Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Trust and Security on Semantic HIM (Health Information Management)
(Articles)
Nasim Khozouei
,
Razie Vanda
,
Peyman Khozouei
Intelligent Information Management
Vol.4 No.6
,November 30, 2012
DOI:
10.4236/iim.2012.46045
4,536
Downloads
7,500
Views
Citations
Developing Dependability Requirements Engineering for Secure and Safe Information Systems with Knowledge Acquisition for Automated Specification
(Articles)
Mohammed Abu Lamddi
Journal of Software Engineering and Applications
Vol.10 No.2
,February 28, 2017
DOI:
10.4236/jsea.2017.102013
1,676
Downloads
3,204
Views
Citations
Using the Latin Square Design Model in the Prioritzation of Network Security Threats: A Quantitative Study
(Articles)
Rodney Alexander
Journal of Information Security
Vol.11 No.2
,April 22, 2020
DOI:
10.4236/jis.2020.112006
860
Downloads
2,504
Views
Citations
Reducing Threats by Using Bayesian Networks to Prioritize and Combine Defense in Depth Security Measures
(Articles)
Rodney Alexander
Journal of Information Security
Vol.11 No.3
,June 8, 2020
DOI:
10.4236/jis.2020.113008
765
Downloads
2,336
Views
Citations
Using Linear Regression Analysis and Defense in Depth to Protect Networks during the Global Corona Pandemic
(Articles)
Rodney Alexander
Journal of Information Security
Vol.11 No.4
,October 21, 2020
DOI:
10.4236/jis.2020.114017
1,043
Downloads
6,089
Views
Citations
Research on the Application and Frontier Issues of Artificial Intelligence in Library and Information Science
(Articles)
Fangyuan Wang
,
Huiting Xu
Voice of the Publisher
Vol.10 No.4
,December 9, 2024
DOI:
10.4236/vp.2024.104028
74
Downloads
478
Views
Citations
Prioritizing Defense in Depth Measures Using Artificial Intelligence (AI) and the Expected Utility Hypothesis
(Articles)
Rodney Alexander
Journal of Information Security
Vol.16 No.2
,March 31, 2025
DOI:
10.4236/jis.2025.162012
40
Downloads
212
Views
Citations
Developing and Assessing Investment Options for Economic, Energy, and Climate Security Gains in the United States
(Articles)
Pat Delaquil
,
Gary Goldstein
,
Hal Nelson
,
Thomas Peterson
,
Stephen Roe
,
Adam Rose
,
Dan Wei
,
Jeffery Wennberg
Low Carbon Economy
Vol.5 No.2
,May 16, 2014
DOI:
10.4236/lce.2014.52004
4,020
Downloads
5,906
Views
Citations
Network Access Control Technology—Proposition to Contain New Security Challenges
(Articles)
Abdelmajid Lakbabi
,
Ghizlane Orhanou
,
Said El Hajji
Int'l J. of Communications, Network and System Sciences
Vol.5 No.8
,August 28, 2012
DOI:
10.4236/ijcns.2012.58061
6,912
Downloads
10,543
Views
Citations
Evaluation of Beijing Low-Income Housing Security Policy: An Analysis of the Public Policy
(Articles)
Jianfang Chen
,
Dingchang Wu
Journal of Service Science and Management
Vol.9 No.1
,February 26, 2016
DOI:
10.4236/jssm.2016.91012
2,419
Downloads
3,490
Views
Citations
Impact of Statelessness: Are We Ready to Face?
(Articles)
Bilkis Afroza Siddika
Open Journal of Social Sciences
Vol.7 No.12
,December 3, 2019
DOI:
10.4236/jss.2019.712001
1,079
Downloads
5,963
Views
Citations
This article belongs to the Special Issue on
Human Rights and Social Justice
Governing Japan: The Perception, Influence and Theoretical Interpretation of Article 9 of the Japanese Constitution and What It Means for Its Security Policy in the 21
st
Century, If Revised
(Articles)
Dahlia Patricia Sterling
Open Journal of Social Sciences
Vol.8 No.11
,November 27, 2020
DOI:
10.4236/jss.2020.811024
1,136
Downloads
4,889
Views
Citations
Nepal-China Security Issue in the Context of Belt and Road Program Implementation
(Articles)
Buddhi Prasad Sharma
Open Journal of Social Sciences
Vol.9 No.8
,August 6, 2021
DOI:
10.4236/jss.2021.98008
373
Downloads
1,991
Views
Citations
Relevance of Advanced Plant Disease Detection Techniques in Disease and Pest Management for Ensuring Food Security and Their Implication: A Review
(Articles)
Matthew Abu John
,
Ibukunoluwa Bankole
,
Oluwatayo Ajayi-Moses
,
Tofunmi Ijila
,
Timilehin Jeje
,
Patil Lalit
American Journal of Plant Sciences
Vol.14 No.11
,November 17, 2023
DOI:
10.4236/ajps.2023.1411086
402
Downloads
2,599
Views
Citations
Third-Party Information Security: Generic Qualitative Inquiry in Banking and Financial Services
(Articles)
Genemar Arthur Lazo
Journal of Financial Risk Management
Vol.13 No.3
,September 27, 2024
DOI:
10.4236/jfrm.2024.133027
68
Downloads
395
Views
Citations
Features of Virus Detection Mechanism in Microsoft Security Essentials (Microsoft Forefront Endpoint Protection)
(Articles)
Dmitry Silnov
Journal of Information Security
Vol.4 No.2
,April 23, 2013
DOI:
10.4236/jis.2013.42014
5,256
Downloads
8,618
Views
Citations
Research on Embedding Capacity and Efficiency of Information Hiding Based on Digital Images
(Articles)
Yanping Zhang
,
Juan Jiang
,
Yongliang Zha
,
Heng Zhang
,
Shu Zhao
International Journal of Intelligence Science
Vol.3 No.2
,April 30, 2013
DOI:
10.4236/ijis.2013.32009
8,532
Downloads
14,104
Views
Citations
Network Defense Methodology: A Comparison of Defense in Depth and Defense in Breadth
(Articles)
Lance Cleghorn
Journal of Information Security
Vol.4 No.3
,July 12, 2013
DOI:
10.4236/jis.2013.43017
11,365
Downloads
18,624
Views
Citations
An Inquiry into the Effectiveness of Student Generated MCQs as a Method of Assessment to Improve Teaching and Learning
(Articles)
Damien Hutchinson
,
Jason Wells
Creative Education
Vol.4 No.7B
,July 18, 2013
DOI:
10.4236/ce.2013.47A2014
6,493
Downloads
9,908
Views
Citations
This article belongs to the Special Issue on
Higher Education
Determinants of Students’ Observance of Library Regulations in Federal Polytechnic Nekede, Owerri, Imo State, Nigeria
(Articles)
Adaora J. Udo-Anyanwu
,
Matilda C. Oduagwu
,
Nkechi O. Okorie1
Open Access Library Journal
Vol.2 No.4
,April 16, 2015
DOI:
10.4236/oalib.1101353
1,172
Downloads
3,234
Views
Citations
<
...
3
4
5
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top