Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Movement for the “Emancipation of the Niger Delta” (MEND) Constitutes a Threat to the U.S. National Security
(Articles)
Mustapha Kulungu
Open Access Library Journal
Vol.8 No.6
,June 15, 2021
DOI:
10.4236/oalib.1107465
290
Downloads
4,872
Views
Citations
The Economics of Sharing Unclassified Cyber Threat Intelligence by Government Agencies and Departments
(Articles)
Josiah Dykstra
,
Lawrence A. Gordon
,
Martin P. Loeb
,
Lei Zhou
Journal of Information Security
Vol.13 No.3
,June 9, 2022
DOI:
10.4236/jis.2022.133006
247
Downloads
1,358
Views
Citations
Computer – Based Infrastructure Sector Interdependencies and Security Implications
(Articles)
Aghware Fidelis Obukohwo
Int'l J. of Communications, Network and System Sciences
Vol.4 No.11
,October 31, 2011
DOI:
10.4236/ijcns.2011.411090
3,714
Downloads
6,464
Views
Citations
The Valuation of Infrastructure Index Bonds
(Articles)
Joseph Atta-Mensah
Journal of Mathematical Finance
Vol.5 No.4
,November 5, 2015
DOI:
10.4236/jmf.2015.54028
2,667
Downloads
3,790
Views
Citations
Research on the Status Quo of Waterfront Space Construction on the Macao Peninsula
(Articles)
Yiyang Li
,
Luyang Tao
,
Yichen Feng
Journal of Building Construction and Planning Research
Vol.9 No.4
,December 20, 2021
DOI:
10.4236/jbcpr.2021.94018
324
Downloads
1,270
Views
Citations
Legal Regulation of Stablecoins
(Articles)
Kaixiang Zhu
Beijing Law Review
Vol.14 No.3
,August 24, 2023
DOI:
10.4236/blr.2023.143060
120
Downloads
548
Views
Citations
From Critical Feminist Theory to Critical Feminist Revolutionary Pedagogy
(Articles)
Gianna Katsiampoura
Advances in Applied Sociology
Vol.14 No.4
,April 17, 2024
DOI:
10.4236/aasoci.2024.144012
414
Downloads
4,352
Views
Citations
Threats to Rural Livelihoods in Nigeria: Implications for Social Order and Crisis Management
(Articles)
Iwundu Anthony Onyekwere
,
Kingsley Onyebuchim Nworgu
Advances in Applied Sociology
Vol.10 No.3
,March 16, 2020
DOI:
10.4236/aasoci.2020.103004
791
Downloads
3,061
Views
Citations
Developing Framework for Alternative Funding Options in Water Infrastructure Projects
(Articles)
Matt Nafziger
,
Dan Koo
Journal of Building Construction and Planning Research
Vol.3 No.1
,March 17, 2015
DOI:
10.4236/jbcpr.2015.31004
5,374
Downloads
6,700
Views
Citations
Analysis of Causes and Actual Events on Electric Power Infrastructure Impacted by Cyber Attack
(Articles)
Hongxu Yin
,
Rui Xiao
,
Fenfei Lv
Journal of Power and Energy Engineering
Vol.3 No.4
,April 13, 2015
DOI:
10.4236/jpee.2015.34012
3,895
Downloads
5,009
Views
Citations
Analysis on the Significance of Constructing Asian Infrastructure Investment Bank
(Articles)
Fei Wei
American Journal of Industrial and Business Management
Vol.7 No.3
,March 31, 2017
DOI:
10.4236/ajibm.2017.73020
1,739
Downloads
3,624
Views
Citations
Security Policy Management Process within Six Sigma Framework
(Articles)
Vijay Anand
,
Jafar Saniie
,
Erdal Oruklu
Journal of Information Security
Vol.3 No.1
,December 31, 2011
DOI:
10.4236/jis.2012.31006
7,097
Downloads
13,975
Views
Citations
The Pale Shades of Emotion: A Signal Detection Theory Analysis of the Emotional Stroop Task
(Articles)
Boaz M. Ben-David
,
Eran Chajut
,
Daniel Algom
Psychology
Vol.3 No.7
,June 18, 2012
DOI:
10.4236/psych.2012.37079
6,056
Downloads
11,664
Views
Citations
A Multi-Leveled Approach to Intrusion Detection and the Insider Threat
(Articles)
Rita M. Barrios
Journal of Information Security
Vol.4 No.1
,January 30, 2013
DOI:
10.4236/jis.2013.41007
6,886
Downloads
11,209
Views
Citations
Threat perception predicts cognitive behavioral therapy outcomes in anxious children
(Articles)
Katharina Manassis
,
Kathryn M. Hum
,
Trevor Changgun Lee
,
Gloria Zhang
,
Marc D. Lewis
Open Journal of Psychiatry
Vol.3 No.1A
,February 26, 2013
DOI:
10.4236/ojpsych.2013.31A009
4,802
Downloads
8,376
Views
Citations
This article belongs to the Special Issue on
Women’s Mental Rotation Abilities as a Function of Priming
(Articles)
Leah R. Ryan
,
Sheila Brownlow
,
Benjamin Patterson
Psychology
Vol.6 No.3
,February 12, 2015
DOI:
10.4236/psych.2015.63021
4,795
Downloads
6,190
Views
Citations
A Study of Precipitation Climatology and Its Variability over Europe Using an Advanced Regional Model (WRF)
(Articles)
Hari Prasad Dasari
,
Venkata Srinivas Challa
American Journal of Climate Change
Vol.4 No.1
,March 6, 2015
DOI:
10.4236/ajcc.2015.41003
4,796
Downloads
6,732
Views
Citations
Optimal Control of a Threatened Wildebeest-Lion Prey-Predator System in the Serengeti Ecosystem
(Articles)
T. D. Sagamiko
,
N. Shaban
,
C. L. Nahonyo
,
O. D. Makinde
Open Journal of Ecology
Vol.5 No.4
,April 1, 2015
DOI:
10.4236/oje.2015.54010
3,168
Downloads
4,427
Views
Citations
This article belongs to the Special Issue on
Modelling in Ecological Systems
On Development of Platform for Organization Security Threat Analytics and Management (POSTAM) Using Rule-Based Approach
(Articles)
Joseph E. Mbowe
,
Simon S. Msanjila
,
George S. Oreku
,
Khamisi Kalegele
Journal of Software Engineering and Applications
Vol.9 No.12
,December 30, 2016
DOI:
10.4236/jsea.2016.912041
1,799
Downloads
2,874
Views
Citations
Security Framework for Managing Data Security within Point of Care Tests
(Articles)
Sivanesan Tulasidas
,
Ruth Mackay
,
Chris Hudson
,
Wamadeva Balachandran
Journal of Software Engineering and Applications
Vol.10 No.2
,February 24, 2017
DOI:
10.4236/jsea.2017.102011
1,886
Downloads
3,655
Views
Citations
<
...
2
3
4
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top