Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Five Basic Types of Insider DoS Attacks of Code Dissemination in Wireless Sensor Networks
(Articles)
Yu ZHANG
,
Xing She ZHOU
,
Yi Ming JI
,
Yee Wei LAW
,
Marimuthu PALANISWAMI
Int'l J. of Communications, Network and System Sciences
Vol.2 No.1
,February 26, 2009
DOI:
10.4236/ijcns.2009.21008
7,188
Downloads
15,048
Views
Citations
A Comparison of Link Layer Attacks on Wireless Sensor Networks
(Articles)
Shahriar Mohammadi
,
Reza Ebrahimi Atani
,
Hossein Jadidoleslamy
Journal of Information Security
Vol.2 No.2
,April 8, 2011
DOI:
10.4236/jis.2011.22007
7,690
Downloads
15,571
Views
Citations
Effectiveness of Built-in Security Protection of Microsoft’s Windows Server 2003 against TCP SYN Based DDoS Attacks
(Articles)
Hari Krishna Vellalacheruvu
,
Sanjeev Kumar
Journal of Information Security
Vol.2 No.3
,July 29, 2011
DOI:
10.4236/jis.2011.23013
5,815
Downloads
11,128
Views
Citations
Evaluation of Electrocardiogram for Biometric Authentication
(Articles)
Yogendra Narain Singh
,
S K Singh
Journal of Information Security
Vol.3 No.1
,December 31, 2011
DOI:
10.4236/jis.2012.31005
24,463
Downloads
35,575
Views
Citations
Feedback Reliability Ratio of an Intrusion Detection System
(Articles)
Usha Banerjee
,
Gaurav Batra
,
K. V. Arya
Journal of Information Security
Vol.3 No.3
,July 25, 2012
DOI:
10.4236/jis.2012.33030
4,885
Downloads
9,053
Views
Citations
Calcium Affects on Vascular Endpoints (CAVE) Retrospective Cohort Trial
(Articles)
Rajib K. Bhattacharya
,
Vaishali B. Patel
,
James L. Vacek
Open Journal of Endocrine and Metabolic Diseases
Vol.3 No.1
,February 26, 2013
DOI:
10.4236/ojemd.2013.31012
3,407
Downloads
5,851
Views
Citations
Integrate Liveness Detection with Iris Verification to Construct Support Biometric System
(Articles)
Hanaa Mohsin Ahmad
,
Bushra Jabbar Abdulkareem
Journal of Computer and Communications
Vol.4 No.1
,January 26, 2016
DOI:
10.4236/jcc.2016.41003
4,984
Downloads
5,989
Views
Citations
Colluding Jamming Attack on a Grand Coalition by Aggrieved Nodes
(Articles)
Ashraf Al Sharah
,
Taiwo Oyedare
,
Sachin Shetty
Communications and Network
Vol.8 No.2
,March 31, 2016
DOI:
10.4236/cn.2016.82007
2,914
Downloads
3,683
Views
Citations
Performance of Analysis Cognitive Radio with Cooperative Sensing under Malicious Attacks over Nakagami Faded Channels
(Articles)
Hagar O. Shazly
,
Asmaa Saafan
,
Hesham El Badawy
,
Hadia M. El Hennawy
Wireless Engineering and Technology
Vol.7 No.2
,April 12, 2016
DOI:
10.4236/wet.2016.72007
2,843
Downloads
3,648
Views
Citations
RETRACTED: Isolating Wormhole Attack in Wireless Sensor Networks
(Articles)
L. Thanga Mariappan
,
K. Rubasoundar
Circuits and Systems
Vol.7 No.8
,June 29, 2016
DOI:
10.4236/cs.2016.78177
1,480
Downloads
2,540
Views
Citations
A Novel Review on Security and Routing Protocols in MANET
(Articles)
Muhammad Kashif Nazir
,
Rameez U. Rehman
,
Atif Nazir
Communications and Network
Vol.8 No.4
,September 22, 2016
DOI:
10.4236/cn.2016.84020
2,291
Downloads
5,497
Views
Citations
Practical Approaches to Securing an IT Environment
(Articles)
Emmanuel S. Kolawole
,
Warsame H. Ali
,
Cofie Penrose
,
John C. Fuller
Communications and Network
Vol.9 No.4
,November 30, 2017
DOI:
10.4236/cn.2017.94019
1,880
Downloads
5,293
Views
Citations
Security Analysis of Subspace Network Coding
(Articles)
Yantao Liu
,
Yasser Morgan
Journal of Information Security
Vol.9 No.1
,January 23, 2018
DOI:
10.4236/jis.2018.91007
980
Downloads
2,130
Views
Citations
An Analysis of Cybersecurity Attacks against Internet of Things and Security Solutions
(Articles)
Mohammad Rafsun Islam
,
K. M. Aktheruzzaman
Journal of Computer and Communications
Vol.8 No.4
,April 2, 2020
DOI:
10.4236/jcc.2020.84002
1,540
Downloads
8,073
Views
Citations
E-Fraud in Nigerian Banks: Why and How?
(Articles)
Babatunde Moses Ololade
,
Mary Kehinde Salawu
,
Aderemi Daniel Adekanmi
Journal of Financial Risk Management
Vol.9 No.3
,September 10, 2020
DOI:
10.4236/jfrm.2020.93012
945
Downloads
7,649
Views
Citations
Comparative Theoretical Studies of the Reactivity and Stability of Selected Groups of Isomers with Carbon-Oxygen and Carbon-Nitrogen Bonds
(Articles)
Issofa Patouossa
,
Eric N. Njabon
,
Alphonse Emadak
,
Naomi Zshika
Computational Chemistry
Vol.9 No.2
,April 30, 2021
DOI:
10.4236/cc.2021.92007
317
Downloads
850
Views
Citations
Security and Privacy Concerns over IoT Devices Attacks in Smart Cities (2022)
(Articles)
Azizi Majid
Journal of Computer and Communications
Vol.11 No.1
,January 20, 2023
DOI:
10.4236/jcc.2023.111003
250
Downloads
2,249
Views
Citations
Impact of Domestic Terrorism on Economy: A Literature Review
(Articles)
Robb Shawe
,
Ian R. McAndrew
iBusiness
Vol.15 No.1
,March 29, 2023
DOI:
10.4236/ib.2023.151006
180
Downloads
1,640
Views
Citations
Psychiatry in a War Situation:
In Situ
Therapeutic Approach to an Attack Case of Ber, Timbuktu in Mali
(Articles)
Kokou Messanh Agbémélé Soedje
,
Guy Gerard Aza-Gnandji
,
Damega Wenkourama
,
Tchédié Etdéchié Elvyreklikpo
,
Koffi Mawussé Mensah
,
Adjaré-Kamé Fidèle Ahara
,
Solo Conde
,
Koffi Djotepe Soedje
,
Kolou Simliwa Dassa
Open Journal of Psychiatry
Vol.13 No.4
,October 25, 2023
DOI:
10.4236/ojpsych.2023.134026
70
Downloads
252
Views
Citations
Increasing Threats to United States of America Infrastructure Based on Cyber-Attacks
(Articles)
Robb Shawe
,
Ian R. McAndrew
Journal of Software Engineering and Applications
Vol.16 No.10
,October 31, 2023
DOI:
10.4236/jsea.2023.1610027
186
Downloads
984
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top