Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Threat Status of Commercially Exploited Trees in the Nigerian Rainforest
(Articles)
Francis E. Bisong
,
Peter Buckley
Open Journal of Forestry
Vol.4 No.5
,October 21, 2014
DOI:
10.4236/ojf.2014.45058
3,797
Downloads
5,115
Views
Citations
Analysis of the 2007-2008 Writer’s Guild Strike with Game Theory
(Articles)
William P. Fox
Applied Mathematics
Vol.6 No.12
,November 30, 2015
DOI:
10.4236/am.2015.612187
2,807
Downloads
3,764
Views
Citations
This article belongs to the Special Issue on
Game Theory
Enhancing Multi-Factor Authentication in Modern Computing
(Articles)
Ekwonwune Emmanuel Nwabueze
,
Iwuoha Obioha
,
Oju Onuoha
Communications and Network
Vol.9 No.3
,August 9, 2017
DOI:
10.4236/cn.2017.93012
2,390
Downloads
5,469
Views
Citations
Climate Change, Environmental Threats and Cyber-Threats to Critical Infrastructures in Multi-Regulatory Sustainable Global Approach with Sweden as an Example
(Articles)
Sandra Cassotta
,
Maria Pettersson
Beijing Law Review
Vol.10 No.3
,June 27, 2019
DOI:
10.4236/blr.2019.103035
1,304
Downloads
5,085
Views
Citations
Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies
(Articles)
Sina Ahmadi
Journal of Information Security
Vol.15 No.2
,March 27, 2024
DOI:
10.4236/jis.2024.152010
540
Downloads
4,534
Views
Citations
The Role of AI in Cyber Security: Safeguarding Digital Identity
(Articles)
Mohammad Binhammad
,
Shaikha Alqaydi
,
Azzam Othman
,
Laila Hatim Abuljadayel
Journal of Information Security
Vol.15 No.2
,April 30, 2024
DOI:
10.4236/jis.2024.152015
1,087
Downloads
8,323
Views
Citations
Tackling the Existential Threats from Quantum Computers and AI
(Articles)
Fazal Raheman
Intelligent Information Management
Vol.16 No.3
,May 31, 2024
DOI:
10.4236/iim.2024.163008
300
Downloads
1,701
Views
Citations
The Congolese Legislation Readiness against AI Development and Foreign Attacks and Perspective of International Cooperation
(Articles)
Jordy Cloud Ntsoumou Mboulou
Open Access Library Journal
Vol.11 No.5
,May 31, 2024
DOI:
10.4236/oalib.1111453
49
Downloads
693
Views
Citations
AssessITS
: Integrating Procedural Guidelines and Practical Evaluation Metrics for Organizational IT and Cybersecurity Risk Assessment
(Articles)
Mir Mehedi Rahman
,
Naresh Kshetri
,
Sayed Abu Sayeed
,
Md Masud Rana
Journal of Information Security
Vol.15 No.4
,October 29, 2024
DOI:
10.4236/jis.2024.154032
124
Downloads
710
Views
Citations
Exploring Cyber Threat Intelligence into Land Administration Systems for Enhanced Cyber Resilience
(Articles)
Pierre-François Blin
,
Trias Aditya
,
Purnama Budi Santosa
,
Christophe Claramunt
Journal of Geographic Information System
Vol.17 No.1
,February 12, 2025
DOI:
10.4236/jgis.2025.171003
64
Downloads
402
Views
Citations
On Threat Models for Information-Stealing Malware (ISM) Targeting Password Managers
(Articles)
Vedika Sunil Bang
,
Vijay Madisetti
Journal of Information Security
Vol.16 No.2
,April 17, 2025
DOI:
10.4236/jis.2025.162015
53
Downloads
474
Views
Citations
Banning Smoking in Public Places under Ethiopian Legal Framework: Some Evidences from Hawassa City
(Articles)
Edilu Shona
Beijing Law Review
Vol.8 No.4
,December 27, 2017
DOI:
10.4236/blr.2017.84029
1,620
Downloads
4,810
Views
Citations
A Case Study on Security Recommendations for a Global Organization
(Articles)
Devashi Tandon
,
Pratyush Parimal
Journal of Computer and Communications
Vol.6 No.3
,March 28, 2018
DOI:
10.4236/jcc.2018.63010
902
Downloads
5,682
Views
Citations
AI-Powered Threat Detection in Online Communities: A Multi-Modal Deep Learning Approach
(Articles)
Ravi Teja Potla
Journal of Computer and Communications
Vol.13 No.2
,February 26, 2025
DOI:
10.4236/jcc.2025.132010
103
Downloads
652
Views
Citations
C4 Framework for Healthcare Cybersecurity Defense: A Human-Centric, Socio-Technical Approach
(Articles)
Mostafa Rahmany
,
Arunmozhi Selvi
E-Health Telecommunication Systems and Networks
Vol.14 No.3
,July 17, 2025
DOI:
10.4236/etsn.2025.143004
14
Downloads
80
Views
Citations
CARE Framework for Healthcare Cybersecurity Defense: A Human-Centric Approach
(Articles)
Mostafa Rahmany
,
Arunmozhi Selvi
E-Health Telecommunication Systems and Networks
Vol.14 No.2
,June 30, 2025
DOI:
10.4236/etsn.2025.142003
17
Downloads
76
Views
Citations
Information Security in the Cloud: Emerging Trends and Challenges
(Articles)
Keerthana Chitreddy
,
Andrew Mikhl Anthony
,
Chinna Manikanta Bandaru
,
Olatunde Abiona
Int'l J. of Communications, Network and System Sciences
Vol.17 No.5
,May 31, 2024
DOI:
10.4236/ijcns.2024.175005
162
Downloads
983
Views
Citations
Rethinking Healthy Aging: The Self-Perception of African American Older Adults
(Articles)
Monique Ejim
,
Crystal Neal
,
Kathryn Miller
Open Journal of Social Sciences
Vol.13 No.1
,January 23, 2025
DOI:
10.4236/jss.2025.131018
71
Downloads
563
Views
Citations
This article belongs to the Special Issue on
Social, Psychological and Behavioral Sciences
The Crucial Role of Safeguarding Critical Infrastructure in Ensuring the Stability and Security of the U.S. Supply Chain
(Articles)
Robb Shawe
American Journal of Industrial and Business Management
Vol.15 No.7
,July 23, 2025
DOI:
10.4236/ajibm.2025.157051
5
Downloads
21
Views
Citations
Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises
(Articles)
Meysam Tahmasebi
Journal of Information Security
Vol.15 No.2
,February 29, 2024
DOI:
10.4236/jis.2024.152008
510
Downloads
2,623
Views
Citations
This article belongs to the Special Issue on
Cybersecurity and Information Security
<
1
2
3
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top