Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Proactive Security Mechanism and Design for Firewall
(Articles)
Saleem-Ullah Lar
,
Xiaofeng Liao
,
Aqeel ur Rehman
,
MA Qinglu
Journal of Information Security
Vol.2 No.3
,July 29, 2011
DOI:
10.4236/jis.2011.23012
7,290
Downloads
13,251
Views
Citations
Gender Differences in Information Security Management
(Articles)
Fayez Alotaibi
,
Aziz Alshehri
Journal of Computer and Communications
Vol.8 No.3
,March 9, 2020
DOI:
10.4236/jcc.2020.83006
1,211
Downloads
3,944
Views
Citations
This article belongs to the Special Issue on
Information, Network & Computer Security
Time-Optimal Control Problem for
n
×
n
Co-Operative Parabolic Systems with Control in Initial Conditions
(Articles)
Mohammed A. Shehata
Advances in Pure Mathematics
Vol.3 No.9A
,December 31, 2013
DOI:
10.4236/apm.2013.39A1006
5,713
Downloads
7,814
Views
Citations
This article belongs to the Special Issue on
Differential Equations and Dynamic Systems
GIS-Based Urbanization Prediction Model Considering Neighborhood Relationship of the Unit of the “Block” in the Outskirts of Metropolitan Area
(Articles)
Kayoko Yamamoto
Journal of Geographic Information System
Vol.6 No.4
,August 12, 2014
DOI:
10.4236/jgis.2014.64030
4,180
Downloads
5,433
Views
Citations
Symplectic Numerical Approach for Nonlinear Optimal Control of Systems with Inequality Constraints
(Articles)
Yoshiki Abe
,
Gou Nishida
,
Noboru Sakamoto
,
Yutaka Yamamoto
Int'l J. of Modern Nonlinear Theory and Application
Vol.4 No.4
,December 3, 2015
DOI:
10.4236/ijmnta.2015.44018
4,060
Downloads
5,174
Views
Citations
Smart Inverter Functionality Testing for Battery Energy Storage Systems
(Articles)
Jun Hashimoto
,
Taha Selim Ustun
,
Kenji Otani
Smart Grid and Renewable Energy
Vol.8 No.11
,November 30, 2017
DOI:
10.4236/sgre.2017.811022
1,724
Downloads
4,299
Views
Citations
Modeling and Numerical Solution of a Cancer Therapy Optimal Control Problem
(Articles)
Melina-Lorén Kienle Garrido
,
Tim Breitenbach
,
Kurt Chudej
,
Alfio Borzì
Applied Mathematics
Vol.9 No.8
,August 30, 2018
DOI:
10.4236/am.2018.98067
1,172
Downloads
2,994
Views
Citations
Evaluation of the Anti-Salivary IgG Response Specific to Anopheles Vectors of Malaria in Children under Five Seen in Health Care Settings in Areas of Low and High Insecticide Resistance in Southern Benin
(Articles)
Tokponnon T. Filémon
,
Ossè Razaki
,
Noukpo Herbert
,
Legba Thibaut
,
Koukpo Zinsou Come
,
Oke Mariam
,
Fassinou Arsène
,
Akakpo Evelyne
,
Fassinou Hector
,
Padonou Gil Germain
,
Remoue Franck
,
Kinde-Gazard Dorothée
,
Akogbeto Martin
Advances in Infectious Diseases
Vol.13 No.2
,June 9, 2023
DOI:
10.4236/aid.2023.132025
170
Downloads
630
Views
Citations
Research on the Contents and Indexes of Reservoir Operational Security
(Articles)
Jingchun Feng
,
Zhongnan Duan
Journal of Water Resource and Protection
Vol.2 No.11
,November 29, 2010
DOI:
10.4236/jwarp.2010.211115
6,191
Downloads
9,600
Views
Citations
Food Is Security: The Nexus of Health Security in Fragile and Failed States
(Articles)
John Quinn
,
Tomas Zeleny
,
Vladimir Bencko
