Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Malware Detection Using Deep Learning
(Articles)
Achi Harrisson Thiziers
,
Koné Tiémoman
,
N’guessan Behou Gérard
,
Traoré Tiémoko Qouddouss Kabir
Open Journal of Applied Sciences
Vol.13 No.12
,December 29, 2023
DOI:
10.4236/ojapps.2023.1312193
126
Downloads
612
Views
Citations
Reduce Malicious Activity in Trusted Programs
(Articles)
Elliot Ito
,
Depeng Li
Journal of Computer and Communications
Vol.10 No.10
,October 20, 2022
DOI:
10.4236/jcc.2022.1010003
74
Downloads
489
Views
Citations
Automorphism of Cyclic Codes
(Articles)
Naser Amiri
Intelligent Information Management
Vol.4 No.5A
,October 30, 2012
DOI:
10.4236/iim.2012.425043
6,388
Downloads
9,111
Views
Citations
This article belongs to the Special Issue on
Information System and Management
Performance Analysis of Malicious Node Detection and Elimination Using Clustering Approach on MANET
(Articles)
S. Gopalakrishnan
,
P. Mohan Kumar
Circuits and Systems
Vol.7 No.6
,May 12, 2016
DOI:
10.4236/cs.2016.76064
2,472
Downloads
4,320
Views
Citations
Malicious Nodes Detection in MANET Using Back-Off Clustering Approach
(Articles)
A. R. Rajeswari
,
K. Kulothungan
,
S. Ganapathy
,
A. Kannan
Circuits and Systems
Vol.7 No.8
,June 30, 2016
DOI:
10.4236/cs.2016.78180
1,969
Downloads
3,682
Views
Citations
Considerations for Planning a Multi-Platform Energy Utility System
(Articles)
Yahav Biran
,
Joel Dubow
,
Sudeep Pasricha
,
George Collins
,
John M. Borky
Energy and Power Engineering
Vol.9 No.12
,November 9, 2017
DOI:
10.4236/epe.2017.912046
889
Downloads
1,807
Views
Citations
This article belongs to the Special Issue on
Power System Protection
A Malicious and Malfunctioning Node Detection Scheme for Wireless Sensor Networks
(Articles)
Seo Hyun Oh
,
Chan O. Hong
,
Yoon Hwa Choi
Wireless Sensor Network
Vol.4 No.3
,March 30, 2012
DOI:
10.4236/wsn.2012.43012
6,693
Downloads
12,903
Views
Citations
Neighbor-Based Malicious Node Detection in Wireless Sensor Networks
(Articles)
Sung-Jib Yim
,
Yoon-Hwa Choi
Wireless Sensor Network
Vol.4 No.9
,September 20, 2012
DOI:
10.4236/wsn.2012.49032
5,808
Downloads
10,459
Views
Citations
A New Method for Sensing Cognitive Radio Network under Malicious Attacker
(Articles)
Shaahin Tabatabaee
,
Vahid Tabataba Vakili
Int'l J. of Communications, Network and System Sciences
Vol.6 No.1
,January 29, 2013
DOI:
10.4236/ijcns.2013.61007
4,462
Downloads
6,635
Views
Citations
Performance of Analysis Cognitive Radio with Cooperative Sensing under Malicious Attacks over Nakagami Faded Channels
(Articles)
Hagar O. Shazly
,
Asmaa Saafan
,
Hesham El Badawy
,
Hadia M. El Hennawy
Wireless Engineering and Technology
Vol.7 No.2
,April 12, 2016
DOI:
10.4236/wet.2016.72007
2,841
Downloads
3,695
Views
Citations
Explanation of Several Problems with Complementary Code
(Articles)
Wenbing Wu
,
Yupeng Wu
,
Jinquan Xiong
Creative Education
Vol.12 No.12
,December 31, 2021
DOI:
10.4236/ce.2021.1212221
103
Downloads
461
Views
Citations
The Study of the Secrets of the Genetic Code
(Articles)
N. N Kozlov
Journal of Computer and Communications
Vol.6 No.7
,July 31, 2018
DOI:
10.4236/jcc.2018.67007
1,343
Downloads
4,748
Views
Citations
Statistical Recognition Method of Binary BCH Code
(Articles)
Jiafeng Wang
,
Yang Yue
,
Jun Yao
Communications and Network
Vol.3 No.1
,February 25, 2011
DOI:
10.4236/cn.2011.31003
5,754
Downloads
11,543
Views
Citations
Construction of Cross-Cultural Identity by Language Choice and Linguistic Practice: A Case-Study of Mixed Hong Kong-Mainland Identity in University Contexts
(Articles)
Tao Gong
,
Lan Shuai
,
Jia Liu
Open Journal of Modern Linguistics
Vol.3 No.3
,August 20, 2013
DOI:
10.4236/ojml.2013.33028
6,512
Downloads
10,768
Views
Citations
A New Family of Optical Codes Based on Complementary Theory for OCDMA System
(Articles)
Xing Chen
,
Weixiao Meng
Communications and Network
Vol.5 No.3C
,November 8, 2013
DOI:
10.4236/cn.2013.53B2034
6,443
Downloads
7,784
Views
Citations
Computation of the Genetic Code: Full Version
(Articles)
N. N. Kozlov
Journal of Computer and Communications
Vol.5 No.10
,August 30, 2017
DOI:
10.4236/jcc.2017.510008
1,381
Downloads
3,278
Views
Citations
Amendments to the International Commercial Code and Its Legal Gaps
(Articles)
Alireza Azadikalkoshki
,
Mohsen Hosseinabadi
Open Journal of Political Science
Vol.8 No.2
,April 13, 2018
DOI:
10.4236/ojps.2018.82010
759
Downloads
1,579
Views
Citations
Translanguaging as EFL Teaching Method
(Articles)
Lela Bolkvadze
Creative Education
Vol.14 No.2
,February 15, 2023
DOI:
10.4236/ce.2023.142019
253
Downloads
1,535
Views
Citations
Prospects of Using Low-Code in the Creation of Automated Systems
(Articles)
Conrad Onesime Oboulhas Tsahat
,
  NGOULOU-A-NDZELI
,
Patrick Aurélien Ampiri Kwai
Open Journal of Applied Sciences
Vol.13 No.10
,October 31, 2023
DOI:
10.4236/ojapps.2023.1310147
85
Downloads
353
Views
Citations
A Two Step Secure Spectrum Sensing Algorithm Using Fuzzy Logic for Cognitive Radio Networks
(Articles)
Ehsan Moeen Taghavi
,
Bahman Abolhassani
Int'l J. of Communications, Network and System Sciences
Vol.4 No.8
,August 19, 2011
DOI:
10.4236/ijcns.2011.48062
5,488
Downloads
10,310
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top