Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Cybersecurity and Domestic Terrorism: Purpose and Future
(Articles)
Robb Shawe
,
Ian R. McAndrew
Journal of Software Engineering and Applications
Vol.16 No.10
,October 31, 2023
DOI:
10.4236/jsea.2023.1610028
210
Downloads
1,003
Views
Citations
Cloud Computing Security, Protecting University Information
(Articles)
Anita C. Eluwa
Open Access Library Journal
Vol.10 No.11
,November 28, 2023
DOI:
10.4236/oalib.1110925
88
Downloads
553
Views
Citations
Study on the Use of Artificial Intelligence for Cybersecurity in Companies: Case of Companies in Burkina Faso
(Articles)
Yanogo Kiswendsida Jean Hermann
,
Ouedraogo Tounwendyam Frederic
Engineering
Vol.15 No.12
,December 11, 2023
DOI:
10.4236/eng.2023.1512056
227
Downloads
1,408
Views
Citations
Enhancing Security for Legacy Factory Machines: A Continuous Key Renewal Algorithm for Securing Group of Machines
(Articles)
Nicolas Ferry
,
Paul-Eric Dossou
,
Gabriel Ihowa
,
Gaspard Laouenan
Journal of Software Engineering and Applications
Vol.16 No.12
,December 29, 2023
DOI:
10.4236/jsea.2023.1612037
175
Downloads
675
Views
Citations
A Review of Cybersecurity Challenges in Small Business: The Imperative for a Future Governance Framework
(Articles)
Binita Saha
,
Zahid Anwar
Journal of Information Security
Vol.15 No.1
,January 15, 2024
DOI:
10.4236/jis.2024.151003
757
Downloads
6,825
Views
Citations
Enhancing Mobile Security through Comprehensive Penetration Testing
(Articles)
Maryam Roshanaei
Journal of Information Security
Vol.15 No.2
,February 27, 2024
DOI:
10.4236/jis.2024.152006
409
Downloads
2,055
Views
Citations
This article belongs to the Special Issue on
Cybersecurity and Information Security
From Standard Policy-Based Zero Trust to Absolute Zero Trust (AZT): A Quantum Leap to Q-Day Security
(Articles)
Fazal Raheman
Journal of Computer and Communications
Vol.12 No.3
,March 29, 2024
DOI:
10.4236/jcc.2024.123016
214
Downloads
1,414
Views
Citations
Competencies in Computer Security and Resolution of Technological Problems in Higher Education Students
(Articles)
Esteban Pérez Flores
,
Alejandra Aldrette Malacara
,
Sandra R. Murillo Cano
,
Vittorio Zanella Palacios
Journal of Computer and Communications
Vol.12 No.4
,April 24, 2024
DOI:
10.4236/jcc.2024.124013
85
Downloads
486
Views
Citations
Cyber Deception Using NLP
(Articles)
Igor Godefroy Kouam Kamdem
,
Marcellin Nkenlifack
Journal of Information Security
Vol.15 No.2
,April 30, 2024
DOI:
10.4236/jis.2024.152016
172
Downloads
827
Views
Citations
Navigating AI Cybersecurity: Evolving Landscape and Challenges
(Articles)
Maryam Roshanaei
,
Mahir R. Khan
,
Natalie N. Sylvester
Journal of Intelligent Learning Systems and Applications
Vol.16 No.3
,June 19, 2024
DOI:
10.4236/jilsa.2024.163010
412
Downloads
2,100
Views
Citations
Defining Quantum Advantage for Building a Sustainable MVP to Deliver Quantum Computing Services
(Articles)
Fazal Raheman
Open Journal of Applied Sciences
Vol.14 No.6
,June 24, 2024
DOI:
10.4236/ojapps.2024.146102
76
Downloads
551
Views
Citations
Enhancing Cybersecurity through AI and ML: Strategies, Challenges, and Future Directions
(Articles)
Maryam Roshanaei
,
Mahir R. Khan
,
Natalie N. Sylvester
Journal of Information Security
Vol.15 No.3
,July 5, 2024
DOI:
10.4236/jis.2024.153019
1,174
Downloads
8,347
Views
Citations
Enhancing Cybersecurity through Cloud Computing Solutions in the United States
(Articles)
Omolola F. Hassan
,
Folorunsho O. Fatai
,
Oluwadare Aderibigbe
,
Abdullah Oladoyin Akinde
,
Tolulope Onasanya
,
Mariam Adetoun Sanusi
,
Oduwunmi Odukoya
Intelligent Information Management
Vol.16 No.4
,July 12, 2024
DOI:
10.4236/iim.2024.164011
311
Downloads
1,990
Views
Citations
Futureproofing Blockchain & Cryptocurrencies against Growing Vulnerabilities & Q-Day Threat with Quantum-Safe Ledger Technology (QLT)
(Articles)
Fazal Raheman
Journal of Computer and Communications
Vol.12 No.7
,July 26, 2024
DOI:
10.4236/jcc.2024.127005
110
Downloads
700
Views
Citations
Exploring the Latest Trends in AI Technologies: A Study on Current State, Application and Individual Impacts
(Articles)
Md Ahsan Ullah Imran
,
Mustakim Bin Aziz
,
Anamika Tiwari
,
Sanchita Saha
,
Ashok Ghimire
Journal of Computer and Communications
Vol.12 No.8
,August 13, 2024
DOI:
10.4236/jcc.2024.128002
157
Downloads
1,154
Views
Citations
A Review of Artificial Intelligence Applications in Contemporary Computer Network Technologies
(Articles)
Ackim Lutepo
,
Kai Zhang
Communications and Network
Vol.16 No.3
,August 20, 2024
DOI:
10.4236/cn.2024.163005
201
Downloads
1,246
Views
Citations
Cybersecurity Framework for Kenyan Universities in Conformity with ISO/IEC 27001:2022 Standard
(Articles)
Patrick Macharia Gichubi
,
Bernard Maake
,
Ruth Chweya
Open Access Library Journal
Vol.11 No.8
,August 30, 2024
DOI:
10.4236/oalib.1110810
82
Downloads
516
Views
Citations
Deep Learning-Based Two-Step Approach for Intrusion Detection in Networks
(Articles)
Kamagaté Beman Hamidja
,
Kanga Koffi
,
Kouassi Adless
,
Olivier Asseu
,
Souleymane Oumtanaga
International Journal of Internet and Distributed Systems
Vol.6 No.2
,November 22, 2024
DOI:
10.4236/ijids.2024.62002
96
Downloads
513
Views
Citations
The Innovations and Trends of Information Technology with AI: Weapons to Reassemble the Future World
(Articles)
Nur Vanu
,
Md. Omar Farouk
,
Md. Samiun
,
Sadia Sharmin
,
Misha Billah
,
Saddam Hossain
Journal of Computer and Communications
Vol.12 No.12
,December 18, 2024
DOI:
10.4236/jcc.2024.1212003
69
Downloads
481
Views
Citations
Unveiling Insider Threats: Examining Vulnerabilities in an Organizational Structure: A Case Study of NamPost
(Articles)
Iyaloo N. Waiganjo
,
Linekela S. Nandjenda
Open Access Library Journal
Vol.12 No.1
,January 8, 2025
DOI:
10.4236/oalib.1112797
39
Downloads
265
Views
Citations
<
...
2
3
4
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top