Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Design and Implementation of End to End Encrypted Short Message Service (SMS) Using Hybrid Cipher Algorithm
(Articles)
Emmanuel Nwabueze Ekwonwune
,
Victor Chibunna Enyinnaya
Journal of Software Engineering and Applications
Vol.13 No.3
,March 31, 2020
DOI:
10.4236/jsea.2020.133003
1,252
Downloads
5,343
Views
Citations
An Improved Real-Time Face Recognition System at Low Resolution Based on Local Binary Pattern Histogram Algorithm and CLAHE
(Articles)
Kamal Chandra Paul
,
Semih Aslan
Optics and Photonics Journal
Vol.11 No.4
,April 12, 2021
DOI:
10.4236/opj.2021.114005
887
Downloads
3,920
Views
Citations
Process of Security Assurance Technique for Application Functional Logic in E-Commerce Systems
(Articles)
Faisal Nabi
,
Jianming Yong
,
Xiaohui Tao
,
Muhammad Saqib Malhi
,
Muhammad Farhan
,
Umar Mahmood
Journal of Information Security
Vol.12 No.3
,May 14, 2021
DOI:
10.4236/jis.2021.123010
481
Downloads
2,204
Views
Citations
Typology of International Migration in Globalization Challenges for Realizing Bangladeshi Migrant Worker’s Rights and Their Contribution to Social Development
(Articles)
Md. Anowarul Azad
Open Journal of Social Sciences
Vol.11 No.1
,January 19, 2023
DOI:
10.4236/jss.2023.111013
293
Downloads
1,447
Views
Citations
Possible Accidents Scenarios in Zaporizhzhia Nuclear Power Plant
(Articles)
Assef Molhem
Open Access Library Journal
Vol.10 No.2
,February 24, 2023
DOI:
10.4236/oalib.1109592
168
Downloads
2,915
Views
Citations
Accelerating Quantum Computing Readiness: Risk Management and Strategies for Sectors
(Articles)
Abdullah Ibrahim Salman Alsalman
Journal of Quantum Information Science
Vol.13 No.2
,June 13, 2023
DOI:
10.4236/jqis.2023.132003
597
Downloads
2,098
Views
Citations
Securing Stock Transactions Using Blockchain Technology: Architecture for Identifying and Reducing Vulnerabilities Linked to the Web Applications Used (MAHV-BC)
(Articles)
Kpinna Tiekoura Coulibaly
,
Abdou Maïga
,
Jerome Diako
,
Moustapha Diaby
Open Journal of Applied Sciences
Vol.13 No.11
,November 28, 2023
DOI:
10.4236/ojapps.2023.1311163
136
Downloads
631
Views
Citations
United States Healthcare Data Breaches: Insights for NIST SP 800-66 Revision 2 from a Review of the NIST SP 800-66 Revision 1
(Articles)
Mohammed Mohammed Raoof
Journal of Information Security
Vol.15 No.2
,April 29, 2024
DOI:
10.4236/jis.2024.152014
110
Downloads
1,031
Views
Citations
A Literature Review: Potential Effects That Health Apps on Mobile Devices May Have on Patient Privacy and Confidentiality
(Articles)
Anna Sheri George
,
Jomin George
,
Judy Jenkins
E-Health Telecommunication Systems and Networks
Vol.13 No.3
,August 9, 2024
DOI:
10.4236/etsn.2024.133003
148
Downloads
1,466
Views
Citations
The Impacts of State Instability on Services Delivery in Post-Conflict South Sudan
(Articles)
Miyar Ezekiel De’Nyok
Open Journal of Political Science
Vol.15 No.1
,January 14, 2025
DOI:
10.4236/ojps.2025.151011
92
Downloads
531
Views
Citations
Unix-Based Systems in Embedded and IoT Devices: Exploring the Versatility and Robustness
(Articles)
Hitendra Chaudhary
,
Andrew Mikhl Anthony
,
Olatunde Abiona
,
Clement Onime
Int'l J. of Communications, Network and System Sciences
Vol.18 No.2
,February 28, 2025
DOI:
10.4236/ijcns.2025.182002
34
Downloads
186
Views
Citations
AI-Driven JTAG Log Monitoring for FPGA
(Articles)
Raj Parikh
,
Khushi Parikh
Journal of Computer and Communications
Vol.13 No.4
,April 22, 2025
DOI:
10.4236/jcc.2025.134004
32
Downloads
203
Views
Citations
The Costa Rican Social Security Fund: The Cornerstone of the Costa Rican Health System
(Articles)
Percy Guzman
,
Pamela Marcus
,
Marianela Salazar
,
Mariana Bolanos
,
Michael Halpern
Open Journal of Applied Sciences
Vol.15 No.5
,May 28, 2025
DOI:
10.4236/ojapps.2025.155102
26
Downloads
324
Views
Citations
CARE Framework for Healthcare Cybersecurity Defense: A Human-Centric Approach
(Articles)
Mostafa Rahmany
,
Arunmozhi Selvi
E-Health Telecommunication Systems and Networks
Vol.14 No.2
,June 30, 2025
DOI:
10.4236/etsn.2025.142003
20
Downloads
89
Views
Citations
Optimizing Agricultural Supply Chain Management Practices to Address Food Security: A Case Study of Agro-Based Small and Medium-Sized Enterprises in Lira City, Northern Uganda
(Articles)
Apio Janet Oyee
,
Peter Paul Opio
Open Access Library Journal
Vol.12 No.7
,July 22, 2025
DOI:
10.4236/oalib.1113401
14
Downloads
98
Views
Citations
Harnessing the Power of DNS over HTTPS (DoH) for Internet Security and Pie-Hole Advertisement Blockers for Bandwidth Conservation
(Articles)
Richard Kobina Arkaifie
,
Abdul-Gafaar Sayibu
,
Enyonam Dagbe Amenumey
Intelligent Information Management
Vol.17 No.4
,July 23, 2025
DOI:
10.4236/iim.2025.174009
15
Downloads
92
Views
Citations
The History, Trend, Types, and Mitigation of Distributed Denial of Service Attacks
(Articles)
Richard Kabanda
,
Bertrand Byera
,
Henrietta Emeka
,
Khaja Taiyab Mohiuddin
Journal of Information Security
Vol.14 No.4
,October 27, 2023
DOI:
10.4236/jis.2023.144026
317
Downloads
2,131
Views
Citations
Cyberspace Security Using Adversarial Learning and Conformal Prediction
(Articles)
Harry Wechsler
Intelligent Information Management
Vol.7 No.4
,July 10, 2015
DOI:
10.4236/iim.2015.74016
7,070
Downloads
8,687
Views
Citations
New Aeroion Model of a Dangerous Natural Phenomenon—Ball Lightning
(Articles)
Simakov Andrey
Open Journal of Philosophy
Vol.14 No.2
,May 10, 2024
DOI:
10.4236/ojpp.2024.142024
138
Downloads
646
Views
Citations
IoT-Enabled RFID in Supply Chain Management: A Comprehensive Survey and Future Directions
(Articles)
Jannatul Ferdousmou
,
Mani Prabha
,
MD Omar Farouk
,
MD Samiun
,
Hasan Mahmud Sozib
,
Al Modabbir Zaman
Journal of Computer and Communications
Vol.12 No.11
,November 28, 2024
DOI:
10.4236/jcc.2024.1211015
216
Downloads
1,701
Views
Citations
<
...
40
41
42
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top