Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Closing the Gap: Boosting Women’s Representation in Cybersecurity Leadership
(Articles)
Yasser Asiry
Journal of Information Security
Vol.15 No.1
,January 10, 2024
DOI:
10.4236/jis.2024.151002
176
Downloads
797
Views
Citations
Artificial Intelligence Adoption for Cybersecurity in Africa
(Articles)
Nadine Nibigira
,
Vincent Havyarimana
,
Zhu Xiao
Journal of Information Security
Vol.15 No.2
,March 21, 2024
DOI:
10.4236/jis.2024.152009
432
Downloads
1,988
Views
Citations
The Risks of the U.S. Cyber Crisis
(Articles)
Theo Lim
Journal of Information Security
Vol.16 No.1
,December 10, 2024
DOI:
10.4236/jis.2025.161003
62
Downloads
378
Views
Citations
Kali Pi—A Miniature Ultra-Portable Penetration Testing Device
(Articles)
Ahmed Bin Ali
Journal of Information Security
Vol.16 No.1
,December 30, 2024
DOI:
10.4236/jis.2025.161005
250
Downloads
767
Views
Citations
Cybersecurity Challenges and Technological Integration in Military Supply Chain 4.0
(Articles)
Nathalie Essi Afefa Takpah
,
Victor Nosakhare Oriakhi
Journal of Information Security
Vol.16 No.1
,December 31, 2024
DOI:
10.4236/jis.2025.161007
143
Downloads
801
Views
Citations
Integrating AI in Cybersecurity Higher Education: A Path to Workforce Readiness
(Articles)
Maryam Roshanaei
,
Mark Gregory Jachura
Journal of Intelligent Learning Systems and Applications
Vol.17 No.2
,March 31, 2025
DOI:
10.4236/jilsa.2025.172005
94
Downloads
369
Views
Citations
Cybercrime in Developing Countries: Negative Effects and Panacea
(Articles)
John Otozi Ugah
,
Onu Sunday
,
Alozie Obidinma
,
Ori Silas Ene
Open Access Library Journal
Vol.12 No.4
,April 10, 2025
DOI:
10.4236/oalib.1113218
19
Downloads
162
Views
Citations
Climate Change, Environmental Threats and Cyber-Threats to Critical Infrastructures in Multi-Regulatory Sustainable Global Approach with Sweden as an Example
(Articles)
Sandra Cassotta
,
Maria Pettersson
Beijing Law Review
Vol.10 No.3
,June 27, 2019
DOI:
10.4236/blr.2019.103035
1,291
Downloads
4,953
Views
Citations
Investigating How Parental Perceptions of Cybersecurity Influence Children’s Safety in the Cyber World: A Case Study of Saudi Arabia
(Articles)
Tariq Saeed Mian
,
Eman M. Alatawi
Intelligent Information Management
Vol.15 No.5
,September 11, 2023
DOI:
10.4236/iim.2023.155017
272
Downloads
1,611
Views
Citations
Developing an Abstraction Framework for Managing and Controlling Saudi Banks’ Cybersecurity Threats Based on the NIST Cybersecurity Framework and ISO/IEC 27001
(Articles)
Abdulaziz Saleh Alraddadi
Journal of Software Engineering and Applications
Vol.16 No.12
,December 29, 2023
DOI:
10.4236/jsea.2023.1612036
353
Downloads
1,449
Views
Citations
A Review of Human Vulnerabilities in Cyber Security: Challenges and Solutions for Microfinance Institutions
(Articles)
Evaline Waweru
,
Simon Maina Karume
,
Alex Kibet
Journal of Information Security
Vol.16 No.1
,December 31, 2024
DOI:
10.4236/jis.2025.161006
93
Downloads
550
Views
Citations
Active Power Filter Based on Adaptive Detecting Approach of Harmonic Currents
(Articles)
Yu ZHANG
,
Yupeng TANG
Journal of Electromagnetic Analysis and Applications
Vol.1 No.4
,December 31, 2009
DOI:
10.4236/jemaa.2009.14036
8,480
Downloads
14,804
Views
Citations
Interference Mitigation in Satellite Personal Communication Networks Using Adaptive Antenna Arrays and Filtering Technique
(Articles)
Sunday E. Iwasokun
,
Michael O. Kolawole
Wireless Engineering and Technology
Vol.1 No.2
,November 3, 2010
DOI:
10.4236/wet.2010.12013
6,532
Downloads
11,456
Views
Citations
A Transient Enhancement Method for Two-Stage Helicopter Gearbox Fault Diagnosis Based on ALE
(Articles)
Xiange Tian
,
Tie Wang
,
Zhi Chen
,
Fengshou Gu
,
Andrew Ball
Journal of Signal and Information Processing
Vol.4 No.3B
,October 17, 2013
DOI:
10.4236/jsip.2013.43B023
3,649
Downloads
4,904
Views
Citations
An Identical Inputs-Adaptive Filter for the Detection of Signal’s Breakdown Points
(Articles)
Mohammed Siddig H. Mohammed
,
Kim Ki-Seong
World Journal of Engineering and Technology
Vol.5 No.2
,May 11, 2017
DOI:
10.4236/wjet.2017.52018
1,528
Downloads
2,469
Views
Citations
Hybrid Authentication Cybersystem Based on Discrete Logarithm, Factorization and Array Entanglements
(Articles)
Boris S. Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.3 No.7
,July 27, 2010
DOI:
10.4236/ijcns.2010.37077
5,003
Downloads
8,610
Views
Citations
The Guidelines to Adopt an Applicable SIEM Solution
(Articles)
Hassan Mokalled
,
Rosario Catelli
,
Valentina Casola
,
Daniele Debertol
,
Ermete Meda
,
Rodolfo Zunino
Journal of Information Security
Vol.11 No.1
,December 13, 2019
DOI:
10.4236/jis.2020.111003
2,081
Downloads
5,322
Views
Citations
An Analysis of Cybersecurity Attacks against Internet of Things and Security Solutions
(Articles)
Mohammad Rafsun Islam
,
K. M. Aktheruzzaman
Journal of Computer and Communications
Vol.8 No.4
,April 2, 2020
DOI:
10.4236/jcc.2020.84002
2,411
Downloads
9,799
Views
Citations
Case Study of a Cyber-Physical Attack Affecting Port and Ship Operational Safety
(Articles)
Kimberly Tam
,
Rory Hopcraft
,
Kemedi Moara-Nkwe
,
Juan Palbar Misas
,
Wesley Andrews
,
Avanthika Vineetha Harish
,
Pablo Giménez
,
Tom Crichton
,
Kevin Jones
Journal of Transportation Technologies
Vol.12 No.1
,December 6, 2021
DOI:
10.4236/jtts.2022.121001
690
Downloads
5,579
Views
Citations
Towards the Advancement of Cashless Transaction: A Security Analysis of Electronic Payment Systems
(Articles)
Iffath Tanjim Moon
,
Muhammad Shamsuzzaman
,
Muhammad Musfiqur Rahman Mridha
,
Abu Sayed Md. Mostafizur Rahaman
Journal of Computer and Communications
Vol.10 No.7
,July 29, 2022
DOI:
10.4236/jcc.2022.107007
865
Downloads
7,049
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top