Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Digital Evidence for Database Tamper Detection
(Articles)
Shweta Tripathi
,
Bandu Baburao Meshram
Journal of Information Security
Vol.3 No.2
,April 26, 2012
DOI:
10.4236/jis.2012.32014
7,794
Downloads
13,861
Views
Citations
A Survey of Blind Forensics Techniques for JPEG Image Tampering
(Articles)
Xueling Chu
,
Haiming Li
Journal of Computer and Communications
Vol.7 No.10
,October 11, 2019
DOI:
10.4236/jcc.2019.710001
525
Downloads
1,454
Views
Citations
Research and Practice on Security Protection and Disaster Recovery Strategy of Oracle Database in Colleges and Universities
(Articles)
Man Liu
,
Lei Yu
Intelligent Information Management
Vol.14 No.2
,March 14, 2022
DOI:
10.4236/iim.2022.142005
218
Downloads
1,105
Views
Citations
Implementation of Machine Learning Method for the Detection and Prevention of Attack in Supervised Network
(Articles)
Patrick Dany Bavoua Kenfack
,
Fabrice Kwefeu Mbakop
,
Edward Eyong-Ebai
Open Access Library Journal
Vol.8 No.12
,December 30, 2021
DOI:
10.4236/oalib.1108000
171
Downloads
1,409
Views
Citations
Machine Learning-Based Alarms Classification and Correlation in an SDH/WDM Optical Network to Improve Network Maintenance
(Articles)
Deussom Djomadji Eric Michel
,
Takembo Ntahkie Clovis
,
Tchapga Tchito Christian
,
Arabo Mamadou
,
Michael Ekonde Sone
Journal of Computer and Communications
Vol.11 No.2
,February 28, 2023
DOI:
10.4236/jcc.2023.112009
132
Downloads
1,258
Views
Citations
An Oracle Bone Inscription Detector Based on Multi-Scale Gaussian Kernels
(Articles)
Guoying Liu
,
Shuanghao Chen
,
Jing Xiong
,
Qingju Jiao
Applied Mathematics
Vol.12 No.3
,March 30, 2021
DOI:
10.4236/am.2021.123014
369
Downloads
1,092
Views
Citations
Comparative Evaluation of Semi Fragile Watermarking Algorithms for Image Authentication
(Articles)
Archana Tiwari
,
Manisha Sharma
Journal of Information Security
Vol.3 No.3
,July 25, 2012
DOI:
10.4236/jis.2012.33023
5,822
Downloads
9,588
Views
Citations
A Multi-Leveled Approach to Intrusion Detection and the Insider Threat
(Articles)
Rita M. Barrios
Journal of Information Security
Vol.4 No.1
,January 30, 2013
DOI:
10.4236/jis.2013.41007
6,746
Downloads
11,258
Views
Citations
Islanding Protection and Islanding Detection in Low Voltage CIGRE Distribution Network with Distributed Generations
(Articles)
Ghullam Mustafa Bhutto
,
Ehsan Ali
,
Jagdesh Kumar
,
Muhammad Akram Bhayo
Smart Grid and Renewable Energy
Vol.5 No.6
,June 23, 2014
DOI:
10.4236/sgre.2014.56014
4,233
Downloads
6,429
Views
Citations
Scalable Distributed File Sharing System: A Robust Strategy for a Reliable Networked Environment in Tertiary Institutions
(Articles)
Emmanuel N. Ekwonwune
,
Bright U. Ezeoha
Int'l J. of Communications, Network and System Sciences
Vol.12 No.4
,April 30, 2019
DOI:
10.4236/ijcns.2019.124005
851
Downloads
2,330
Views
Citations
Forensic odontostomatology
(Articles)
Geoffrey H. Sperber
Forensic Medicine and Anatomy Research
Vol.1 No.4
,October 9, 2013
DOI:
10.4236/fmar.2013.14019
4,402
Downloads
8,985
Views
Citations
Extended Oracle Properties of Adaptive Lasso Estimators
(Articles)
Lorenzo Camponovo
Open Journal of Statistics
Vol.12 No.2
,April 18, 2022
DOI:
10.4236/ojs.2022.122015
105
Downloads
612
Views
Citations
The Anatomy of Working Memory and Its Utility in Criminal Investigations
(Articles)
J. Adam Park
Open Journal of Social Sciences
Vol.5 No.8
,August 30, 2017
DOI:
10.4236/jss.2017.58021
1,325
Downloads
5,890
Views
Citations
A Forensic Investigation of Terrorism in Nigeria: An Apriori Algorithm Approach
(Articles)
Aamo Iorliam
,
Raymond U. Dugeri
,
Beatrice O. Akumba
,
Samera Otor
Journal of Information Security
Vol.12 No.4
,October 20, 2021
DOI:
10.4236/jis.2021.124015
245
Downloads
1,461
Views
Citations
Trusted Blockchain Oracle Scheme Based on Aggregate Signature
(Articles)
Xiaodong Liu
,
Jun Feng
Journal of Computer and Communications
Vol.9 No.3
,March 30, 2021
DOI:
10.4236/jcc.2021.93007
666
Downloads
2,424
Views
Citations
Discussion on the Information Collection Methods of Public Health Emergency Files
(Articles)
Wenni Wang
,
Miaoying Lin
,
Wenpan Song
,
Fucai Huang
,
Baiyi Wang
Open Journal of Preventive Medicine
Vol.11 No.7
,July 22, 2021
DOI:
10.4236/ojpm.2021.117026
230
Downloads
736
Views
Citations
God and Dionysus: Oedipus’ Invincible Destiny
(Articles)
Wenjing Lu
Advances in Literary Study
Vol.10 No.3
,July 13, 2022
DOI:
10.4236/als.2022.103023
133
Downloads
1,752
Views
Citations
Intelligent Biometric Information Management
(Articles)
Harry Wechsler
Intelligent Information Management
Vol.2 No.9
,October 13, 2010
DOI:
10.4236/iim.2010.29060
5,851
Downloads
10,259
Views
Citations
Estimating age of Brazilians using the methods of Demirjian and Nicodemo, Moraes and Médici: A comparative analysis
(Articles)
Ricarda Duarte da Silva
,
Marcos André Duarte da Silva
,
Aline Yumi Uezono
,
Simone Borges Braga dos Santos Queiroz
,
Rogério Nogueira de Oliveira
Forensic Medicine and Anatomy Research
Vol.1 No.3
,July 11, 2013
DOI:
10.4236/fmar.2013.13011
4,987
Downloads
8,930
Views
Citations
Video Inter-Frame Forgery Identification Based on Consistency of Correlation Coefficients of Gray Values
(Articles)
Qi Wang
,
Zhaohong Li
,
Zhenzhen Zhang
,
Qinglong Ma
Journal of Computer and Communications
Vol.2 No.4
,March 18, 2014
DOI:
10.4236/jcc.2014.24008
4,041
Downloads
5,816
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top