Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journals
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Publication Date:
📅
--📅
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
The Influence of China Demographic Structure on Social Security Expenditure—Based on Panel Data Model
(Articles)
Shichang Shen
,
Ying Wu
Open Journal of Statistics
Vol.8 No.3
, June 15, 2018
DOI:
10.4236/ojs.2018.83036
936
Downloads
2,193
Views
Citations
Analysis of Rural Households Food Security in Western Ethiopia
(Articles)
Seid Sani
,
Biruk Kemaw
Food and Nutrition Sciences
Vol.10 No.3
, March 5, 2019
DOI:
10.4236/fns.2019.103019
2,325
Downloads
5,691
Views
Citations
This article belongs to the Special Issue on
Food Analysis
Effects of Regional Trade Agreements on Strategic Agricultural Trade in Africa and Its Implications to Food Security: Evidence from Gravity Model Estimation
(Articles)
Fredu Nega Tegebu
,
Edris Hussein Seid
Theoretical Economics Letters
Vol.9 No.4
, March 18, 2019
DOI:
10.4236/tel.2019.94037
1,011
Downloads
3,274
Views
Citations
A Model “Critical Decision-Making Model”, Case-Study of Ghana, West Africa
(Articles)
Ishmael Norman
Advances in Applied Sociology
Vol.13 No.4
, April 27, 2023
DOI:
10.4236/aasoci.2023.134020
213
Downloads
1,123
Views
Citations
Dynamic Signature Verification Using Pattern Recognition
(Articles)
Emmanuel Nwabueze Ekwonwune
,
Duroha Austin Ekekwe
,
Chinyere Iheakachi Ubochi
,
Henry Chinedu Oleribe
Journal of Software Engineering and Applications
Vol.17 No.5
, May 27, 2024
DOI:
10.4236/jsea.2024.175012
208
Downloads
1,249
Views
Citations
Development of a Conceptual Model for Ensuring Cyber-Resilience of Software Systems
(Articles)
Shafagat Mahmudova
Open Access Library Journal
Vol.11 No.7
, July 10, 2024
DOI:
10.4236/oalib.1111787
85
Downloads
669
Views
Citations
Optimizing Network Security via Ensemble Learning: A Nexus with Intrusion Detection
(Articles)
Anu Baluguri
,
Vasudha Pasumarthy
,
Indranil Roy
,
Bidyut Gupta
,
Nick Rahimi
Journal of Information Security
Vol.15 No.4
, October 22, 2024
DOI:
10.4236/jis.2024.154030
125
Downloads
1,151
Views
Citations
A Comprehensive Review of Cybersecurity for Modern Work: Attacks, Zero Trust and NIS2 Compliance
(Articles)
Cristina-Ioana Călin
,
Andreea-Mihaela Comșiț
Journal of Computer and Communications
Vol.13 No.8
, August 15, 2025
DOI:
10.4236/jcc.2025.138007
79
Downloads
464
Views
Citations
Research on the Contents and Indexes of Reservoir Operational Security
(Articles)
Jingchun Feng
,
Zhongnan Duan
Journal of Water Resource and Protection
Vol.2 No.11
, November 29, 2010
DOI:
10.4236/jwarp.2010.211115
6,269
Downloads
9,800
Views
Citations
Food Is Security: The Nexus of Health Security in Fragile and Failed States
(Articles)
John Quinn
,
Tomas Zeleny
,
Vladimir Bencko
Food and Nutrition Sciences
Vol.5 No.19
, October 14, 2014
DOI:
10.4236/fns.2014.519197
5,080
Downloads
6,882
Views
Citations
On Development of Platform for Organization Security Threat Analytics and Management (POSTAM) Using Rule-Based Approach
(Articles)
Joseph E. Mbowe
,
Simon S. Msanjila
,
George S. Oreku
,
Khamisi Kalegele
Journal of Software Engineering and Applications
Vol.9 No.12
, December 30, 2016
DOI:
10.4236/jsea.2016.912041
1,911
Downloads
3,205
Views
Citations
The Necessity of Information Security in the Vulnerable Pharmaceutical Industry
(Articles)
Shawn Josette Roberts
Journal of Information Security
Vol.5 No.4
, September 25, 2014
DOI:
10.4236/jis.2014.54014
7,293
Downloads
10,524
Views
Citations
Externalities and the Magnitude of Cyber Security Underinvestment by Private Sector Firms: A Modification of the Gordon-Loeb Model
(Articles)
Lawrence A. Gordon
,
Martin P. Loeb
,
William Lucyshyn
,
Lei Zhou
Journal of Information Security
Vol.6 No.1
, January 7, 2015
DOI:
10.4236/jis.2015.61003
8,206
Downloads
11,386
Views
Citations
Association between the Performance of the University Security Officers and Their Physical Fitness: A Case Study
(Articles)
A. M. Razmy
,
A. Jabeer
Open Access Library Journal
Vol.4 No.6
, June 12, 2017
DOI:
10.4236/oalib.1103239
1,183
Downloads
2,401
Views
Citations
Towards Maintaining Peacefulness of the Sea: Legal Regime Governing Maritime Safety and Security in Nigeria
(Articles)
Ekundayo Oluwaremilekun Babatunde
,
Mutiat Mobolanle Abdulsalam
Beijing Law Review
Vol.12 No.2
, June 1, 2021
DOI:
10.4236/blr.2021.122029
623
Downloads
4,346
Views
Citations
Security Cooperation between China and Indonesia to Address Maritime Security Threats
(Articles)
Yuliannova Lestari
,
Georges Olemanu Lohalo
,
Nicole Kajir Diur
,
Betao Ngoma Mushinda
,
Vital Mbumba Mbumba
,
Scheel Mutombo Kianga
,
Peter Ngolo Minga
Open Journal of Political Science
Vol.12 No.4
, September 9, 2022
DOI:
10.4236/ojps.2022.124030
572
Downloads
3,460
Views
Citations
Metaphor Analysis of Security Discourse in
Xi Jinping
:
The Governance of China
(
Volume IV
) and Its English Translation Strategies
(Articles)
Rui Chen
Open Journal of Modern Linguistics
Vol.14 No.5
, October 15, 2024
DOI:
10.4236/ojml.2024.145050
154
Downloads
934
Views
Citations
Leadership Responsibilities and Characteristics in Security Work
(Articles)
Abdullah Ahmed Al-Subaie
Open Journal of Leadership
Vol.14 No.2
, April 22, 2025
DOI:
10.4236/ojl.2025.142009
90
Downloads
861
Views
Citations
Cyber Resilience through Real-Time Threat Analysis in Information Security
(Articles)
Aparna Gadhi
,
Ragha Madhavi Gondu
,
Hitendra Chaudhary
,
Olatunde Abiona
International Journal of Communications, Network and System Sciences
Vol.17 No.4
, April 30, 2024
DOI:
10.4236/ijcns.2024.174004
322
Downloads
1,451
Views
Citations
To Preserve Privacy for Smart Home Security System in Cloud Computing
(Articles)
Depeng Li
Journal of Information Security
Vol.17 No.1
, January 14, 2026
DOI:
10.4236/jis.2026.171002
51
Downloads
211
Views
Citations
First
<
...
4
5
6
...
>
Last
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2026 Scientific Research Publishing Inc. All Rights Reserved.
Top