Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Biometrics as a Matrix: The Short Distance between Crime and Security Systems, Prompting an Artificial Intelligence to Invent Electronic Biometrics ID!
(Articles)
Ahmed Laarfi
International Journal of Intelligence Science
Vol.12 No.1
,January 11, 2022
DOI:
10.4236/ijis.2022.121001
192
Downloads
895
Views
Citations
A Comparative Analysis of the Current Status and Trends of Domestic and International Privacy Protection Research—CiteSpace-Based Bibliometric Study (1976-2022)
(Articles)
Yushi Yin
,
Dongphil Chun
,
Zhiying Tang
,
Minghao Huang
Open Journal of Business and Management
Vol.10 No.6
,November 8, 2022
DOI:
10.4236/ojbm.2022.106150
182
Downloads
864
Views
Citations
RETRACTED:
Challenges of Privacy in Cloud Computing
(Articles)
Fatimah Khalil Aljwari
Journal of Computer and Communications
Vol.10 No.12
,December 27, 2022
DOI:
10.4236/jcc.2022.1012004
370
Downloads
4,613
Views
Citations
A Method to Improve the Accuracy of Personal Information Detection
(Articles)
Chih-Chieh Chiu
,
Chu-Sing Yang
,
Ce-Kuen Shieh
Journal of Computer and Communications
Vol.11 No.6
,June 30, 2023
DOI:
10.4236/jcc.2023.116010
118
Downloads
748
Views
Citations
Security Threads and IoT Security
(Articles)
Dona Alkunidry
,
Shahad Alhuwaysi
,
Rawan Alharbi
Journal of Computer and Communications
Vol.11 No.9
,September 28, 2023
DOI:
10.4236/jcc.2023.119005
126
Downloads
1,160
Views
Citations
The Failure and Response of Risk Prevention Regulations: Taking Privacy Computing as an Example
(Articles)
Xinhui Liu
Open Journal of Social Sciences
Vol.11 No.11
,November 30, 2023
DOI:
10.4236/jss.2023.1111035
33
Downloads
114
Views
Citations
Is It Time to Recognize the Right to an Image?
(Articles)
Timothy S. McNamara
Beijing Law Review
Vol.14 No.4
,December 18, 2023
DOI:
10.4236/blr.2023.144117
56
Downloads
227
Views
Citations
Digital Age: Surveillance Culture under Artistic Intervention
(Articles)
Yongxin Li
Advances in Journalism and Communication
Vol.11 No.4
,December 26, 2023
DOI:
10.4236/ajc.2023.114028
75
Downloads
378
Views
Citations
Breach Notification in the General Data Protection Regulation
(Articles)
M’Bia Hortense De-Yolande
,
Théo Doh-Djanhoundji
,
Gabo Yves Constant
Voice of the Publisher
Vol.9 No.4
,December 26, 2023
DOI:
10.4236/vp.2023.94026
60
Downloads
271
Views
Citations
Whispered Tuning: Data Privacy Preservation in Fine-Tuning LLMs through Differential Privacy
(Articles)
Tanmay Singh
,
Harshvardhan Aditya
,
Vijay K. Madisetti
,
Arshdeep Bahga
Journal of Software Engineering and Applications
Vol.17 No.1
,January 23, 2024
DOI:
10.4236/jsea.2024.171001
236
Downloads
1,237
Views
Citations
Software Architecture and Methodology as a Tool for Efficient Software Engineering Process: A Critical Appraisal
(Articles)
Achimugu Philip
,
Babajide Afolabi
,
Oluwaranti Adeniran
,
Gambo Ishaya
,
Oluwagbemi Oluwatolani
Journal of Software Engineering and Applications
Vol.3 No.10
,November 19, 2010
DOI:
10.4236/jsea.2010.310110
6,498
Downloads
11,998
Views
Citations
Temporal Patterns of Software Evolution Defects: A Comparative Analysis of Open Source and Closed Source Projects
(Articles)
Uzma Raja
,
Joanne Elaine Hale
,
David Peter Hale
Journal of Software Engineering and Applications
Vol.4 No.8
,August 2, 2011
DOI:
10.4236/jsea.2011.48058
5,858
Downloads
10,882
Views
Citations
Guidelines Based Software Engineering for Developing Software Components
(Articles)
Muthu Ramachandran
Journal of Software Engineering and Applications
Vol.5 No.1
,December 31, 2011
DOI:
10.4236/jsea.2012.51001
10,400
Downloads
17,119
Views
Citations
Privacy Negotiation in Socio-Technical Systems
(Articles)
Murthy Rallapalli
,
Dinesh Verma
Technology and Investment
Vol.3 No.1
,February 24, 2012
DOI:
10.4236/ti.2012.31003
5,198
Downloads
8,209
Views
Citations
Privacy Policies Considerations in Socio-Technical Systems
(Articles)
Murthy Rallapalli
Technology and Investment
Vol.3 No.2
,May 29, 2012
DOI:
10.4236/ti.2012.32009
4,358
Downloads
6,957
Views
Citations
Privacy Accountability Model and Policy for Security Organizations
(Articles)
Yoel Raban
iBusiness
Vol.4 No.2
,June 20, 2012
DOI:
10.4236/ib.2012.42020
3,651
Downloads
6,018
Views
Citations
Ad Blockers & Online Privacy: A Comparative Analysis of Privacy Enhancing Technologies (PET)
(Articles)
Siddharth M. Madikeri
,
Vijay K. Madisetti
Journal of Software Engineering and Applications
Vol.17 No.5
,May 30, 2024
DOI:
10.4236/jsea.2024.175021
9
Downloads
46
Views
Citations
Cyclomatic Complexity and Lines of Code: Empirical Evidence of a Stable Linear Relationship
(Articles)
Graylin JAY
,
Joanne E. HALE
,
Randy K. SMITH
,
David HALE
,
Nicholas A. KRAFT
,
Charles WARD
Journal of Software Engineering and Applications
Vol.2 No.3
,October 23, 2009
DOI:
10.4236/jsea.2009.23020
14,351
Downloads
29,006
Views
Citations
Software Reliability Early Prediction in Architectural Design Phase: Overview and Limitations
(Articles)
Lalit Kumar Singh
,
Anil Kumar Tripathi
,
Gopika Vinod
Journal of Software Engineering and Applications
Vol.4 No.3
,March 18, 2011
DOI:
10.4236/jsea.2011.43020
6,314
Downloads
12,091
Views
Citations
A New Software Reliability Growth Model: Genetic-Programming-Based Approach
(Articles)
Zainab ALRahamneh
,
Mohammad Reyalat
,
Alaa F. Sheta
,
Sulieman Bani-Ahmad
,
Saleh Al-Oqeili
Journal of Software Engineering and Applications
Vol.4 No.8
,August 2, 2011
DOI:
10.4236/jsea.2011.48054
6,904
Downloads
13,527
Views
Citations
<
...
2
3
4
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top