Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Proposed Framework for Security Risk Assessment
(Articles)
Zakaria I. Saleh
,
Heba Refai
,
Ahmad Mashhour
Journal of Information Security
Vol.2 No.2
,April 22, 2011
DOI:
10.4236/jis.2011.22008
8,133
Downloads
19,677
Views
Citations
Securitizing Area Insurance: A Risk Management Approach
(Articles)
Pasquale Lucio Scandizzo
Journal of Financial Risk Management
Vol.2 No.3
,September 23, 2013
DOI:
10.4236/jfrm.2013.23009
5,004
Downloads
9,223
Views
Citations
Study on the Risk of Regional Energy Security Cooperation
(Articles)
Ying Shen
,
Xintong Yang
,
Xiaoli Guo
Energy and Power Engineering
Vol.5 No.4B
,November 21, 2013
DOI:
10.4236/epe.2013.54B273
4,736
Downloads
5,762
Views
Citations
Systematizing IT Risks
(Articles)
Georg Disterer
Journal of Information Security
Vol.10 No.4
,October 14, 2019
DOI:
10.4236/jis.2019.104013
980
Downloads
2,447
Views
Citations
Online Accounts Management Method Using Risk-Based Approach
(Articles)
Yoshio Kakizaki
,
Takumi Akiyama
,
Kazuya Otani
,
Ryoichi Sasaki
Journal of Computer and Communications
Vol.4 No.14
,November 14, 2016
DOI:
10.4236/jcc.2016.414003
1,314
Downloads
2,121
Views
Citations
Financial Internationalization and Financial Security Issues
(Articles)
Ruyu Han
Open Access Library Journal
Vol.5 No.9
,September 13, 2018
DOI:
10.4236/oalib.1104874
648
Downloads
3,553
Views
Citations
Stochastic Modelling of Vulnerability Life Cycle and Security Risk Evaluation
(Articles)
Sasith M. Rajasooriya
,
Chris P. Tsokos
,
Pubudu Kalpani Kaluarachchi
Journal of Information Security
Vol.7 No.4
,July 21, 2016
DOI:
10.4236/jis.2016.74022
2,179
Downloads
3,916
Views
Citations
Prediction and Diversion Mechanisms for Crowd Management Based on Risk Rating
(Articles)
Meihua Zhang
,
Yuan Yao
,
Kefan Xie
Engineering
Vol.9 No.5
,May 27, 2017
DOI:
10.4236/eng.2017.95021
1,398
Downloads
3,031
Views
Citations
Strategic Risk Factors for Indian Stock Markets
(Articles)
Aman Srivastava
,
Prashant Gupta
,
Rakesh Gupta
Theoretical Economics Letters
Vol.7 No.6
,September 30, 2017
DOI:
10.4236/tel.2017.76114
1,125
Downloads
3,116
Views
Citations
Oil, Risk Analysis Techniques, Maritime Security and Safe Passage in Pirate Infested Gulf of Guinea Waters
(Articles)
Nana Raymond Lawrence Ofosu-Boateng
Open Journal of Social Sciences
Vol.5 No.12
,December 14, 2017
DOI:
10.4236/jss.2017.512008
1,108
Downloads
2,137
Views
Citations
Distance Control and Positive Security for Intrinsic Equipment Working in Explosive Potential Atmospheres
(Articles)
Emil Pop
,
Gabriel-Ioan Ilcea
,
Ionut-Alin Popa
Engineering
Vol.10 No.3
,March 16, 2018
DOI:
10.4236/eng.2018.103006
1,054
Downloads
2,029
Views
Citations
This article belongs to the Special Issue on
Safety System Engineering
Optimum Spending on Cybersecurity Measures: Part II
(Articles)
Sherita Tara Kissoon
Journal of Information Security
Vol.12 No.1
,January 21, 2021
DOI:
10.4236/jis.2021.121007
1,244
Downloads
3,017
Views
Citations
Public Service Delivery in the Context of Disaster Risk Reduction for Sustainable Human Security with Special Reference to the City of Mutare, Zimbabwe
(Articles)
David Chibhoyi
,
Tafadzwa Hatidani Machaka
,
Absai Chakaipa
,
Rumbidzai Chibhoyi
,
Nevermind Muchongwe
,
Charity Ranganayi
,
Norman Tavengwa
,
Itai Zvawanda
,
Norah Gwesu
Open Access Library Journal
Vol.11 No.3
,March 22, 2024
DOI:
10.4236/oalib.1111123
28
Downloads
126
Views
Citations
Cyber Security: Nonlinear Stochastic Models for Predicting the Exploitability
(Articles)
Sasith M. Rajasooriya
,
Chris. P. Tsokos
,
Pubudu Kalpani Kaluarachchi
Journal of Information Security
Vol.8 No.2
,April 30, 2017
DOI:
10.4236/jis.2017.82009
1,556
Downloads
3,340
Views
Citations
Analysis of Risk Measures in Portfolio Optimization for the Uganda Securities Exchange
(Articles)
Criscent Birungi
,
Lucy Muthoni
Journal of Financial Risk Management
Vol.10 No.2
,June 7, 2021
DOI:
10.4236/jfrm.2021.102008
388
Downloads
2,146
Views
Citations
A Novel Approach to Improve the Security of P2P File-Sharing Systems
(Articles)
Cuihua ZUO
,
Ruixuan LI
,
Zhengding LU
Int'l J. of Communications, Network and System Sciences
Vol.2 No.3
,June 21, 2009
DOI:
10.4236/ijcns.2009.23025
5,082
Downloads
9,186
Views
Citations
A Study on Quantitative Methodology to Assess Cyber Security Risk of Smart Grid
(Articles)
Pil Sung Woo
,
Byung-Hyun Ko
,
Dong-Joo Kang
,
Balho H. Kim
Energy and Power Engineering
Vol.5 No.4B
,November 18, 2013
DOI:
10.4236/epe.2013.54B249
5,348
Downloads
8,120
Views
Citations
Developing Dependability Requirements Engineering for Secure and Safe Information Systems with Knowledge Acquisition for Automated Specification
(Articles)
Mohammed Abu Lamddi
Journal of Software Engineering and Applications
Vol.10 No.2
,February 28, 2017
DOI:
10.4236/jsea.2017.102013
1,605
Downloads
3,026
Views
Citations
Nonhomogeneous Risk Rank Analysis Method for Security Network System
(Articles)
Pubudu Kalpani Hitigala Kaluarachchilage
,
Chris P. Tsokos
,
Sasith M. Rajasooriya
Int'l J. of Communications, Network and System Sciences
Vol.12 No.1
,January 25, 2019
DOI:
10.4236/ijcns.2019.121001
728
Downloads
1,571
Views
Citations
Appraising the Manifestation of Optimism Bias and Its Impact on Human Perception of Cyber Security: A Meta Analysis
(Articles)
Khaled M. Alnifie
,
Charles Kim
Journal of Information Security
Vol.14 No.2
,February 23, 2023
DOI:
10.4236/jis.2023.142007
366
Downloads
1,787
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top