Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Network Access Control Technology—Proposition to Contain New Security Challenges
(Articles)
Abdelmajid Lakbabi
,
Ghizlane Orhanou
,
Said El Hajji
Int'l J. of Communications, Network and System Sciences
Vol.5 No.8
,August 28, 2012
DOI:
10.4236/ijcns.2012.58061
6,703
Downloads
11,064
Views
Citations
Piercing the Veil of Public Policy in the Recognition and Enforcement of Foreign-Related Awards in China
(Articles)
Haoqian Chen
,
Hailin Bao
,
Tianyi Zhang
Beijing Law Review
Vol.7 No.1
,March 2, 2016
DOI:
10.4236/blr.2016.71003
3,047
Downloads
4,972
Views
Citations
Maritime Security: A New Strategy for Merchant Shipping to Avoid Piracy in the Gulf of Guinea
(Articles)
Debi Ahoefa Broohm
,
Guohua Wang
,
Juntao Gao
Open Journal of Social Sciences
Vol.8 No.5
,May 29, 2020
DOI:
10.4236/jss.2020.85027
640
Downloads
2,383
Views
Citations
Illegitimacy is Dangerous: How Authorities Experience and React to Illegitimacy
(Articles)
Phillip Atiba Goff
,
Liana Maris Epstein
,
Avital Mentovich
,
Kavita S. Reddy
Psychology
Vol.4 No.3A
,March 29, 2013
DOI:
10.4236/psych.2013.43A049
4,385
Downloads
7,234
Views
Citations
This article belongs to the Special Issue on
Applied Psychology
The Mitigation Strategies for Managing the Potential Environmental Risks Posed by Oil and Gas Development on Mangrove Ecosystems in the Coastal Communities
(Articles)
Collin Augustus Henry
,
Thomas B. Singh
,
Temitope D. Timothy Oyedotun
Journal of Geoscience and Environment Protection
Vol.11 No.5
,May 31, 2023
DOI:
10.4236/gep.2023.115016
100
Downloads
545
Views
Citations
The Incidence of Capital Flight in an African Open Economy
(Articles)
Oluremi Ogun
Open Access Library Journal
Vol.4 No.9
,September 14, 2017
DOI:
10.4236/oalib.1103736
528
Downloads
1,877
Views
Citations
Public Policy Exception in the Enforcement of Arbitral Awards in Nigeria
(Articles)
Uchenna Ponfa Emelonye
,
Uchenna Emelonye
Beijing Law Review
Vol.12 No.1
,March 31, 2021
DOI:
10.4236/blr.2021.121016
631
Downloads
3,396
Views
Citations
Applying Medicine’s “Never Events” Model to Law Enforcement’s Disparate Killings of Black Male Civilians
(Articles)
Tiffanie Victoria Jones
Open Journal of Social Sciences
Vol.9 No.5
,May 14, 2021
DOI:
10.4236/jss.2021.95013
283
Downloads
1,098
Views
Citations
Concept, Interests and Systems: Logical Consciousness of the China Campus Football Policy Trip
(Articles)
Zheng Liu
,
Lizhi Liu
Natural Science
Vol.15 No.6
,June 30, 2023
DOI:
10.4236/ns.2023.156015
59
Downloads
212
Views
Citations
Security Policy Management Process within Six Sigma Framework
(Articles)
Vijay Anand
,
Jafar Saniie
,
Erdal Oruklu
Journal of Information Security
Vol.3 No.1
,December 31, 2011
DOI:
10.4236/jis.2012.31006
6,922
Downloads
13,757
Views
Citations
Ontology-Based Cyber Security Policy Implementation in Saudi Arabia
(Articles)
Amir Mohamed Talib
,
Fahad Omar Alomary
,
Hanan Fouad Alwadi
,
Rawan Rashed Albusayli
Journal of Information Security
Vol.9 No.4
,October 26, 2018
DOI:
10.4236/jis.2018.94021
1,504
Downloads
3,506
Views
Citations
A Privacy Enabled Fast Dynamic Authentication and Authorization for B3G/4G Mobility
(Articles)
Zhikui CHEN
,
Song YANG
Communications and Network
Vol.1 No.2
,December 1, 2009
DOI:
10.4236/cn.2009.12012
6,538
Downloads
10,357
Views
Citations
The Enforcement of Child Custody in China: Dilemma and Solution
(Articles)
Zhiguo Zhang
Chinese Studies
Vol.12 No.2
,May 31, 2023
DOI:
10.4236/chnstd.2023.122014
85
Downloads
706
Views
Citations
A Conceptual Framework for Threat Assessment Based on Organization’s Information Security Policy
(Articles)
Joseph Elias Mbowe
,
Irina Zlotnikova
,
Simon S. Msanjila
,
George S. Oreku
Journal of Information Security
Vol.5 No.4
,September 29, 2014
DOI:
10.4236/jis.2014.54016
6,624
Downloads
10,594
Views
Citations
Challenges of Energy Security to the Industrialisation and Sustainable Development in Vietnam
(Articles)
Nguyen Tan Phat
Technology and Investment
Vol.3 No.3
,August 31, 2012
DOI:
10.4236/ti.2012.33024
6,152
Downloads
9,466
Views
Citations
Investigation of Climate and Land Use Policy Change Impacts on Food Security in Eastern Sudan, Gadarif State
(Articles)
Yousif Elnour Yagoub
,
Zhongqin Li
,
Omer Said Musa
,
Muhammad Naveed Anjum
,
Feiteng Wang
,
Zhang Bo
Journal of Geographic Information System
Vol.9 No.5
,September 13, 2017
DOI:
10.4236/jgis.2017.95034
1,159
Downloads
2,471
Views
Citations
The Hypocrisy of Saudi Arabia
(Articles)
Albertus J. Meintjes
Open Journal of Political Science
Vol.8 No.4
,October 19, 2018
DOI:
10.4236/ojps.2018.84028
987
Downloads
3,305
Views
Citations
An Overview of the Nigerian Defense Policy and the Challenges against Terrorism
(Articles)
David Oluwafemi Bodunde
,
Noah Opeyemi Balogun
Open Journal of Political Science
Vol.9 No.3
,June 21, 2019
DOI:
10.4236/ojps.2019.93030
1,647
Downloads
15,020
Views
Citations
Lessons for Epidemic Emergency Policy: A Scoping Review of Ebola and COVID-19 Pandemics in Africa
(Articles)
Sam Agatre Okuonzi
Health
Vol.15 No.7
,July 28, 2023
DOI:
10.4236/health.2023.157053
86
Downloads
357
Views
Citations
Supply Chain Orchestration Leveraging on MNC Networks and Local Resources: Approach Strategies
(Articles)
Zhengping Li
,
Robert De Souza
,
Mark Goh
Journal of Service Science and Management
Vol.9 No.4
,July 26, 2016
DOI:
10.4236/jssm.2016.94036
2,147
Downloads
4,218
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top