Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Technological Perspectives for Propulsion on Nuclear Attack Submarines
(Articles)
Luciano Ondir Freire
,
Delvonei Alves de Andrade
World Journal of Nuclear Science and Technology
Vol.6 No.4
,October 26, 2016
DOI:
10.4236/wjnst.2016.64028
1,855
Downloads
3,563
Views
Citations
Discussion and Research on Information Security Attack and Defense Platform Construction in Universities Based on Cloud Computing and Virtualization
(Articles)
Xiancheng Ding
Journal of Information Security
Vol.7 No.5
,October 27, 2016
DOI:
10.4236/jis.2016.75025
2,417
Downloads
3,830
Views
Citations
Cybersecurity: A Stochastic Predictive Model to Determine Overall Network Security Risk Using Markovian Process
(Articles)
Nawa Raj Pokhrel
,
Chris P. Tsokos
Journal of Information Security
Vol.8 No.2
,April 28, 2017
DOI:
10.4236/jis.2017.82007
2,374
Downloads
6,433
Views
Citations
Performance Assessment of a Calm Flapping Wind Turbine with Small Attack Angle
(Articles)
Md. Sabbir Alam
,
Hiroyuki Hirahara
Smart Grid and Renewable Energy
Vol.8 No.8
,August 21, 2017
DOI:
10.4236/sgre.2017.88018
1,387
Downloads
3,304
Views
Citations
Associated Risks in Mobile Applications Permissions
(Articles)
Mohammed Al Jutail
,
Mousa Al-Akhras
,
Abdulaziz Albesher
Journal of Information Security
Vol.10 No.2
,March 26, 2019
DOI:
10.4236/jis.2019.102004
1,809
Downloads
6,427
Views
Citations
Correlated Extra Reductions Defeat Fixed Window Exponentiation
(Articles)
Xiaohan Meng
Journal of Computer and Communications
Vol.7 No.10
,October 30, 2019
DOI:
10.4236/jcc.2019.710016
417
Downloads
944
Views
Citations
Cyberattack and the Use of Force in International Law
(Articles)
Joseph N. Madubuike-Ekwe
Beijing Law Review
Vol.12 No.2
,June 22, 2021
DOI:
10.4236/blr.2021.122034
1,338
Downloads
14,216
Views
Citations
Software Implementation of AES-128: Cross-Subkey Side Channel Attack
(Articles)
Fanliang Hu
,
Junnian Wang
,
Wan Wang
,
Feng Ni
Open Access Library Journal
Vol.9 No.1
,January 27, 2022
DOI:
10.4236/oalib.1108307
113
Downloads
1,008
Views
Citations
Taming the Shrew of Rising Cyber-Warfare
(Articles)
Festus C. Obi
,
Alaba M. Oludare
Open Access Library Journal
Vol.9 No.12
,December 28, 2022
DOI:
10.4236/oalib.1109003
82
Downloads
732
Views
Citations
Study of the Effect of Plastic Aggregates on Drying Shrinkage and Expansion of Concrete
(Articles)
Kouamou Nguessi Arnaud
,
Yamb Emmanuel
,
Ndigui Billong
,
Ngwem Bayiha Blaise
,
Mbuh Moses Kuma
,
Tchemou Gilbert
,
Christian Hyeng Bock
,
Madouma Madouma Arnold
Materials Sciences and Applications
Vol.14 No.4
,April 10, 2023
DOI:
10.4236/msa.2023.144015
163
Downloads
817
Views
Citations
The Knowledge of Cyber-Security Vulnerabilities in an Institution of Higher and University Education. A Case of ISP-Bukavu (Institut Supérieur Pédagogique de Bukavu) (TTC = Teachers’ Training College)
(Articles)
Dominique Wasso Kiseki
,
Vincent Havyarimana
,
Therence Niyonsaba
,
Désiré Lumonge Zabagunda
,
Walumbuka Ilundu Wail
,
Thabo Semong
