Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Data Integrity and Risk
(Articles)
Sasidhar Duggineni
Open Journal of Optimization
Vol.12 No.2
,June 7, 2023
DOI:
10.4236/ojop.2023.122003
884
Downloads
6,320
Views
Citations
Designing a Comprehensive Data Governance Maturity Model for Kenya Ministry of Defence
(Articles)
Gilly Gitahi Gathogo
,
Simon Maina Karume
,
Josphat Karani
Journal of Information Security
Vol.16 No.1
,November 27, 2024
DOI:
10.4236/jis.2025.161002
70
Downloads
454
Views
Citations
Cyber Resilience through Real-Time Threat Analysis in Information Security
(Articles)
Aparna Gadhi
,
Ragha Madhavi Gondu
,
Hitendra Chaudhary
,
Olatunde Abiona
Int'l J. of Communications, Network and System Sciences
Vol.17 No.4
,April 30, 2024
DOI:
10.4236/ijcns.2024.174004
223
Downloads
953
Views
Citations
Petroleum Data Governance and Its Impact on Corporate Performance
—The Case of Petroleum Company
(Articles)
Nonye Peter Awurum
Open Access Library Journal
Vol.12 No.1
,January 23, 2025
DOI:
10.4236/oalib.1112360
31
Downloads
294
Views
Citations
Secure Cloud Based Approach for Mobile Devices User Data
(Articles)
Oscar Mbae
,
David Mwathi
,
Edna Too
Open Access Library Journal
Vol.9 No.9
,September 27, 2022
DOI:
10.4236/oalib.1109264
91
Downloads
915
Views
Citations
Classification of Big Data Security Based on Ontology Web Language
(Articles)
Alsadig Mohammed Adam Abdallah
,
Amir Mohamed Talib
Journal of Information Security
Vol.14 No.1
,January 31, 2023
DOI:
10.4236/jis.2023.141006
226
Downloads
971
Views
Citations
Developing a Multi-Layer Strategy for Securing Control Systems of Oil Refineries
(Articles)
Musaria K. Mahmood
,
Fawzi M. Al-Naima
Wireless Sensor Network
Vol.2 No.7
,July 9, 2010
DOI:
10.4236/wsn.2010.27064
5,729
Downloads
10,818
Views
Citations
Security Framework for Managing Data Security within Point of Care Tests
(Articles)
Sivanesan Tulasidas
,
Ruth Mackay
,
Chris Hudson
,
Wamadeva Balachandran
Journal of Software Engineering and Applications
Vol.10 No.2
,February 24, 2017
DOI:
10.4236/jsea.2017.102011
1,892
Downloads
3,675
Views
Citations
A Multilayer Security Framework for Cloud Computing in Internet of Things (IoT) Domain
(Articles)
M. Mamun-Ibn-Abdullah
,
M. Humayun Kabir
Journal of Computer and Communications
Vol.9 No.7
,July 27, 2021
DOI:
10.4236/jcc.2021.97004
433
Downloads
2,138
Views
Citations
Flaws in the Field of Digital Security in the Workplace: Case of Companies in Burkina Faso
(Articles)
Yanogo Kiswendsida Jean Hermann
,
Ouedraogo Tounwendyam Frederic
Open Journal of Applied Sciences
Vol.12 No.12
,December 29, 2022
DOI:
10.4236/ojapps.2022.1212146
142
Downloads
579
Views
Citations
Addressing the Security Challenges of Big Data Analytics in Healthcare Research
(Articles)
Mohamed Sami Rakha
,
Lucas Lapczyk
,
Costa Dafnas
,
Patrick Martin
Int'l J. of Communications, Network and System Sciences
Vol.15 No.8
,August 3, 2022
DOI:
10.4236/ijcns.2022.158009
432
Downloads
2,695
Views
Citations
Data Security Issues and Challenges in Cloud Computing: A Conceptual Analysis and Review
(Articles)
Osama Harfoushi
,
Bader Alfawwaz
,
Nazeeh A. Ghatasheh
,
Ruba Obiedat
,
Mua’ad M. Abu-Faraj
,
Hossam Faris
Communications and Network
Vol.6 No.1
,February 13, 2014
DOI:
10.4236/cn.2014.61003
14,855
Downloads
29,850
Views
Citations
The Failure and Response of Risk Prevention Regulations: Taking Privacy Computing as an Example
(Articles)
Xinhui Liu
Open Journal of Social Sciences
Vol.11 No.11
,November 30, 2023
DOI:
10.4236/jss.2023.1111035
90
Downloads
302
Views
Citations
Breach Notification in the General Data Protection Regulation
(Articles)
M’Bia Hortense De-Yolande
,
Théo Doh-Djanhoundji
,
Gabo Yves Constant
Voice of the Publisher
Vol.9 No.4
,December 26, 2023
DOI:
10.4236/vp.2023.94026
200
Downloads
1,122
Views
Citations
Security and Optimization Challenges of Green Data Centers
(Articles)
Arif Sari
,
Murat Akkaya
Int'l J. of Communications, Network and System Sciences
Vol.8 No.12
,December 17, 2015
DOI:
10.4236/ijcns.2015.812044
5,942
Downloads
7,802
Views
Citations
This article belongs to the Special Issue on
Big Data and Cloud Computing Challenges
Towards the Development of Best Data Security for Big Data
(Articles)
Yuan Tian
Communications and Network
Vol.9 No.4
,November 30, 2017
DOI:
10.4236/cn.2017.94020
1,883
Downloads
5,265
Views
Citations
Sensitive Information Security Based on Elliptic Curves
(Articles)
Nadine Nibigira
,
Vincent Havyarimana
,
Zhu Xiao
World Journal of Engineering and Technology
Vol.12 No.2
,April 23, 2024
DOI:
10.4236/wjet.2024.122018
128
Downloads
550
Views
Citations
Reactive Data Security Approach and Review of Data Security Techniques in Wireless Networks
(Articles)
Arif Sari
,
Mehmet Karay
Int'l J. of Communications, Network and System Sciences
Vol.8 No.13
,December 30, 2015
DOI:
10.4236/ijcns.2015.813051
4,047
Downloads
5,221
Views
Citations
Analysis of Secured Cloud Data Storage Model for Information
(Articles)
Emmanuel Nwabueze Ekwonwune
,
Udo Chukwuebuka Chigozie
,
Duroha Austin Ekekwe
,
Georgina Chekwube Nwankwo
Journal of Software Engineering and Applications
Vol.17 No.5
,May 28, 2024
DOI:
10.4236/jsea.2024.175017
139
Downloads
621
Views
Citations
Effective and Extensive Virtual Private Network
(Articles)
Tarek S. Sobh
,
Yasser Aly
Journal of Information Security
Vol.2 No.1
,January 31, 2011
DOI:
10.4236/jis.2011.21004
7,401
Downloads
15,740
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top