Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
The Role of AI in Cyber Security: Safeguarding Digital Identity
(Articles)
Mohammad Binhammad
,
Shaikha Alqaydi
,
Azzam Othman
,
Laila Hatim Abuljadayel
Journal of Information Security
Vol.15 No.2
,April 30, 2024
DOI:
10.4236/jis.2024.152015
970
Downloads
7,275
Views
Citations
Security Challenges around the Student Representative Council’s e-Voting System at Public-Funded University in the Western Cape
(Articles)
Joel Chigada
,
Dion Steven Tawanda Mazhawidza
Open Access Library Journal
Vol.11 No.9
,September 25, 2024
DOI:
10.4236/oalib.1112166
35
Downloads
736
Views
Citations
Informal Cross-Border Trade and Security Concerns in the IGAD Region: An Interrogation of the Policy Framework
(Articles)
Michael Omondi Owiso
,
Odhiambo Alphonce Kasera
Open Journal of Social Sciences
Vol.13 No.1
,January 7, 2025
DOI:
10.4236/jss.2025.131002
51
Downloads
290
Views
Citations
Weighted Voting Ensemble Model Integrated with IoT for Detecting Security Threats in Satellite Systems and Aerial Vehicles
(Articles)
Raed Alharthi
Journal of Computer and Communications
Vol.13 No.2
,February 28, 2025
DOI:
10.4236/jcc.2025.132016
56
Downloads
248
Views
Citations
Security: A Core Issue in Mobile
Ad hoc
Networks
(Articles)
Asif Shabbir
,
Fayyaz Khalid
,
Syed Muqsit Shaheed
,
Jalil Abbas
,
M. Zia-Ul-Haq
Journal of Computer and Communications
Vol.3 No.12
,December 9, 2015
DOI:
10.4236/jcc.2015.312005
5,124
Downloads
6,933
Views
Citations
Third-Party Information Security: Generic Qualitative Inquiry in Banking and Financial Services
(Articles)
Genemar Arthur Lazo
Journal of Financial Risk Management
Vol.13 No.3
,September 27, 2024
DOI:
10.4236/jfrm.2024.133027
68
Downloads
400
Views
Citations
Efficient DPA Attacks on AES Hardware Implementations
(Articles)
Yu HAN
,
Xuecheng ZOU
,
Zhenglin LIU
,
Yicheng CHEN
Int'l J. of Communications, Network and System Sciences
Vol.1 No.1
,June 6, 2008
DOI:
10.4236/ijcns.2008.11010
7,993
Downloads
16,983
Views
Citations
Five Basic Types of Insider DoS Attacks of Code Dissemination in Wireless Sensor Networks
(Articles)
Yu ZHANG
,
Xing She ZHOU
,
Yi Ming JI
,
Yee Wei LAW
,
Marimuthu PALANISWAMI
Int'l J. of Communications, Network and System Sciences
Vol.2 No.1
,February 26, 2009
DOI:
10.4236/ijcns.2009.21008
7,297
Downloads
15,296
Views
Citations
The Analysis of the Structure and Security of Home Control Subnet
(Articles)
Chengyi WANG
,
Yun ZHANG
Wireless Sensor Network
Vol.1 No.1
,April 10, 2009
DOI:
10.4236/wsn.2009.11009
6,164
Downloads
10,983
Views
Citations
Impact of Irrigation on Food Security in Bangladesh for the Past Three Decades
(Articles)
M. Wakilur RAHMAN
,
Lovely PARVIN
Journal of Water Resource and Protection
Vol.1 No.3
,September 21, 2009
DOI:
10.4236/jwarp.2009.13027
8,811
Downloads
16,147
Views
Citations
QoS-Guaranteed Secure Multicast Routing Protocol for Satellite IP Networks Using Hierarchical Architecture
(Articles)
Zhizhong Yin
,
Long Zhang
,
Xianwei Zhou
,
Peng Xu
,
Yu Deng
Int'l J. of Communications, Network and System Sciences
Vol.3 No.4
,April 30, 2010
DOI:
10.4236/ijcns.2010.34045
5,698
Downloads
11,007
Views
Citations
Reconstruction of Wireless UWB Pulses by Exponential Sampling Filter
(Articles)
Juuso T. Olkkonen
,
Hannu Olkkonen
Wireless Sensor Network
Vol.2 No.6
,June 24, 2010
DOI:
10.4236/wsn.2010.26057
4,712
Downloads
8,600
Views
Citations
The Design of an Intelligent Security Access Control System Based on Fingerprint Sensor FPC1011C
(Articles)
Yan Wang
,
Hongli Liu
,
Jun Feng
Circuits and Systems
Vol.1 No.1
,July 28, 2010
DOI:
10.4236/cs.2010.11005
10,779
Downloads
20,731
Views
Citations
An Adaptive Key Management Framework for the Wireless Mesh and Sensor Networks
(Articles)
Mi Wen
,
Zhi Yin
,
Yu Long
,
Yong Wang
Wireless Sensor Network
Vol.2 No.9
,September 30, 2010
DOI:
10.4236/wsn.2010.29083
5,557
Downloads
10,547
Views
Citations
Sustainable Tourism Using Security Cameras with Privacy Protecting Ability
(Articles)
V. Prashyanusorn
,
Y. Fujii
,
S. Kaviya
,
S. Mitatha
,
P. P. Yupapin
Journal of Information Security
Vol.1 No.2
,October 29, 2010
DOI:
10.4236/jis.2010.12008
4,339
Downloads
9,657
Views
Citations
A Novel Attack Graph Posterior Inference Model Based on Bayesian Network
(Articles)
Shaojun Zhang
,
Shanshan Song
Journal of Information Security
Vol.2 No.1
,January 31, 2011
DOI:
10.4236/jis.2011.21002
6,766
Downloads
12,434
Views
Citations
Effective and Extensive Virtual Private Network
(Articles)
Tarek S. Sobh
,
Yasser Aly
Journal of Information Security
Vol.2 No.1
,January 31, 2011
DOI:
10.4236/jis.2011.21004
7,387
Downloads
15,686
Views
Citations
Ambient Intelligence: Awareness Context Application in Industrial Storage
(Articles)
Ahmed Zouinkhi
,
Eddy Bajic
,
Eric Rondeau
,
Mohamed Ben Gayed
,
Mohamed Naceur Abdelkrim
Wireless Sensor Network
Vol.3 No.4
,March 31, 2011
DOI:
10.4236/wsn.2011.34016
5,069
Downloads
9,810
Views
Citations
A Comparison of Link Layer Attacks on Wireless Sensor Networks
(Articles)
Shahriar Mohammadi
,
Reza Ebrahimi Atani
,
Hossein Jadidoleslamy
Journal of Information Security
Vol.2 No.2
,April 8, 2011
DOI:
10.4236/jis.2011.22007
7,811
Downloads
15,874
Views
Citations
Midwife’s experiences of using intuition as a motivating element in conveying assurance and care
(Articles)
Agneta Olsson
,
Annsofie Adolfsson
Health
Vol.3 No.7
,July 18, 2011
DOI:
10.4236/health.2011.37075
4,961
Downloads
9,974
Views
Citations
<
...
12
13
14
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top