Food and Nutrition Sciences
Vol.5 No.19
,October 14, 2014
DOI:
10.4236/fns.2014.519197
5,012
Downloads
6,593
Views
Citations
On Development of Platform for Organization Security Threat Analytics and Management (POSTAM) Using Rule-Based Approach
(Articles)
Joseph E. Mbowe
,
Simon S. Msanjila
,
George S. Oreku
,
Khamisi Kalegele
Journal of Software Engineering and Applications
Vol.9 No.12
,December 30, 2016
DOI:
10.4236/jsea.2016.912041
1,821
Downloads
2,937
Views
Citations
The Necessity of Information Security in the Vulnerable Pharmaceutical Industry
(Articles)
Shawn Josette Roberts
Journal of Information Security
Vol.5 No.4
,September 25, 2014
DOI:
10.4236/jis.2014.54014
6,864
Downloads
9,895
Views
Citations
Externalities and the Magnitude of Cyber Security Underinvestment by Private Sector Firms: A Modification of the Gordon-Loeb Model
(Articles)
Lawrence A. Gordon
,
Martin P. Loeb
,
William Lucyshyn
,
Lei Zhou
Journal of Information Security
Vol.6 No.1
,January 7, 2015
DOI:
10.4236/jis.2015.61003
7,689
Downloads
10,560
Views
Citations
Association between the Performance of the University Security Officers and Their Physical Fitness: A Case Study
(Articles)
A. M. Razmy
,
A. Jabeer
Open Access Library Journal
Vol.4 No.6
,June 12, 2017
DOI:
10.4236/oalib.1103239
1,134
Downloads
2,191
Views
Citations
Towards Maintaining Peacefulness of the Sea: Legal Regime Governing Maritime Safety and Security in Nigeria
(Articles)
Ekundayo Oluwaremilekun Babatunde
,
Mutiat Mobolanle Abdulsalam
Beijing Law Review
Vol.12 No.2
,June 1, 2021
DOI:
10.4236/blr.2021.122029
567
Downloads
3,969
Views
Citations
Security Cooperation between China and Indonesia to Address Maritime Security Threats
(Articles)
Yuliannova Lestari
,
Georges Olemanu Lohalo
,
Nicole Kajir Diur
,
Betao Ngoma Mushinda
,
Vital Mbumba Mbumba
,
Scheel Mutombo Kianga
,
Peter Ngolo Minga
Open Journal of Political Science
Vol.12 No.4
,September 9, 2022
DOI:
10.4236/ojps.2022.124030
516
Downloads
3,142
Views
Citations
Metaphor Analysis of Security Discourse in
Xi Jinping
:
The Governance of China
(
Volume IV
) and Its English Translation Strategies
(Articles)
Rui Chen
Open Journal of Modern Linguistics
Vol.14 No.5
,October 15, 2024
DOI:
10.4236/ojml.2024.145050
107
Downloads
585
Views
Citations
Leadership Responsibilities and Characteristics in Security Work
(Articles)
Abdullah Ahmed Al-Subaie
Open Journal of Leadership
Vol.14 No.2
,April 22, 2025
DOI:
10.4236/ojl.2025.142009
48
Downloads
335
Views
Citations
Integrated Financial Management Information System and Supply Chain Effectiveness
(Articles)
Alex Osoro Mbaka
,
Juliana M. Namada
American Journal of Industrial and Business Management
Vol.9 No.1
,January 18, 2019
DOI:
10.4236/ajibm.2019.91014
2,367
Downloads
6,506
Views
Citations
Computer – Based Infrastructure Sector Interdependencies and Security Implications
(Articles)
Aghware Fidelis Obukohwo
Int'l J. of Communications, Network and System Sciences
Vol.4 No.11
,October 31, 2011
DOI:
10.4236/ijcns.2011.411090
3,731
Downloads
6,521
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top