Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Human Sensor Web Crowd Sourcing Security Incidents Management in Tanzania Context
(Articles)
Maduhu Mshangi
,
Edephonce Ngemera Nfuka
,
Camilius Sanga
Journal of Information Security
Vol.9 No.3
,July 10, 2018
DOI:
10.4236/jis.2018.93014
918
Downloads
2,132
Views
Citations
A Study on Quantitative Methodology to Assess Cyber Security Risk of Smart Grid
(Articles)
Pil Sung Woo
,
Byung-Hyun Ko
,
Dong-Joo Kang
,
Balho H. Kim
Energy and Power Engineering
Vol.5 No.4B
,November 18, 2013
DOI:
10.4236/epe.2013.54B249
5,373
Downloads
8,054
Views
Citations
On a Generic Security Game Model
(Articles)
Vivek Shandilya
,
Sajjan Shiva
Int'l J. of Communications, Network and System Sciences
Vol.10 No.7
,July 28, 2017
DOI:
10.4236/ijcns.2017.107008
854
Downloads
1,703
Views
Citations
Cyber-Physical-Social Based Security Architecture for Future Internet of Things
(Articles)
Huansheng Ning
,
Hong Liu
Advances in Internet of Things
Vol.2 No.1
,January 14, 2012
DOI:
10.4236/ait.2012.21001
13,791
Downloads
30,955
Views
Citations
The Analysis of the Structure and Security of Home Control Subnet
(Articles)
Chengyi WANG
,
Yun ZHANG
Wireless Sensor Network
Vol.1 No.1
,April 10, 2009
DOI:
10.4236/wsn.2009.11009
6,070
Downloads
10,780
Views
Citations
QoS-Guaranteed Secure Multicast Routing Protocol for Satellite IP Networks Using Hierarchical Architecture
(Articles)
Zhizhong Yin
,
Long Zhang
,
Xianwei Zhou
,
Peng Xu
,
Yu Deng
Int'l J. of Communications, Network and System Sciences
Vol.3 No.4
,April 30, 2010
DOI:
10.4236/ijcns.2010.34045
5,567
Downloads
10,697
Views
Citations
An Analysis of Cybersecurity Attacks against Internet of Things and Security Solutions
(Articles)
Mohammad Rafsun Islam
,
K. M. Aktheruzzaman
Journal of Computer and Communications
Vol.8 No.4
,April 2, 2020
DOI:
10.4236/jcc.2020.84002
1,576
Downloads
8,205
Views
Citations
Application of Full Text Search Engine Based on Lucene
(Articles)
Rujia Gao
,
Danying Li
,
Wanlong Li
,
Yaze Dong
Advances in Internet of Things
Vol.2 No.4
,October 30, 2012
DOI:
10.4236/ait.2012.24013
6,735
Downloads
12,098
Views
Citations
Study on Information System Architecture Based on Service-Dominant Logic
(Articles)
Juhua Wu
,
Meng Xu
,
Zan Mo
,
Nuo Liao
Intelligent Information Management
Vol.7 No.2
,February 15, 2015
DOI:
10.4236/iim.2015.72005
8,911
Downloads
10,090
Views
Citations
Comparative Analysis of Operating System of Different Smart Phones
(Articles)
Naseer Ahmad
,
Muhammad Waqas Boota
,
Abdul Hye Masoom
Journal of Software Engineering and Applications
Vol.8 No.3
,March 4, 2015
DOI:
10.4236/jsea.2015.83012
11,194
Downloads
16,785
Views
Citations
Research on the Contents and Indexes of Reservoir Operational Security
(Articles)
Jingchun Feng
,
Zhongnan Duan
Journal of Water Resource and Protection
Vol.2 No.11
,November 29, 2010
DOI:
10.4236/jwarp.2010.211115
6,099
Downloads
9,337
Views
Citations
Secure Web Application Technologies Implementation through Hardening Security Headers Using Automated Threat Modelling Techniques
(Articles)
Maduhu Mshangi Mlyatu
,
Camilius Sanga
Journal of Information Security
Vol.14 No.1
,November 30, 2022
DOI:
10.4236/jis.2023.141001
203
Downloads
1,046
Views
Citations
A Tree Model for Identification of Threats as the First Stage of Risk Assessment in HIS
(Articles)
Ahmad Bakhtiyari Shahri
,
Zuraini Ismail
Journal of Information Security
Vol.3 No.2
,April 26, 2012
DOI:
10.4236/jis.2012.32020
8,308
Downloads
12,721
Views
Citations
Software Composition Using Behavioral Models of Design Patterns
(Articles)
Sargon Hasso
,
Carl Robert Carlson
Journal of Software Engineering and Applications
Vol.7 No.2
,February 25, 2014
DOI:
10.4236/jsea.2014.72012
4,989
Downloads
7,456
Views
Citations
The Effective Enhancement of Power System Security by Flexible Transmission Line Impedance with Minimal Rescheduling of Generators
(Articles)
Karuppasamy Muthulakshmi
,
R.M. Sasiraja
,
Selvarajan Mukesh Muthu
Circuits and Systems
Vol.7 No.4
,April 28, 2016
DOI:
10.4236/cs.2016.74033
1,682
Downloads
2,313
Views
Citations
XML Attacks towards Different Targeted Operating Systems
(Articles)
Xueying Pan
,
Sharon Martin
Open Access Library Journal
Vol.11 No.3
,March 29, 2024
DOI:
10.4236/oalib.1111367
30
Downloads
292
Views
Citations
Software Architecture and Methodology as a Tool for Efficient Software Engineering Process: A Critical Appraisal
(Articles)
Achimugu Philip
,
Babajide Afolabi
,
Oluwaranti Adeniran
,
Gambo Ishaya
,
Oluwagbemi Oluwatolani
Journal of Software Engineering and Applications
Vol.3 No.10
,November 19, 2010
DOI:
10.4236/jsea.2010.310110
6,519
Downloads
12,028
Views
Citations
Process of Designing Robust, Dependable, Safe and Secure Software for Medical Devices: Point of Care Testing Device as a Case Study
(Articles)
Sivanesan Tulasidas
,
Ruth Mackay
,
Pascal Craw
,
Chris Hudson
,
Voula Gkatzidou
,
Wamadeva Balachandran
Journal of Software Engineering and Applications
Vol.6 No.9A
,August 30, 2013
DOI:
10.4236/jsea.2013.69A001
4,398
Downloads
7,913
Views
Citations
This article belongs to the Special Issue on
Software Engineering for Safety-Critical Systems and Medical Devices
The Implementation of Electronic Intelligent Tag System Based on Wireless Sensor Network
(Articles)
Kai Yu
,
Zhijun Xie
,
Jiangbo Qian
,
Guang Jin
Communications and Network
Vol.5 No.1B
,November 6, 2013
DOI:
10.4236/cn.2013.51B010
3,540
Downloads
4,990
Views
Citations
A Collaborative Healthcare Service Framework and Performance Evaluation
(Articles)
John Jung-Woon Yoo
,
Krishnaveni Gnanasekaran
,
Chen-Yang Cheng
American Journal of Industrial and Business Management
Vol.4 No.6
,June 19, 2014
DOI:
10.4236/ajibm.2014.46035
3,340
Downloads
4,618
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top