Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Safety Aspects in the Distance Learning Systems
(Articles)
Sergii Kavun
,
Yousef Daradkeh
,
Alexander Zyma
Creative Education
Vol.3 No.1
,February 22, 2012
DOI:
10.4236/ce.2012.31014
5,497
Downloads
9,500
Views
Citations
Data Integrity and Risk
(Articles)
Sasidhar Duggineni
Open Journal of Optimization
Vol.12 No.2
,June 7, 2023
DOI:
10.4236/ojop.2023.122003
909
Downloads
6,447
Views
Citations
Reactive Data Security Approach and Review of Data Security Techniques in Wireless Networks
(Articles)
Arif Sari
,
Mehmet Karay
Int'l J. of Communications, Network and System Sciences
Vol.8 No.13
,December 30, 2015
DOI:
10.4236/ijcns.2015.813051
4,053
Downloads
5,243
Views
Citations
A Facilitated Interface to Generate a Combined Textual and Graphical Database System Using Widely Available Software
(Articles)
Corey Lawson
,
Kirk Larson
,
Jonathan Van Erdewyk
,
Christopher Smith
,
Al Rizzo
,
Landon Ross
,
Marc Rendell
Journal of Software Engineering and Applications
Vol.5 No.10
,October 31, 2012
DOI:
10.4236/jsea.2012.510091
4,817
Downloads
6,905
Views
Citations
Hybrid Power System Power Flow Analysis
(Articles)
Petr Bilik
,
Jakub Manas
,
Jan Zidek
,
Jiri Koziorek
Energy and Power Engineering
Vol.5 No.4B
,October 31, 2013
DOI:
10.4236/epe.2013.54B135
5,867
Downloads
8,167
Views
Citations
Big Data—Building Software: Some Thoughts on the Future of Building Sciences
(Articles)
Winifred Elysse Newman
Creative Education
Vol.10 No.3
,March 6, 2019
DOI:
10.4236/ce.2019.103038
919
Downloads
1,780
Views
Citations
CAS-Based Approach for Automatic Data Integration
(Articles)
Eli Rohn
American Journal of Operations Research
Vol.3 No.1A
,January 30, 2013
DOI:
10.4236/ajor.2013.31A017
3,409
Downloads
5,823
Views
Citations
This article belongs to the Special Issue on
Complex System
Analysis of Secured Cloud Data Storage Model for Information
(Articles)
Emmanuel Nwabueze Ekwonwune
,
Udo Chukwuebuka Chigozie
,
Duroha Austin Ekekwe
,
Georgina Chekwube Nwankwo
Journal of Software Engineering and Applications
Vol.17 No.5
,May 28, 2024
DOI:
10.4236/jsea.2024.175017
145
Downloads
654
Views
Citations
Evaluation of Operating Domains in Power Systems
(Articles)
M. A. El-Kady
,
Y. A. Alturki
,
M. S. Al-Saud
Energy and Power Engineering
Vol.4 No.4
,June 25, 2012
DOI:
10.4236/epe.2012.44037
4,763
Downloads
7,155
Views
Citations
Practical Security Approaches against Border Gateway Protocol (BGP) Session Hijacking Attacks between Autonomous Systems
(Articles)
Stephen Brako Oti
,
James Ben Hayfron-Acquah
Journal of Computer and Communications
Vol.2 No.8
,June 17, 2014
DOI:
10.4236/jcc.2014.28002
4,361
Downloads
7,014
Views
Citations
A Systems-Theoretic Security Model for Large Scale, Complex Systems Applied to the US Air Transportation System
(Articles)
Joseph R. Laracy
Int'l J. of Communications, Network and System Sciences
Vol.10 No.5
,May 31, 2017
DOI:
10.4236/ijcns.2017.105005
1,749
Downloads
3,660
Views
Citations
A Hybrid Intrusion Detection System for Smart Home Security Based on Machine Learning and User Behavior
(Articles)
Faisal Alghayadh
,
Debatosh Debnath
Advances in Internet of Things
Vol.11 No.1
,January 28, 2021
DOI:
10.4236/ait.2021.111002
1,547
Downloads
6,672
Views
Citations
Algorithms and Tools for Securing and Protecting Academic Data in the Democratic Republic of the Congo
(Articles)
Gulain Mugaruka Buduge
,
Jérémie Ndikumagenge
,
Justin Buhendwa Nyenyezi
Journal of Information Security
Vol.13 No.4
,September 30, 2022
DOI:
10.4236/jis.2022.134017
203
Downloads
838
Views
Citations
Information Systems Security Threats and Vulnerabilities: A Case of the Institute of Accountancy Arusha (IAA)
(Articles)
Adam Aloyce Semlambo
,
Didas Malekia Mfoi
,
Yona Sangula
Journal of Computer and Communications
Vol.10 No.11
,November 3, 2022
DOI:
10.4236/jcc.2022.1011003
360
Downloads
3,489
Views
Citations
Multi-Factor Authentication for Keyless Entry Systems: An Innovative Approach to Automotive Security
(Articles)
Danilo Brito
,
Shakour Abuzneid
Journal of Information Security
Vol.16 No.1
,December 27, 2024
DOI:
10.4236/jis.2025.161004
114
Downloads
1,040
Views
Citations
Big Data Analysis in Smart Manufacturing: A Review
(Articles)
Kevin Nagorny
,
Pedro Lima-Monteiro
,
Jose Barata
,
Armando Walter Colombo
Int'l J. of Communications, Network and System Sciences
Vol.10 No.3
,March 31, 2017
DOI:
10.4236/ijcns.2017.103003
5,047
Downloads
17,998
Views
Citations
Secure Web Application Technologies Implementation through Hardening Security Headers Using Automated Threat Modelling Techniques
(Articles)
Maduhu Mshangi Mlyatu
,
Camilius Sanga
Journal of Information Security
Vol.14 No.1
,November 30, 2022
DOI:
10.4236/jis.2023.141001
319
Downloads
1,683
Views
Citations
Weighted Voting Ensemble Model Integrated with IoT for Detecting Security Threats in Satellite Systems and Aerial Vehicles
(Articles)
Raed Alharthi
Journal of Computer and Communications
Vol.13 No.2
,February 28, 2025
DOI:
10.4236/jcc.2025.132016
64
Downloads
360
Views
Citations
Effective and Extensive Virtual Private Network
(Articles)
Tarek S. Sobh
,
Yasser Aly
Journal of Information Security
Vol.2 No.1
,January 31, 2011
DOI:
10.4236/jis.2011.21004
7,413
Downloads
15,806
Views
Citations
Managing Social Security Data in the Web 2.0 Era
(Articles)
Li Luo
,
Hongyan Yang
,
Xuhui Li
iBusiness
Vol.4 No.3
,September 27, 2012
DOI:
10.4236/ib.2012.43028
4,613
Downloads
7,268
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top