Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Improving General Undergraduate Cyber Security Education: A Responsibility for All Universities?
(Articles)
Stephanie M. Redman
,
Kate J. Yaxley
,
Keith F. Joiner
Creative Education
Vol.11 No.12
,December 9, 2020
DOI:
10.4236/ce.2020.1112187
607
Downloads
1,771
Views
Citations
Pricing Cyber Security Insurance
(Articles)
Zhaoxin Lin
,
Travis R. A. Sapp
,
Rahul Parsa
,
Jackie Rees Ulmer
,
Chengxin Cao
Journal of Mathematical Finance
Vol.12 No.1
,January 18, 2022
DOI:
10.4236/jmf.2022.121003
363
Downloads
2,517
Views
Citations
A DoS Attacks Detection Aglorithm Based on Snort-BASE for Robotic Arm Control Systems
(Articles)
Nana Li
,
Yong Wang
,
Pengfei Shen
,
Shuangfei Li
,
Lin Zhou
Journal of Computer and Communications
Vol.10 No.4
,April 7, 2022
DOI:
10.4236/jcc.2022.104001
137
Downloads
609
Views
Citations
Identification and Validation of Social Media Socio-Technical Information Security Factors with Respect to Usable-Security Principles
(Articles)
Joe Mutebi
,
Margaret Kareyo
,
Umezuruike Chinecherem
,
Akampurira Paul
Journal of Computer and Communications
Vol.10 No.8
,August 17, 2022
DOI:
10.4236/jcc.2022.108004
177
Downloads
836
Views
Citations
Cyber-Security of Smart Grids: Attacks, Detection, Countermeasure Techniques, and Future Directions
(Articles)
Tala Talaei Khoei
,
Hadjar Ould Slimane
,
Naima Kaabouch
Communications and Network
Vol.14 No.4
,November 24, 2022
DOI:
10.4236/cn.2022.144009
714
Downloads
6,156
Views
Citations
Appraising the Manifestation of Optimism Bias and Its Impact on Human Perception of Cyber Security: A Meta Analysis
(Articles)
Khaled M. Alnifie
,
Charles Kim
Journal of Information Security
Vol.14 No.2
,February 23, 2023
DOI:
10.4236/jis.2023.142007
385
Downloads
1,895
Views
Citations
Study the Effectiveness of ISO 27001 to Mitigate the Cyber Security Threats in the Egyptian Downstream Oil and Gas Industry
(Articles)
Mohamed Shohoud
Journal of Information Security
Vol.14 No.2
,April 28, 2023
DOI:
10.4236/jis.2023.142010
265
Downloads
1,467
Views
Citations
Investigating How Parental Perceptions of Cybersecurity Influence Children’s Safety in the Cyber World: A Case Study of Saudi Arabia
(Articles)
Tariq Saeed Mian
,
Eman M. Alatawi
Intelligent Information Management
Vol.15 No.5
,September 11, 2023
DOI:
10.4236/iim.2023.155017
129
Downloads
818
Views
Citations
Enhancing Security in QR Code Technology Using AI: Exploration and Mitigation Strategies
(Articles)
Saranya Vaithilingam
,
Santhosh Aradhya Mohan Shankar
International Journal of Intelligence Science
Vol.14 No.2
,March 26, 2024
DOI:
10.4236/ijis.2024.142003
53
Downloads
331
Views
Citations
Exploring the Characteristics of Data Breaches: A Descriptive Analytic Study
(Articles)
Dominik Molitor
,
Aditya Saharia
,
Viju Raghupathi
,
Wullianallur Raghupathi
Journal of Information Security
Vol.15 No.2
,April 2, 2024
DOI:
10.4236/jis.2024.152011
84
Downloads
537
Views
Citations
A Study on the Challenges of Human-Centric Cyber-Security and the Guarantee of Information Quality
(Articles)
Mohammed Hussein Kurdi
,
Mohsen Denden
,
David Paul
Journal of Information Security
Vol.15 No.2
,April 24, 2024
DOI:
10.4236/jis.2024.152013
137
Downloads
870
Views
Citations
International Telecommunication Union Standardization for Trust Provisioning in Information, Communication and Technology Infrastructure toward Achieving United Nation’s Sustainable Development Goals
(Articles)
Maryam Roshanaei
,
Qiang Duan
Journal of Computer and Communications
Vol.9 No.10
,October 13, 2021
DOI:
10.4236/jcc.2021.910004
207
Downloads
1,176
Views
Citations
Modeling Cyber Loss Severity Using a Spliced Regression Distribution with Mixture Components
(Articles)
Meng Sun
Open Journal of Statistics
Vol.13 No.4
,July 11, 2023
DOI:
10.4236/ojs.2023.134021
150
Downloads
703
Views
Citations
This article belongs to the Special Issue on
Multivariate Statistical Analysis
Cyber Resilience through Real-Time Threat Analysis in Information Security
(Articles)
Aparna Gadhi
,
Ragha Madhavi Gondu
,
Hitendra Chaudhary
,
Olatunde Abiona
Int'l J. of Communications, Network and System Sciences
Vol.17 No.4
,April 30, 2024
DOI:
10.4236/ijcns.2024.174004
27
Downloads
81
Views
Citations
Mathematical Nanotechnology: Quantum Field Intentionality
(Articles)
Francisco Bulnes
Journal of Applied Mathematics and Physics
Vol.1 No.5
,October 22, 2013
DOI:
10.4236/jamp.2013.15005
6,100
Downloads
10,797
Views
Citations
Digital Transformation of Small and Medium Sized Enterprises Production Manufacturing
(Articles)
Manel Koumas
,
Paul-Eric Dossou
,
Jean-Yves Didier
Journal of Software Engineering and Applications
Vol.14 No.12
,December 17, 2021
DOI:
10.4236/jsea.2021.1412036
1,106
Downloads
4,747
Views
Citations
Dissent under Siege: Case Studies of Repression in the Digital Era of Bangladesh
(Articles)
Ahmed Tahsin Shams
Advances in Journalism and Communication
Vol.12 No.1
,March 29, 2024
DOI:
10.4236/ajc.2024.121011
32
Downloads
165
Views
Citations
Cyberspace Security Using Adversarial Learning and Conformal Prediction
(Articles)
Harry Wechsler
Intelligent Information Management
Vol.7 No.4
,July 10, 2015
DOI:
10.4236/iim.2015.74016
6,943
Downloads
8,545
Views
Citations
<
...
2
3
4
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top