Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
A Web Platform Based on the NIST CSF for Assessing and Monitoring the Cybersecurity of SMEs and Critical Infrastructures
(Articles)
Mohamadou Konate
,
Pegdwinde Justin Kouraogo
,
Omar Hamidou Harouna
Open Journal of Applied Sciences
Vol.15 No.1
,January 30, 2025
DOI:
10.4236/ojapps.2025.151018
58
Downloads
354
Views
Citations
Assessing the Gaps in Cybersecurity Resilience in Cameroon: Challenges and Opportunities for Strengthening National Cybersecurity Frameworks
(Articles)
Eyong Atem
Journal of Computer and Communications
Vol.13 No.2
,February 27, 2025
DOI:
10.4236/jcc.2025.132012
101
Downloads
728
Views
Citations
The Crucial Role of Safeguarding Critical Infrastructure in Ensuring the Stability and Security of the U.S. Supply Chain
(Articles)
Robb Shawe
American Journal of Industrial and Business Management
Vol.15 No.7
,July 23, 2025
DOI:
10.4236/ajibm.2025.157051
9
Downloads
34
Views
Citations
Cybersecurity Investment Guidance: Extensions of the Gordon and Loeb Model
(Articles)
Scott Farrow
,
Jules Szanton
Journal of Information Security
Vol.7 No.2
,March 16, 2016
DOI:
10.4236/jis.2016.72002
3,140
Downloads
5,043
Views
Citations
This article belongs to the Special Issue on
Cybersecurity Investments
Information Segmentation and Investing in Cybersecurity
(Articles)
Lawrence A. Gordon
,
Martin P. Loeb
,
Lei Zhou
Journal of Information Security
Vol.12 No.1
,January 19, 2021
DOI:
10.4236/jis.2021.121006
1,128
Downloads
3,938
Views
Citations
Improving the Cybersecurity Framework for Future Consumer Networks
(Articles)
Tyler Welker
,
Olatunde Abiona
Int'l J. of Communications, Network and System Sciences
Vol.14 No.4
,April 30, 2021
DOI:
10.4236/ijcns.2021.144004
1,106
Downloads
2,583
Views
Citations
Relevance of Cybersecurity Education at Pedagogy Levels in Schools
(Articles)
Eric Amankwa
Journal of Information Security
Vol.12 No.4
,September 9, 2021
DOI:
10.4236/jis.2021.124013
1,817
Downloads
11,611
Views
Citations
Case Study on Data Analytics and Machine Learning Accuracy
(Articles)
Abdullah Z. Alruhaymi
,
Charles J. Kim
Journal of Data Analysis and Information Processing
Vol.9 No.4
,September 24, 2021
DOI:
10.4236/jdaip.2021.94015
444
Downloads
2,360
Views
Citations
Data Privacy on the Internet: A Study on Awareness and Attitudes among the Students of the University of Chittagong in Bangladesh
(Articles)
Madhab Chandra Das
Advances in Journalism and Communication
Vol.10 No.2
,May 7, 2022
DOI:
10.4236/ajc.2022.102006
508
Downloads
8,470
Views
Citations
Factors Influencing Employees on Compliance with Cybersecurity Policies and Their Implications for Protection of Information and Technology Assets in Saudi Arabia
(Articles)
Sami Saad Alsemairi
Intelligent Information Management
Vol.15 No.4
,July 20, 2023
DOI:
10.4236/iim.2023.154013
227
Downloads
1,228
Views
Citations
Challenges of Technology in African Countries: A Case Study of Zambia
(Articles)
Emile S. Mbungu Kala
Open Journal of Safety Science and Technology
Vol.13 No.4
,December 25, 2023
DOI:
10.4236/ojsst.2023.134011
702
Downloads
9,824
Views
Citations
Closing the Gap: Boosting Women’s Representation in Cybersecurity Leadership
(Articles)
Yasser Asiry
Journal of Information Security
Vol.15 No.1
,January 10, 2024
DOI:
10.4236/jis.2024.151002
188
Downloads
885
Views
Citations
Artificial Intelligence Adoption for Cybersecurity in Africa
(Articles)
Nadine Nibigira
,
Vincent Havyarimana
,
Zhu Xiao
Journal of Information Security
Vol.15 No.2
,March 21, 2024
DOI:
10.4236/jis.2024.152009
472
Downloads
2,233
Views
Citations
The Risks of the U.S. Cyber Crisis
(Articles)
Theo Lim
Journal of Information Security
Vol.16 No.1
,December 10, 2024
DOI:
10.4236/jis.2025.161003
76
Downloads
474
Views
Citations
Kali Pi—A Miniature Ultra-Portable Penetration Testing Device
(Articles)
Ahmed Bin Ali
Journal of Information Security
Vol.16 No.1
,December 30, 2024
DOI:
10.4236/jis.2025.161005
262
Downloads
889
Views
Citations
Cybersecurity Challenges and Technological Integration in Military Supply Chain 4.0
(Articles)
Nathalie Essi Afefa Takpah
,
Victor Nosakhare Oriakhi
Journal of Information Security
Vol.16 No.1
,December 31, 2024
DOI:
10.4236/jis.2025.161007
171
Downloads
1,052
Views
Citations
Integrating AI in Cybersecurity Higher Education: A Path to Workforce Readiness
(Articles)
Maryam Roshanaei
,
Mark Gregory Jachura
Journal of Intelligent Learning Systems and Applications
Vol.17 No.2
,March 31, 2025
DOI:
10.4236/jilsa.2025.172005
250
Downloads
736
Views
Citations
Cybercrime in Developing Countries: Negative Effects and Panacea
(Articles)
John Otozi Ugah
,
Onu Sunday
,
Alozie Obidinma
,
Ori Silas Ene
Open Access Library Journal
Vol.12 No.4
,April 10, 2025
DOI:
10.4236/oalib.1113218
33
Downloads
310
Views
Citations
Enabling Seamless Human-AI Interaction and Effective Teaming
(Articles)
Vivek Singh
International Journal of Intelligence Science
Vol.15 No.3
,May 30, 2025
DOI:
10.4236/ijis.2025.153005
36
Downloads
186
Views
Citations
Climate Change, Environmental Threats and Cyber-Threats to Critical Infrastructures in Multi-Regulatory Sustainable Global Approach with Sweden as an Example
(Articles)
Sandra Cassotta
,
Maria Pettersson
Beijing Law Review
Vol.10 No.3
,June 27, 2019
DOI:
10.4236/blr.2019.103035
1,304
Downloads
5,086
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top