Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
SCADA Framework Incorporating MANET and IDP for Cyber Security of Residential Microgrid Communication Network
(Articles)
Goutham K. Chalamasetty
,
Paras Mandal
,
Tzu-Liang (Bill) Tseng
Smart Grid and Renewable Energy
Vol.7 No.3
,March 29, 2016
DOI:
10.4236/sgre.2016.73007
2,506
Downloads
3,987
Views
Citations
Analysis of Recent Secure Scan Test Techniques
(Articles)
Cheng Xing
,
Sungju Park
,
Ji Zhao
Journal of Software Engineering and Applications
Vol.9 No.3
,March 31, 2016
DOI:
10.4236/jsea.2016.93008
3,198
Downloads
4,153
Views
Citations
General Study of Mobile Agent Based Intrusion Detection System (IDS)
(Articles)
Chandrakant Jain
,
Aumreesh Kumar Saxena
Journal of Computer and Communications
Vol.4 No.4
,April 13, 2016
DOI:
10.4236/jcc.2016.44008
2,974
Downloads
4,677
Views
Citations
Web Threats Detection and Prevention Framework
(Articles)
Osama M. Rababah
,
Ahmad K. Al Hwaitat
,
Saher Al Manaseer
,
Hussam N. Fakhouri
,
Rula Halaseh
Communications and Network
Vol.8 No.3
,August 4, 2016
DOI:
10.4236/cn.2016.83017
2,200
Downloads
3,372
Views
Citations
Technological Perspectives for Propulsion on Nuclear Attack Submarines
(Articles)
Luciano Ondir Freire
,
Delvonei Alves de Andrade
World Journal of Nuclear Science and Technology
Vol.6 No.4
,October 26, 2016
DOI:
10.4236/wjnst.2016.64028
1,756
Downloads
3,183
Views
Citations
Discussion and Research on Information Security Attack and Defense Platform Construction in Universities Based on Cloud Computing and Virtualization
(Articles)
Xiancheng Ding
Journal of Information Security
Vol.7 No.5
,October 27, 2016
DOI:
10.4236/jis.2016.75025
2,337
Downloads
3,586
Views
Citations
Cybersecurity: A Stochastic Predictive Model to Determine Overall Network Security Risk Using Markovian Process
(Articles)
Nawa Raj Pokhrel
,
Chris P. Tsokos
Journal of Information Security
Vol.8 No.2
,April 28, 2017
DOI:
10.4236/jis.2017.82007
2,277
Downloads
5,902
Views
Citations
Performance Assessment of a Calm Flapping Wind Turbine with Small Attack Angle
(Articles)
Md. Sabbir Alam
,
Hiroyuki Hirahara
Smart Grid and Renewable Energy
Vol.8 No.8
,August 21, 2017
DOI:
10.4236/sgre.2017.88018
1,315
Downloads
3,046
Views
Citations
Access Control Attacks on PLC Vulnerabilities
(Articles)
Yong Wang
,
Jinyong Liu
,
Can Yang
,
Lin Zhou
,
Shuangfei Li
,
Zhaoyan Xu
Journal of Computer and Communications
Vol.6 No.11
,November 29, 2018
DOI:
10.4236/jcc.2018.611028
2,782
Downloads
5,269
Views
Citations
Associated Risks in Mobile Applications Permissions
(Articles)
Mohammed Al Jutail
,
Mousa Al-Akhras
,
Abdulaziz Albesher
Journal of Information Security
Vol.10 No.2
,March 26, 2019
DOI:
10.4236/jis.2019.102004
1,711
Downloads
5,737
Views
Citations
Correlated Extra Reductions Defeat Fixed Window Exponentiation
(Articles)
Xiaohan Meng
Journal of Computer and Communications
Vol.7 No.10
,October 30, 2019
DOI:
10.4236/jcc.2019.710016
367
Downloads
793
Views
Citations
