Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Finite Element Modeling of Crack Tip Blunting for Estimation of Energy Release Rate Component of Mode I Crack near a Strength Mismatched Interface
(Articles)
Sunil Bhat
,
Vijay
G. Ukadgaonker
Applied Mathematics
Vol.4 No.5A
,May 21, 2013
DOI:
10.4236/am.2013.45A001
4,913
Downloads
7,771
Views
Citations
This article belongs to the Special Issue on
Finite Element Method
Configuration for Predicting Travel-Time Using Wavelet Packets and Support Vector Regression
(Articles)
Adeel Yusuf
,
Vijay
K. Madisetti
Journal of Transportation Technologies
Vol.3 No.3
,July 11, 2013
DOI:
10.4236/jtts.2013.33023
4,695
Downloads
7,172
Views
Citations
Outbreak Investigation of Cholera in a Slum of Northern India
(Articles)
Manoj Kumar
,
Vijay
Lakshmi Sharma
Open Journal of Epidemiology
Vol.4 No.4
,November 21, 2014
DOI:
10.4236/ojepi.2014.44031
5,086
Downloads
6,557
Views
Citations
Enucleation Followed by Open Packing of Iodoform Gauze in Mandibular Unicystic Ameloblastoma: A Case Report
(Articles)
Vijay
Kumar
,
Raman Kant Sinha
Open Access Library Journal
Vol.1 No.4
,July 30, 2014
DOI:
10.4236/oalib.1100703
3,245
Downloads
4,630
Views
Citations
Synthesis and Characterization of Graft Co-Polymers of Sisal Fiber with Binary Vinyl Monomers
(Articles)
Vijay
K. Kaushik
,
Mukesh Goyal
Open Access Library Journal
Vol.1 No.6
,September 19, 2014
DOI:
10.4236/oalib.1100604
1,769
Downloads
2,783
Views
Citations
Predicting tbx22 Zebrafish Protein Structure Using Multi-Level Prediction Tools and Demonstration of Conserved Structural Domains in Relation to Orthologous tbx22 Proteins in Humans
(Articles)
Vijay
P. Boominathan
,
Tracie Ferreira
Journal of Biosciences and Medicines
Vol.4 No.3
,March 30, 2016
DOI:
10.4236/jbm.2016.43014
2,617
Downloads
3,620
Views
Citations
Blockchain Platform for Industrial Internet of Things
(Articles)
Arshdeep Bahga
,
Vijay
K. Madisetti
Journal of Software Engineering and Applications
Vol.9 No.10
,October 28, 2016
DOI:
10.4236/jsea.2016.910036
10,699
Downloads
29,719
Views
Citations
Is There a Reserve Saving Effect of International Clearing Union? Testing for Asian Clearing Union
(Articles)
Vijay
Singh Shekhawat
,
Vinish Kathuria
Theoretical Economics Letters
Vol.7 No.3
,April 20, 2017
DOI:
10.4236/tel.2017.73041
1,345
Downloads
2,898
Views
Citations
A Value Token Transfer Protocol (VTTP) for Decentralized Finance
(Articles)
Arshdeep Bahga
,
Vijay
K. Madisetti
Journal of Software Engineering and Applications
Vol.13 No.11
,November 26, 2020
DOI:
10.4236/jsea.2020.1311020
722
Downloads
2,233
Views
Citations
ERAD: Enhanced Ransomware Attack Defense System for Healthcare Organizations
(Articles)
Xinyue Li
,
Vijay
K. Madisetti
Journal of Software Engineering and Applications
Vol.17 No.5
,May 28, 2024
DOI:
10.4236/jsea.2024.175016
157
Downloads
849
Views
Citations
Sher: A Secure Broker for DevSecOps and CI/CD Workflows
(Articles)
Pranau Kumar
,
Vijay
K. Madisetti
Journal of Software Engineering and Applications
Vol.17 No.5
,May 29, 2024
DOI:
10.4236/jsea.2024.175018
165
Downloads
594
Views
Citations
A Comparative Analysis of Cybersecurity Threat Taxonomies for Healthcare Organizations
(Articles)
Mahima Jaikanth
,
Vijay
K. Madisetti
Journal of Software Engineering and Applications
Vol.17 No.5
,May 30, 2024
DOI:
10.4236/jsea.2024.175020
172
Downloads
820
Views
Citations
User Profile & Attitude Analysis Based on Unstructured Social Media and Online Activity
(Articles)
Yuting Tan
,
Vijay
K. Madisetti
Journal of Software Engineering and Applications
Vol.17 No.6
,June 7, 2024
DOI:
10.4236/jsea.2024.176025
99
Downloads
426
Views
Citations
Certis: Cloud Asset Management & Threat Evaluation Using Behavioral Fingerprinting at Application Layer
(Articles)
Kumardwij Bhatnagar
,
Vijay
K. Madisetti
Journal of Software Engineering and Applications
Vol.17 No.6
,June 7, 2024
DOI:
10.4236/jsea.2024.176026
82
Downloads
380
Views
Citations
Cybersecurity Risk Management through Behavior-Based Contextual Analysis of Online Logs
(Articles)
Irawati Edlabadkar
,
Vijay
K. Madisetti
Journal of Software Engineering and Applications
Vol.17 No.6
,June 7, 2024
DOI:
10.4236/jsea.2024.176027
121
Downloads
573
Views
Citations
Side-Channel Attacks & Data Exfiltration Using Wall Outlet USB Power Adapters
(Articles)
Andrew Masters
,
Vijay
K. Madisetti
Journal of Information Security
Vol.15 No.4
,September 10, 2024
DOI:
10.4236/jis.2024.154025
80
Downloads
552
Views
Citations
PhishGuard: Integrating Fine-Tuned Large Language Models (LLMs) into Password Management
(Articles)
Smith Patel
,
Vijay
K. Madisetti
Journal of Information Security
Vol.15 No.4
,October 10, 2024
DOI:
10.4236/jis.2024.154027
61
Downloads
392
Views
Citations
Intelligent ETL for Enterprise Software Applications Using Unstructured Data
(Articles)
Manthan Joshi
,
Vijay
K. Madisetti
Journal of Software Engineering and Applications
Vol.18 No.1
,January 30, 2025
DOI:
10.4236/jsea.2025.181003
80
Downloads
474
Views
Citations
Enhancing Microsoft CyberBattleSim for Enterprise Cybersecurity Simulations
(Articles)
Jackson Norris
,
Vijay
K. Madisetti
Journal of Information Security
Vol.16 No.2
,April 8, 2025
DOI:
10.4236/jis.2025.162014
33
Downloads
288
Views
Citations
On Threat Models for Information-Stealing Malware (ISM) Targeting Password Managers
(Articles)
Vedika Sunil Bang
,
Vijay
Madisetti
Journal of Information Security
Vol.16 No.2
,April 17, 2025
DOI:
10.4236/jis.2025.162015
30
Downloads
196
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top