Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Discussion and Research on Information Security Attack and Defense Platform Construction in Universities Based on Cloud Computing and Virtualization
(Articles)
Xiancheng Ding
Journal of Information Security
Vol.7 No.5
,October 27, 2016
DOI:
10.4236/jis.2016.75025
2,329
Downloads
3,648
Views
Citations
Cybersecurity: A Stochastic Predictive Model to Determine Overall Network Security Risk Using Markovian Process
(Articles)
Nawa Raj Pokhrel
,
Chris P. Tsokos
Journal of Information Security
Vol.8 No.2
,April 28, 2017
DOI:
10.4236/jis.2017.82007
2,270
Downloads
6,122
Views
Citations
Performance Assessment of a Calm Flapping Wind Turbine with Small Attack Angle
(Articles)
Md. Sabbir Alam
,
Hiroyuki Hirahara
Smart Grid and Renewable Energy
Vol.8 No.8
,August 21, 2017
DOI:
10.4236/sgre.2017.88018
1,309
Downloads
3,361
Views
Citations
Access Control Attacks on PLC Vulnerabilities
(Articles)
Yong Wang
,
Jinyong Liu
,
Can Yang
,
Lin Zhou
,
Shuangfei Li
,
Zhaoyan Xu
Journal of Computer and Communications
Vol.6 No.11
,November 29, 2018
DOI:
10.4236/jcc.2018.611028
2,767
Downloads
6,084
Views
Citations
Associated Risks in Mobile Applications Permissions
(Articles)
Mohammed Al Jutail
,
Mousa Al-Akhras
,
Abdulaziz Albesher
Journal of Information Security
Vol.10 No.2
,March 26, 2019
DOI:
10.4236/jis.2019.102004
1,700
Downloads
5,958
Views
Citations
Correlated Extra Reductions Defeat Fixed Window Exponentiation
(Articles)
Xiaohan Meng
Journal of Computer and Communications
Vol.7 No.10
,October 30, 2019
DOI:
10.4236/jcc.2019.710016
365
Downloads
849
Views
Citations
Cyberattack and the Use of Force in International Law
(Articles)
Joseph N. Madubuike-Ekwe
Beijing Law Review
Vol.12 No.2
,June 22, 2021
DOI:
10.4236/blr.2021.122034
1,036
Downloads
11,752
Views
Citations
Software Implementation of AES-128: Cross-Subkey Side Channel Attack
(Articles)
Fanliang Hu
,
Junnian Wang
,
Wan Wang
,
Feng Ni
Open Access Library Journal
Vol.9 No.1
,January 27, 2022
DOI:
10.4236/oalib.1108307
81
Downloads
868
Views
Citations
Taming the Shrew of Rising Cyber-Warfare
(Articles)
Festus C. Obi
,
Alaba M. Oludare
Open Access Library Journal
Vol.9 No.12
,December 28, 2022
DOI:
10.4236/oalib.1109003
57
Downloads
513
Views
Citations
Study of the Effect of Plastic Aggregates on Drying Shrinkage and Expansion of Concrete
(Articles)
Kouamou Nguessi Arnaud
,
Yamb Emmanuel
,
Ndigui Billong
,
Ngwem Bayiha Blaise
,
Mbuh Moses Kuma
,
Tchemou Gilbert
,
Christian Hyeng Bock
,
Madouma Madouma Arnold
Materials Sciences and Applications
Vol.14 No.4
,April 10, 2023
DOI:
10.4236/msa.2023.144015
102
Downloads
529
Views
Citations
The Knowledge of Cyber-Security Vulnerabilities in an Institution of Higher and University Education. A Case of ISP-Bukavu (Institut Supérieur Pédagogique de Bukavu) (TTC = Teachers’ Training College)
(Articles)
Dominique Wasso Kiseki
,
Vincent Havyarimana
,
Therence Niyonsaba
,
Désiré Lumonge Zabagunda
,
Walumbuka Ilundu Wail
,
Thabo Semong
Journal of Computer and Communications
Vol.11 No.4
,April 24, 2023
