Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
The Influence of the Minimum Dynamic Leaf Gap on VMAT Plans Quality
(Articles)
C. F. Djoumessi Zamo
,
M. Ndontchueng Moyo
,
A. Colliaux
,
V. Blot-Lafond
Open Access Library Journal
Vol.8 No.4
,April 29, 2021
DOI:
10.4236/oalib.1107378
474
Downloads
1,134
Views
Citations
Cybersecurity Investment Guidance: Extensions of the Gordon and Loeb Model
(Articles)
Scott Farrow
,
Jules Szanton
Journal of Information Security
Vol.7 No.2
,March 16, 2016
DOI:
10.4236/jis.2016.72002
3,130
Downloads
4,971
Views
Citations
This article belongs to the Special Issue on
Cybersecurity Investments
Information Segmentation and Investing in Cybersecurity
(Articles)
Lawrence A. Gordon
,
Martin P. Loeb
,
Lei Zhou
Journal of Information Security
Vol.12 No.1
,January 19, 2021
DOI:
10.4236/jis.2021.121006
1,036
Downloads
3,758
Views
Citations
Improving the Cybersecurity Framework for Future Consumer Networks
(Articles)
Tyler Welker
,
Olatunde Abiona
Int'l J. of Communications, Network and System Sciences
Vol.14 No.4
,April 30, 2021
DOI:
10.4236/ijcns.2021.144004
982
Downloads
2,404
Views
Citations
Relevance of Cybersecurity Education at Pedagogy Levels in Schools
(Articles)
Eric Amankwa
Journal of Information Security
Vol.12 No.4
,September 9, 2021
DOI:
10.4236/jis.2021.124013
1,663
Downloads
11,190
Views
Citations
Case Study on Data Analytics and Machine Learning Accuracy
(Articles)
Abdullah Z. Alruhaymi
,
Charles J. Kim
Journal of Data Analysis and Information Processing
Vol.9 No.4
,September 24, 2021
DOI:
10.4236/jdaip.2021.94015
432
Downloads
2,236
Views
Citations
Data Privacy on the Internet: A Study on Awareness and Attitudes among the Students of the University of Chittagong in Bangladesh
(Articles)
Madhab Chandra Das
Advances in Journalism and Communication
Vol.10 No.2
,May 7, 2022
DOI:
10.4236/ajc.2022.102006
486
Downloads
8,237
Views
Citations
Factors Influencing Employees on Compliance with Cybersecurity Policies and Their Implications for Protection of Information and Technology Assets in Saudi Arabia
(Articles)
Sami Saad Alsemairi
Intelligent Information Management
Vol.15 No.4
,July 20, 2023
DOI:
10.4236/iim.2023.154013
213
Downloads
1,124
Views
Citations
Challenges of Technology in African Countries: A Case Study of Zambia
(Articles)
Emile S. Mbungu Kala
Open Journal of Safety Science and Technology
Vol.13 No.4
,December 25, 2023
DOI:
10.4236/ojsst.2023.134011
644
Downloads
8,995
Views
Citations
Artificial Intelligence Adoption for Cybersecurity in Africa
(Articles)
Nadine Nibigira
,
Vincent Havyarimana
,
Zhu Xiao
Journal of Information Security
Vol.15 No.2
,March 21, 2024
DOI:
10.4236/jis.2024.152009
438
Downloads
2,014
Views
Citations
The Risks of the U.S. Cyber Crisis
(Articles)
Theo Lim
Journal of Information Security
Vol.16 No.1
,December 10, 2024
DOI:
10.4236/jis.2025.161003
64
Downloads
391
Views
Citations
Kali Pi—A Miniature Ultra-Portable Penetration Testing Device
(Articles)
Ahmed Bin Ali
Journal of Information Security
Vol.16 No.1
,December 30, 2024
DOI:
10.4236/jis.2025.161005
252
Downloads
776
Views
Citations
Cybersecurity Challenges and Technological Integration in Military Supply Chain 4.0
(Articles)
Nathalie Essi Afefa Takpah
,
Victor Nosakhare Oriakhi
Journal of Information Security
Vol.16 No.1
,December 31, 2024
DOI:
10.4236/jis.2025.161007
147
Downloads
827
Views
Citations
Integrating AI in Cybersecurity Higher Education: A Path to Workforce Readiness
(Articles)
Maryam Roshanaei
,
Mark Gregory Jachura
Journal of Intelligent Learning Systems and Applications
Vol.17 No.2
,March 31, 2025
DOI:
10.4236/jilsa.2025.172005
112
Downloads
414
Views
Citations
Cybercrime in Developing Countries: Negative Effects and Panacea
(Articles)
John Otozi Ugah
,
Onu Sunday
,
Alozie Obidinma
,
Ori Silas Ene
Open Access Library Journal
Vol.12 No.4
,April 10, 2025
DOI:
10.4236/oalib.1113218
20
Downloads
169
Views
Citations
Monthly Forecast of Indian Southwest Monsoon Rainfall Based on NCEP’s Coupled Forecast System
(Articles)
Dushmanta R. Pattanaik
,
Biswajit Mukhopadhyay
,
Arun Kumar
Atmospheric and Climate Sciences
Vol.2 No.4
,November 2, 2012
DOI:
10.4236/acs.2012.24042
5,423
Downloads
9,416
Views
Citations
Managing Emotional Labour in Service Encounters in Healthcare Occupation in Bangladesh
(Articles)
Muhammad Faisol Chowdhury
Journal of Human Resource and Sustainability Studies
Vol.2 No.4
,December 5, 2014
DOI:
10.4236/jhrss.2014.24022
4,492
Downloads
6,202
Views
Citations
Climate Change, Environmental Threats and Cyber-Threats to Critical Infrastructures in Multi-Regulatory Sustainable Global Approach with Sweden as an Example
(Articles)
Sandra Cassotta
,
Maria Pettersson
Beijing Law Review
Vol.10 No.3
,June 27, 2019
DOI:
10.4236/blr.2019.103035
1,293
Downloads
4,971
Views
Citations
Investigating How Parental Perceptions of Cybersecurity Influence Children’s Safety in the Cyber World: A Case Study of Saudi Arabia
(Articles)
Tariq Saeed Mian
,
Eman M. Alatawi
Intelligent Information Management
Vol.15 No.5
,September 11, 2023
DOI:
10.4236/iim.2023.155017
275
Downloads
1,634
Views
Citations
Developing an Abstraction Framework for Managing and Controlling Saudi Banks’ Cybersecurity Threats Based on the NIST Cybersecurity Framework and ISO/IEC 27001
(Articles)
Abdulaziz Saleh Alraddadi
Journal of Software Engineering and Applications
Vol.16 No.12
,December 29, 2023
DOI:
10.4236/jsea.2023.1612036
359
Downloads
1,477
Views
Citations
<
...
2
3
4
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top