Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journals
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
FAQ
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
FAQ
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462
(WhatsApp)
1655362766
SCIRP WeChat
Publication Date:
📅
--📅
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
The Motivation behind Islamic Terrorism
(Articles)
Youmna Mohammed
Open Journal of Political Science
Vol.11 No.4
, October 13, 2021
DOI:
10.4236/ojps.2021.114040
556
Downloads
12,281
Views
Citations
Mathematical Aspects of
SU
(2) and
SO
(3,R) Derived from Two-Mode Realization in Coordinate-Invariant Form
(Articles)
Alfred Wünsche
Journal of Modern Physics
Vol.14 No.3
, February 28, 2023
DOI:
10.4236/jmp.2023.143022
186
Downloads
1,133
Views
Citations
“Fight Club”: Symptomatic Analysis
(Articles)
Colin K. Touhy
Open Journal of Social Sciences
Vol.12 No.2
, February 6, 2024
DOI:
10.4236/jss.2024.122002
510
Downloads
6,666
Views
Citations
This article belongs to the Special Issue on
Arts and Entertainment
Digital Nationalism: Understanding the Power of Digital Technology in the Rise of Nationalism, National Identity, and National Narratives
(Articles)
Ratha Heang
Open Access Library Journal
Vol.11 No.9
, September 30, 2024
DOI:
10.4236/oalib.1112129
657
Downloads
6,912
Views
Citations
Financial Risk Analysis through Malicious URL Detection: Safeguarding Consumer Data in the Digital Economy
(Articles)
Soundararajan
,
Vaibhav Bhaskar
,
Adith Kadiyala
Open Journal of Business and Management
Vol.13 No.6
, October 28, 2025
DOI:
10.4236/ojbm.2025.136209
96
Downloads
766
Views
Citations
Some Implications of the Gessel Identity
(Articles)
Claire Levaillant
Applied Mathematics
Vol.14 No.9
, September 15, 2023
DOI:
10.4236/am.2023.149034
192
Downloads
860
Views
Citations
This article belongs to the Special Issue on
Mathematical and Computational Applications
Unique Identity Gateway Automation Product Capable of Connecting SAP GRC Security System for IAM Activity
(Articles)
Shreekant Rangrej
Journal of Information Security
Vol.16 No.4
, October 29, 2025
DOI:
10.4236/jis.2025.164030
63
Downloads
390
Views
Citations
Operator Methods and SU(1,1) Symmetry in the Theory of Jacobi and of Ultraspherical Polynomials
(Articles)
Alfred Wünsche
Advances in Pure Mathematics
Vol.7 No.2
, February 16, 2017
DOI:
10.4236/apm.2017.72012
3,068
Downloads
5,351
Views
Citations
This article belongs to the Special Issue on
Group Theory and Its Applications
The Power Play: Assessing the Impact of Hosting Global Sporting Events
(Articles)
Kelly Fong
Open Journal of Political Science
Vol.15 No.2
, April 3, 2025
DOI:
10.4236/ojps.2025.152020
189
Downloads
3,700
Views
Citations
Safeguarding the Living Cultural Vein: A Policy-Oriented Analysis of Intangible Cultural Heritage Inheritance and Renewal in China
(Articles)
Lkhagvasuren Urgamal
,
Rina Su
Open Access Library Journal
Vol.13 No.4
, April 27, 2026
DOI:
10.4236/oalib.1115266
7
Downloads
59
Views
Citations
Intelligent Biometric Information Management
(Articles)
Harry Wechsler
Intelligent Information Management
Vol.2 No.9
, October 13, 2010
DOI:
10.4236/iim.2010.29060
6,066
Downloads
10,920
Views
Citations
Cyberattack Ramifications, The Hidden Cost of a Security Breach
(Articles)
Meysam Tahmasebi
Journal of Information Security
Vol.15 No.2
, February 29, 2024
DOI:
10.4236/jis.2024.152007
469
Downloads
2,488
Views
Citations
This article belongs to the Special Issue on
Cybersecurity and Information Security
First
<
...
23
24
25
>
Last
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
SCIRP Newsletter
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
News
About SCIRP
Ethics
Editorial Policies
For Authors
Peer-Review Issues
Publication Fees
Special Issues
Service
Manuscript Tracking System
Order Print Copies
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2026 Scientific Research Publishing Inc. All Rights Reserved.
Top