Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
A Multilayer Security Framework for Cloud Computing in Internet of Things (IoT) Domain
(Articles)
M. Mamun-Ibn-Abdullah
,
M. Humayun Kabir
Journal of Computer and Communications
Vol.9 No.7
,July 27, 2021
DOI:
10.4236/jcc.2021.97004
426
Downloads
2,106
Views
Citations
Developments in Land Use and Land Cover Classification Techniques in Remote Sensing: A Review
(Review)
Lucrêncio Silvestre Macarringue
,
Édson Luis Bolfe
,
Paulo Roberto Mendes Pereira
Journal of Geographic Information System
Vol.14 No.1
,February 17, 2022
DOI:
10.4236/jgis.2022.141001
1,399
Downloads
7,060
Views
Citations
An Enhanced Healthcare Integration System Based on Cloud Computing during the Coronavirus Crisis
(Articles)
Samah A. Massadeh
,
Rose M. Al-Qasem
,
Nawal A. Al-Zabin
,
Sara I. Al-Issa
Open Access Library Journal
Vol.10 No.2
,February 13, 2023
DOI:
10.4236/oalib.1109699
73
Downloads
571
Views
Citations
Cloud Computing Security, Protecting University Information
(Articles)
Anita C. Eluwa
Open Access Library Journal
Vol.10 No.11
,November 28, 2023
DOI:
10.4236/oalib.1110925
89
Downloads
565
Views
Citations
A Novel LSB Steganography Technique for Enhancing Cloud Security
(Articles)
Ahsan Ullah
,
Md. Inzamul Haque
,
Md. Mokarom Hossain
,
Md. Sadman Ahammad
,
Mst. Nishita Aktar
Journal of Information Security
Vol.15 No.3
,July 17, 2024
DOI:
10.4236/jis.2024.153021
103
Downloads
627
Views
Citations
An Agent Based Model for Ransomware Detection and Mitigation in a Cloud System
(Articles)
N’golo Konate
,
Tenan Yeo
Journal of Information Security
Vol.15 No.4
,August 1, 2024
DOI:
10.4236/jis.2024.154024
157
Downloads
614
Views
Citations
This article belongs to the Special Issue on
Cybersecurity and Information Security
A Study on Determinants of Enterprises Migrating ERP Systems to the Cloud
(Articles)
Jiayu Chi
American Journal of Industrial and Business Management
Vol.14 No.8
,August 28, 2024
DOI:
10.4236/ajibm.2024.148056
89
Downloads
392
Views
Citations
Construction and Application of Yancheng Education Cloud Resources and Coping Strategies
(Articles)
Huaping Xu
,
Chunxia Wang
Advances in Applied Sociology
Vol.13 No.3
,March 13, 2023
DOI:
10.4236/aasoci.2023.133013
145
Downloads
570
Views
Citations
The Construction of Human Resource Management Cloud Service Platform
(Articles)
Liangtie Dai
,
Yang He
,
Guangdong Xing
Intelligent Information Management
Vol.7 No.1
,January 9, 2015
DOI:
10.4236/iim.2015.71001
4,919
Downloads
7,292
Views
Citations
An Evaluation Approach of Subjective Trust Based on Cloud Model
(Articles)
Shouxin Wang
,
Li Zhang
,
Na Ma
,
Shuai Wang
Journal of Software Engineering and Applications
Vol.1 No.1
,December 9, 2008
DOI:
10.4236/jsea.2008.11007
6,393
Downloads
12,486
Views
Citations
Managing Computing Infrastructure for IoT Data
(Articles)
Sapna Tyagi
,
Ashraf Darwish
,
Mohammad Yahiya Khan
Advances in Internet of Things
Vol.4 No.3
,July 29, 2014
DOI:
10.4236/ait.2014.43005
6,121
Downloads
8,301
Views
Citations
Enhancing Mobile Cloud Computing Security Using Steganography
(Articles)
Hassan Reza
,
Madhuri Sonawane
Journal of Information Security
Vol.7 No.4
,July 19, 2016
DOI:
10.4236/jis.2016.74020
3,675
Downloads
6,716
Views
Citations
The Future of Cloud Computing: Benefits and Challenges
(Articles)
Rafia Islam
,
Vardhan Patamsetti
,
Aparna Gadhi
,
Ragha Madhavi Gondu
,
Chinna Manikanta Bandaru
,
Sai Chaitanya Kesani
,
Olatunde Abiona
Int'l J. of Communications, Network and System Sciences
Vol.16 No.4
,April 17, 2023
DOI:
10.4236/ijcns.2023.164004
2,998
Downloads
22,668
Views
Citations
Cloud Technologies and Its Impact on the US Health Insurance Claims Process
(Articles)
Leelakumar Raja Lekkala
Voice of the Publisher
Vol.9 No.4
,December 25, 2023
DOI:
10.4236/vp.2023.94025
102
Downloads
526
Views
Citations
QoS Based Framework for Effective Web Services in Cloud Computing
(Articles)
Debajyoti Mukhopadhyay
,
Falguni J. Chathly
,
Nagesh N. Jadhav
Journal of Software Engineering and Applications
Vol.5 No.11A
,November 30, 2012
DOI:
10.4236/jsea.2012.531110
5,218
Downloads
9,055
Views
Citations
This article belongs to the Special Issue on
Cloud Computing
Cloud Computing as an Innovation in GIS & SDI: Methodologies, Services, Issues and Deployment Techniques
(Articles)
Mohammad Naghavi
Journal of Geographic Information System
Vol.4 No.6
,December 31, 2012
DOI:
10.4236/jgis.2012.46062
9,771
Downloads
14,587
Views
Citations
Heuristic Scheduling Algorithms for Allocation of Virtualized Network and Computing Resources
(Articles)
Yichao Yang
,
Yanbo Zhou
,
Zhili Sun
,
Haitham Cruickshank
Journal of Software Engineering and Applications
Vol.6 No.1
,January 30, 2013
DOI:
10.4236/jsea.2013.61001
5,875
Downloads
9,556
Views
Citations
HA-SLA: A Hierarchical Autonomic SLA Model for SLA Monitoring in Cloud Computing
(Articles)
Ahmad Mosallanejad
,
Rodziah Atan
Journal of Software Engineering and Applications
Vol.6 No.3B
,April 11, 2013
DOI:
10.4236/jsea.2013.63B025
3,837
Downloads
6,816
Views
Citations
The Objective Function Value Optimization of Cloud Computing Resources Security Allocation of Artificial Firefly Algorithm
(Articles)
Xiaoxi Hu
Open Journal of Optimization
Vol.4 No.2
,May 15, 2015
DOI:
10.4236/ojop.2015.42005
3,512
Downloads
4,569
Views
Citations
An E-Negotiation Agent Using Rule Based and Case Based Approaches: A Comparative Study with Bilateral E-Negotiation with Prediction
(Articles)
Sheetal R. Vij
,
Amruta More
,
Debajyoti Mukhopadhyay
,
Avinash J. Agrawal
Journal of Software Engineering and Applications
Vol.8 No.10
,October 12, 2015
DOI:
10.4236/jsea.2015.810049
5,066
Downloads
5,999
Views
Citations
<
...
6
7
8
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top