Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
A Conceptual Framework for Threat Assessment Based on Organization’s Information Security Policy
(Articles)
Joseph Elias Mbowe
,
Irina Zlotnikova
,
Simon S. Msanjila
,
George S. Oreku
Journal of Information Security
Vol.5 No.4
,September 29, 2014
DOI:
10.4236/jis.2014.54016
6,685
Downloads
9,970
Views
Citations
Reactive Data Security Approach and Review of Data Security Techniques in Wireless Networks
(Articles)
Arif Sari
,
Mehmet Karay
Int'l J. of Communications, Network and System Sciences
Vol.8 No.13
,December 30, 2015
DOI:
10.4236/ijcns.2015.813051
3,942
Downloads
4,889
Views
Citations
Identification and Validation of Social Media Socio-Technical Information Security Factors with Respect to Usable-Security Principles
(Articles)
Joe Mutebi
,
Margaret Kareyo
,
Umezuruike Chinecherem
,
Akampurira Paul
Journal of Computer and Communications
Vol.10 No.8
,August 17, 2022
DOI:
10.4236/jcc.2022.108004
179
Downloads
793
Views
Citations
Classification of Big Data Security Based on Ontology Web Language
(Articles)
Alsadig Mohammed Adam Abdallah
,
Amir Mohamed Talib
Journal of Information Security
Vol.14 No.1
,January 31, 2023
DOI:
10.4236/jis.2023.141006
163
Downloads
692
Views
Citations
A Comparison between Three-Dimensional Conformal Radiotherapy, Intensity-Modulated Radiotherapy, and Volumetric-Modulated Arc Therapy Techniques for Stereotactic Body Radiotherapy of Lung Tumors
(Articles)
Ganesh Narayanasamy
,
Drew Granatowicz
,
Diana Baacke
,
Ying Li
,
Alonso Gutierrez
,
Niko Papanikolaou
,
Sotirios Stathakis
Int'l J. of Medical Physics, Clinical Eng. and Radiation Oncology
Vol.4 No.2
,April 7, 2015
DOI:
10.4236/ijmpcero.2015.42014
4,860
Downloads
6,427
Views
Citations
A Comparative Study of Dosimetric Analysis of Three Different Sets of Five Fields and Seven Fields IMRT Plans for Prostate Cancer
(Articles)
Mukesh Kumar Zope
,
Deepali Bhaskar Patil
,
Angel Kuriakose
,
Aslam Rahman
,
Vinita Trivedi
,
Shekhar Kumar Keshri
Int'l J. of Medical Physics, Clinical Eng. and Radiation Oncology
Vol.8 No.3
,August 29, 2019
DOI:
10.4236/ijmpcero.2019.83016
982
Downloads
2,435
Views
Citations
Safety and Efficacy of Artisan Aphakia Iris-Claw Intraocular Lens in Tertiary Hospital in Indonesia
(Articles)
Emmy Dwi Sugiarti
,
Azalia Latuasan
,
Andrew M. H. Knoch
,
Budiman Budiman
Open Journal of Ophthalmology
Vol.11 No.1
,February 9, 2021
DOI:
10.4236/ojoph.2021.111003
457
Downloads
1,986
Views
Citations
A Mathematical Study of the Dynamics of Conscious Acquiring of Knowledge through Reading and Cramming and the Process of Losing Information from the Brain by Natural Forgetting of Facts
(Articles)
Sudipto Roy
,
Priyadarshi Majumdar
Psychology
Vol.1 No.4
,November 18, 2010
DOI:
10.4236/psych.2010.14034
5,427
Downloads
9,268
Views
Citations
Optimization of Diffraction Efficiency and Polarization Dependence Loss in Photopolymer Grating for Use in Multichip Module
(Articles)
Lingaraj Sahu
,
J. Surya Narayana Achary
,
Sukanta Kumar Tripathy
Journal of Modern Physics
Vol.3 No.9
,September 24, 2012
DOI:
10.4236/jmp.2012.39131
4,347
Downloads
6,324
Views
Citations
On Harmonic Index and Diameter of Graphs
(Articles)
Jianxi Liu
Journal of Applied Mathematics and Physics
Vol.1 No.3
,August 23, 2013
DOI:
10.4236/jamp.2013.13002
3,620
Downloads
7,830
Views
Citations
Ex Ante Inequality and Under-Nutrition Vulnerability Dynamics: Case Study of the Sundarbans Delta Region, West Bengal, India
(Articles)
Moumita Mukherjee
Food and Nutrition Sciences
Vol.5 No.20
,October 20, 2014
DOI:
10.4236/fns.2014.520207
3,735
Downloads
4,744
Views
Citations
This article belongs to the Special Issue on
Malnutrition
A New Index for Identifying Technology Development in OECD Countries
(Articles)
Ben David Nissim
,
Garyn Tal Sharon
Modern Economy
Vol.9 No.3
,March 21, 2018
DOI:
10.4236/me.2018.93029
671
Downloads
1,397
Views
Citations
LDAP Injection Techniques
(Articles)
Jose Maria ALONSO
,
Antonio GUZMAN
,
Marta BELTRAN
,
Rodolfo BORDON
Wireless Sensor Network
Vol.1 No.4
,November 20, 2009
DOI:
10.4236/wsn.2009.14030
11,011
Downloads
17,764
Views
Citations
A Privacy Enabled Fast Dynamic Authentication and Authorization for B3G/4G Mobility
(Articles)
Zhikui CHEN
,
Song YANG
Communications and Network
Vol.1 No.2
,December 1, 2009
DOI:
10.4236/cn.2009.12012
6,553
Downloads
10,274
Views
Citations
Research on the Security Monitoring of the Amusement Ride of Tourist Sites Based on RFID
(Articles)
Jian SHANGGUAN
,
Yingchun LV
,
Mu ZHANG
Wireless Sensor Network
Vol.2 No.1
,January 13, 2010
DOI:
10.4236/wsn.2010.21012
6,800
Downloads
10,988
Views
Citations
WEP and WPA Improvement
(Articles)
Mustafa ElGili
,
Samani A. Talab
,
Awad H. Ali
Wireless Sensor Network
Vol.2 No.3
,April 12, 2010
DOI:
10.4236/wsn.2010.23032
6,491
Downloads
12,630
Views
Citations
Self Umpiring System for Security in Wireless Mobile Ad Hoc Network
(Articles)
Ayyaswamy Kathirvel
,
Rengaramanujam Srinivasan
Wireless Sensor Network
Vol.2 No.3
,April 12, 2010
DOI:
10.4236/wsn.2010.23036
5,095
Downloads
9,330
Views
Citations
Considerations and Open Issues in Delay Tolerant Network’S (DTNs) Security
(Articles)
Harminder Singh Bindra
,
Amrit Lal Sangal
Wireless Sensor Network
Vol.2 No.8
,August 3, 2010
DOI:
10.4236/wsn.2010.28076
7,474
Downloads
14,496
Views
Citations
SOAP-Based Security Interaction of Web Service inHeterogeneous Platforms
(Articles)
Tao Xu
,
Chunxiao Yi
Journal of Information Security
Vol.2 No.1
,February 17, 2011
DOI:
10.4236/jis.2011.21001
5,207
Downloads
9,775
Views
Citations
Secured Electronic Voting Protocol Using Biometric Authentication
(Articles)
Kalaichelvi Visvalingam
,
R. M. Chandrasekaran
Advances in Internet of Things
Vol.1 No.2
,July 26, 2011
DOI:
10.4236/ait.2011.12006
10,696
Downloads
24,105
Views
Citations
<
...
4
5
6
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top