Open Access Library Journal
Vol.1 No.9
,December 18, 2014
DOI:
10.4236/oalib.1101124
851
Downloads
1,848
Views
Citations
Research on a Secure Communication Protocol Based on National Secret SM2 Algorithm
(Articles)
Youhai Shao
,
Yong Wang
,
Yun Yang
,
Xiang Wang
Journal of Computer and Communications
Vol.10 No.1
,January 17, 2022
DOI:
10.4236/jcc.2022.101003
196
Downloads
1,284
Views
Citations
Research and Practice on Security Protection and Disaster Recovery Strategy of Oracle Database in Colleges and Universities
(Articles)
Man Liu
,
Lei Yu
Intelligent Information Management
Vol.14 No.2
,March 14, 2022
DOI:
10.4236/iim.2022.142005
209
Downloads
1,054
Views
Citations
Freedom of Religious Beliefs and Protection of Cultural Heritage: A Comparative Study between Four EU Member States and Recommendations for Training, Education and Awareness Raising
(Articles)
Panayiota Constanti
,
Mandy Stalder-Thon
,
Eliza Patouris
Open Journal of Social Sciences
Vol.11 No.4
,April 10, 2023
DOI:
10.4236/jss.2023.114001
67
Downloads
379
Views
Citations
The Impact of Religious Fundamentalism on Places of Worship
(Articles)
Nikolaos Dimitriadis
,
Catia Cruz
,
Ioanara Silva
,
José Paulo Oliveira
,
Eliza Patouris
Open Journal of Social Sciences
Vol.11 No.4
,April 19, 2023
DOI:
10.4236/jss.2023.114019
69
Downloads
2,171
Views
Citations
High-Impedance Bus Differential Protection Modeling in ATP/MODELS
(Articles)
Mardênnia T. S. Alvarenga
,
Priscila L. Vianna
,
Kleber M. Silva
Engineering
Vol.5 No.9B
,October 10, 2013
DOI:
10.4236/eng.2013.59B007
6,286
Downloads
8,659
Views
Citations
Evaluation of Sample Taxicab Security Cameras
(Articles)
Shengke Zeng
,
Harlan E. Amandus
,
Alfred A. Amendola
,
Richard S. Current
,
Bradley H. Newbraugh
,
Douglas M. Cantis
,
Darlene Weaver
Journal of Transportation Technologies
Vol.7 No.4
,October 12, 2017
DOI:
10.4236/jtts.2017.74026
863
Downloads
1,835
Views
Citations
The Evolution of Intellectual Property Protection in China
(Articles)
Lu Chen
iBusiness
Vol.7 No.1
,March 17, 2015
DOI:
10.4236/ib.2015.71008
8,370
Downloads
10,440
Views
Citations
Architecture Design for Integrated Wide Area Protection and Control Systems
(Articles)
Z. Q. Bo
,
Q. P. Wang
,
Lin Wang
,
Fengqun Zhou
,
Shengming Ge
,
B. M. Zhang
Journal of Power and Energy Engineering
Vol.3 No.4
,April 15, 2015
DOI:
10.4236/jpee.2015.34055
5,240
Downloads
6,354
Views
Citations
Experimental Evaluation of Cisco ASA-5510 Intrusion Prevention System against Denial of Service Attacks
(Articles)
Sanjeev Kumar
,
Raja Sekhar Reddy Gade
Journal of Information Security
Vol.3 No.2
,April 26, 2012
DOI:
10.4236/jis.2012.32015
8,477
Downloads
15,234
Views
Citations
Urban Market-Gardening in Parakou (Republic of Benin): Spatial Dynamics, Food Security, Protection of the Environment and Creation of Employments
(Articles)
Abdoul-Ramane Abdoulaye
,
Aboudou Yacoubou Mama Aboudou Ramanou
Journal of Geoscience and Environment Protection
Vol.3 No.5
,July 28, 2015
DOI:
10.4236/gep.2015.35011
3,179
Downloads
4,162
Views
Citations
Informative Signal Analysis: Metrology of the Underwater Geomagnetic Singularities in Low-Density Ionic Solution (Sea Water)
(Articles)
Osvaldo Faggioni
,
Maurizio Soldani
,
Giacomo Cozzani
,
Rodolfo Zunino
Journal of Signal and Information Processing
Vol.9 No.1
,December 28, 2017
DOI:
10.4236/jsip.2018.91001
846
Downloads
1,648
Views
Citations
Dying Traditional Water Bodies in India Struggling to Survive against Unplanned Development
(Articles)
Rudresh Sugam
,
Bhawna Gupta
,
Diticha Deka
Journal of Water Resource and Protection
Vol.10 No.6
,June 26, 2018
DOI:
10.4236/jwarp.2018.106030
1,148
Downloads
5,234
Views
Citations
A DoS Attacks Detection Aglorithm Based on Snort-BASE for Robotic Arm Control Systems
(Articles)
Nana Li
,
Yong Wang
,
Pengfei Shen
,
Shuangfei Li
,
Lin Zhou
Journal of Computer and Communications
Vol.10 No.4
,April 7, 2022
DOI:
10.4236/jcc.2022.104001
134
Downloads
594
Views
Citations
Development of the Software Application with Graphical User Interface for One Model Cyber Security
(Articles)
Ramaz R. Shamugia
Int'l J. of Communications, Network and System Sciences
Vol.12 No.12
,December 13, 2019
DOI:
10.4236/ijcns.2019.1212014
674
Downloads
1,593
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top