Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
A Conceptual Framework for Threat Assessment Based on Organization’s Information Security Policy
(Articles)
Joseph Elias Mbowe
,
Irina Zlotnikova
,
Simon S. Msanjila
,
George S. Oreku
Journal of Information Security
Vol.5 No.4
,September 29, 2014
DOI:
10.4236/jis.2014.54016
7,009
Downloads
10,738
Views
Citations
On Development of Platform for Organization Security Threat Analytics and Management (POSTAM) Using Rule-Based Approach
(Articles)
Joseph E. Mbowe
,
Simon S. Msanjila
,
George S. Oreku
,
Khamisi Kalegele
Journal of Software Engineering and Applications
Vol.9 No.12
,December 30, 2016
DOI:
10.4236/jsea.2016.912041
1,798
Downloads
2,873
Views
Citations
A Comparative Analysis of Cybersecurity Threat Taxonomies for Healthcare Organizations
(Articles)
Mahima Jaikanth
,
Vijay K. Madisetti
Journal of Software Engineering and Applications
Vol.17 No.5
,May 30, 2024
DOI:
10.4236/jsea.2024.175020
174
Downloads
836
Views
Citations
Research on University’s Cyber Threat Intelligence Sharing Platform Based on New Types of STIX and TAXII Standards
(Articles)
Gang Wang
,
Yuanzhi Huo
,
Zhao Ma Ma
Journal of Information Security
Vol.10 No.4
,October 29, 2019
DOI:
10.4236/jis.2019.104015
1,464
Downloads
3,897
Views
Citations
The Constitutional Transformation and a Threat of the Environment in Poland
(Articles)
Krzysztof R. Mazurski
Journal of Environmental Protection
Vol.2 No.4
,June 17, 2011
DOI:
10.4236/jep.2011.24044
4,890
Downloads
8,037
Views
Citations
A Tree Model for Identification of Threats as the First Stage of Risk Assessment in HIS
(Articles)
Ahmad Bakhtiyari Shahri
,
Zuraini Ismail
Journal of Information Security
Vol.3 No.2
,April 26, 2012
DOI:
10.4236/jis.2012.32020
8,395
Downloads
12,974
Views
Citations
Proposal to Disseminate the Knowledge of Tsunamis in the Caribbean Coast of Costa Rica, Central America
(Articles)
Mario Fernández Arce
,
Daniel Solís
,
Juan Luis Porras
,
Gino González
World Journal of Engineering and Technology
Vol.2 No.3B
,September 18, 2014
DOI:
10.4236/wjet.2014.23B013
3,162
Downloads
3,224
Views
Citations
Groundless Threat of Infringement of Patent
(Articles)
Dharmapuri Selvakumar Madhumitha
Beijing Law Review
Vol.10 No.3
,June 4, 2019
DOI:
10.4236/blr.2019.103029
1,201
Downloads
3,061
Views
Citations
Generative Adversarial Network Based Approach towards Synthetically Generating Insider Threat Scenarios
(Articles)
Mayesh Mohapatra
,
Anshumaan Phukan
,
Vijay K. Madisetti
Journal of Software Engineering and Applications
Vol.16 No.11
,November 28, 2023
DOI:
10.4236/jsea.2023.1611030
141
Downloads
584
Views
Citations
Handwriting Analysis Based on Belief of Targeted Individual Supporting Insider Threat Detection
(Articles)
Jason Slaughter
,
Carole E. Chaski
,
Kellep Charles
Journal of Information Security
Vol.15 No.3
,June 11, 2024
DOI:
10.4236/jis.2024.153018
80
Downloads
455
Views
Citations
A Survey of Visualization Techniques and Tools for Environmental Data
(Articles)
Romal Bharatkumar Patel
Technology and Investment
Vol.14 No.3
,August 28, 2023
DOI:
10.4236/ti.2023.143009
178
Downloads
745
Views
Citations
Using Luhn’s Automatic Abstract Method to Create Graphs of Words for Document Visualization
(Articles)
Luiz Cláudio Santos Silva
,
Renelson Ribeiro Sampaio
Social Networking
Vol.3 No.2
,February 27, 2014
DOI:
10.4236/sn.2014.32008
4,789
Downloads
6,812
Views
Citations
Getting by with a Little Help from My Friends: Mental Rotation Ability after Tacit Peer Encouragement
(Articles)
Sheila Brownlow
,
Amanda J. Janas
,
Kathleen A. Blake
,
Kathleen T. Rebadow
,
Lindsay M. Mello
Psychology
Vol.2 No.4
,July 25, 2011
DOI:
10.4236/psych.2011.24057
6,306
Downloads
10,346
Views
Citations
Can Rewards Obviate Stereotype Threat Effects on Mental Rotation Tasks?
(Articles)
Amanda Kanoy
,
Sheila Brownlow
,
Tiffany F. Sowers
Psychology
Vol.3 No.7
,June 18, 2012
DOI:
10.4236/psych.2012.37080
5,273
Downloads
8,574
Views
Citations
Anything but Race: Avoiding Racial Discourse to Avoid Hurting You or Me
(Articles)
Phillip Atiba Goff
,
Matthew Christian Jackson
,
Andrew H. Nichols
,
Brooke Allison Lewis Di Leone
Psychology
Vol.4 No.3A
,March 29, 2013
DOI:
10.4236/psych.2013.43A048
5,900
Downloads
9,233
Views
Citations
This article belongs to the Special Issue on
Applied Psychology
Movement for the “Emancipation of the Niger Delta” (MEND) Constitutes a Threat to the U.S. National Security
(Articles)
Mustapha Kulungu
Open Access Library Journal
Vol.8 No.6
,June 15, 2021
DOI:
10.4236/oalib.1107465
287
Downloads
4,860
Views
Citations
The Economics of Sharing Unclassified Cyber Threat Intelligence by Government Agencies and Departments
(Articles)
Josiah Dykstra
,
Lawrence A. Gordon
,
Martin P. Loeb
,
Lei Zhou
Journal of Information Security
Vol.13 No.3
,June 9, 2022
DOI:
10.4236/jis.2022.133006
247
Downloads
1,354
Views
Citations
Threats to Rural Livelihoods in Nigeria: Implications for Social Order and Crisis Management
(Articles)
Iwundu Anthony Onyekwere
,
Kingsley Onyebuchim Nworgu
Advances in Applied Sociology
Vol.10 No.3
,March 16, 2020
DOI:
10.4236/aasoci.2020.103004
791
Downloads
3,060
Views
Citations
Cyber Resilience through Real-Time Threat Analysis in Information Security
(Articles)
Aparna Gadhi
,
Ragha Madhavi Gondu
,
Hitendra Chaudhary
,
Olatunde Abiona
Int'l J. of Communications, Network and System Sciences
Vol.17 No.4
,April 30, 2024
DOI:
10.4236/ijcns.2024.174004
207
Downloads
843
Views
Citations
Simulation-Based Analysis and Intuitive Visualization of the Cutting Edge Load in Micromilling of Hardened Steel
(Articles)
Petra Kersting
,
Dirk Biermann
,
Eugen Krebs
Engineering
Vol.4 No.9
,September 28, 2012
DOI:
10.4236/eng.2012.49068
5,109
Downloads
7,395
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top