Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Implementation of Machine Learning Method for the Detection and Prevention of Attack in Supervised Network
(Articles)
Patrick Dany Bavoua Kenfack
,
Fabrice Kwefeu Mbakop
,
Edward Eyong-Ebai
Open Access Library Journal
Vol.8 No.12
,December 30, 2021
DOI:
10.4236/oalib.1108000
171
Downloads
1,321
Views
Citations
Securing User Authentication with Server-Side Voice Verification
(Articles)
Deepak R. Chandran
,
Sanath Kumar
,
S. Deepashri
Journal of Computer and Communications
Vol.11 No.5
,May 30, 2023
DOI:
10.4236/jcc.2023.115010
114
Downloads
501
Views
Citations
Systematic Review: Analysis of Coding Vulnerabilities across Languages
(Articles)
Shreyas Sakharkar
Journal of Information Security
Vol.14 No.4
,September 28, 2023
DOI:
10.4236/jis.2023.144019
163
Downloads
1,530
Views
Citations
An Analysis of Digital Records and Their Juridical Ramifications: Bangladesh Perspective
(Articles)
Mohammad Khabbab Taki
Beijing Law Review
Vol.14 No.4
,December 7, 2023
DOI:
10.4236/blr.2023.144106
47
Downloads
238
Views
Citations
A Review of Cybersecurity Challenges in Small Business: The Imperative for a Future Governance Framework
(Articles)
Binita Saha
,
Zahid Anwar
Journal of Information Security
Vol.15 No.1
,January 15, 2024
DOI:
10.4236/jis.2024.151003
194
Downloads
1,487
Views
Citations
Development of the Software Application with Graphical User Interface for One Model Cyber Security
(Articles)
Ramaz R. Shamugia
Int'l J. of Communications, Network and System Sciences
Vol.12 No.12
,December 13, 2019
DOI:
10.4236/ijcns.2019.1212014
681
Downloads
1,503
Views
Citations
Exploring the Characteristics of Data Breaches: A Descriptive Analytic Study
(Articles)
Dominik Molitor
,
Aditya Saharia
,
Viju Raghupathi
,
Wullianallur Raghupathi
Journal of Information Security
Vol.15 No.2
,April 2, 2024
DOI:
10.4236/jis.2024.152011
92
Downloads
519
Views
Citations
Fifty-Six Big Data V’s Characteristics and Proposed Strategies to Overcome Security and Privacy Challenges (BD2)
(Articles)
Abou_el_ela Abdou Hussein
Journal of Information Security
Vol.11 No.4
,October 30, 2020
DOI:
10.4236/jis.2020.114019
1,067
Downloads
5,459
Views
Citations
A Predicted Region based Cache Replacement Policy for Location Dependent Data in Mobile Environment
(Articles)
Ajey KUMAR
,
Manoj MISRA
,
Anil K. SARJE
Int'l J. of Communications, Network and System Sciences
Vol.1 No.1
,June 6, 2008
DOI:
10.4236/ijcns.2008.11012
6,133
Downloads
11,008
Views
Citations
Mixed Model, AMMI and Eberhart-Russel Comparison via Simulation on Genotype × Environment Interaction Study in Sugarcane
(Articles)
Guilherme Moraes Ferraudo
,
Dilermando Perecin
Applied Mathematics
Vol.5 No.14
,July 28, 2014
DOI:
10.4236/am.2014.514205
5,049
Downloads
7,230
Views
Citations
This article belongs to the Special Issue on
Experimental Design
Trust Management in Grid-Trust Assessment and Trust Degree Calculation of a Resource—A Novel Approach
(Articles)
Avula Anitha
Journal of Computer and Communications
Vol.3 No.6
,May 28, 2015
DOI:
10.4236/jcc.2015.36005
2,613
Downloads
3,417
Views
Citations
Scalability of the DVFS Power Management Technique as Applied to 3-Tier Data Center Architecture in Cloud Computing
(Articles)
Sulieman Bani-Ahmad
,
Saleh Sa’adeh
Journal of Computer and Communications
Vol.5 No.1
,January 20, 2017
DOI:
10.4236/jcc.2017.51007
1,970
Downloads
3,440
Views
Citations
Subject Oriented Autonomic Cloud Data Center Networks Model
(Articles)
Hang Qin
,
Li Zhu
Journal of Data Analysis and Information Processing
Vol.5 No.3
,July 25, 2017
DOI:
10.4236/jdaip.2017.53007
1,042
Downloads
1,875
Views
Citations
Towards Attaining Reliable and Efficient Green Cloud Computing Using Micro-Smart Grids to Power Internet Data Center
(Articles)
Mohammed Mansur Ibrahim
,
Anas Ahmad Danbala
,
Mustapha Ismail
Journal of Computer and Communications
Vol.7 No.7
,July 18, 2019
DOI:
10.4236/jcc.2019.77016
1,001
Downloads
2,178
Views
Citations
An Overview of “Optimal Input-Output Planning Model and Cross-Boundary Economic Management Information System”
—Organic Combinations and Connections between the Optimal Input-Output Planning Model and Big Data, New Cloud Computing Technology, Internet of Things or New Internet Industry
(Articles)
Ning Kang
American Journal of Industrial and Business Management
Vol.9 No.9
,September 16, 2019
DOI:
10.4236/ajibm.2019.99118
631
Downloads
1,950
Views
Citations
Organizational Guidelines for Embrapa Advanced Quantitative Methods and Scientific Computing Area
(Articles)
Marcia Izabel Fugisawa Souza
,
Tércia Zavaglia Torres
,
Moacir Pedroso Júnior
,
José Ruy Porto de Carvalho
,
Sônia Ternes
,
Kleber Xavier Sampaio de Souza
,
Geraldo da Silva e Souza
Open Journal of Business and Management
Vol.8 No.4
,July 29, 2020
DOI:
10.4236/ojbm.2020.84111
306
Downloads
861
Views
Citations
Discrete Event Simulation-Based Evaluation of a Single-Lane Synchronized Dual-Traffic Light Intersections
(Articles)
Chimezie Calistus
,
Ogharandukun Martin
,
Abdullahi Monday
,
Essien Joe
Journal of Computer and Communications
Vol.11 No.10
,October 25, 2023
DOI:
10.4236/jcc.2023.1110006
86
Downloads
433
Views
Citations
A Threshold Signature Scheme Based on TPM
(Articles)
Zhi-Hua Zhang
,
Si-Rong Zhang
,
Wen-Jin Yu
,
Jian-Jun Li
,
Bei Gong
,
Wei Jiang
Int'l J. of Communications, Network and System Sciences
Vol.4 No.10
,October 12, 2011
DOI:
10.4236/ijcns.2011.410075
5,091
Downloads
8,698
Views
Citations
Opportunistic Unicast and Multicast Routing Protocol for VANET
(Articles)
Zhizhong Jie
,
Chuanhe Huang
,
Liya Xu
,
Bo Wang
,
Wenzhong Yang
,
Xi Chen
Journal of Software Engineering and Applications
Vol.6 No.6
,June 19, 2013
DOI:
10.4236/jsea.2013.66040
5,354
Downloads
8,071
Views
Citations
The Influence of Leader-Member Relationship on Staff under the Feeling Trusted
(Articles)
Xue Yang
Open Journal of Business and Management
Vol.7 No.2
,March 28, 2019
DOI:
10.4236/ojbm.2019.72039
778
Downloads
1,687
Views
Citations
<
...
4
5
6
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top