Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Education Technology Cloud Platform Framework Establishment and Security
(Articles)
Guoqiang Hu
,
Yanrong Yang
,
Li Li
Journal of Computer and Communications
Vol.4 No.7
,May 19, 2016
DOI:
10.4236/jcc.2016.47002
2,066
Downloads
3,088
Views
Citations
Cloud Computing and the Essentials of Security Management
(Articles)
Zhong Hua
,
Xin Wang
Open Access Library Journal
Vol.3 No.5
,May 30, 2016
DOI:
10.4236/oalib.1102618
1,808
Downloads
4,468
Views
Citations
Forensics Issues in Cloud Computing
(Articles)
Aqil Burney
,
Muhammad Asif
,
Zain Abbas
Journal of Computer and Communications
Vol.4 No.10
,August 22, 2016
DOI:
10.4236/jcc.2016.410007
3,297
Downloads
7,831
Views
Citations
Analyzing Security Threats to Virtual Machines Monitor in Cloud Computing Environment
(Articles)
Ahmad Fayez S. Althobaiti
Journal of Information Security
Vol.8 No.1
,December 7, 2016
DOI:
10.4236/jis.2017.81001
3,453
Downloads
7,262
Views
Citations
Security Model for Cloud Computing: Case Report of Organizational Vulnerability
(Articles)
Sakharkar Shreyas
Journal of Information Security
Vol.14 No.4
,August 9, 2023
DOI:
10.4236/jis.2023.144015
286
Downloads
1,931
Views
Citations
This article belongs to the Special Issue on
Cybersecurity and Information Security
Cloud Computing: Purpose and Future
(Articles)
Robb Shawe
Journal of Software Engineering and Applications
Vol.17 No.10
,October 16, 2024
DOI:
10.4236/jsea.2024.1710041
62
Downloads
416
Views
Citations
Security Implications of Edge Computing in Cloud Networks
(Articles)
Sina Ahmadi
Journal of Computer and Communications
Vol.12 No.2
,February 9, 2024
DOI:
10.4236/jcc.2024.122003
325
Downloads
1,619
Views
Citations
Data Security Issues and Challenges in Cloud Computing: A Conceptual Analysis and Review
(Articles)
Osama Harfoushi
,
Bader Alfawwaz
,
Nazeeh A. Ghatasheh
,
Ruba Obiedat
,
Mua’ad M. Abu-Faraj
,
Hossam Faris
Communications and Network
Vol.6 No.1
,February 13, 2014
DOI:
10.4236/cn.2014.61003
14,734
Downloads
29,515
Views
Citations
Cloud Security: Services, Risks, and a Case Study on Amazon Cloud Services
(Articles)
Patrick Mosca
,
Yanping Zhang
,
Zhifeng Xiao
,
Yun Wang
Int'l J. of Communications, Network and System Sciences
Vol.7 No.12
,December 24, 2014
DOI:
10.4236/ijcns.2014.712053
10,714
Downloads
16,850
Views
Citations
A Cloud Computing Security Assessment Framework for Small and Medium Enterprises
(Articles)
Satwinder Singh Rupra
,
Amos Omamo
Journal of Information Security
Vol.11 No.4
,September 23, 2020
DOI:
10.4236/jis.2020.114014
1,332
Downloads
4,351
Views
Citations
Information Security in the Cloud: Emerging Trends and Challenges
(Articles)
Keerthana Chitreddy
,
Andrew Mikhl Anthony
,
Chinna Manikanta Bandaru
,
Olatunde Abiona
Int'l J. of Communications, Network and System Sciences
Vol.17 No.5
,May 31, 2024
DOI:
10.4236/ijcns.2024.175005
89
Downloads
459
Views
Citations
A Multilayer Security Framework for Cloud Computing in Internet of Things (IoT) Domain
(Articles)
M. Mamun-Ibn-Abdullah
,
M. Humayun Kabir
Journal of Computer and Communications
Vol.9 No.7
,July 27, 2021
DOI:
10.4236/jcc.2021.97004
397
Downloads
1,992
Views
Citations
Towards a Comprehensive Security Framework of Cloud Data Storage Based on Multi Agent System Architecture
(Articles)
Amir Mohamed Talib
,
Rodziah Atan
,
Rusli Abdullah
,
Masrah Azrifah Azmi Murad
Journal of Information Security
Vol.3 No.4
,October 31, 2012
DOI:
10.4236/jis.2012.34036
6,787
Downloads
11,816
Views
Citations
A Review of Anomaly Detection Systems in Cloud Networks and Survey of Cloud Security Measures in Cloud Storage Applications
(Review)
Arif Sari
Journal of Information Security
Vol.6 No.2
,April 23, 2015
DOI:
10.4236/jis.2015.62015
10,834
Downloads
14,507
Views
Citations
Data Security of Mobile Cloud Computing on Cloud Server
(Articles)
Mohammad Waseem
,
Abdullah Lakhan
,
Irfan Ali Jamali
Open Access Library Journal
Vol.3 No.4
,April 28, 2016
DOI:
10.4236/oalib.1102377
1,817
Downloads
8,217
Views
Citations
New Proposed Robust, Scalable and Secure Network Cloud Computing Storage Architecture
(Articles)
Fawaz S. Al-Anzi
,
Ayed A. Salman
,
Noby K. Jacob
Journal of Software Engineering and Applications
Vol.7 No.5
,May 6, 2014
DOI:
10.4236/jsea.2014.75031
5,164
Downloads
7,215
Views
Citations
Implications of SSO Solutions on Cloud Applications
(Articles)
Mohamed Watfa
,
Shakir Khan
,
Ali Radmehr
Communications and Network
Vol.6 No.3
,August 21, 2014
DOI:
10.4236/cn.2014.63020
3,469
Downloads
4,315
Views
Citations
Safety Protection Design of Virtual Machine Drift Flow in Cloud Data Center Based on VXLAN Technology
(Articles)
Heping Pu
,
Yijun Wang
,
Xinke An
Journal of Computer and Communications
Vol.8 No.8
,August 28, 2020
DOI:
10.4236/jcc.2020.88005
553
Downloads
1,550
Views
Citations
A Novel LSB Steganography Technique for Enhancing Cloud Security
(Articles)
Ahsan Ullah
,
Md. Inzamul Haque
,
Md. Mokarom Hossain
,
Md. Sadman Ahammad
,
Mst. Nishita Aktar
Journal of Information Security
Vol.15 No.3
,July 17, 2024
DOI:
10.4236/jis.2024.153021
80
Downloads
437
Views
Citations
An Agent Based Model for Ransomware Detection and Mitigation in a Cloud System
(Articles)
N’golo Konate
,
Tenan Yeo
Journal of Information Security
Vol.15 No.4
,August 1, 2024
DOI:
10.4236/jis.2024.154024
110
Downloads
428
Views
Citations
This article belongs to the Special Issue on
Cybersecurity and Information Security
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top