Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Ending Privacy’s Gremlin: Stopping the Data-Broker Loophole to the Fourth Amendment’s Search Warrant Requirement
(Articles)
Samantha B. Larkin
,
Shakour Abuzneid
Journal of Information Security
Vol.15 No.4
,October 29, 2024
DOI:
10.4236/jis.2024.154033
71
Downloads
426
Views
Citations
Optimization of Security Communication Wired Network by Means of Genetic Algorithms
(Articles)
Fabio Garzia
,
Natale Tirocchi
,
Michele Scarpiniti
,
Roberto Cusani
Communications and Network
Vol.4 No.3
,August 31, 2012
DOI:
10.4236/cn.2012.43024
4,208
Downloads
7,426
Views
Citations
Managing Social Security Data in the Web 2.0 Era
(Articles)
Li Luo
,
Hongyan Yang
,
Xuhui Li
iBusiness
Vol.4 No.3
,September 27, 2012
DOI:
10.4236/ib.2012.43028
4,596
Downloads
7,214
Views
Citations
A Resource Allocation Algorithm of Physical-Layer Security for OFDMA System under Non-ideal Condition
(Articles)
Xiao-min Ran
,
You-quan Mo
,
Yu-lei Chen
Communications and Network
Vol.5 No.3C
,November 8, 2013
DOI:
10.4236/cn.2013.53B2039
5,791
Downloads
7,092
Views
Citations
Influences of ±800 kV Yunnan-Guangdong HVDC System on Security and Stability of China Southern Power Grid
(Articles)
Baorong Zhou
,
Xiaoming Jin
,
Chao Hong
,
Pei Zhang
,
Zhigang Wu
Energy and Power Engineering
Vol.5 No.4B
,November 18, 2013
DOI:
10.4236/epe.2013.54B233
6,283
Downloads
7,868
Views
Citations
The SMS Chaum Mix
(Articles)
Matthew Rothmeyer
,
Dale R. Thompson
,
Matthew Moccaro
Journal of Computer and Communications
Vol.2 No.4
,March 18, 2014
DOI:
10.4236/jcc.2014.24010
5,250
Downloads
6,628
Views
Citations
China’s Food Security Evaluation Based on Factor Analysis
(Articles)
Jie Zou
,
Shiqin Guo
American Journal of Industrial and Business Management
Vol.5 No.6
,June 29, 2015
DOI:
10.4236/ajibm.2015.56044
3,522
Downloads
5,053
Views
Citations
General Study of Mobile Agent Based Intrusion Detection System (IDS)
(Articles)
Chandrakant Jain
,
Aumreesh Kumar Saxena
Journal of Computer and Communications
Vol.4 No.4
,April 13, 2016
DOI:
10.4236/jcc.2016.44008
3,056
Downloads
4,917
Views
Citations
Information Availability: An Insight into the Most Important Attribute of Information Security
(Articles)
Suhail Qadir
,
S. M. K. Quadri
Journal of Information Security
Vol.7 No.3
,April 15, 2016
DOI:
10.4236/jis.2016.73014
7,798
Downloads
21,556
Views
Citations
An Immunity-Based IOT Environment Security Situation Awareness Model
(Articles)
Yuanquan Shi
,
Tao Li
,
Renfa Li
,
Xiaoning Peng
,
Pengju Tang
Journal of Computer and Communications
Vol.5 No.7
,May 25, 2017
DOI:
10.4236/jcc.2017.57016
1,696
Downloads
3,069
Views
Citations
SecSPS: A Secure and Privacy-Preserving Framework for Smart Parking Systems
(Articles)
Ali Alqazzaz
,
Ibrahim Alrashdi
,
Esam Aloufi
,
Mohamed Zohdy
,
Hua Ming
Journal of Information Security
Vol.9 No.4
,October 15, 2018
DOI:
10.4236/jis.2018.94020
1,636
Downloads
4,463
Views
Citations
Concepts of Safety Critical Systems Unification Approach & Security Assurance Process
(Articles)
Faisal Nabi
,
Jianming Yong
,
Xiaohui Tao
,
Muhammad Saqib Malhi
,
Umar Mahmood
,
Usman Iqbal
Journal of Information Security
Vol.11 No.4
,October 27, 2020
DOI:
10.4236/jis.2020.114018
601
Downloads
2,034
Views
Citations
Study on the Use of Artificial Intelligence for Cybersecurity in Companies: Case of Companies in Burkina Faso
(Articles)
Yanogo Kiswendsida Jean Hermann
,
Ouedraogo Tounwendyam Frederic
Engineering
Vol.15 No.12
,December 11, 2023
DOI:
10.4236/eng.2023.1512056
224
Downloads
1,395
Views
Citations
The Research on Open Sharing of Higher Education Park Based on Intelligent Security System
(Articles)
Yan Dong
Journal of Computer and Communications
Vol.12 No.3
,March 21, 2024
DOI:
10.4236/jcc.2024.123007
123
Downloads
425
Views
Citations
Development of a Conceptual Model for Ensuring Cyber-Resilience of Software Systems
(Articles)
Shafagat Mahmudova
Open Access Library Journal
Vol.11 No.7
,July 10, 2024
DOI:
10.4236/oalib.1111787
56
Downloads
370
Views
Citations
An Agent Based Model for Ransomware Detection and Mitigation in a Cloud System
(Articles)
N’golo Konate
,
Tenan Yeo
Journal of Information Security
Vol.15 No.4
,August 1, 2024
DOI:
10.4236/jis.2024.154024
155
Downloads
600
Views
Citations
This article belongs to the Special Issue on
Cybersecurity and Information Security
Modeling and Implementation of a Data Security and Protection Medium Using the Generated Key Based on Electromagnetic Wave Propagation Theories
(Articles)
Vincent Mbonigaba
,
Fulgence Nahayo
,
Octave Moutsinga
,
Dieudonné Okalas-Ossami
,
Romeo Nibitanga
,
Thérence Niyonsaba
Journal of Computer and Communications
Vol.12 No.9
,September 26, 2024
DOI:
10.4236/jcc.2024.129008
40
Downloads
240
Views
Citations
An Energy-Efficient Cross-Layer Approach for Wireless Sensor Networks Security
(Articles)
Namwinwelbere Dabiré
,
Abdoul-Hadi Konfé
,
Pegdwindé Justin Kouraogo
Journal of Sensor Technology
Vol.15 No.1
,January 26, 2025
DOI:
10.4236/jst.2025.151002
56
Downloads
241
Views
Citations
Developing and Assessing Investment Options for Economic, Energy, and Climate Security Gains in the United States
(Articles)
Pat Delaquil
,
Gary Goldstein
,
Hal Nelson
,
Thomas Peterson
,
Stephen Roe
,
Adam Rose
,
Dan Wei
,
Jeffery Wennberg
Low Carbon Economy
Vol.5 No.2
,May 16, 2014
DOI:
10.4236/lce.2014.52004
4,020
Downloads
5,902
Views
Citations
Adaptive Control of a Production-Inventory Model with Uncertain Deterioration Rate
(Articles)
Fawzy Bukhari
Applied Mathematics
Vol.2 No.9
,September 19, 2011
DOI:
10.4236/am.2011.29162
4,950
Downloads
9,397
Views
Citations
<
...
4
5
6
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top