Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Developing a Multi-Layer Strategy for Securing Control Systems of Oil Refineries
(Articles)
Musaria K. Mahmood
,
Fawzi M. Al-Naima
Wireless Sensor Network
Vol.2 No.7
,July 9, 2010
DOI:
10.4236/wsn.2010.27064
5,617
Downloads
10,635
Views
Citations
Public Key Infrastructure: An Enhanced Validation Framework
(Articles)
Paul Danquah
,
Henoch Kwabena-Adade
Journal of Information Security
Vol.11 No.4
,September 25, 2020
DOI:
10.4236/jis.2020.114016
885
Downloads
4,914
Views
Citations
Collaborative Governance on Public Security in Concentrated Contiguous Destitute Areas: A Case Study of Wuling Mountains Area in China
(Articles)
Anhua Yang
Open Journal of Social Sciences
Vol.3 No.5
,May 8, 2015
DOI:
10.4236/jss.2015.35006
3,140
Downloads
3,891
Views
Citations
Is Public Co-Ordination of Investment in Information Security Desirable?
(Articles)
Christos Ioannidis
,
David Pym
,
Julian Williams
Journal of Information Security
Vol.7 No.2
,March 30, 2016
DOI:
10.4236/jis.2016.72005
2,982
Downloads
3,917
Views
Citations
This article belongs to the Special Issue on
Cybersecurity Investments
A Modified and Secured RSA Public Key Cryptosystem Based on “n” Prime Numbers
(Articles)
Muhammad Ariful Islam
,
Md. Ashraful Islam
,
Nazrul Islam
,
Boishakhi Shabnam
Journal of Computer and Communications
Vol.6 No.3
,March 23, 2018
DOI:
10.4236/jcc.2018.63006
2,989
Downloads
8,239
Views
Citations
Information Systems Security Threats and Vulnerabilities: A Case of the Institute of Accountancy Arusha (IAA)
(Articles)
Adam Aloyce Semlambo
,
Didas Malekia Mfoi
,
Yona Sangula
Journal of Computer and Communications
Vol.10 No.11
,November 3, 2022
DOI:
10.4236/jcc.2022.1011003
221
Downloads
2,294
Views
Citations
Evaluating Open-Source Facial Recognition Software in Public Security: Effectiveness and Observations on Ethnicity
(Articles)
Methanias Colaço Júnior
,
Luan Bruno Barbosa de Souza Costa
,
Everton Carlos Santos Recchi
,
Ana Carla Bliacheriene
,
Fatima de L. S. Nunes
,
Luciano Vieira de Araújo
Beijing Law Review
Vol.14 No.2
,June 26, 2023
DOI:
10.4236/blr.2023.142054
100
Downloads
481
Views
Citations
Public Service Delivery in the Context of Disaster Risk Reduction for Sustainable Human Security with Special Reference to the City of Mutare, Zimbabwe
(Articles)
David Chibhoyi
,
Tafadzwa Hatidani Machaka
,
Absai Chakaipa
,
Rumbidzai Chibhoyi
,
Nevermind Muchongwe
,
Charity Ranganayi
,
Norman Tavengwa
,
Itai Zvawanda
,
Norah Gwesu
Open Access Library Journal
Vol.11 No.3
,March 22, 2024
DOI:
10.4236/oalib.1111123
28
Downloads
126
Views
Citations
Evolution of Slum Redevelopment Policy
(Articles)
Deepika Andavarapu
,
David J. Edelman
Current Urban Studies
Vol.1 No.4
,December 24, 2013
DOI:
10.4236/cus.2013.14021
7,458
Downloads
14,110
Views
Citations
Research on Supply Chain Management and Talent Assurance of Emergency Logistics Personnel under Public Health Emergencies
(Articles)
Changli Lu
,
Min Chen
American Journal of Industrial and Business Management
Vol.11 No.1
,January 21, 2021
DOI:
10.4236/ajibm.2021.111005
701
Downloads
2,004
Views
Citations
The Influence of International Instruments on Public Service Labour Relations in Botswana Prior to the Advent of Unionization
(Articles)
K. Solo
Beijing Law Review
Vol.12 No.1
,March 19, 2021
DOI:
10.4236/blr.2021.121010
335
Downloads
1,483
Views
Citations
Exploring the Commuters’ Willingness-to-Pay and Its Influencing Factors for an Improved Public Bus Service in Dhaka City
(Articles)
Ayesha Umme
,
Kojima Aya
,
Kubota Hisashi
Journal of Transportation Technologies
Vol.13 No.2
,February 27, 2023
DOI:
10.4236/jtts.2023.132007
188
Downloads
1,001
Views
Citations
Public Sentiment Analysis of Social Security Emergencies Based on Feature Fusion Model of BERT and TextLevelGCN
(Articles)
Linli Wang
,
Hu Wang
,
Hanlu Lei
Journal of Computer and Communications
Vol.11 No.5
,May 31, 2023
DOI:
10.4236/jcc.2023.115014
96
Downloads
458
Views
Citations
Stand-Alone Patient Reception and Referral System with Health Data Management
(Articles)
Ababacar Sadikh Faye
,
Ousmane Sow
,
Mame Andallah Diop
,
Jupiter Ndiaye
,
Youssou Traore
,
Oumar Diallo
Engineering
Vol.15 No.10
,October 24, 2023
DOI:
10.4236/eng.2023.1510042
66
Downloads
301
Views
Citations
GDP Falls as MBA Rises?
(Articles)
T. N. Cummins
Applied Mathematics
Vol.4 No.10
,October 14, 2013
DOI:
10.4236/am.2013.410196
4,462
Downloads
6,208
Views
Citations
Proactive Security Mechanism and Design for Firewall
(Articles)
Saleem-Ullah Lar
,
Xiaofeng Liao
,
Aqeel ur Rehman
,
MA Qinglu
Journal of Information Security
Vol.2 No.3
,July 29, 2011
DOI:
10.4236/jis.2011.23012
7,015
Downloads
13,026
Views
Citations
Gender Differences in Information Security Management
(Articles)
Fayez Alotaibi
,
Aziz Alshehri
Journal of Computer and Communications
Vol.8 No.3
,March 9, 2020
DOI:
10.4236/jcc.2020.83006
1,009
Downloads
3,154
Views
Citations
This article belongs to the Special Issue on
Information, Network & Computer Security
Research on the Contents and Indexes of Reservoir Operational Security
(Articles)
Jingchun Feng
,
Zhongnan Duan
Journal of Water Resource and Protection
Vol.2 No.11
,November 29, 2010
DOI:
10.4236/jwarp.2010.211115
6,085
Downloads
9,357
Views
Citations
Food Is Security: The Nexus of Health Security in Fragile and Failed States
(Articles)
John Quinn
,
Tomas Zeleny
,
Vladimir Bencko
Food and Nutrition Sciences
Vol.5 No.19
,October 14, 2014
DOI:
10.4236/fns.2014.519197
4,865
Downloads
6,336
Views
Citations
On Development of Platform for Organization Security Threat Analytics and Management (POSTAM) Using Rule-Based Approach
(Articles)
Joseph E. Mbowe
,
Simon S. Msanjila
,
George S. Oreku
,
Khamisi Kalegele
Journal of Software Engineering and Applications
Vol.9 No.12
,December 30, 2016
DOI:
10.4236/jsea.2016.912041
1,691
Downloads
2,725
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top