Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Development of a Platform to Explore Network Intrusion Detection System (NIDS) for Cybersecurity
(Articles)
Chee Keong Chan
,
Alexander Weil Tine Yeoh
Journal of Computer and Communications
Vol.6 No.1
,December 29, 2017
DOI:
10.4236/jcc.2018.61001
1,289
Downloads
4,394
Views
Citations
Generative Adversarial Network Based Approach towards Synthetically Generating Insider Threat Scenarios
(Articles)
Mayesh Mohapatra
,
Anshumaan Phukan
,
Vijay K. Madisetti
Journal of Software Engineering and Applications
Vol.16 No.11
,November 28, 2023
DOI:
10.4236/jsea.2023.1611030
74
Downloads
301
Views
Citations
Mobile and Context-Aware GeoBI Applications: A Multilevel Model for Structuring and Sharing of Contextual Information
(Articles)
Belko Abdoul Aziz Diallo
,
Thierry Badard
,
Frédéric Hubert
,
Sylvie Daniel
Journal of Geographic Information System
Vol.4 No.5
,November 1, 2012
DOI:
10.4236/jgis.2012.45048
10,657
Downloads
13,336
Views
Citations
Policy Proposal of the Americans with Disability Act (ADA) Amendments Act of 2008
(Articles)
Sahana Pentyala
Open Journal of Social Sciences
Vol.9 No.11
,November 26, 2021
DOI:
10.4236/jss.2021.911018
154
Downloads
1,119
Views
Citations
On P-Regularity of Acts
(Articles)
Akbar Golchin
,
Hossein Mohammadzadeh
,
Parisa Rezaei
Advances in Pure Mathematics
Vol.2 No.2
,March 22, 2012
DOI:
10.4236/apm.2012.22014
4,354
Downloads
8,492
Views
Citations
The Paradoxical Nature of Academic Measures and Creativity
(Articles)
Sally Blake
,
Cheryl McCarthy
,
Jeremy A. Krause
Creative Education
Vol.5 No.10
,June 19, 2014
DOI:
10.4236/ce.2014.510092
5,185
Downloads
6,571
Views
Citations
The Epidemiological, Clinical, Paraclinical and Prognostic Aspects of Severe Malaria at the Regional Hospital of Thies
(Articles)
Agbogbenkou Tévi Déla-dem Lawson
,
Madoky Magatte Diop
,
Viviane Marie Pierre Cisse
,
Stéphanie Akanni
,
Adama Berthe
,
Papa Souleymane Toure
,
Bernard Marcel Diop
,
Mamadou Mourtalla Ka
Advances in Infectious Diseases
Vol.8 No.3
,September 20, 2018
DOI:
10.4236/aid.2018.83015
1,103
Downloads
1,824
Views
Citations
Motivation in Sharing Economy-Based Service Triads: Operations of a Ride-Sharing Company
(Articles)
Githii Michael Wainaina
,
Hellen Mutogoh
Journal of Service Science and Management
Vol.15 No.3
,June 28, 2022
DOI:
10.4236/jssm.2022.153011
177
Downloads
766
Views
Citations
A Museum Cost Sharing Problem
(Articles)
Yuntong Wang
American Journal of Operations Research
Vol.1 No.2
,June 17, 2011
DOI:
10.4236/ajor.2011.12008
4,955
Downloads
9,986
Views
Citations
Cybersecurity Investment Guidance: Extensions of the Gordon and Loeb Model
(Articles)
Scott Farrow
,
Jules Szanton
Journal of Information Security
Vol.7 No.2
,March 16, 2016
DOI:
10.4236/jis.2016.72002
2,877
Downloads
4,402
Views
Citations
This article belongs to the Special Issue on
Cybersecurity Investments
Relevance of Cybersecurity Education at Pedagogy Levels in Schools
(Articles)
Eric Amankwa
Journal of Information Security
Vol.12 No.4
,September 9, 2021
DOI:
10.4236/jis.2021.124013
1,081
Downloads
8,414
Views
Citations
Case Study on Data Analytics and Machine Learning Accuracy
(Articles)
Abdullah Z. Alruhaymi
,
Charles J. Kim
Journal of Data Analysis and Information Processing
Vol.9 No.4
,September 24, 2021
DOI:
10.4236/jdaip.2021.94015
340
Downloads
1,784
Views
Citations
Challenges of Technology in African Countries: A Case Study of Zambia
(Articles)
Emile S. Mbungu Kala
Open Journal of Safety Science and Technology
Vol.13 No.4
,December 25, 2023
DOI:
10.4236/ojsst.2023.134011
160
Downloads
2,530
Views
Citations
Closing the Gap: Boosting Women’s Representation in Cybersecurity Leadership
(Articles)
Yasser Asiry
Journal of Information Security
Vol.15 No.1
,January 10, 2024
DOI:
10.4236/jis.2024.151002
69
Downloads
331
Views
Citations
Artificial Intelligence Adoption for Cybersecurity in Africa
(Articles)
Nadine Nibigira
,
Vincent Havyarimana
,
Zhu Xiao
Journal of Information Security
Vol.15 No.2
,March 21, 2024
DOI:
10.4236/jis.2024.152009
127
Downloads
532
Views
Citations
Climate Change, Environmental Threats and Cyber-Threats to Critical Infrastructures in Multi-Regulatory Sustainable Global Approach with Sweden as an Example
(Articles)
Sandra Cassotta
,
Maria Pettersson
Beijing Law Review
Vol.10 No.3
,June 27, 2019
DOI:
10.4236/blr.2019.103035
1,202
Downloads
4,223
Views
Citations
Investigating How Parental Perceptions of Cybersecurity Influence Children’s Safety in the Cyber World: A Case Study of Saudi Arabia
(Articles)
Tariq Saeed Mian
,
Eman M. Alatawi
Intelligent Information Management
Vol.15 No.5
,September 11, 2023
DOI:
10.4236/iim.2023.155017
132
Downloads
785
Views
Citations
Developing an Abstraction Framework for Managing and Controlling Saudi Banks’ Cybersecurity Threats Based on the NIST Cybersecurity Framework and ISO/IEC 27001
(Articles)
Abdulaziz Saleh Alraddadi
Journal of Software Engineering and Applications
Vol.16 No.12
,December 29, 2023
DOI:
10.4236/jsea.2023.1612036
159
Downloads
603
Views
Citations
The History, Trend, Types, and Mitigation of Distributed Denial of Service Attacks
(Articles)
Richard Kabanda
,
Bertrand Byera
,
Henrietta Emeka
,
Khaja Taiyab Mohiuddin
Journal of Information Security
Vol.14 No.4
,October 27, 2023
DOI:
10.4236/jis.2023.144026
156
Downloads
900
Views
Citations
Cyber Resilience through Real-Time Threat Analysis in Information Security
(Articles)
Aparna Gadhi
,
Ragha Madhavi Gondu
,
Hitendra Chaudhary
,
Olatunde Abiona
Int'l J. of Communications, Network and System Sciences
Vol.17 No.4
,April 30, 2024
DOI:
10.4236/ijcns.2024.174004
46
Downloads
139
Views
Citations
<
...
2
3
4
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top