Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Developing a Multi-Layer Strategy for Securing Control Systems of Oil Refineries
(Articles)
Musaria K. Mahmood
,
Fawzi M. Al-Naima
Wireless Sensor Network
Vol.2 No.7
,July 9, 2010
DOI:
10.4236/wsn.2010.27064
5,755
Downloads
10,885
Views
Citations
Security Framework for Managing Data Security within Point of Care Tests
(Articles)
Sivanesan Tulasidas
,
Ruth Mackay
,
Chris Hudson
,
Wamadeva Balachandran
Journal of Software Engineering and Applications
Vol.10 No.2
,February 24, 2017
DOI:
10.4236/jsea.2017.102011
1,907
Downloads
3,746
Views
Citations
A Multilayer Security Framework for Cloud Computing in Internet of Things (IoT) Domain
(Articles)
M. Mamun-Ibn-Abdullah
,
M. Humayun Kabir
Journal of Computer and Communications
Vol.9 No.7
,July 27, 2021
DOI:
10.4236/jcc.2021.97004
445
Downloads
2,213
Views
Citations
Flaws in the Field of Digital Security in the Workplace: Case of Companies in Burkina Faso
(Articles)
Yanogo Kiswendsida Jean Hermann
,
Ouedraogo Tounwendyam Frederic
Open Journal of Applied Sciences
Vol.12 No.12
,December 29, 2022
DOI:
10.4236/ojapps.2022.1212146
158
Downloads
659
Views
Citations
Addressing the Security Challenges of Big Data Analytics in Healthcare Research
(Articles)
Mohamed Sami Rakha
,
Lucas Lapczyk
,
Costa Dafnas
,
Patrick Martin
Int'l J. of Communications, Network and System Sciences
Vol.15 No.8
,August 3, 2022
DOI:
10.4236/ijcns.2022.158009
454
Downloads
2,819
Views
Citations
Optimizing Healthcare Outcomes through Data-Driven Predictive Modeling
(Articles)
Md Nagib Mahfuz Sunny
,
Mohammad Balayet Hossain Sakil
,
Abdullah Al Nahian
,
Syed Walid Ahmed
,
Md Newaz Shorif
,
Jennet Atayeva
Journal of Intelligent Learning Systems and Applications
Vol.16 No.4
,October 22, 2024
DOI:
10.4236/jilsa.2024.164019
214
Downloads
2,004
Views
Citations
Enhancing Predictive Analytics for Healthcare: Addressing Limitations and Proposing Advanced Solutions
(Articles)
Rohan Desai
Journal of Intelligent Learning Systems and Applications
Vol.17 No.1
,February 14, 2025
DOI:
10.4236/jilsa.2025.171004
90
Downloads
475
Views
Citations
Data Security Issues and Challenges in Cloud Computing: A Conceptual Analysis and Review
(Articles)
Osama Harfoushi
,
Bader Alfawwaz
,
Nazeeh A. Ghatasheh
,
Ruba Obiedat
,
Mua’ad M. Abu-Faraj
,
Hossam Faris
Communications and Network
Vol.6 No.1
,February 13, 2014
DOI:
10.4236/cn.2014.61003
14,908
Downloads
30,027
Views
Citations
Computer Assisted Alerts Using Mental Model Approach for Customer Service Improvement
(Articles)
Abid Ghaffar
,
Mohamed Ridza Wahiddin
,
Asadullah Shaikh
Journal of Software Engineering and Applications
Vol.6 No.5B
,October 12, 2013
DOI:
10.4236/jsea.2013.65B005
3,835
Downloads
5,533
Views
Citations
A Systematic Approach for Cyber Security in Vehicular Networks
(Articles)
Farhan Ahmad
,
Asma Adnane
,
Virginia N. L. Franqueira
Journal of Computer and Communications
Vol.4 No.16
,December 29, 2016
DOI:
10.4236/jcc.2016.416004
2,335
Downloads
6,431
Views
Citations
This article belongs to the Special Issue on
Vehicular Communications and Networks
Security Analysis of a Privacy-Preserving Identity-Based Encryption Architecture
(Articles)
Carlisle Adams
Journal of Information Security
Vol.13 No.4
,October 12, 2022
DOI:
10.4236/jis.2022.134018
228
Downloads
1,259
Views
Citations
This article belongs to the Special Issue on
Cryptography and Network Security
Architecting SuperApps: Microservices vs. Mini-Apps Container Models
—Technical Frameworks for Managing Scalability, Modularity, and Security in SuperApps
(Articles)
Zaki Ali Bayashot
Journal of Software Engineering and Applications
Vol.18 No.7
,July 25, 2025
DOI:
10.4236/jsea.2025.187017
50
Downloads
311
Views
Citations
Security and Optimization Challenges of Green Data Centers
(Articles)
Arif Sari
,
Murat Akkaya
Int'l J. of Communications, Network and System Sciences
Vol.8 No.12
,December 17, 2015
DOI:
10.4236/ijcns.2015.812044
5,958
Downloads
7,875
Views
Citations
This article belongs to the Special Issue on
Big Data and Cloud Computing Challenges
Towards the Development of Best Data Security for Big Data
(Articles)
Yuan Tian
Communications and Network
Vol.9 No.4
,November 30, 2017
DOI:
10.4236/cn.2017.94020
1,905
Downloads
5,362
Views
Citations
Sensitive Information Security Based on Elliptic Curves
(Articles)
Nadine Nibigira
,
Vincent Havyarimana
,
Zhu Xiao
World Journal of Engineering and Technology
Vol.12 No.2
,April 23, 2024
DOI:
10.4236/wjet.2024.122018
148
Downloads
639
Views
Citations
Utilizing AI Text Checkers: Case Studies and Implications
(Articles)
Robb Shawe
International Journal of Intelligence Science
Vol.15 No.3
,July 24, 2025
DOI:
10.4236/ijis.2025.153007
41
Downloads
232
Views
Citations
Data Integrity and Risk
(Articles)
Sasidhar Duggineni
Open Journal of Optimization
Vol.12 No.2
,June 7, 2023
DOI:
10.4236/ojop.2023.122003
956
Downloads
6,751
Views
Citations
Ending Privacy’s Gremlin: Stopping the Data-Broker Loophole to the Fourth Amendment’s Search Warrant Requirement
(Articles)
Samantha B. Larkin
,
Shakour Abuzneid
Journal of Information Security
Vol.15 No.4
,October 29, 2024
DOI:
10.4236/jis.2024.154033
94
Downloads
626
Views
Citations
Reactive Data Security Approach and Review of Data Security Techniques in Wireless Networks
(Articles)
Arif Sari
,
Mehmet Karay
Int'l J. of Communications, Network and System Sciences
Vol.8 No.13
,December 30, 2015
DOI:
10.4236/ijcns.2015.813051
4,067
Downloads
5,295
Views
Citations
An Extensive Study and Review of Privacy Preservation Models for the Multi-Institutional Data
(Articles)
Sagarkumar Patel
,
Rachna Patel
,
Ashok Akbari
,
Srinivasa Reddy Mukkala
Journal of Information Security
Vol.14 No.4
,October 10, 2023
DOI:
10.4236/jis.2023.144020
206
Downloads
884
Views
Citations
<
...
3
4
5
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top