Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Externalities and the Magnitude of Cyber Security Underinvestment by Private Sector Firms: A Modification of the Gordon-Loeb Model
(Articles)
Lawrence A. Gordon
,
Martin P. Loeb
,
William Lucyshyn
,
Lei Zhou
Journal of Information Security
Vol.6 No.1
,January 7, 2015
DOI:
10.4236/jis.2015.61003
7,325
Downloads
10,489
Views
Citations
Reactive Data Security Approach and Review of Data Security Techniques in Wireless Networks
(Articles)
Arif Sari
,
Mehmet Karay
Int'l J. of Communications, Network and System Sciences
Vol.8 No.13
,December 30, 2015
DOI:
10.4236/ijcns.2015.813051
3,938
Downloads
5,006
Views
Citations
Passive Loss Inference in Wireless Sensor Networks Using EM Algorithm
(Articles)
Yu Yang
,
Zhulin An
,
Yongjun Xu
,
Xiaowei Li
,
Canfeng Che
Wireless Sensor Network
Vol.2 No.7
,July 9, 2010
DOI:
10.4236/wsn.201027063
4,993
Downloads
8,840
Views
Citations
Investigating Approaches of Data Integrity Preservation for Secure Data Aggregation in Wireless Sensor Networks
(Articles)
Vivaksha Jariwala
,
Vishal Singh
,
Prafulla Kumar
,
Devesh C. Jinwala
Journal of Information Security
Vol.5 No.1
,January 10, 2014
DOI:
10.4236/jis.2014.51001
3,712
Downloads
6,660
Views
Citations
Task-Specific Feature Selection and Detection Algorithms for IoT-Based Networks
(Articles)
Yang Gyun Kim
,
Benito Mendoza
,
Ohbong Kwon
,
John Yoon
Journal of Computer and Communications
Vol.10 No.10
,October 27, 2022
DOI:
10.4236/jcc.2022.1010005
131
Downloads
721
Views
Citations
Approximate Continuous Aggregation via Time Window Based Compression and Sampling in WSNs
(Articles)
Lei Yu
,
Jianzhong Li
,
Siyao Cheng
Wireless Sensor Network
Vol.2 No.9
,September 30, 2010
DOI:
10.4236/wsn.2010.29081
5,354
Downloads
8,928
Views
Citations
A Survey of Cloud Computing Detection Techniques against DDoS Attacks
(Articles)
Sabah Alzahrani
,
Liang Hong
Journal of Information Security
Vol.9 No.1
,December 21, 2017
DOI:
10.4236/jis.2018.91005
2,369
Downloads
7,254
Views
Citations
This article belongs to the Special Issue on
Intrusion Detection and Prevention
An Institutional Theory Perspective on Developing a Cyber Security Legal Framework: A Case of Saudi Arabia
(Articles)
H. P. Singh
,
Tareq S. Alshammari
Beijing Law Review
Vol.11 No.3
,July 9, 2020
DOI:
10.4236/blr.2020.113039
829
Downloads
3,275
Views
Citations
A Review on Distribution Model for Mobile Agent-Based Information Leakage Prevention
(Articles)
Alese Boniface Kayode
,
Alowolodu Olufunso Dayo
,
Adekunle Adewale Uthman
Communications and Network
Vol.13 No.2
,May 27, 2021
DOI:
10.4236/cn.2021.132006
292
Downloads
1,083
Views
Citations
Software Intrusion Detection Evaluation System: A Cost-Based Evaluation of Intrusion Detection Capability
(Articles)
Agbotiname L. Imoize
,
Taiwo Oyedare
,
Michael E. Otuokere
,
Sachin Shetty
Communications and Network
Vol.10 No.4
,November 23, 2018
DOI:
10.4236/cn.2018.104017
1,902
Downloads
4,220
Views
Citations
Online Detection of Network Traffic Anomalies Using Degree Distributions
(Articles)
Wuzuo WANG
,
Weidong WU
Int'l J. of Communications, Network and System Sciences
Vol.3 No.2
,March 1, 2010
DOI:
10.4236/ijcns.2010.32025
6,161
Downloads
12,078
Views
Citations
E-Fraud in Nigerian Banks: Why and How?
