Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Cybersecurity and Privacy Protection in Vehicular Networks (VANETs)
(Articles)
Bruno Macena
,
Celio Albuquerque
,
Raphael Machado
Advances in Internet of Things
Vol.13 No.4
,October 30, 2023
DOI:
10.4236/ait.2023.134006
331
Downloads
1,692
Views
Citations
Navigating Human Rights in the Digital Age: An Exploration of Data Protection Laws in Brazil and in Europe
(Articles)
Gabriel Oliveira de Aguiar Borges
Beijing Law Review
Vol.14 No.4
,December 1, 2023
DOI:
10.4236/blr.2023.144098
159
Downloads
703
Views
Citations
This article belongs to the Special Issue on
Law and Human Rights
The Intersection of Privacy by Design and Behavioral Economics: Nudging Users towards Privacy-Friendly Choices
(Articles)
Vivek Kumar Agarwal
Journal of Information Security
Vol.15 No.4
,October 24, 2024
DOI:
10.4236/jis.2024.154031
70
Downloads
459
Views
Citations
Reviewing the New AI Paradigm in Property and Casualty Insurance
(Articles)
Muhammad Imran Sajid
Open Journal of Applied Sciences
Vol.15 No.2
,February 25, 2025
DOI:
10.4236/ojapps.2025.152031
83
Downloads
568
Views
Citations
Federated Learning for Treatment Response Prediction in Bipolar Disorder: A Simulation-Based Institutional Study
(Articles)
Rocco de Filippis
,
Abdullah Al Foysal
Open Access Library Journal
Vol.12 No.8
,August 18, 2025
DOI:
10.4236/oalib.1113954
16
Downloads
111
Views
Citations
Analysis of Secured Cloud Data Storage Model for Information
(Articles)
Emmanuel Nwabueze Ekwonwune
,
Udo Chukwuebuka Chigozie
,
Duroha Austin Ekekwe
,
Georgina Chekwube Nwankwo
Journal of Software Engineering and Applications
Vol.17 No.5
,May 28, 2024
DOI:
10.4236/jsea.2024.175017
158
Downloads
737
Views
Citations
Effective and Extensive Virtual Private Network
(Articles)
Tarek S. Sobh
,
Yasser Aly
Journal of Information Security
Vol.2 No.1
,January 31, 2011
DOI:
10.4236/jis.2011.21004
7,448
Downloads
15,951
Views
Citations
Managing Social Security Data in the Web 2.0 Era
(Articles)
Li Luo
,
Hongyan Yang
,
Xuhui Li
iBusiness
Vol.4 No.3
,September 27, 2012
DOI:
10.4236/ib.2012.43028
4,627
Downloads
7,309
Views
Citations
New Proposed Robust, Scalable and Secure Network Cloud Computing Storage Architecture
(Articles)
Fawaz S. Al-Anzi
,
Ayed A. Salman
,
Noby K. Jacob
Journal of Software Engineering and Applications
Vol.7 No.5
,May 6, 2014
DOI:
10.4236/jsea.2014.75031
5,218
Downloads
7,394
Views
Citations
Data Compression for Next Generation Phasor Data Concentrators (PDCs) in a Smart Grid
(Articles)
Erwan Olivo
,
Mitch Campion
,
Prakash Ranganathan
Journal of Information Security
Vol.7 No.5
,September 14, 2016
DOI:
10.4236/jis.2016.75024
1,635
Downloads
3,152
Views
Citations
Implementation of Machine Learning Method for the Detection and Prevention of Attack in Supervised Network
(Articles)
Patrick Dany Bavoua Kenfack
,
Fabrice Kwefeu Mbakop
,
Edward Eyong-Ebai
Open Access Library Journal
Vol.8 No.12
,December 30, 2021
DOI:
10.4236/oalib.1108000
225
Downloads
1,767
Views
Citations
Securing User Authentication with Server-Side Voice Verification
(Articles)
Deepak R. Chandran
,
Sanath Kumar
,
S. Deepashri
Journal of Computer and Communications
Vol.11 No.5
,May 30, 2023
DOI:
10.4236/jcc.2023.115010
189
Downloads
896
Views
Citations
Systematic Review: Analysis of Coding Vulnerabilities across Languages
(Articles)
Shreyas Sakharkar
Journal of Information Security
Vol.14 No.4
,September 28, 2023
DOI:
10.4236/jis.2023.144019
386
Downloads
3,269
Views
Citations
An Analysis of Digital Records and Their Juridical Ramifications: Bangladesh Perspective
(Articles)
Mohammad Khabbab Taki
Beijing Law Review
Vol.14 No.4
,December 7, 2023
DOI:
10.4236/blr.2023.144106
141
Downloads
657
Views
Citations
A Review of Cybersecurity Challenges in Small Business: The Imperative for a Future Governance Framework
(Articles)
Binita Saha
,
Zahid Anwar
Journal of Information Security
Vol.15 No.1
,January 15, 2024
DOI:
10.4236/jis.2024.151003
969
Downloads
8,669
Views
Citations
Optimizing Network Security via Ensemble Learning: A Nexus with Intrusion Detection
(Articles)
Anu Baluguri
,
Vasudha Pasumarthy
,
Indranil Roy
,
Bidyut Gupta
,
Nick Rahimi
Journal of Information Security
Vol.15 No.4
,October 22, 2024
DOI:
10.4236/jis.2024.154030
88
Downloads
876
Views
Citations
Development of the Software Application with Graphical User Interface for One Model Cyber Security
(Articles)
Ramaz R. Shamugia
Int'l J. of Communications, Network and System Sciences
Vol.12 No.12
,December 13, 2019
DOI:
10.4236/ijcns.2019.1212014
816
Downloads
1,949
Views
Citations
Data Security of Mobile Cloud Computing on Cloud Server
(Articles)
Mohammad Waseem
,
Abdullah Lakhan
,
Irfan Ali Jamali
Open Access Library Journal
Vol.3 No.4
,April 28, 2016
DOI:
10.4236/oalib.1102377
1,866
Downloads
8,737
Views
Citations
A Security Architecture for SCADA Systems
(Articles)
Arun Velagapalli
,
Mahalingam Ramkumar
Journal of Information Security
Vol.9 No.1
,January 23, 2018
DOI:
10.4236/jis.2018.91009
1,464
Downloads
4,028
Views
Citations
Protecting LLMs against Privacy Attacks While Preserving Utility
(Articles)
Gunika Dhingra
,
Saumil Sood
,
Zeba Mohsin Wase
,
Arshdeep Bahga
,
Vijay K. Madisetti
Journal of Information Security
Vol.15 No.4
,September 20, 2024
DOI:
10.4236/jis.2024.154026
143
Downloads
997
Views
Citations
<
...
4
5
6
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top