Cyberattack and the Use of Force in International Law
(Articles)
Joseph N. Madubuike-Ekwe
Beijing Law Review
Vol.12 No.2
,June 22, 2021
DOI:
10.4236/blr.2021.122034
1,057
Downloads
11,219
Views
Citations
Software Implementation of AES-128: Cross-Subkey Side Channel Attack
(Articles)
Fanliang Hu
,
Junnian Wang
,
Wan Wang
,
Feng Ni
Open Access Library Journal
Vol.9 No.1
,January 27, 2022
DOI:
10.4236/oalib.1108307
84
Downloads
835
Views
Citations
Taming the Shrew of Rising Cyber-Warfare
(Articles)
Festus C. Obi
,
Alaba M. Oludare
Open Access Library Journal
Vol.9 No.12
,December 28, 2022
DOI:
10.4236/oalib.1109003
58
Downloads
505
Views
Citations
Study of the Effect of Plastic Aggregates on Drying Shrinkage and Expansion of Concrete
(Articles)
Kouamou Nguessi Arnaud
,
Yamb Emmanuel
,
Ndigui Billong
,
Ngwem Bayiha Blaise
,
Mbuh Moses Kuma
,
Tchemou Gilbert
,
Christian Hyeng Bock
,
Madouma Madouma Arnold
Materials Sciences and Applications
Vol.14 No.4
,April 10, 2023
DOI:
10.4236/msa.2023.144015
106
Downloads
518
Views
Citations
The Knowledge of Cyber-Security Vulnerabilities in an Institution of Higher and University Education. A Case of ISP-Bukavu (Institut Supérieur Pédagogique de Bukavu) (TTC = Teachers’ Training College)
(Articles)
Dominique Wasso Kiseki
,
Vincent Havyarimana
,
Therence Niyonsaba
,
Désiré Lumonge Zabagunda
,
Walumbuka Ilundu Wail
,
Thabo Semong
Journal of Computer and Communications
Vol.11 No.4
,April 24, 2023
DOI:
10.4236/jcc.2023.114002
102
Downloads
476
Views
Citations
Awareness of the Importance of Cardiopulmonary Resuscitation Skills Following the Sudden Cardiac Arrest of Damar Hamlin during a Buffalo Bills Game
(Articles)
Puja Sengupta
,
Mariana Adieb
,
Simona Maksimyan
,
Maxim Crasta
Journal of Biosciences and Medicines
Vol.11 No.6
,June 21, 2023
DOI:
10.4236/jbm.2023.116013
136
Downloads
1,026
Views
Citations
Retrospective Study of an Epidemic
Vibrio cholerae
in the Central Region of Ghana: An Evidence from Surveillance Data
(Articles)
Gideon Kwarteng Acheampong
,
Isaac Owusu
,
Fidelis Zumah
,
Ernest Akyereko
,
Rebecca Ann Mpangah
Open Access Library Journal
Vol.10 No.9
,September 27, 2023
DOI:
10.4236/oalib.1110603
30
Downloads
176
Views
Citations
Study on the Use of Artificial Intelligence for Cybersecurity in Companies: Case of Companies in Burkina Faso
(Articles)
Yanogo Kiswendsida Jean Hermann
,
Ouedraogo Tounwendyam Frederic
Engineering
Vol.15 No.12
,December 11, 2023
DOI:
10.4236/eng.2023.1512056
127
Downloads
788
Views
Citations
Psychological Consequences of a Mass Attack Following Multiple Gunshots and Explosions among Victims in a State in Southwest Nigeria
(Articles)
Adewale Moses Adejugbagbe
,
Dele David Omoniyi
,
Akinola Ayoola Fatiregun
,
Modupeola Oluwakemi Dosumu
,
Ngozi Onyejiaka
,
Banji Awolowo Ajaka
,
Stephen Fagbemi
Open Journal of Epidemiology
Vol.14 No.1
,February 8, 2024
DOI:
10.4236/ojepi.2024.141007
50
Downloads
223
Views
Citations
<
...
3
4
5
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top