Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Implementation of Machine Learning Method for the Detection and Prevention of Attack in Supervised Network
(Articles)
Patrick Dany Bavoua Kenfack
,
Fabrice Kwefeu Mbakop
,
Edward Eyong-Ebai
Open Access Library Journal
Vol.8 No.12
,December 30, 2021
DOI:
10.4236/oalib.1108000
214
Downloads
1,676
Views
Citations
Securing User Authentication with Server-Side Voice Verification
(Articles)
Deepak R. Chandran
,
Sanath Kumar
,
S. Deepashri
Journal of Computer and Communications
Vol.11 No.5
,May 30, 2023
DOI:
10.4236/jcc.2023.115010
167
Downloads
802
Views
Citations
Systematic Review: Analysis of Coding Vulnerabilities across Languages
(Articles)
Shreyas Sakharkar
Journal of Information Security
Vol.14 No.4
,September 28, 2023
DOI:
10.4236/jis.2023.144019
352
Downloads
2,887
Views
Citations
An Analysis of Digital Records and Their Juridical Ramifications: Bangladesh Perspective
(Articles)
Mohammad Khabbab Taki
Beijing Law Review
Vol.14 No.4
,December 7, 2023
DOI:
10.4236/blr.2023.144106
111
Downloads
510
Views
Citations
A Review of Cybersecurity Challenges in Small Business: The Imperative for a Future Governance Framework
(Articles)
Binita Saha
,
Zahid Anwar
Journal of Information Security
Vol.15 No.1
,January 15, 2024
DOI:
10.4236/jis.2024.151003
764
Downloads
6,907
Views
Citations
Enhancing Cybersecurity through AI and ML: Strategies, Challenges, and Future Directions
(Articles)
Maryam Roshanaei
,
Mahir R. Khan
,
Natalie N. Sylvester
Journal of Information Security
Vol.15 No.3
,July 5, 2024
DOI:
10.4236/jis.2024.153019
1,181
Downloads
8,423
Views
Citations
Optimizing Network Security via Ensemble Learning: A Nexus with Intrusion Detection
(Articles)
Anu Baluguri
,
Vasudha Pasumarthy
,
Indranil Roy
,
Bidyut Gupta
,
Nick Rahimi
Journal of Information Security
Vol.15 No.4
,October 22, 2024
DOI:
10.4236/jis.2024.154030
69
Downloads
662
Views
Citations
Development of the Software Application with Graphical User Interface for One Model Cyber Security
(Articles)
Ramaz R. Shamugia
Int'l J. of Communications, Network and System Sciences
Vol.12 No.12
,December 13, 2019
DOI:
10.4236/ijcns.2019.1212014
780
Downloads
1,821
Views
Citations
Data Security of Mobile Cloud Computing on Cloud Server
(Articles)
Mohammad Waseem
,
Abdullah Lakhan
,
Irfan Ali Jamali
Open Access Library Journal
Vol.3 No.4
,April 28, 2016
DOI:
10.4236/oalib.1102377
1,847
Downloads
8,507
Views
Citations
A Security Architecture for SCADA Systems
(Articles)
Arun Velagapalli
,
Mahalingam Ramkumar
Journal of Information Security
Vol.9 No.1
,January 23, 2018
DOI:
10.4236/jis.2018.91009
1,432
Downloads
3,913
Views
Citations
Exploring the Characteristics of Data Breaches: A Descriptive Analytic Study
(Articles)
Dominik Molitor
,
Aditya Saharia
,
Viju Raghupathi
,
Wullianallur Raghupathi
Journal of Information Security
Vol.15 No.2
,April 2, 2024
DOI:
10.4236/jis.2024.152011
347
Downloads
2,576
Views
Citations
Block Level Data Integrity Assurance Using Matrix Dialing Method towards High Performance Data Security on Cloud Storage
(Articles)
P. Premkumar
,
D. Shanthi
Circuits and Systems
Vol.7 No.11
,September 13, 2016
DOI:
10.4236/cs.2016.711307
1,917
Downloads
3,359
Views
Citations
Fifty-Six Big Data V’s Characteristics and Proposed Strategies to Overcome Security and Privacy Challenges (BD2)
(Articles)
Abou_el_ela Abdou Hussein
Journal of Information Security
Vol.11 No.4
,October 30, 2020
DOI:
10.4236/jis.2020.114019
1,358
Downloads
6,651
Views
Citations
A Review on Distribution Model for Mobile Agent-Based Information Leakage Prevention
(Articles)
Alese Boniface Kayode
,
Alowolodu Olufunso Dayo
,
Adekunle Adewale Uthman
Communications and Network
Vol.13 No.2
,May 27, 2021
DOI:
10.4236/cn.2021.132006
387
Downloads
1,256
Views
Citations
Designing a Comprehensive Data Governance Maturity Model for Kenya Ministry of Defence
(Articles)
Gilly Gitahi Gathogo
,
Simon Maina Karume
,
Josphat Karani
Journal of Information Security
Vol.16 No.1
,November 27, 2024
DOI:
10.4236/jis.2025.161002
64
Downloads
377
Views
Citations
Information Security in the Cloud: Emerging Trends and Challenges
(Articles)
Keerthana Chitreddy
,
Andrew Mikhl Anthony
,
Chinna Manikanta Bandaru
,
Olatunde Abiona
Int'l J. of Communications, Network and System Sciences
Vol.17 No.5
,May 31, 2024
DOI:
10.4236/ijcns.2024.175005
149
Downloads
842
Views
Citations
Third-Party Information Security: Generic Qualitative Inquiry in Banking and Financial Services
(Articles)
Genemar Arthur Lazo
Journal of Financial Risk Management
Vol.13 No.3
,September 27, 2024
DOI:
10.4236/jfrm.2024.133027
68
Downloads
408
Views
Citations
Corporate Intranet Security: Packet-Level Protocols for Preventing Leakage of Sensitive Information and Assuring Authorized Network Traffic
(Articles)
Boris S. Verkhovsky
,
Roberto D. Rubino
Int'l J. of Communications, Network and System Sciences
Vol.5 No.5
,May 30, 2012
DOI:
10.4236/ijcns.2012.55033
5,028
Downloads
7,448
Views
Citations
Data Stream Subspace Clustering for Anomalous Network Packet Detection
(Articles)
Zachary Miller
,
Wei Hu
Journal of Information Security
Vol.3 No.3
,July 25, 2012
DOI:
10.4236/jis.2012.33027
5,436
Downloads
8,696
Views
Citations
Network Intrusion Detection and Visualization Using Aggregations in a Cyber Security Data Warehouse
(Articles)
Bogdan Denny Czejdo
,
Erik M. Ferragut
,
John R. Goodall
,
Jason Laska
Int'l J. of Communications, Network and System Sciences
Vol.5 No.9A
,September 18, 2012
DOI:
10.4236/ijcns.2012.529069
4,928
Downloads
8,734
Views
Citations
This article belongs to the Special Issue on
Models and Algorithms for Applications
<
1
2
3
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top