Browse Menu |
---|
Journals by Subject |
Journals by Title |
Benefits |
---|
- Lifetime hosting |
- Fast publication |
- Open access |
- Peer review |
- Free indexing service |
- Free promotion service |
- High visibility |
Newsletter |
---|
Just enter your email address below, we will share with you the latest information of journals published by CSP. Plus, you can easily unsubscribe at any time, and we'll never share your email address with anyone. |
Articles Search in the SCIENTIFIC DIGITAL LIBRARY (SCIDL)
Qingyu Meng*, Lam TYM
Abstract | References | PDF | HTML | Pub. Date: Dec 6, 2021
DOI: 10.23977/jceup.2021.030101 | Downloads: 26 | Views: 1317Siqin Gaowa Liu*
Abstract | References | PDF | HTML | Pub. Date: Dec 3, 2021
DOI: 10.23977/agrfem.2021.040113 | Downloads: 35 | Views: 1147Challenges and Opportunities Presented by AI Anchors to Hosts
Xiang XIAO*, Lian DUAN
Abstract | References | PDF | HTML | Pub. Date: Dec 3, 2021
DOI: 10.23977/mediacr.2021.020105 | Downloads: 44 | Views: 1770On the Innovation Model of Trust Business in China
Zhan Wang*
Abstract | References | PDF | HTML | Pub. Date: Dec 3, 2021
DOI: 10.23977/acccm.2021.030111 | Downloads: 22 | Views: 966Xinyue Zhang*
Abstract | References | PDF | HTML | Pub. Date: Dec 3, 2021
DOI: 10.23977/acccm.2021.030110 | Downloads: 8 | Views: 912Computer Game Interface Design Based on Human-Computer Interaction Analysis
Gordan Zhang*
Abstract | References | PDF | HTML | Pub. Date: Dec 3, 2021
DOI: 10.23977/jwsa.2021.030105 | Downloads: 16 | Views: 1151Network Security Evaluation and Optimal Active Defense Based on Data Mining Technology
Wenwen Zhao*
Abstract | References | PDF | HTML | Pub. Date: Dec 3, 2021
DOI: 10.23977/jwsa.2021.030104 | Downloads: 13 | Views: 1229Research on Information Encryption Technology Applied in Computer Network Security
Yi Shen*, Haoming Yan
Abstract | References | PDF | HTML | Pub. Date: Dec 3, 2021
DOI: 10.23977/jwsa.2021.030103 | Downloads: 14 | Views: 1260