(Articles)
Babatunde Moses Ololade
,
Mary Kehinde Salawu
,
Aderemi Daniel Adekanmi
Journal of Financial Risk Management
Vol.9 No.3
,September 10, 2020
DOI:
10.4236/jfrm.2020.93012
930
Downloads
8,020
Views
Citations
Case Study of a Cyber-Physical Attack Affecting Port and Ship Operational Safety
(Articles)
Kimberly Tam
,
Rory Hopcraft
,
Kemedi Moara-Nkwe
,
Juan Palbar Misas
,
Wesley Andrews
,
Avanthika Vineetha Harish
,
Pablo Giménez
,
Tom Crichton
,
Kevin Jones
Journal of Transportation Technologies
Vol.12 No.1
,December 6, 2021
DOI:
10.4236/jtts.2022.121001
505
Downloads
4,430
Views
Citations
Cyber-Physical-Social Based Security Architecture for Future Internet of Things
(Articles)
Huansheng Ning
,
Hong Liu
Advances in Internet of Things
Vol.2 No.1
,January 14, 2012
DOI:
10.4236/ait.2012.21001
13,749
Downloads
31,790
Views
Citations
Security and Privacy Challenges in Cyber-Physical Systems
(Articles)
Fahd AlDosari
Journal of Information Security
Vol.8 No.4
,October 13, 2017
DOI:
10.4236/jis.2017.84019
2,324
Downloads
7,384
Views
Citations
The UKM Students Perception towards Cyber Security
(Articles)
Mohd Jasmy Abd Rahman
,
Mohd Isa Hamzah
,
Mohd Hanafi Mohd Yasin
,
Mohd Mokhtar Tahar
,
Zolkepeli Haron
,
Nur Kamariah Ensimau Ensimau
Creative Education
Vol.10 No.12
,November 29, 2019
DOI:
10.4236/ce.2019.1012211
1,099
Downloads
3,494
Views
Citations
This article belongs to the Special Issue on
Teaching and Learning
A Hybrid DNN-RBFNN Model for Intrusion Detection System
(Articles)
Wafula Maurice Oboya
,
Anthony Waititu Gichuhi
,
Anthony Wanjoya
Journal of Data Analysis and Information Processing
Vol.11 No.4
,November 1, 2023
DOI:
10.4236/jdaip.2023.114019
77
Downloads
473
Views
Citations
Improving Knowledge Based Spam Detection Methods: The Effect of Malicious Related Features in Imbalance Data Distribution
(Articles)
Jafar Alqatawna
,
Hossam Faris
,
Khalid Jaradat
,
Malek Al-Zewairi
,
Omar Adwan
Int'l J. of Communications, Network and System Sciences
Vol.8 No.5
,April 30, 2015
DOI:
10.4236/ijcns.2015.85014
4,149
Downloads
5,817
Views
Citations
Public Key Infrastructure: An Enhanced Validation Framework
(Articles)
Paul Danquah
,
Henoch Kwabena-Adade
Journal of Information Security
Vol.11 No.4
,September 25, 2020
DOI:
10.4236/jis.2020.114016
893
Downloads
4,958
Views
Citations
Knowledge Management Strategy for Handling Cyber Attacks in E-Commerce with Computer Security Incident Response Team (CSIRT)
(Articles)
Fauziyah Fauziyah
,
Zhaosun Wang
,
Gabriel Joy
Journal of Information Security
Vol.13 No.4
,September 23, 2022
DOI:
10.4236/jis.2022.134016
359
Downloads
1,976
Views
Citations
<
...
3
4
5
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top