Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Security Framework for Managing Data Security within Point of Care Tests
(Articles)
Sivanesan Tulasidas
,
Ruth Mackay
,
Chris Hudson
,
Wamadeva Balachandran
Journal of Software Engineering and Applications
Vol.10 No.2
,February 24, 2017
DOI:
10.4236/jsea.2017.102011
1,898
Downloads
3,700
Views
Citations
A Multilayer Security Framework for Cloud Computing in Internet of Things (IoT) Domain
(Articles)
M. Mamun-Ibn-Abdullah
,
M. Humayun Kabir
Journal of Computer and Communications
Vol.9 No.7
,July 27, 2021
DOI:
10.4236/jcc.2021.97004
438
Downloads
2,160
Views
Citations
Flaws in the Field of Digital Security in the Workplace: Case of Companies in Burkina Faso
(Articles)
Yanogo Kiswendsida Jean Hermann
,
Ouedraogo Tounwendyam Frederic
Open Journal of Applied Sciences
Vol.12 No.12
,December 29, 2022
DOI:
10.4236/ojapps.2022.1212146
143
Downloads
598
Views
Citations
Optimizing Healthcare Outcomes through Data-Driven Predictive Modeling
(Articles)
Md Nagib Mahfuz Sunny
,
Mohammad Balayet Hossain Sakil
,
Abdullah Al Nahian
,
Syed Walid Ahmed
,
Md Newaz Shorif
,
Jennet Atayeva
Journal of Intelligent Learning Systems and Applications
Vol.16 No.4
,October 22, 2024
DOI:
10.4236/jilsa.2024.164019
192
Downloads
1,766
Views
Citations
Enhancing Predictive Analytics for Healthcare: Addressing Limitations and Proposing Advanced Solutions
(Articles)
Rohan Desai
Journal of Intelligent Learning Systems and Applications
Vol.17 No.1
,February 14, 2025
DOI:
10.4236/jilsa.2025.171004
59
Downloads
356
Views
Citations
Addressing the Security Challenges of Big Data Analytics in Healthcare Research
(Articles)
Mohamed Sami Rakha
,
Lucas Lapczyk
,
Costa Dafnas
,
Patrick Martin
Int'l J. of Communications, Network and System Sciences
Vol.15 No.8
,August 3, 2022
DOI:
10.4236/ijcns.2022.158009
436
Downloads
2,729
Views
Citations
Data Security Issues and Challenges in Cloud Computing: A Conceptual Analysis and Review
(Articles)
Osama Harfoushi
,
Bader Alfawwaz
,
Nazeeh A. Ghatasheh
,
Ruba Obiedat
,
Mua’ad M. Abu-Faraj
,
Hossam Faris
Communications and Network
Vol.6 No.1
,February 13, 2014
DOI:
10.4236/cn.2014.61003
14,861
Downloads
29,882
Views
Citations
Computer Assisted Alerts Using Mental Model Approach for Customer Service Improvement
(Articles)
Abid Ghaffar
,
Mohamed Ridza Wahiddin
,
Asadullah Shaikh
Journal of Software Engineering and Applications
Vol.6 No.5B
,October 12, 2013
DOI:
10.4236/jsea.2013.65B005
3,814
Downloads
5,481
Views
Citations
A Systematic Approach for Cyber Security in Vehicular Networks
(Articles)
Farhan Ahmad
,
Asma Adnane
,
Virginia N. L. Franqueira
Journal of Computer and Communications
Vol.4 No.16
,December 29, 2016
DOI:
10.4236/jcc.2016.416004
2,291
Downloads
6,330
Views
Citations
This article belongs to the Special Issue on
Vehicular Communications and Networks
Security Analysis of a Privacy-Preserving Identity-Based Encryption Architecture
(Articles)
Carlisle Adams
Journal of Information Security
Vol.13 No.4
,October 12, 2022
DOI:
10.4236/jis.2022.134018
217
Downloads
1,222
Views
Citations
This article belongs to the Special Issue on
Cryptography and Network Security
Architecting SuperApps: Microservices vs. Mini-Apps Container Models
—Technical Frameworks for Managing Scalability, Modularity, and Security in SuperApps
(Articles)
Zaki Ali Bayashot
Journal of Software Engineering and Applications
Vol.18 No.7
,July 25, 2025
DOI:
10.4236/jsea.2025.187017
8
Downloads
47
Views
Citations
Security and Optimization Challenges of Green Data Centers
(Articles)
Arif Sari
,
Murat Akkaya
Int'l J. of Communications, Network and System Sciences
Vol.8 No.12
,December 17, 2015
DOI:
10.4236/ijcns.2015.812044
5,947
Downloads
7,827
Views
Citations
This article belongs to the Special Issue on
Big Data and Cloud Computing Challenges
Towards the Development of Best Data Security for Big Data
(Articles)
Yuan Tian
Communications and Network
Vol.9 No.4
,November 30, 2017
DOI:
10.4236/cn.2017.94020
1,886
Downloads
5,287
Views
Citations
Sensitive Information Security Based on Elliptic Curves
(Articles)
Nadine Nibigira
,
Vincent Havyarimana
,
Zhu Xiao
World Journal of Engineering and Technology
Vol.12 No.2
,April 23, 2024
DOI:
10.4236/wjet.2024.122018
138
Downloads
581
Views
Citations
Utilizing AI Text Checkers: Case Studies and Implications
(Articles)
Robb Shawe
International Journal of Intelligence Science
Vol.15 No.3
,July 24, 2025
DOI:
10.4236/ijis.2025.153007
7
Downloads
48
Views
Citations
Data Integrity and Risk
(Articles)
Sasidhar Duggineni
Open Journal of Optimization
Vol.12 No.2
,June 7, 2023
DOI:
10.4236/ojop.2023.122003
909
Downloads
6,451
Views
Citations
Ending Privacy’s Gremlin: Stopping the Data-Broker Loophole to the Fourth Amendment’s Search Warrant Requirement
(Articles)
Samantha B. Larkin
,
Shakour Abuzneid
Journal of Information Security
Vol.15 No.4
,October 29, 2024
DOI:
10.4236/jis.2024.154033
82
Downloads
538
Views
Citations
Reactive Data Security Approach and Review of Data Security Techniques in Wireless Networks
(Articles)
Arif Sari
,
Mehmet Karay
Int'l J. of Communications, Network and System Sciences
Vol.8 No.13
,December 30, 2015
DOI:
10.4236/ijcns.2015.813051
4,053
Downloads
5,243
Views
Citations
An Extensive Study and Review of Privacy Preservation Models for the Multi-Institutional Data
(Articles)
Sagarkumar Patel
,
Rachna Patel
,
Ashok Akbari
,
Srinivasa Reddy Mukkala
Journal of Information Security
Vol.14 No.4
,October 10, 2023
DOI:
10.4236/jis.2023.144020
189
Downloads
822
Views
Citations
Cybersecurity and Privacy Protection in Vehicular Networks (VANETs)
(Articles)
Bruno Macena
,
Celio Albuquerque
,
Raphael Machado
Advances in Internet of Things
Vol.13 No.4
,October 30, 2023
DOI:
10.4236/ait.2023.134006
301
Downloads
1,566
Views
Citations
<
...
3
4
5
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top