Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Large Language Models (LLMs) for Software Security Analysis
(Articles)
Brian Mata
,
Vijay Madisetti
Journal of Information Security
Vol.16 No.2
,April 29, 2025
DOI:
10.4236/jis.2025.162018
31
Downloads
196
Views
Citations
The Analysis and Amendment of Security System in 3G
(Articles)
Min ZHAO
,
Ling SHI
Intelligent Information Management
Vol.1 No.1
,July 31, 2009
DOI:
10.4236/iim.2009.11001
7,839
Downloads
12,049
Views
Citations
Investigations on Simultaneously Secure IBE Scheme and Security Proofs under RO and Non-RO Model
(Articles)
Zhengtao JIANG
,
Yongbin WANG
,
Yong WANG
,
Yumin WANG
Intelligent Information Management
Vol.1 No.1
,July 31, 2009
DOI:
10.4236/iim.2009.11002
4,832
Downloads
8,479
Views
Citations
A Conceptual Framework for Threat Assessment Based on Organization’s Information Security Policy
(Articles)
Joseph Elias Mbowe
,
Irina Zlotnikova
,
Simon S. Msanjila
,
George S. Oreku
Journal of Information Security
Vol.5 No.4
,September 29, 2014
DOI:
10.4236/jis.2014.54016
7,007
Downloads
10,727
Views
Citations
Reactive Data Security Approach and Review of Data Security Techniques in Wireless Networks
(Articles)
Arif Sari
,
Mehmet Karay
Int'l J. of Communications, Network and System Sciences
Vol.8 No.13
,December 30, 2015
DOI:
10.4236/ijcns.2015.813051
4,039
Downloads
5,188
Views
Citations
Identification and Validation of Social Media Socio-Technical Information Security Factors with Respect to Usable-Security Principles
(Articles)
Joe Mutebi
,
Margaret Kareyo
,
Umezuruike Chinecherem
,
Akampurira Paul
Journal of Computer and Communications
Vol.10 No.8
,August 17, 2022
DOI:
10.4236/jcc.2022.108004
251
Downloads
1,020
Views
Citations
Classification of Big Data Security Based on Ontology Web Language
(Articles)
Alsadig Mohammed Adam Abdallah
,
Amir Mohamed Talib
Journal of Information Security
Vol.14 No.1
,January 31, 2023
DOI:
10.4236/jis.2023.141006
219
Downloads
943
Views
Citations
Internet of Things Security: Threats, Recent Trends, and Mitigation Approaches
(Articles)
Laila Tageldin
Advances in Internet of Things
Vol.15 No.1
,March 4, 2025
DOI:
10.4236/ait.2025.151001
112
Downloads
591
Views
Citations
LDAP Injection Techniques
(Articles)
Jose Maria ALONSO
,
Antonio GUZMAN
,
Marta BELTRAN
,
Rodolfo BORDON
Wireless Sensor Network
Vol.1 No.4
,November 20, 2009
DOI:
10.4236/wsn.2009.14030
11,305
Downloads
18,263
Views
Citations
A Privacy Enabled Fast Dynamic Authentication and Authorization for B3G/4G Mobility
(Articles)
Zhikui CHEN
,
Song YANG
Communications and Network
Vol.1 No.2
,December 1, 2009
DOI:
10.4236/cn.2009.12012
6,646
Downloads
10,483
Views
Citations
Research on the Security Monitoring of the Amusement Ride of Tourist Sites Based on RFID
(Articles)
Jian SHANGGUAN
,
Yingchun LV
,
Mu ZHANG
Wireless Sensor Network
Vol.2 No.1
,January 13, 2010
DOI:
10.4236/wsn.2010.21012
6,883
Downloads
11,177
Views
Citations
WEP and WPA Improvement
(Articles)
Mustafa ElGili
,
Samani A. Talab
,
Awad H. Ali
Wireless Sensor Network
Vol.2 No.3
,April 12, 2010
DOI:
10.4236/wsn.2010.23032
6,620
Downloads
12,953
Views
Citations
Self Umpiring System for Security in Wireless Mobile Ad Hoc Network
(Articles)
Ayyaswamy Kathirvel
,
Rengaramanujam Srinivasan
Wireless Sensor Network
Vol.2 No.3
,April 12, 2010
DOI:
10.4236/wsn.2010.23036
5,167
Downloads
9,543
Views
Citations
Considerations and Open Issues in Delay Tolerant Network’S (DTNs) Security
(Articles)
Harminder Singh Bindra
,
Amrit Lal Sangal
Wireless Sensor Network
Vol.2 No.8
,August 3, 2010
DOI:
10.4236/wsn.2010.28076
7,751
Downloads
14,931
Views
Citations
SOAP-Based Security Interaction of Web Service inHeterogeneous Platforms
(Articles)
Tao Xu
,
Chunxiao Yi
Journal of Information Security
Vol.2 No.1
,February 17, 2011
DOI:
10.4236/jis.2011.21001
5,345
Downloads
10,090
Views
Citations
Secured Electronic Voting Protocol Using Biometric Authentication
(Articles)
Kalaichelvi Visvalingam
,
R. M. Chandrasekaran
Advances in Internet of Things
Vol.1 No.2
,July 26, 2011
DOI:
10.4236/ait.2011.12006
10,905
Downloads
24,754
Views
Citations
Characterization of Peaks and Valleys of Electricity Demand. Application to the Spanish Mainland System in the Period 2000-2020
(Articles)
Fermín Moreno
Energy and Power Engineering
Vol.3 No.4
,September 27, 2011
DOI:
10.4236/epe.2011.34066
5,608
Downloads
9,154
Views
Citations
A Personnel Detection Algorithm for an Intermodal Maritime Application of ITS Technology for Security at Port Facilities
(Articles)
Mouhammad K. Al Akkoumi
,
Robert C. Huck
,
James J. Sluss
Journal of Transportation Technologies
Vol.1 No.4
,October 24, 2011
DOI:
10.4236/jtts.2011.14016
4,995
Downloads
8,477
Views
Citations
A Topology-Based Conflict Detection System for Firewall Policies using Bit-Vector-Based Spatial Calculus
(Articles)
Subana Thanasegaran
,
Yi Yin
,
Yuichiro Tateiwa
,
Yoshiaki Katayama
,
Naohisa Takahashi
Int'l J. of Communications, Network and System Sciences
Vol.4 No.11
,October 31, 2011
DOI:
10.4236/ijcns.2011.411084
4,881
Downloads
8,649
Views
Citations
Cyber-Physical-Social Based Security Architecture for Future Internet of Things
(Articles)
Huansheng Ning
,
Hong Liu
Advances in Internet of Things
Vol.2 No.1
,January 14, 2012
DOI:
10.4236/ait.2012.21001
14,103
Downloads
31,545
Views
Citations
<
...
4
5
6
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top