Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journals
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Publication Date:
📅
--📅
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Forecasting Shark Attack Risk Using AI: A Deep Learning Approach
(Articles)
Evan Valenti
Journal of Data Analysis and Information Processing
Vol.11 No.4
, October 12, 2023
DOI:
10.4236/jdaip.2023.114018
288
Downloads
2,005
Views
Citations
On the Separation Mechanism between a Shark’s Tooth and Its Jaw Base, with Special Emphasis on an Observation Made from a White Shark,
Carcharodon carcharias
(Articles)
Erich K. Ritter
,
Andreas Dellios
Open Journal of Animal Sciences
Vol.8 No.3
, July 23, 2018
DOI:
10.4236/ojas.2018.83024
1,475
Downloads
3,087
Views
Citations
Shark Cognition and a Human Mediated Driver of a Spate of Shark Attacks
(Articles)
Marie Levine
,
Ralph S. Collier
,
Erich Ritter
,
Moustafa Fouda
,
Vincent Canabal
Open Journal of Animal Sciences
Vol.4 No.5
, September 29, 2014
DOI:
10.4236/ojas.2014.45033
5,302
Downloads
9,135
Views
Citations
A Study of Shark Stealth Behavior in the Proximity of Divers
(Articles)
Erich Ritter
,
Raid Amin
Open Journal of Animal Sciences
Vol.5 No.2
, May 4, 2015
DOI:
10.4236/ojas.2015.52025
4,445
Downloads
6,695
Views
Citations
From Mutualistic Partner to Hunted Prey?
(Articles)
Erich K. Ritter
Open Journal of Animal Sciences
Vol.9 No.1
, January 10, 2019
DOI:
10.4236/ojas.2019.91008
1,326
Downloads
2,525
Views
Citations
Is the Shark Just Drifting, or Does It Take a Quick Nap?
(Articles)
Erich K. Ritter
Open Journal of Animal Sciences
Vol.10 No.1
, December 13, 2019
DOI:
10.4236/ojas.2020.101004
718
Downloads
2,389
Views
Citations
Does the Type of Dive Mask Matter to a Shark?
(Articles)
Erich Ritter
,
Raid Amin
,
Ellie Farquhar
Open Journal of Animal Sciences
Vol.10 No.3
, July 30, 2020
DOI:
10.4236/ojas.2020.103040
560
Downloads
2,107
Views
Citations
Security Concerns with IoT Routing: A Review of Attacks, Countermeasures, and Future Prospects
(Articles)
Ali M. A. Abuagoub
Advances in Internet of Things
Vol.14 No.4
, October 14, 2024
DOI:
10.4236/ait.2024.144005
186
Downloads
1,231
Views
Citations
Information Theoretic Distinguishers for Timing Attacks with Partial Profiles: Solving the Empty Bin Issue
(Articles)
Eloi De Chérisey
,
Sylvain Guilley
,
Olivier Rioul
,
Darshana Jayasinghe
Journal of Information Security
Vol.12 No.1
, December 10, 2020
DOI:
10.4236/jis.2021.121001
523
Downloads
1,361
Views
Citations
A Comparative Analysis of Tools for Verification of Security Protocols
(Articles)
Nitish Dalal
,
Jenny Shah
,
Khushboo Hisaria
,
Devesh Jinwala
International Journal of Communications, Network and System Sciences
Vol.3 No.10
, October 27, 2010
DOI:
10.4236/ijcns.2010.310104
8,151
Downloads
16,951
Views
Citations
A One-Session Treatment Protocol for Panic Attacks
(Articles)
Ron Robbins
,
Jan Parker
,
Charles Tatum
Psychology
Vol.6 No.9
, July 6, 2015
DOI:
10.4236/psych.2015.69103
4,668
Downloads
8,362
Views
Citations
Toward Secure Vehicular Ad Hoc Networks an Overview and Comparative Study
(Articles)
Yousef Al-Raba’nah
,
Mohammed Al-Refai
Journal of Computer and Communications
Vol.4 No.16
, December 9, 2016
DOI:
10.4236/jcc.2016.416002
2,222
Downloads
4,638
Views
Citations
Evolution of white and megatooth sharks, and evidence for early predation on seals, sirenians, and whales
(Articles)
Cajus G. Diedrich
Natural Science
Vol.5 No.11
, November 13, 2013
DOI:
10.4236/ns.2013.511148
10,447
Downloads
18,147
Views
Citations
Fatty Acid Profiles of Livers from Two Marine Fishes Inhabiting Sudanese Red Sea Coast
(Articles)
Howida M. Hassan
,
Salaheldeen Y. Mohammed
,
Sheikheldin M. Elamin
,
Eman E. Alraih
Food and Nutrition Sciences
Vol.11 No.6
, June 22, 2020
DOI:
10.4236/fns.2020.116040
535
Downloads
1,346
Views
Citations
Structured Financial Product Designing
(Articles)
Huayue Zhang
,
Jingwen Wang
Open Journal of Social Sciences
Vol.11 No.2
, February 28, 2023
DOI:
10.4236/jss.2023.112032
223
Downloads
1,903
Views
Citations
A Secure DHCP Protocol to Mitigate LAN Attacks
(Articles)
Osama S. Younes
Journal of Computer and Communications
Vol.4 No.1
, January 28, 2016
DOI:
10.4236/jcc.2016.41005
6,297
Downloads
13,051
Views
Citations
Security and Privacy Challenges in Cyber-Physical Systems
(Articles)
Fahd AlDosari
Journal of Information Security
Vol.8 No.4
, October 13, 2017
DOI:
10.4236/jis.2017.84019
2,556
Downloads
8,250
Views
Citations
Analysis and Evaluation of Performance Related to Java and PHP Security Codes
(Articles)
Fontaine Rafamantanantsoa
,
Rabetafika Louis Haja
,
Randrianomenjanahary Lala Ferdinand
Communications and Network
Vol.13 No.1
, February 26, 2021
DOI:
10.4236/cn.2021.131004
2,113
Downloads
4,102
Views
Citations
Improving the Cybersecurity Framework for Future Consumer Networks
(Articles)
Tyler Welker
,
Olatunde Abiona
International Journal of Communications, Network and System Sciences
Vol.14 No.4
, April 30, 2021
DOI:
10.4236/ijcns.2021.144004
1,359
Downloads
3,136
Views
Citations
The Role of Social Engineering in Cybersecurity and Its Impact
(Articles)
Bandar S. Almutairi
,
Abdurahman Alghamdi
Journal of Information Security
Vol.13 No.4
, October 28, 2022
DOI:
10.4236/jis.2022.134020
1,292
Downloads
8,288
Views
Citations
First
<
1
2
3
...
>
Last
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
News
About SCIRP
Ethics
Editorial Policies
For Authors
Peer-Review Issues
Publication Fees
Special Issues
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2026 Scientific Research Publishing Inc. All Rights Reserved.
Top