Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Determinants of Home Deliveries by Pregnant Mothers in Lumbo Chabbobboma Zone of Gwembe District in Zambia
(Articles)
Miyoba M. Habanji
Open Journal of Obstetrics and Gynecology
Vol.14 No.6
,June 25, 2024
DOI:
10.4236/ojog.2024.146075
89
Downloads
436
Views
Citations
Rapidly Progressing Hepatic Angiosarcoma Terminally Cared for at Home: A Case Discussion
—Hepatic Angiosarcoma Taken Palliative Care at Home
(Articles)
Hiroaki Yamane
,
Aki Yoshimitsu
,
Tomoko Itagaki
,
Motoi Yamane
Case Reports in Clinical Medicine
Vol.13 No.11
,November 5, 2024
DOI:
10.4236/crcm.2024.1311056
35
Downloads
228
Views
Citations
The Necessity of Information Security in the Vulnerable Pharmaceutical Industry
(Articles)
Shawn Josette Roberts
Journal of Information Security
Vol.5 No.4
,September 25, 2014
DOI:
10.4236/jis.2014.54014
6,778
Downloads
9,720
Views
Citations
Externalities and the Magnitude of Cyber Security Underinvestment by Private Sector Firms: A Modification of the Gordon-Loeb Model
(Articles)
Lawrence A. Gordon
,
Martin P. Loeb
,
William Lucyshyn
,
Lei Zhou
Journal of Information Security
Vol.6 No.1
,January 7, 2015
DOI:
10.4236/jis.2015.61003
7,596
Downloads
10,276
Views
Citations
Association between the Performance of the University Security Officers and Their Physical Fitness: A Case Study
(Articles)
A. M. Razmy
,
A. Jabeer
Open Access Library Journal
Vol.4 No.6
,June 12, 2017
DOI:
10.4236/oalib.1103239
1,128
Downloads
2,137
Views
Citations
Towards Maintaining Peacefulness of the Sea: Legal Regime Governing Maritime Safety and Security in Nigeria
(Articles)
Ekundayo Oluwaremilekun Babatunde
,
Mutiat Mobolanle Abdulsalam
Beijing Law Review
Vol.12 No.2
,June 1, 2021
DOI:
10.4236/blr.2021.122029
539
Downloads
3,768
Views
Citations
Security Cooperation between China and Indonesia to Address Maritime Security Threats
(Articles)
Yuliannova Lestari
,
Georges Olemanu Lohalo
,
Nicole Kajir Diur
,
Betao Ngoma Mushinda
,
Vital Mbumba Mbumba
,
Scheel Mutombo Kianga
,
Peter Ngolo Minga
Open Journal of Political Science
Vol.12 No.4
,September 9, 2022
DOI:
10.4236/ojps.2022.124030
491
Downloads
2,983
Views
Citations
Metaphor Analysis of Security Discourse in
Xi Jinping
:
The Governance of China
(
Volume IV
) and Its English Translation Strategies
(Articles)
Rui Chen
Open Journal of Modern Linguistics
Vol.14 No.5
,October 15, 2024
DOI:
10.4236/ojml.2024.145050
89
Downloads
455
Views
Citations
Leadership Responsibilities and Characteristics in Security Work
(Articles)
Abdullah Ahmed Al-Subaie
Open Journal of Leadership
Vol.14 No.2
,April 22, 2025
DOI:
10.4236/ojl.2025.142009
18
Downloads
89
Views
Citations
Computer – Based Infrastructure Sector Interdependencies and Security Implications
(Articles)
Aghware Fidelis Obukohwo
Int'l J. of Communications, Network and System Sciences
Vol.4 No.11
,October 31, 2011
DOI:
10.4236/ijcns.2011.411090
3,714
Downloads
6,464
Views
Citations
Food insecurity: How to orchestrate a global health crisis
(Articles)
John Quinn
,
Vladimir Bencko
Health
Vol.5 No.6
,June 20, 2013
DOI:
10.4236/health.2013.56141
5,178
Downloads
8,169
Views
Citations
Myths and Realities about Mexico-United States Migration
(Articles)
Luis Arturo Rivas Tovar
,
Adela Chávez
,
Juan Enrique Azuara Munguía
,
Ana Gabriela Benítez Jurado
iBusiness
Vol.6 No.2
,May 23, 2014
DOI:
10.4236/ib.2014.62008
5,174
Downloads
7,618
Views
Citations
Improved High Definition Multimedia Interface Authentication Mechanism
(Articles)
R. N. Iyare
,
S. D. Walker
Journal of Computer and Communications
Vol.2 No.12
,October 22, 2014
DOI:
10.4236/jcc.2014.212003
3,494
Downloads
4,354
Views
Citations
Education Technology Cloud Platform Framework Establishment and Security
(Articles)
Guoqiang Hu
,
Yanrong Yang
,
Li Li
Journal of Computer and Communications
Vol.4 No.7
,May 19, 2016
DOI:
10.4236/jcc.2016.47002
2,090
Downloads
3,158
Views
Citations
A Political Theory Approach to Understanding Conflict in Selected African States
(Articles)
Solomon Owuoche
Open Access Library Journal
Vol.2 No.2
,February 16, 2015
DOI:
10.4236/oalib.1101248
629
Downloads
1,834
Views
Citations
Sensors Applied in Healthcare Environments
(Articles)
Wei Vivien Shi
Journal of Computer and Communications
Vol.4 No.5
,May 29, 2016
DOI:
10.4236/jcc.2016.45015
1,749
Downloads
3,748
Views
Citations
A Review of Security Concerns in Internet of Things
(Articles)
Engin Leloglu
Journal of Computer and Communications
Vol.5 No.1
,January 22, 2017
DOI:
10.4236/jcc.2017.51010
5,314
Downloads
19,120
Views
Citations
Statistical Approach to Regulation of Nanotechnology: Need, Advantages and Disadvantages
(Articles)
Ricardo Santana Cabello
,
José Vega-Baudrit
,
Robin Zuluaga
,
Piedad Gañán
Journal of Biomaterials and Nanobiotechnology
Vol.11 No.1
,November 18, 2019
DOI:
10.4236/jbnb.2020.111002
1,228
Downloads
4,292
Views
Citations
The G5 Sahel: Security Implementation and Challenges
(Articles)
Alassane Camara
Open Journal of Political Science
Vol.10 No.3
,July 10, 2020
DOI:
10.4236/ojps.2020.103030
1,196
Downloads
3,475
Views
Citations
Maximizing Security Operations to Promote Socio-Economic Development in Mining Firms in Ghana
(Articles)
Daniel Ofori
,
Ambrose Amoah-Ashyiah
,
Benjamin Adjei Dankwah
,
Stephen Yeboah
,
Kakraba Ben Komla
,
Maxwell Acheampong
,
Kwadwo Kyei Ofori
,
Michael Oppong
iBusiness
Vol.14 No.4
,November 21, 2022
DOI:
10.4236/ib.2022.144015
201
Downloads
1,035
Views
Citations
<
...
7
8
9
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top