Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
A 5G Perspective of an SDN-Based Privacy-Preserving Scheme for IoT Networks
(Articles)
Isaac Appiah
,
Xiaoming Jiang
,
Edward Kwadwo Boahen
,
Ebenezer Owusu
Int'l J. of Communications, Network and System Sciences
Vol.16 No.8
,August 17, 2023
DOI:
10.4236/ijcns.2023.168012
220
Downloads
919
Views
Citations
Enhancing Cybersecurity through AI and ML: Strategies, Challenges, and Future Directions
(Articles)
Maryam Roshanaei
,
Mahir R. Khan
,
Natalie N. Sylvester
Journal of Information Security
Vol.15 No.3
,July 5, 2024
DOI:
10.4236/jis.2024.153019
1,246
Downloads
8,936
Views
Citations
Privacy Protection Framework with Defined Policies for Service-Oriented Architecture
(Articles)
David S. Allison
,
Miriam A. M. Capretz
,
Hany F. EL Yamany
,
Shuying Wang
Journal of Software Engineering and Applications
Vol.5 No.3
,March 29, 2012
DOI:
10.4236/jsea.2012.53026
6,840
Downloads
10,374
Views
Citations
Design and Implementation of Secure Subnet Inside of Data Sensitive Network
(Articles)
Haiwei Xue
,
Yunliang Zhang
,
Zhien Guo
,
Yiqi Dai
Journal of Software Engineering and Applications
Vol.6 No.3B
,April 11, 2013
DOI:
10.4236/jsea.2013.63B012
3,140
Downloads
4,830
Views
Citations
Exploring the Characteristics of Data Breaches: A Descriptive Analytic Study
(Articles)
Dominik Molitor
,
Aditya Saharia
,
Viju Raghupathi
,
Wullianallur Raghupathi
Journal of Information Security
Vol.15 No.2
,April 2, 2024
DOI:
10.4236/jis.2024.152011
371
Downloads
2,784
Views
Citations
Multi-Dimensional Anonymization for Participatory Sensing Systems
(Articles)
Nafeez Abrar
,
Shaolin Zaman
,
Anindya Iqbal
,
Manzur Murshed
Int'l J. of Communications, Network and System Sciences
Vol.13 No.6
,June 30, 2020
DOI:
10.4236/ijcns.2020.136006
328
Downloads
939
Views
Citations
A Systematic Survey for Differential Privacy Techniques in Federated Learning
(Articles)
Yi Zhang
,
Yunfan Lu
,
Fengxia Liu
Journal of Information Security
Vol.14 No.2
,February 28, 2023
DOI:
10.4236/jis.2023.142008
893
Downloads
3,981
Views
Citations
This article belongs to the Special Issue on
Cybersecurity and Information Security
China’s Online Retail Market in an Era of Technological Innovations
(Articles)
Gal Forer
Beijing Law Review
Vol.10 No.4
,August 7, 2019
DOI:
10.4236/blr.2019.104040
1,349
Downloads
3,651
Views
Citations
This article belongs to the Special Issue on
Economic Law and Commercial Law
Cybersecurity and Privacy Protection in Vehicular Networks (VANETs)
(Articles)
Bruno Macena
,
Celio Albuquerque
,
Raphael Machado
Advances in Internet of Things
Vol.13 No.4
,October 30, 2023
DOI:
10.4236/ait.2023.134006
295
Downloads
1,543
Views
Citations
Navigating Human Rights in the Digital Age: An Exploration of Data Protection Laws in Brazil and in Europe
(Articles)
Gabriel Oliveira de Aguiar Borges
Beijing Law Review
Vol.14 No.4
,December 1, 2023
DOI:
10.4236/blr.2023.144098
127
Downloads
616
Views
Citations
This article belongs to the Special Issue on
Law and Human Rights
The Intersection of Privacy by Design and Behavioral Economics: Nudging Users towards Privacy-Friendly Choices
(Articles)
Vivek Kumar Agarwal
Journal of Information Security
Vol.15 No.4
,October 24, 2024
DOI:
10.4236/jis.2024.154031
59
Downloads
400
Views
Citations
When Corporal Acts Are Labeled Criminal: Lack of Privacy among the Homeless
(Articles)
Matthew R. Taylor
,
Eileen T. Walsh
Sociology Mind
Vol.8 No.2
,April 3, 2018
DOI:
10.4236/sm.2018.82011
1,376
Downloads
5,330
Views
Citations
Cyber Resilience through Real-Time Threat Analysis in Information Security
(Articles)
Aparna Gadhi
,
Ragha Madhavi Gondu
,
Hitendra Chaudhary
,
Olatunde Abiona
Int'l J. of Communications, Network and System Sciences
Vol.17 No.4
,April 30, 2024
DOI:
10.4236/ijcns.2024.174004
225
Downloads
967
Views
Citations
Computer Assisted Alerts Using Mental Model Approach for Customer Service Improvement
(Articles)
Abid Ghaffar
,
Mohamed Ridza Wahiddin
,
Asadullah Shaikh
Journal of Software Engineering and Applications
Vol.6 No.5B
,October 12, 2013
DOI:
10.4236/jsea.2013.65B005
3,814
Downloads
5,470
Views
Citations
Enhancing Mobile Cloud Computing Security Using Steganography
(Articles)
Hassan Reza
,
Madhuri Sonawane
Journal of Information Security
Vol.7 No.4
,July 19, 2016
DOI:
10.4236/jis.2016.74020
3,685
Downloads
6,751
Views
Citations
A Systematic Approach for Cyber Security in Vehicular Networks
(Articles)
Farhan Ahmad
,
Asma Adnane
,
Virginia N. L. Franqueira
Journal of Computer and Communications
Vol.4 No.16
,December 29, 2016
DOI:
10.4236/jcc.2016.416004
2,286
Downloads
6,307
Views
Citations
This article belongs to the Special Issue on
Vehicular Communications and Networks
Fifty-Six Big Data V’s Characteristics and Proposed Strategies to Overcome Security and Privacy Challenges (BD2)
(Articles)
Abou_el_ela Abdou Hussein
Journal of Information Security
Vol.11 No.4
,October 30, 2020
DOI:
10.4236/jis.2020.114019
1,371
Downloads
6,753
Views
Citations
Security Analysis of a Privacy-Preserving Identity-Based Encryption Architecture
(Articles)
Carlisle Adams
Journal of Information Security
Vol.13 No.4
,October 12, 2022
DOI:
10.4236/jis.2022.134018
217
Downloads
1,212
Views
Citations
This article belongs to the Special Issue on
Cryptography and Network Security
Utility-Based Anonymization Using Generalization Boundaries to Protect Sensitive Attributes
(Articles)
Abou-el-ela Abdou Hussien
,
Nagy Ramadan Darwish
,
Hesham A. Hefny
Journal of Information Security
Vol.6 No.3
,June 15, 2015
DOI:
10.4236/jis.2015.63019
4,847
Downloads
5,820
Views
Citations
Predicting Users Mobile App Privacy Preferences
(Articles)
Aziz Alshehri
,
Fayez Alotaibi
Journal of Computer and Communications
Vol.7 No.10
,October 22, 2019
DOI:
10.4236/jcc.2019.710014
552
Downloads
1,609
Views
Citations
<
...
2
3
4
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top