Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
The G5 Sahel: Security Implementation and Challenges
(Articles)
Alassane Camara
Open Journal of Political Science
Vol.10 No.3
,July 10, 2020
DOI:
10.4236/ojps.2020.103030
1,196
Downloads
3,475
Views
Citations
Maximizing Security Operations to Promote Socio-Economic Development in Mining Firms in Ghana
(Articles)
Daniel Ofori
,
Ambrose Amoah-Ashyiah
,
Benjamin Adjei Dankwah
,
Stephen Yeboah
,
Kakraba Ben Komla
,
Maxwell Acheampong
,
Kwadwo Kyei Ofori
,
Michael Oppong
iBusiness
Vol.14 No.4
,November 21, 2022
DOI:
10.4236/ib.2022.144015
202
Downloads
1,036
Views
Citations
Quality and Safety in the Phlebotomy Units of Medical Structures in Lubumbashi
(Articles)
Eric Kasamba Ilunga
,
Athy Kalumba Kambote
,
Philomene Katende Masanka
,
Emmanuel Prosper Malangu Mposhy
Open Access Library Journal
Vol.10 No.4
,April 24, 2023
DOI:
10.4236/oalib.1109966
103
Downloads
1,104
Views
Citations
The Impact of Cyber Security on Business: How to Protect Your Business
(Articles)
Emiles Mbungu Kala
Open Journal of Safety Science and Technology
Vol.13 No.2
,June 30, 2023
DOI:
10.4236/ojsst.2023.132003
970
Downloads
9,975
Views
Citations
Cybersecurity Requirements for Management Information Systems
(Articles)
Nadia K. Samara
Journal of Information Security
Vol.14 No.3
,July 20, 2023
DOI:
10.4236/jis.2023.143013
440
Downloads
3,356
Views
Citations
Critical Role of Cyber Security in Global Economy
(Articles)
Emile S. Mbungu Kala
Open Journal of Safety Science and Technology
Vol.13 No.4
,December 25, 2023
DOI:
10.4236/ojsst.2023.134012
352
Downloads
3,572
Views
Citations
An Evaluation Approach of Subjective Trust Based on Cloud Model
(Articles)
Shouxin Wang
,
Li Zhang
,
Na Ma
,
Shuai Wang
Journal of Software Engineering and Applications
Vol.1 No.1
,December 9, 2008
DOI:
10.4236/jsea.2008.11007
6,392
Downloads
12,481
Views
Citations
Radio Wave Propagation Characteristics in FMCW Radar
(Articles)
Ghada M. SAMI
Journal of Electromagnetic Analysis and Applications
Vol.1 No.4
,December 31, 2009
DOI:
10.4236/jemaa.2009.14042
8,999
Downloads
15,546
Views
Citations
The Clouds Microstructure and the Rain Stimulation by Acoustic Waves
(Articles)
Ovik Nalbandyan
Atmospheric and Climate Sciences
Vol.1 No.3
,July 21, 2011
DOI:
10.4236/acs.2011.13009
4,274
Downloads
8,294
Views
Citations
IaaS Public Cloud Computing Platform Scheduling Model and Optimization Analysis
(Articles)
Aobing Sun
,
Tongkai Ji
,
Qiang Yue
,
Feiya Xiong
Int'l J. of Communications, Network and System Sciences
Vol.4 No.12A
,December 22, 2011
DOI:
10.4236/ijcns.2011.432098
6,987
Downloads
14,372
Views
Citations
This article belongs to the Special Issue on
Cloud Computing
Smart System Resource Monitoring in Cloud
(Articles)
Rich C. Lee
iBusiness
Vol.4 No.1
,March 31, 2012
DOI:
10.4236/ib.2012.41005
7,461
Downloads
11,596
Views
Citations
Efficient Use of Cloud Computing in Medical Science
(Articles)
Tejaswi Avula
,
Manoj Kumar Nela
,
Radhika Gudapati
,
Sreenivas Velagapudi
American Journal of Computational Mathematics
Vol.2 No.3
,September 28, 2012
DOI:
10.4236/ajcm.2012.23032
6,577
Downloads
13,116
Views
Citations
Finding Optimal Allocation of Constrained Cloud Capacity Using Hyperbolic Voronoi Diagrams on the Sphere
(Articles)
Shanthi Shanmugam
,
Caroline Shouraboura
Intelligent Information Management
Vol.4 No.5A
,October 30, 2012
DOI:
10.4236/iim.2012.425035
6,484
Downloads
8,741
Views
Citations
This article belongs to the Special Issue on
Information System and Management
Emerging Issues & Challenges in Cloud Computing—A Hybrid Approach
(Articles)
Yaser Ghanam
,
Jennifer Ferreira
,
Frank Maurer
Journal of Software Engineering and Applications
Vol.5 No.11A
,November 30, 2012
DOI:
10.4236/jsea.2012.531107
15,334
Downloads
29,784
Views
Citations
This article belongs to the Special Issue on
Cloud Computing
Research on Architecture of Logistics Public Information Platform
(Articles)
Zhen Yu
,
Gui-Cheng Shen
,
Bing-Wu Liu
Intelligent Information Management
Vol.4 No.6
,November 30, 2012
DOI:
10.4236/iim.2012.46044
6,319
Downloads
10,534
Views
Citations
Regulatory Privacy Protection for Biomedical Cloud Computing
(Articles)
Y. Tony Yang
,
Kari Borg
Beijing Law Review
Vol.3 No.4
,December 13, 2012
DOI:
10.4236/blr.2012.34020
4,840
Downloads
8,206
Views
Citations
A Application of Cloud Computing and IOT in Logistics
(Articles)
Dongxin Lu
,
Qi Teng
Journal of Software Engineering and Applications
Vol.5 No.12B
,January 25, 2013
DOI:
10.4236/jsea.2012.512B039
8,299
Downloads
16,033
Views
Citations
K-Gram Based Fuzzy Keyword Search over Encrypted Cloud Computing
(Articles)
Wei Zhou
,
Lixi Liu
,
He Jing
,
Chi Zhang
,
Shaowen Yao
,
Shipu Wang
Journal of Software Engineering and Applications
Vol.6 No.1
,January 30, 2013
DOI:
10.4236/jsea.2013.61004
6,501
Downloads
11,178
Views
Citations
Technology of Secure File Archiving in the Uniformly Random Distributed Archive Scheme
(Articles)
Ahmed Tallat
,
Hiroshi Yasuda
,
Kilho Shin
Journal of Information Security
Vol.4 No.1
,January 30, 2013
DOI:
10.4236/jis.2013.41006
3,459
Downloads
6,104
Views
Citations
TCLOUD: A New Model of Data Storage Providing Public Verifiability and Dynamic Data Recovery for Cloud Computing
(Articles)
Sultan Ullah
,
Xuefeng Zheng
,
Feng Zhou
Journal of Software Engineering and Applications
Vol.6 No.3B
,April 10, 2013
DOI:
10.4236/jsea.2013.63B006
4,526
Downloads
6,801
Views
Citations
<
...
4
5
6
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top