Journal of Computer and Communications
Vol.11 No.4
,April 24, 2023
DOI:
10.4236/jcc.2023.114002
164
Downloads
799
Views
Citations
Awareness of the Importance of Cardiopulmonary Resuscitation Skills Following the Sudden Cardiac Arrest of Damar Hamlin during a Buffalo Bills Game
(Articles)
Puja Sengupta
,
Mariana Adieb
,
Simona Maksimyan
,
Maxim Crasta
Journal of Biosciences and Medicines
Vol.11 No.6
,June 21, 2023
DOI:
10.4236/jbm.2023.116013
181
Downloads
1,375
Views
Citations
Retrospective Study of an Epidemic
Vibrio cholerae
in the Central Region of Ghana: An Evidence from Surveillance Data
(Articles)
Gideon Kwarteng Acheampong
,
Isaac Owusu
,
Fidelis Zumah
,
Ernest Akyereko
,
Rebecca Ann Mpangah
Open Access Library Journal
Vol.10 No.9
,September 27, 2023
DOI:
10.4236/oalib.1110603
65
Downloads
426
Views
Citations
Study on the Use of Artificial Intelligence for Cybersecurity in Companies: Case of Companies in Burkina Faso
(Articles)
Yanogo Kiswendsida Jean Hermann
,
Ouedraogo Tounwendyam Frederic
Engineering
Vol.15 No.12
,December 11, 2023
DOI:
10.4236/eng.2023.1512056
226
Downloads
1,404
Views
Citations
Psychological Consequences of a Mass Attack Following Multiple Gunshots and Explosions among Victims in a State in Southwest Nigeria
(Articles)
Adewale Moses Adejugbagbe
,
Dele David Omoniyi
,
Akinola Ayoola Fatiregun
,
Modupeola Oluwakemi Dosumu
,
Ngozi Onyejiaka
,
Banji Awolowo Ajaka
,
Stephen Fagbemi
Open Journal of Epidemiology
Vol.14 No.1
,February 8, 2024
DOI:
10.4236/ojepi.2024.141007
134
Downloads
481
Views
Citations
Intelligent Detection and Identification of Attacks in IoT Networks Based on the Combination of DNN and LSTM Methods with a Set of Classifiers
(Articles)
Brou Médard Kouassi
,
Vincent Monsan
,
Kablan Jérôme Adou
Open Journal of Applied Sciences
Vol.14 No.8
,August 27, 2024
DOI:
10.4236/ojapps.2024.148153
70
Downloads
318
Views
Citations
Development of Two-Factor Authentication to Mitigate Phishing Attack
(Articles)
Varun Dixit
,
Davinderjit Kaur
Journal of Software Engineering and Applications
Vol.17 No.11
,November 6, 2024
DOI:
10.4236/jsea.2024.1711043
112
Downloads
599
Views
Citations
Experimental Evaluation of Juniper Network's Netscreen-5GT Security Device against Layer4 Flood Attacks
(Articles)
Sanjeev Kumar
,
Raja Sekhar Reddy Gade
Journal of Information Security
Vol.2 No.1
,January 31, 2011
DOI:
10.4236/jis.2011.21005
6,068
Downloads
11,360
Views
Citations
An Actual Survey of Dimensionality Reduction
(Articles)
Alireza Sarveniazi
American Journal of Computational Mathematics
Vol.4 No.2
,March 21, 2014
DOI:
10.4236/ajcm.2014.42006
7,700
Downloads
11,767
Views
Citations
The Paper Published by Dr. I. Brondz: Analytical Methods in Quality Control of Scientific Publications Part IV: Fraud Ordered by the Pharmaceutical Industry
(Articles)
Boris Sedunov
Voice of the Publisher
Vol.1 No.1
,June 30, 2015
DOI:
10.4236/vp.2015.11004
3,872
Downloads
4,752
Views
Citations
<
...
3
4
5
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top