Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Cyber Resilience through Real-Time Threat Analysis in Information Security
(Articles)
Aparna Gadhi
,
Ragha Madhavi Gondu
,
Hitendra Chaudhary
,
Olatunde Abiona
Int'l J. of Communications, Network and System Sciences
Vol.17 No.4
,April 30, 2024
DOI:
10.4236/ijcns.2024.174004
209
Downloads
849
Views
Citations
A New Construction Scheme for Information Security Lab
(Articles)
Li Zhu
,
Huaqing Mao
,
Zhiwen Hu
Creative Education
Vol.3 No.4
,August 13, 2012
DOI:
10.4236/ce.2012.34064
5,121
Downloads
7,437
Views
Citations
Keyboard Dependency of Personal Identification Performance by Keystroke Dynamics in Free Text Typing
(Articles)
Yoshitomo Matsubara
,
Toshiharu Samura
,
Haruhiko Nishimura
Journal of Information Security
Vol.6 No.3
,July 14, 2015
DOI:
10.4236/jis.2015.63023
5,151
Downloads
7,739
Views
Citations
Camera and Voice Control Based Location Services and Information Security on Android
(Articles)
Jitendra G. Chouhan
,
Nikhil Kumar Singh
,
Prashant S. Modi
,
Keyurbhai A. Jani
,
Bhavin N. Joshi
Journal of Information Security
Vol.7 No.3
,April 15, 2016
DOI:
10.4236/jis.2016.73015
3,721
Downloads
5,327
Views
Citations
Improving the Cybersecurity Framework for Future Consumer Networks
(Articles)
Tyler Welker
,
Olatunde Abiona
Int'l J. of Communications, Network and System Sciences
Vol.14 No.4
,April 30, 2021
DOI:
10.4236/ijcns.2021.144004
976
Downloads
2,394
Views
Citations
Strengthening the Security of Supervised Networks by Automating Hardening Mechanisms
(Articles)
Patrick Dany Bavoua Kenfack
,
Alphonse Binele Abana
,
Emmanuel Tonye
,
Genevieve Elvira Ndjana Leka
Journal of Computer and Communications
Vol.11 No.5
,May 26, 2023
DOI:
10.4236/jcc.2023.115009
149
Downloads
868
Views
Citations
Is Public Co-Ordination of Investment in Information Security Desirable?
(Articles)
Christos Ioannidis
,
David Pym
,
Julian Williams
Journal of Information Security
Vol.7 No.2
,March 30, 2016
DOI:
10.4236/jis.2016.72005
3,063
Downloads
4,106
Views
Citations
This article belongs to the Special Issue on
Cybersecurity Investments
Information Availability: An Insight into the Most Important Attribute of Information Security
(Articles)
Suhail Qadir
,
S. M. K. Quadri
Journal of Information Security
Vol.7 No.3
,April 15, 2016
DOI:
10.4236/jis.2016.73014
7,801
Downloads
21,591
Views
Citations
The Impact of Accountants Participation in Development for Computerized Accounting Information Systems on the Success of these Systems’ Performance
(Articles)
Tarek Abdelhafid Elsharif
Open Access Library Journal
Vol.5 No.11
,November 14, 2018
DOI:
10.4236/oalib.1104995
1,329
Downloads
5,389
Views
Citations
Analysis of the Problems of Ensuring Information Security in the Terms of the Contemporary Society
(Articles)
Dmitrii S. Brazevich
,
Zhanna S. Safronova
,
Tatyana N. Kosheleva
,
Alla V. Biryukova
Open Journal of Social Sciences
Vol.8 No.2
,February 28, 2020
DOI:
10.4236/jss.2020.82018
905
Downloads
2,831
Views
Citations
Identification and Validation of Social Media Socio-Technical Information Security Factors with Respect to Usable-Security Principles
(Articles)
Joe Mutebi
,
Margaret Kareyo
,
Umezuruike Chinecherem
,
Akampurira Paul
Journal of Computer and Communications
Vol.10 No.8
,August 17, 2022
DOI:
10.4236/jcc.2022.108004
251
Downloads
1,023
Views
Citations
Classification of Big Data Security Based on Ontology Web Language
(Articles)
Alsadig Mohammed Adam Abdallah
,
Amir Mohamed Talib
Journal of Information Security
Vol.14 No.1
,January 31, 2023
DOI:
10.4236/jis.2023.141006
219
Downloads
945
Views
Citations
Intelligent Multi-Agent Based Information Management Methods to Direct Complex Industrial Systems
(Articles)
Danilo Avola
,
Luigi Cinque
,
Giuseppe Placidi
Intelligent Information Management
Vol.4 No.6
,November 28, 2012
DOI:
10.4236/iim.2012.46038
5,452
Downloads
8,982
Views
Citations
Information System/Information Technology Strategic Planning in Order Information Technology Development Strategy Using TOGAF (The Open Group Architecture Framework) Methodology in Achieving World Class University in Satya Wacana Christian University
(Articles)
Augie David Manuputty
,
Agustinus Fritz Wijaya
Intelligent Information Management
Vol.5 No.6
,November 28, 2013
DOI:
10.4236/iim.2013.56019
5,814
Downloads
8,939
Views
Citations
High Immunization Coverage but Delayed Immunization Reflects Gaps in Health Management Information System (HMIS) in District Kangra, Himachal Pradesh, India—An Immunization Evaluation
(Articles)
Rajesh Kumar Sood
,
Anjali Sood
,
Omesh Kumar Bharti
,
Vidya Ramachandran
,
Archana Phull
World Journal of Vaccines
Vol.5 No.2
,April 16, 2015
DOI:
10.4236/wjv.2015.52009
6,390
Downloads
7,795
Views
Citations
Supply Chain for Regional Centralized Purchasing: An Application Model
(Articles)
Alessandro Pepino
,
Marcella Rovani
,
Adriano Torri
,
Mario Sansone
Intelligent Information Management
Vol.4 No.5A
,October 30, 2012
DOI:
10.4236/iim.2012.425038
6,891
Downloads
9,882
Views
Citations
This article belongs to the Special Issue on
Information System and Management
Applying Information Technology to Financial Statement Analysis for Market Capitalization Prediction
(Articles)
Hayden Wimmer
,
Roy Rada
Open Journal of Accounting
Vol.2 No.1
,January 29, 2013
DOI:
10.4236/ojacct.2013.21001
7,285
Downloads
13,793
Views
Citations
Global River Basin Modeling and Contaminant Transport
(Articles)
Rakesh Bahadur
,
Christopher Ziemniak
,
David E. Amstutz
,
William B. Samuels
American Journal of Climate Change
Vol.2 No.2
,June 24, 2013
DOI:
10.4236/ajcc.2013.22014
5,555
Downloads
8,600
Views
Citations
Use of Video Clips in a Virtual Learning Environment of Accounting Information Systems Class—A Case Study
(Articles)
Baozhou Lu
,
Liang Song
Open Journal of Accounting
Vol.2 No.4
,October 21, 2013
DOI:
10.4236/ojacct.2013.24015
7,583
Downloads
10,880
Views
Citations
Airport Information Systems—Airside Management Information Systems
(Articles)
Adam Marks
,
Kees Rietsema
Intelligent Information Management
Vol.6 No.3
,May 29, 2014
DOI:
10.4236/iim.2014.63016
14,616
Downloads
18,263
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top