DOI:
10.4236/jcc.2023.114002
99
Downloads
516
Views
Citations
Awareness of the Importance of Cardiopulmonary Resuscitation Skills Following the Sudden Cardiac Arrest of Damar Hamlin during a Buffalo Bills Game
(Articles)
Puja Sengupta
,
Mariana Adieb
,
Simona Maksimyan
,
Maxim Crasta
Journal of Biosciences and Medicines
Vol.11 No.6
,June 21, 2023
DOI:
10.4236/jbm.2023.116013
133
Downloads
1,078
Views
Citations
Retrospective Study of an Epidemic
Vibrio cholerae
in the Central Region of Ghana: An Evidence from Surveillance Data
(Articles)
Gideon Kwarteng Acheampong
,
Isaac Owusu
,
Fidelis Zumah
,
Ernest Akyereko
,
Rebecca Ann Mpangah
Open Access Library Journal
Vol.10 No.9
,September 27, 2023
DOI:
10.4236/oalib.1110603
30
Downloads
173
Views
Citations
Psychological Consequences of a Mass Attack Following Multiple Gunshots and Explosions among Victims in a State in Southwest Nigeria
(Articles)
Adewale Moses Adejugbagbe
,
Dele David Omoniyi
,
Akinola Ayoola Fatiregun
,
Modupeola Oluwakemi Dosumu
,
Ngozi Onyejiaka
,
Banji Awolowo Ajaka
,
Stephen Fagbemi
Open Journal of Epidemiology
Vol.14 No.1
,February 8, 2024
DOI:
10.4236/ojepi.2024.141007
45
Downloads
216
Views
Citations
Critical Issues to Be Concern In Selecting Tools For Teaching High School Computer Project Lesson Using Computer-Supported Collaborative Learning
(Articles)
Prapat Palacheewa
,
Praweenya Suwannatthachote
,
Prachyanun Nilsook
Creative Education
Vol.3 No.8B
,January 16, 2013
DOI:
10.4236/ce.2012.38B003
3,543
Downloads
6,062
Views
Citations
Cogniton-based Enlightenment of Creative Thinking: Examplars in Computer Science
(Articles)
Zhi-Quan Cheng
,
Shiyao Jin
Creative Education
Vol.3 No.8B
,January 17, 2013
DOI:
10.4236/ce.2012.38B020
4,373
Downloads
6,472
Views
Citations
Concept Learning in Neuromorphic Vision Systems: What Can We Learn from Insects?
(Articles)
Fredrik Sandin
,
Asad I. Khan
,
Adrian G. Dyer
,
Anang Hudaya M. Amin
,
Giacomo Indiveri
,
Elisabetta Chicca
,
Evgeny Osipov
Journal of Software Engineering and Applications
Vol.7 No.5
,May 13, 2014
DOI:
10.4236/jsea.2014.75035
4,763
Downloads
6,711
Views
Citations
This article belongs to the Special Issue on
Computer Vision
Computer Programming and Auxiliary Learning Processes: Hackers School Case
(Articles)
Adriano Canabarro Teixeira
,
Fernanda Batistela
,
Adriana Dickel
Creative Education
Vol.8 No.7
,June 2, 2017
DOI:
10.4236/ce.2017.87073
2,109
Downloads
3,560
Views
Citations
The Influence of Computer Information Activities of Middle School Students on Reading Literacy Based on Interactive Behavior Theory
(Articles)
Xinyuan Zhang
Open Journal of Social Sciences
Vol.9 No.2
,February 25, 2021
DOI:
10.4236/jss.2021.92027
540
Downloads
1,924
Views
Citations
Experimental Evaluation of Juniper Network's Netscreen-5GT Security Device against Layer4 Flood Attacks
(Articles)
Sanjeev Kumar
,
Raja Sekhar Reddy Gade
Journal of Information Security
Vol.2 No.1
,January 31, 2011
DOI:
10.4236/jis.2011.21005
5,942
Downloads
11,227
Views
Citations
<
...
3
4
5
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top